-
Low-Crosstalk, Silicon-Fabricated Optical Waveguides for Laser Delivery to Matter Qubits
Authors:
Clayton L. Craft,
Nicholas J. Barton,
Andrew C. Klug,
Kenneth Scalzi,
Ian Wildemann,
Pramod Asagodu,
Joseph D. Broz,
Nikola L. Porto,
Michael Macalik,
Anthony Rizzo,
Garrett Percevault,
Christopher C. Tison,
A. Matthew Smith,
Michael L. Fanto,
James Schneeloch,
Erin Sheridan,
Dylan Heberle,
Andrew Brownell,
Vijay S. S. Sundaram,
Venkatesh Deenadayalan,
Matthew van Niekerk,
Evan Manfreda-Schulz,
Gregory A. Howland,
Stefan F. Preble,
Daniel Coleman
, et al. (8 additional authors not shown)
Abstract:
Reliable control of quantum information in matter-based qubits requires precisely applied external fields, and unaccounted for spatial cross-talk of these fields between adjacent qubits leads to loss of fidelity. We report a CMOS foundry-produced, micro-fabricated silicon nitride (Si3N4) optical waveguide for addressing a chain of eight, unequally-spaced trapped barium ions with crosstalk compatib…
▽ More
Reliable control of quantum information in matter-based qubits requires precisely applied external fields, and unaccounted for spatial cross-talk of these fields between adjacent qubits leads to loss of fidelity. We report a CMOS foundry-produced, micro-fabricated silicon nitride (Si3N4) optical waveguide for addressing a chain of eight, unequally-spaced trapped barium ions with crosstalk compatible with scalable quantum information processing. The crosstalk mitigation techniques incorporated into the chip design result in a reduction of the measured optical field by at least 50.8(1.3) dB between adjacent waveguide outputs near 650 nm and similar behavior for devices designed for 493 nm and 585 nm. The waveguide outputs near 650 nm, along with a global laser near 493 nm were used to laser-cool a chain of eight barium-138 ions, and a camera imaged the resulting fluorescence at 493 nm.
△ Less
Submitted 27 June, 2024; v1 submitted 25 June, 2024;
originally announced June 2024.
-
The $e$-positivity of the chromatic symmetric function for twinned paths and cycles
Authors:
Esther Banaian,
Kyle Celano,
Megan Chang-Lee,
Laura Colmenarejo,
Owen Goff,
Jamie Kimble,
Lauren Kimpel,
John Lentfer,
**ting Liang,
Sheila Sundaram
Abstract:
The operation of twinning a graph at a vertex was introduced by Foley, Hoàng, and Merkel (2019), who conjectured that twinning preserves $e$-positivity of the chromatic symmetric function. A counterexample to this conjecture was given by Li, Li, Wang, and Yang (2021). In this paper, we prove that $e$-positivity is preserved by the twinning operation on cycles, by giving an $e$-positive generating…
▽ More
The operation of twinning a graph at a vertex was introduced by Foley, Hoàng, and Merkel (2019), who conjectured that twinning preserves $e$-positivity of the chromatic symmetric function. A counterexample to this conjecture was given by Li, Li, Wang, and Yang (2021). In this paper, we prove that $e$-positivity is preserved by the twinning operation on cycles, by giving an $e$-positive generating function for the chromatic symmetric function, as well as an $e$-positive recurrence. We derive similar $e$-positive generating functions and recurrences for twins of paths. Our methods make use of the important triple deletion formulas of Orellana and Scott (2014), as well as new symmetric function identities.
△ Less
Submitted 27 May, 2024;
originally announced May 2024.
-
Submodular Information Selection for Hypothesis Testing with Misclassification Penalties
Authors:
Jayanth Bhargav,
Mahsa Ghasemi,
Shreyas Sundaram
Abstract:
We consider the problem of selecting an optimal subset of information sources for a hypothesis testing/classification task where the goal is to identify the true state of the world from a finite set of hypotheses, based on finite observation samples from the sources. In order to characterize the learning performance, we propose a misclassification penalty framework, which enables nonuniform treatm…
▽ More
We consider the problem of selecting an optimal subset of information sources for a hypothesis testing/classification task where the goal is to identify the true state of the world from a finite set of hypotheses, based on finite observation samples from the sources. In order to characterize the learning performance, we propose a misclassification penalty framework, which enables nonuniform treatment of different misclassification errors. In a centralized Bayesian learning setting, we study two variants of the subset selection problem: (i) selecting a minimum cost information set to ensure that the maximum penalty of misclassifying the true hypothesis is below a desired bound and (ii) selecting an optimal information set under a limited budget to minimize the maximum penalty of misclassifying the true hypothesis. Under certain assumptions, we prove that the objective (or constraints) of these combinatorial optimization problems are weak (or approximate) submodular, and establish high-probability performance guarantees for greedy algorithms. Further, we propose an alternate metric for information set selection which is based on the total penalty of misclassification. We prove that this metric is submodular and establish near-optimal guarantees for the greedy algorithms for both the information set selection problems. Finally, we present numerical simulations to validate our theoretical results over several randomly generated instances.
△ Less
Submitted 27 June, 2024; v1 submitted 17 May, 2024;
originally announced May 2024.
-
Can a Hallucinating Model help in Reducing Human "Hallucination"?
Authors:
Sowmya S Sundaram,
Balaji Alwar
Abstract:
The prevalence of unwarranted beliefs, spanning pseudoscience, logical fallacies, and conspiracy theories, presents substantial societal hurdles and the risk of disseminating misinformation. Utilizing established psychometric assessments, this study explores the capabilities of large language models (LLMs) vis-a-vis the average human in detecting prevalent logical pitfalls. We undertake a philosop…
▽ More
The prevalence of unwarranted beliefs, spanning pseudoscience, logical fallacies, and conspiracy theories, presents substantial societal hurdles and the risk of disseminating misinformation. Utilizing established psychometric assessments, this study explores the capabilities of large language models (LLMs) vis-a-vis the average human in detecting prevalent logical pitfalls. We undertake a philosophical inquiry, juxtaposing the rationality of humans against that of LLMs. Furthermore, we propose methodologies for harnessing LLMs to counter misconceptions, drawing upon psychological models of persuasion such as cognitive dissonance theory and elaboration likelihood theory. Through this endeavor, we highlight the potential of LLMs as personalized misinformation debunking agents.
△ Less
Submitted 1 May, 2024;
originally announced May 2024.
-
Koszulity, supersolvability, and Stirling representations
Authors:
Ayah Almousa,
Victor Reiner,
Sheila Sundaram
Abstract:
Supersolvable hyperplane arrangements and matroids are known to give rise to certain Koszul algebras, namely their Orlik-Solomon algebras and graded Varchenko-Gel'fand algebras. We explore how this interacts with group actions, particularly for the braid arrangement and the action of the symmetric group, where the Hilbert functions of the algebras and their Koszul duals are given by Stirling numbe…
▽ More
Supersolvable hyperplane arrangements and matroids are known to give rise to certain Koszul algebras, namely their Orlik-Solomon algebras and graded Varchenko-Gel'fand algebras. We explore how this interacts with group actions, particularly for the braid arrangement and the action of the symmetric group, where the Hilbert functions of the algebras and their Koszul duals are given by Stirling numbers of the first and second kinds, respectively. The corresponding symmetric group representations exhibit branching rules that interpret Stirling number recurrences, which are shown to apply to all supersolvable arrangements. They also enjoy representation stability properties that follow from Koszul duality.
△ Less
Submitted 16 April, 2024;
originally announced April 2024.
-
Attention based End to end network for Offline Writer Identification on Word level data
Authors:
Vineet Kumar,
Suresh Sundaram
Abstract:
Writer identification due to its widespread application in various fields has gained popularity over the years. In scenarios where optimum handwriting samples are available, whether they be in the form of a single line, a sentence, or an entire page, writer identification algorithms have demonstrated noteworthy levels of accuracy. However, in scenarios where only a limited number of handwritten sa…
▽ More
Writer identification due to its widespread application in various fields has gained popularity over the years. In scenarios where optimum handwriting samples are available, whether they be in the form of a single line, a sentence, or an entire page, writer identification algorithms have demonstrated noteworthy levels of accuracy. However, in scenarios where only a limited number of handwritten samples are available, particularly in the form of word images, there is a significant scope for improvement.
In this paper, we propose a writer identification system based on an attention-driven Convolutional Neural Network (CNN). The system is trained utilizing image segments, known as fragments, extracted from word images, employing a pyramid-based strategy. This methodology enables the system to capture a comprehensive representation of the data, encompassing both fine-grained details and coarse features across various levels of abstraction. These extracted fragments serve as the training data for the convolutional network, enabling it to learn a more robust representation compared to traditional convolution-based networks trained on word images. Additionally, the paper explores the integration of an attention mechanism to enhance the representational power of the learned features. The efficacy of the proposed algorithm is evaluated on three benchmark databases, demonstrating its proficiency in writer identification tasks, particularly in scenarios with limited access to handwriting data.
△ Less
Submitted 11 April, 2024;
originally announced April 2024.
-
Use of a Structured Knowledge Base Enhances Metadata Curation by Large Language Models
Authors:
Sowmya S. Sundaram,
Benjamin Solomon,
Avani Khatri,
Anisha Laumas,
Purvesh Khatri,
Mark A. Musen
Abstract:
Metadata play a crucial role in ensuring the findability, accessibility, interoperability, and reusability of datasets. This paper investigates the potential of large language models (LLMs), specifically GPT-4, to improve adherence to metadata standards. We conducted experiments on 200 random data records describing human samples relating to lung cancer from the NCBI BioSample repository, evaluati…
▽ More
Metadata play a crucial role in ensuring the findability, accessibility, interoperability, and reusability of datasets. This paper investigates the potential of large language models (LLMs), specifically GPT-4, to improve adherence to metadata standards. We conducted experiments on 200 random data records describing human samples relating to lung cancer from the NCBI BioSample repository, evaluating GPT-4's ability to suggest edits for adherence to metadata standards. We computed the adherence accuracy of field name-field value pairs through a peer review process, and we observed a marginal average improvement in adherence to the standard data dictionary from 79% to 80% (p<0.01). We then prompted GPT-4 with domain information in the form of the textual descriptions of CEDAR templates and recorded a significant improvement to 97% from 79% (p<0.01). These results indicate that, while LLMs may not be able to correct legacy metadata to ensure satisfactory adherence to standards when unaided, they do show promise for use in automated metadata curation when integrated with a structured knowledge base.
△ Less
Submitted 17 April, 2024; v1 submitted 8 April, 2024;
originally announced April 2024.
-
Variable-Pitch-Propeller Mechanism Design, and Development of Heliquad for Mid-flight Flip** and Fault-Tolerant-Control
Authors:
Eeshan Kulkarni,
Suresh Sundaram
Abstract:
This paper presents the design of Variable-Pitch-Propeller mechanism and its application on a quadcopter called Heliquad to demonstrate its unique capabilities. The input-output relationship is estimated for a generic mechanism. Various singularities and actuator sizing requirements are also analyzed. The mechanism is manufactured, and the validated input-output relationship is implemented in the…
▽ More
This paper presents the design of Variable-Pitch-Propeller mechanism and its application on a quadcopter called Heliquad to demonstrate its unique capabilities. The input-output relationship is estimated for a generic mechanism. Various singularities and actuator sizing requirements are also analyzed. The mechanism is manufactured, and the validated input-output relationship is implemented in the controller of Heliquad. Heliquad is controlled by a unified non-switching cascaded attitude-rate controller, followed by a unique Neural-Network-based reconfigurable control allocation to approximate nonlinear relationship between the control input and actuator command. The Heliquad prototype's mid-flight flip experiment validates the controller's tracking performance in upright as well as inverted conditions. The prototype is then flown in upright condition with only three of its working actuators. To the best of the authors' knowledge, the cambered airfoil propeller-equipped Heliquad prototype demonstrates full-attitude control, including yaw-rate, on three working actuators for the first time in the literature. Finally, the utility of this novel capability is demonstrated by safe recovery and precise landing post-mid-flight actuator failure crisis. Overall, the controller tracks the references well for all the experiments, and the output of the NN-based control allocation remains bounded throughout.
△ Less
Submitted 8 April, 2024;
originally announced April 2024.
-
Scalable Distributed Optimization of Multi-Dimensional Functions Despite Byzantine Adversaries
Authors:
Kananart Kuwaranancharoen,
Lei Xin,
Shreyas Sundaram
Abstract:
The problem of distributed optimization requires a group of networked agents to compute a parameter that minimizes the average of their local cost functions. While there are a variety of distributed optimization algorithms that can solve this problem, they are typically vulnerable to "Byzantine" agents that do not follow the algorithm. Recent attempts to address this issue focus on single dimensio…
▽ More
The problem of distributed optimization requires a group of networked agents to compute a parameter that minimizes the average of their local cost functions. While there are a variety of distributed optimization algorithms that can solve this problem, they are typically vulnerable to "Byzantine" agents that do not follow the algorithm. Recent attempts to address this issue focus on single dimensional functions, or assume certain statistical properties of the functions at the agents. In this paper, we provide two resilient, scalable, distributed optimization algorithms for multi-dimensional functions. Our schemes involve two filters, (1) a distance-based filter and (2) a min-max filter, which each remove neighborhood states that are extreme (defined precisely in our algorithms) at each iteration. We show that these algorithms can mitigate the impact of up to $F$ (unknown) Byzantine agents in the neighborhood of each regular agent. In particular, we show that if the network topology satisfies certain conditions, all of the regular agents' states are guaranteed to converge to a bounded region that contains the minimizer of the average of the regular agents' functions.
△ Less
Submitted 14 March, 2024; v1 submitted 11 March, 2024;
originally announced March 2024.
-
C3D: Cascade Control with Change Point Detection and Deep Koopman Learning for Autonomous Surface Vehicles
Authors:
Jianwen Li,
Hyunsang Park,
Wenjian Hao,
Lei Xin,
Jalil Chavez-Galaviz,
A**kya Chaudhary,
Meredith Bloss,
Kyle Pattison,
Christopher Vo,
Devesh Upadhyay,
Shreyas Sundaram,
Shaoshuai Mou,
Nina Mahmoudian
Abstract:
In this paper, we discuss the development and deployment of a robust autonomous system capable of performing various tasks in the maritime domain under unknown dynamic conditions. We investigate a data-driven approach based on modular design for ease of transfer of autonomy across different maritime surface vessel platforms. The data-driven approach alleviates issues related to a priori identifica…
▽ More
In this paper, we discuss the development and deployment of a robust autonomous system capable of performing various tasks in the maritime domain under unknown dynamic conditions. We investigate a data-driven approach based on modular design for ease of transfer of autonomy across different maritime surface vessel platforms. The data-driven approach alleviates issues related to a priori identification of system models that may become deficient under evolving system behaviors or shifting, unanticipated, environmental influences. Our proposed learning-based platform comprises a deep Koopman system model and a change point detector that provides guidance on domain shifts prompting relearning under severe exogenous and endogenous perturbations. Motion control of the autonomous system is achieved via an optimal controller design. The Koopman linearized model naturally lends itself to a linear-quadratic regulator (LQR) control design. We propose the C3D control architecture Cascade Control with Change Point Detection and Deep Koopman Learning. The framework is verified in station kee** task on an ASV in both simulation and real experiments. The approach achieved at least 13.9 percent improvement in mean distance error in all test cases compared to the methods that do not consider system changes.
△ Less
Submitted 25 March, 2024; v1 submitted 9 March, 2024;
originally announced March 2024.
-
Duality between the quantum inverted harmonic oscillator and inverse square potentials
Authors:
Sriram Sundaram,
C. P. Burgess,
D. H. J. O'Dell
Abstract:
In this paper we show how the quantum mechanics of the inverted harmonic oscillator can be mapped to the quantum mechanics of a particle in a super-critical inverse square potential. We demonstrate this by relating both of these systems to the Berry-Keating system with hamiltonian $H=(xp+px)/2$. It has long been appreciated that the quantum mechanics of the inverse square potential has an ambiguit…
▽ More
In this paper we show how the quantum mechanics of the inverted harmonic oscillator can be mapped to the quantum mechanics of a particle in a super-critical inverse square potential. We demonstrate this by relating both of these systems to the Berry-Keating system with hamiltonian $H=(xp+px)/2$. It has long been appreciated that the quantum mechanics of the inverse square potential has an ambiguity in choosing a boundary condition near the origin and we show how this ambiguity is mapped to the inverted harmonic oscillator system. Imposing a boundary condition requires specifying a distance scale where it is applied and changes to this scale come with a renormalization group (RG) evolution of the boundary condition that ensures observables do not directly depend on the scale (which is arbitrary). Physical scales instead emerge as RG invariants of this evolution. The RG flow for the inverse square potential is known to follow limit cycles describing the discrete breaking of classical scale invariance in a simple example of a quantum anomaly, and we find that limit cycles also occur for the inverted harmonic oscillator. However, unlike the inverse square potential where the continuous scaling symmetry is explicit, in the case of the inverted harmonic oscillator it is hidden and occurs because the hamiltonian is part of a larger su(1,1) spectrum generating algebra. Our map does not require the boundary condition to be self-adjoint, as can be appropriate for systems that involve the absorption or emission of particles.
△ Less
Submitted 21 February, 2024;
originally announced February 2024.
-
Towards Improved Imbalance Robustness in Continual Multi-Label Learning with Dual Output Spiking Architecture (DOSA)
Authors:
Sourav Mishra,
Shirin Dora,
Suresh Sundaram
Abstract:
Algorithms designed for addressing typical supervised classification problems can only learn from a fixed set of samples and labels, making them unsuitable for the real world, where data arrives as a stream of samples often associated with multiple labels over time. This motivates the study of task-agnostic continual multi-label learning problems. While algorithms using deep learning approaches fo…
▽ More
Algorithms designed for addressing typical supervised classification problems can only learn from a fixed set of samples and labels, making them unsuitable for the real world, where data arrives as a stream of samples often associated with multiple labels over time. This motivates the study of task-agnostic continual multi-label learning problems. While algorithms using deep learning approaches for continual multi-label learning have been proposed in the recent literature, they tend to be computationally heavy. Although spiking neural networks (SNNs) offer a computationally efficient alternative to artificial neural networks, existing literature has not used SNNs for continual multi-label learning. Also, accurately determining multiple labels with SNNs is still an open research problem. This work proposes a dual output spiking architecture (DOSA) to bridge these research gaps. A novel imbalance-aware loss function is also proposed, improving the multi-label classification performance of the model by making it more robust to data imbalance. A modified F1 score is presented to evaluate the effectiveness of the proposed loss function in handling imbalance. Experiments on several benchmark multi-label datasets show that DOSA trained with the proposed loss function shows improved robustness to data imbalance and obtains better continual multi-label learning performance than CIFDM, a previous state-of-the-art algorithm.
△ Less
Submitted 7 February, 2024;
originally announced February 2024.
-
Design of radiative cooling paint coating and insights into its sub-ambient cooling behaviour
Authors:
Bhrigu Rishi Mishra,
Sreerag Sundaram,
Karthik Sasihithlu
Abstract:
Recent developments in radiative cooling technologies have primarily focused on affordable paint coatings that are easy to fabricate and deploy. Using a systematic approach to obtain optimal parameters, a radiative cooling (RC) paint coating using titanium dioxide (TiO2) and polydimethylsiloxane (PDMS) is designed. The resulting paint exhibits a high solar reflectivity of 88.2 % (more than 94% in…
▽ More
Recent developments in radiative cooling technologies have primarily focused on affordable paint coatings that are easy to fabricate and deploy. Using a systematic approach to obtain optimal parameters, a radiative cooling (RC) paint coating using titanium dioxide (TiO2) and polydimethylsiloxane (PDMS) is designed. The resulting paint exhibits a high solar reflectivity of 88.2 % (more than 94% in visible and NIR) and an emissivity of 92.4 %. Outdoor testing demonstrates a maximum reduction of 7.9 0C in the internal temperature of an RC paint-coated aluminium (Al) box compared to a bare Al box but in contrast to other studies, no sub-ambient cooling have been observed. In this context, a comprehensive analysis explaining the absence of sub-ambient cooling and underscore the importance of a standardized reporting methodology for RC paints has been discussed. Theoretical calculations suggest that the developed RC paint can achieve sub-ambient cooling (1-4 0C) under specific ambient conditions.
△ Less
Submitted 22 January, 2024;
originally announced January 2024.
-
Graph-based Prediction and Planning Policy Network (GP3Net) for scalable self-driving in dynamic environments using Deep Reinforcement Learning
Authors:
Jayabrata Chowdhury,
Venkataramanan Shivaraman,
Suresh Sundaram,
P B Sujit
Abstract:
Recent advancements in motion planning for Autonomous Vehicles (AVs) show great promise in using expert driver behaviors in non-stationary driving environments. However, learning only through expert drivers needs more generalizability to recover from domain shifts and near-failure scenarios due to the dynamic behavior of traffic participants and weather conditions. A deep Graph-based Prediction an…
▽ More
Recent advancements in motion planning for Autonomous Vehicles (AVs) show great promise in using expert driver behaviors in non-stationary driving environments. However, learning only through expert drivers needs more generalizability to recover from domain shifts and near-failure scenarios due to the dynamic behavior of traffic participants and weather conditions. A deep Graph-based Prediction and Planning Policy Network (GP3Net) framework is proposed for non-stationary environments that encodes the interactions between traffic participants with contextual information and provides a decision for safe maneuver for AV. A spatio-temporal graph models the interactions between traffic participants for predicting the future trajectories of those participants. The predicted trajectories are utilized to generate a future occupancy map around the AV with uncertainties embedded to anticipate the evolving non-stationary driving environments. Then the contextual information and future occupancy maps are input to the policy network of the GP3Net framework and trained using Proximal Policy Optimization (PPO) algorithm. The proposed GP3Net performance is evaluated on standard CARLA benchmarking scenarios with domain shifts of traffic patterns (urban, highway, and mixed). The results show that the GP3Net outperforms previous state-of-the-art imitation learning-based planning models for different towns. Further, in unseen new weather conditions, GP3Net completes the desired route with fewer traffic infractions. Finally, the results emphasize the advantage of including the prediction module to enhance safety measures in non-stationary environments.
△ Less
Submitted 10 December, 2023;
originally announced December 2023.
-
A Comprehensive Study on Modelling and Control of Autonomous Underwater Vehicle
Authors:
Ra**i Makam,
Pruthviraj Mane,
Suresh Sundaram,
P. B. Sujit
Abstract:
Autonomous underwater vehicles (AUV) have become the de facto vehicle for remote operations involving oceanography, inspection, and monitoring tasks. These vehicles operate in different and often challenging environments; hence, the design and development of the AUV involving hydrodynamics and control systems need to be designed in detail. This book chapter presents a study on the modelling and ro…
▽ More
Autonomous underwater vehicles (AUV) have become the de facto vehicle for remote operations involving oceanography, inspection, and monitoring tasks. These vehicles operate in different and often challenging environments; hence, the design and development of the AUV involving hydrodynamics and control systems need to be designed in detail. This book chapter presents a study on the modelling and robust control of a research vehicle in the presence of uncertainties. The vehicle's dynamic behaviour is modelled using a 6-degree-of-freedom approach, considering the effect of ocean currents. The level flight requirements for different speeds are derived, and the resulting model is decomposed into horizontal and vertical subsystems for linear analysis. The simulation results presented focus on the efficacy of linear controllers within three key subsystems: depth, yaw, and speed. Moreover, level-flight outcomes are demonstrated for a speed of 4 knots. The nonlinear control strategies employed in this study encompass conventional and sliding-mode control (SMC) methodologies. To ensure accurate tracking performance, the controller design considers the vehicle's dynamics with various uncertainties such as ocean currents, parameter uncertainty, CG (Center of Gravity) deviation and buoyancy variation. Both conventional and nonlinear SMC controllers' outcomes are showcased with a lawn-mowing manoeuvre scenario. A systematic comparison is drawn between the robustness of SMC against disturbances and parameter fluctuations in contrast to conventional controllers. Importantly, these results underscore the trade-off that accompanies SMC's robustness, as it necessitates a higher level of complexity in terms of controller design, intricate implementation intricacies, and the management of chattering phenomena.
△ Less
Submitted 18 January, 2024; v1 submitted 5 December, 2023;
originally announced December 2023.
-
Contrastive Learning-Based Spectral Knowledge Distillation for Multi-Modality and Missing Modality Scenarios in Semantic Segmentation
Authors:
Aniruddh Sikdar,
Jayant Teotia,
Suresh Sundaram
Abstract:
Improving the performance of semantic segmentation models using multispectral information is crucial, especially for environments with low-light and adverse conditions. Multi-modal fusion techniques pursue either the learning of cross-modality features to generate a fused image or engage in knowledge distillation but address multimodal and missing modality scenarios as distinct issues, which is no…
▽ More
Improving the performance of semantic segmentation models using multispectral information is crucial, especially for environments with low-light and adverse conditions. Multi-modal fusion techniques pursue either the learning of cross-modality features to generate a fused image or engage in knowledge distillation but address multimodal and missing modality scenarios as distinct issues, which is not an optimal approach for multi-sensor models. To address this, a novel multi-modal fusion approach called CSK-Net is proposed, which uses a contrastive learning-based spectral knowledge distillation technique along with an automatic mixed feature exchange mechanism for semantic segmentation in optical (EO) and infrared (IR) images. The distillation scheme extracts detailed textures from the optical images and distills them into the optical branch of CSK-Net. The model encoder consists of shared convolution weights with separate batch norm (BN) layers for both modalities, to capture the multi-spectral information from different modalities of the same objects. A Novel Gated Spectral Unit (GSU) and mixed feature exchange strategy are proposed to increase the correlation of modality-shared information and decrease the modality-specific information during the distillation process. Comprehensive experiments show that CSK-Net surpasses state-of-the-art models in multi-modal tasks and for missing modalities when exclusively utilizing IR data for inference across three public benchmarking datasets. For missing modality scenarios, the performance increase is achieved without additional computational costs compared to the baseline segmentation models.
△ Less
Submitted 4 December, 2023;
originally announced December 2023.
-
Online Change Points Detection for Linear Dynamical Systems with Finite Sample Guarantees
Authors:
Lei Xin,
George Chiu,
Shreyas Sundaram
Abstract:
The problem of online change point detection is to detect abrupt changes in properties of time series, ideally as soon as possible after those changes occur. Existing work on online change point detection either assumes i.i.d data, focuses on asymptotic analysis, does not present theoretical guarantees on the trade-off between detection accuracy and detection delay, or is only suitable for detecti…
▽ More
The problem of online change point detection is to detect abrupt changes in properties of time series, ideally as soon as possible after those changes occur. Existing work on online change point detection either assumes i.i.d data, focuses on asymptotic analysis, does not present theoretical guarantees on the trade-off between detection accuracy and detection delay, or is only suitable for detecting single change points. In this work, we study the online change point detection problem for linear dynamical systems with unknown dynamics, where the data exhibits temporal correlations and the system could have multiple change points. We develop a data-dependent threshold that can be used in our test that allows one to achieve a pre-specified upper bound on the probability of making a false alarm. We further provide a finite-sample-based bound for the probability of detecting a change point. Our bound demonstrates how parameters used in our algorithm affect the detection probability and delay, and provides guidance on the minimum required time between changes to guarantee detection.
△ Less
Submitted 30 November, 2023;
originally announced November 2023.
-
MRFP: Learning Generalizable Semantic Segmentation from Sim-2-Real with Multi-Resolution Feature Perturbation
Authors:
Sumanth Udupa,
Prajwal Gurunath,
Aniruddh Sikdar,
Suresh Sundaram
Abstract:
Deep neural networks have shown exemplary performance on semantic scene understanding tasks on source domains, but due to the absence of style diversity during training, enhancing performance on unseen target domains using only single source domain data remains a challenging task. Generation of simulated data is a feasible alternative to retrieving large style-diverse real-world datasets as it is…
▽ More
Deep neural networks have shown exemplary performance on semantic scene understanding tasks on source domains, but due to the absence of style diversity during training, enhancing performance on unseen target domains using only single source domain data remains a challenging task. Generation of simulated data is a feasible alternative to retrieving large style-diverse real-world datasets as it is a cumbersome and budget-intensive process. However, the large domain-specfic inconsistencies between simulated and real-world data pose a significant generalization challenge in semantic segmentation. In this work, to alleviate this problem, we propose a novel MultiResolution Feature Perturbation (MRFP) technique to randomize domain-specific fine-grained features and perturb style of coarse features. Our experimental results on various urban-scene segmentation datasets clearly indicate that, along with the perturbation of style-information, perturbation of fine-feature components is paramount to learn domain invariant robust feature maps for semantic segmentation models. MRFP is a simple and computationally efficient, transferable module with no additional learnable parameters or objective functions, that helps state-of-the-art deep neural networks to learn robust domain invariant features for simulation-to-real semantic segmentation.
△ Less
Submitted 28 March, 2024; v1 submitted 30 November, 2023;
originally announced November 2023.
-
Reverse Engineering the Reproduction Number: A Framework for Data-Driven Counterfactual Analysis, Strategy Evaluation, and Feedback Control of Epidemics
Authors:
Baike She,
Rebecca Lee Smith,
Ian Pytlarz,
Shreyas Sundaram,
Philip E. Paré
Abstract:
During the COVID-19 pandemic, different countries, regions, and communities constructed various epidemic models to evaluate spreading behaviors and assist in making mitigation policies. Model uncertainties, introduced by complex transmission behaviors, contact-tracing networks, time-varying spreading parameters, and human factors, as well as insufficient data, have posed arduous challenges for mod…
▽ More
During the COVID-19 pandemic, different countries, regions, and communities constructed various epidemic models to evaluate spreading behaviors and assist in making mitigation policies. Model uncertainties, introduced by complex transmission behaviors, contact-tracing networks, time-varying spreading parameters, and human factors, as well as insufficient data, have posed arduous challenges for model-based approaches. To address these challenges, we propose a novel framework for data-driven counterfactual analysis, strategy evaluation, and feedback control of epidemics, which leverages statistical information from epidemic testing data instead of constructing a specific model. Through reverse engineering the reproduction number by quantifying the impact of the intervention strategy, this framework tackles three primary problems: 1) How severe would an outbreak have been without the implemented intervention strategies? 2) What impact would varying the intervention strength have had on an outbreak? 3) How can we adjust the intervention intensity based on the current state of an outbreak? Specifically, we consider the epidemic intervention policies such as the testing-for-isolation strategy as an example, which was successfully implemented by the University of Illinois Urbana-Champaign (UIUC) and Purdue University (Purdue) during the COVID-19 pandemic. By leveraging data collected by UIUC and Purdue, we validate the effectiveness of the proposed data-driven framework.
△ Less
Submitted 31 October, 2023;
originally announced November 2023.
-
Robust Online Covariance and Sparse Precision Estimation Under Arbitrary Data Corruption
Authors:
Tong Yao,
Shreyas Sundaram
Abstract:
Gaussian graphical models are widely used to represent correlations among entities but remain vulnerable to data corruption. In this work, we introduce a modified trimmed-inner-product algorithm to robustly estimate the covariance in an online scenario even in the presence of arbitrary and adversarial data attacks. At each time step, data points, drawn nominally independently and identically from…
▽ More
Gaussian graphical models are widely used to represent correlations among entities but remain vulnerable to data corruption. In this work, we introduce a modified trimmed-inner-product algorithm to robustly estimate the covariance in an online scenario even in the presence of arbitrary and adversarial data attacks. At each time step, data points, drawn nominally independently and identically from a multivariate Gaussian distribution, arrive. However, a certain fraction of these points may have been arbitrarily corrupted. We propose an online algorithm to estimate the sparse inverse covariance (i.e., precision) matrix despite this corruption. We provide the error-bound and convergence properties of the estimates to the true precision matrix under our algorithms.
△ Less
Submitted 16 September, 2023;
originally announced September 2023.
-
Learning Linearized Models from Nonlinear Systems with Finite Data
Authors:
Lei Xin,
George Chiu,
Shreyas Sundaram
Abstract:
Identifying a linear system model from data has wide applications in control theory. The existing work on finite sample analysis for linear system identification typically uses data from a single system trajectory under i.i.d random inputs, and assumes that the underlying dynamics is truly linear. In contrast, we consider the problem of identifying a linearized model when the true underlying dynam…
▽ More
Identifying a linear system model from data has wide applications in control theory. The existing work on finite sample analysis for linear system identification typically uses data from a single system trajectory under i.i.d random inputs, and assumes that the underlying dynamics is truly linear. In contrast, we consider the problem of identifying a linearized model when the true underlying dynamics is nonlinear. We provide a multiple trajectories-based deterministic data acquisition algorithm followed by a regularized least squares algorithm, and provide a finite sample error bound on the learned linearized dynamics. Our error bound demonstrates a trade-off between the error due to nonlinearity and the error due to noise, and shows that one can learn the linearized dynamics with arbitrarily small error given sufficiently many samples. We validate our results through experiments, where we also show the potential insufficiency of linear system identification using a single trajectory with i.i.d random inputs, when nonlinearity does exist.
△ Less
Submitted 15 September, 2023;
originally announced September 2023.
-
Deep Reinforcement Learning Based Framework for Mobile Energy Disseminator Dispatching to Charge On-the-Road Electric Vehicles
Authors:
Jiaming Wang,
Jiqian Dong,
Sikai Chen,
Shreyas Sundaram,
Samuel Labi
Abstract:
The exponential growth of electric vehicles (EVs) presents novel challenges in preserving battery health and in addressing the persistent problem of vehicle range anxiety. To address these concerns, wireless charging, particularly, Mobile Energy Disseminators (MEDs) have emerged as a promising solution. The MED is mounted behind a large vehicle and charges all participating EVs within a radius ups…
▽ More
The exponential growth of electric vehicles (EVs) presents novel challenges in preserving battery health and in addressing the persistent problem of vehicle range anxiety. To address these concerns, wireless charging, particularly, Mobile Energy Disseminators (MEDs) have emerged as a promising solution. The MED is mounted behind a large vehicle and charges all participating EVs within a radius upstream of it. Unfortuantely, during such V2V charging, the MED and EVs inadvertently form platoons, thereby occupying multiple lanes and impairing overall corridor travel efficiency. In addition, constrained budgets for MED deployment necessitate the development of an effective dispatching strategy to determine optimal timing and locations for introducing the MEDs into traffic. This paper proposes a deep reinforcement learning (DRL) based methodology to develop a vehicle dispatching framework. In the first component of the framework, we develop a realistic reinforcement learning environment termed "ChargingEnv" which incorporates a reliable charging simulation system that accounts for common practical issues in wireless charging deployment, specifically, the charging panel misalignment. The second component, the Proximal-Policy Optimization (PPO) agent, is trained to control MED dispatching through continuous interactions with ChargingEnv. Numerical experiments were carried out to demonstrate the demonstrate the efficacy of the proposed MED deployment decision processor. The experiment results suggest that the proposed model can significantly enhance EV travel range while efficiently deploying a optimal number of MEDs. The proposed model is found to be not only practical in its applicability but also has promises of real-world effectiveness. The proposed model can help travelers to maximize EV range and help road agencies or private-sector vendors to manage the deployment of MEDs efficiently.
△ Less
Submitted 29 August, 2023;
originally announced August 2023.
-
An Autonomous Hybrid Drone-Rover Vehicle for Weed Removal and Spraying Applications in Agriculture
Authors:
J Krishna Kant,
Mahankali Sripaad,
Anand Bharadwaj,
Rajashekhar V S,
Suresh Sundaram
Abstract:
The usage of drones and rovers helps to overcome the limitations of traditional agriculture which has been predominantly human-intensive, for carrying out tasks such as removal of weeds and spraying of fertilizers and pesticides. Drones and rovers are hel** to realize precision agriculture and farmers with improved monitoring and surveying at affordable costs. Major benefits have come for vertic…
▽ More
The usage of drones and rovers helps to overcome the limitations of traditional agriculture which has been predominantly human-intensive, for carrying out tasks such as removal of weeds and spraying of fertilizers and pesticides. Drones and rovers are hel** to realize precision agriculture and farmers with improved monitoring and surveying at affordable costs. Major benefits have come for vertical farming and fields with irrigation canals. However, drones have a limitation of flight time due to payload constraints. Rovers have limitations in vertical farming and obstacles like canals in agricultural fields. To meet the different requirements of multiple terrains and vertical farming in agriculture, we propose an autonomous hybrid drone-rover vehicle that combines the advantages of both rovers and drones. The prototype is described along with experimental results regarding its ability to avoid obstacles, pluck weeds and spray pesticides.
△ Less
Submitted 9 August, 2023;
originally announced August 2023.
-
GeneMask: Fast Pretraining of Gene Sequences to Enable Few-Shot Learning
Authors:
Soumyadeep Roy,
Jonas Wallat,
Sowmya S Sundaram,
Wolfgang Nejdl,
Niloy Ganguly
Abstract:
Large-scale language models such as DNABert and LOGO aim to learn optimal gene representations and are trained on the entire Human Reference Genome. However, standard tokenization schemes involve a simple sliding window of tokens like k-mers that do not leverage any gene-based semantics and thus may lead to (trivial) masking of easily predictable sequences and subsequently inefficient Masked Langu…
▽ More
Large-scale language models such as DNABert and LOGO aim to learn optimal gene representations and are trained on the entire Human Reference Genome. However, standard tokenization schemes involve a simple sliding window of tokens like k-mers that do not leverage any gene-based semantics and thus may lead to (trivial) masking of easily predictable sequences and subsequently inefficient Masked Language Modeling (MLM) training. Therefore, we propose a novel masking algorithm, GeneMask, for MLM training of gene sequences, where we randomly identify positions in a gene sequence as mask centers and locally select the span around the mask center with the highest Normalized Pointwise Mutual Information (NPMI) to mask. We observe that in the absence of human-understandable semantics in the genomics domain (in contrast, semantic units like words and phrases are inherently available in NLP), GeneMask-based models substantially outperform the SOTA models (DNABert and LOGO) over four benchmark gene sequence classification datasets in five few-shot settings (10 to 1000-shot). More significantly, the GeneMask-based DNABert model is trained for less than one-tenth of the number of epochs of the original SOTA model. We also observe a strong correlation between top-ranked PMI tokens and conserved DNA sequence motifs, which may indicate the incorporation of latent genomic information. The codes (including trained models) and datasets are made publicly available at https://github.com/roysoumya/GeneMask.
△ Less
Submitted 29 July, 2023;
originally announced July 2023.
-
Making Metadata More FAIR Using Large Language Models
Authors:
Sowmya S. Sundaram,
Mark A. Musen
Abstract:
With the global increase in experimental data artifacts, harnessing them in a unified fashion leads to a major stumbling block - bad metadata. To bridge this gap, this work presents a Natural Language Processing (NLP) informed application, called FAIRMetaText, that compares metadata. Specifically, FAIRMetaText analyzes the natural language descriptions of metadata and provides a mathematical simil…
▽ More
With the global increase in experimental data artifacts, harnessing them in a unified fashion leads to a major stumbling block - bad metadata. To bridge this gap, this work presents a Natural Language Processing (NLP) informed application, called FAIRMetaText, that compares metadata. Specifically, FAIRMetaText analyzes the natural language descriptions of metadata and provides a mathematical similarity measure between two terms. This measure can then be utilized for analyzing varied metadata, by suggesting terms for compliance or grou** similar terms for identification of replaceable terms. The efficacy of the algorithm is presented qualitatively and quantitatively on publicly available research artifacts and demonstrates large gains across metadata related tasks through an in-depth study of a wide variety of Large Language Models (LLMs). This software can drastically reduce the human effort in sifting through various natural language metadata while employing several experimental datasets on the same topic.
△ Less
Submitted 24 July, 2023;
originally announced July 2023.
-
Priority-based DREAM Approach for Highly Manoeuvring Intruders in A Perimeter Defense Problem
Authors:
Shridhar Velhal,
Suresh Sundaram,
Narasimhan Sundararajan
Abstract:
In this paper, a Priority-based Dynamic REsource Allocation with decentralized Multi-task assignment (P-DREAM) approach is presented to protect a territory from highly manoeuvring intruders. In the first part, static optimization problems are formulated to compute the following parameters of the perimeter defense problem; the number of reserve stations, their locations, the priority region, the mo…
▽ More
In this paper, a Priority-based Dynamic REsource Allocation with decentralized Multi-task assignment (P-DREAM) approach is presented to protect a territory from highly manoeuvring intruders. In the first part, static optimization problems are formulated to compute the following parameters of the perimeter defense problem; the number of reserve stations, their locations, the priority region, the monitoring region, and the minimum number of defenders required for the monitoring purpose. The concept of a prioritized intruder is proposed here to identify and handle those critical intruders (computed based on the velocity ratio and location) to be tackled on a priority basis. The computed priority region helps to assign reserve defenders sufficiently earlier such that they can neutralize the prioritized intruders. The monitoring region defines the minimum region to be monitored and is sufficient enough to handle the intruders. In the second part, the earlier developed DREAM approach is modified to incorporate the priority of an intruder. The proposed P-DREAM approach assigns the defenders to the prioritized intruders as the first task. A convex territory protection problem is simulated to illustrate the P-DREAM approach. It involves the computation of static parameters and solving the prioritized task assignments with dynamic resource allocation. Monte-Carlo results were conducted to verify the performance of P-DREAM, and the results clearly show that the P-DREAM approach can protect the territory with consistent performance against highly manoeuvring intruders.
△ Less
Submitted 19 July, 2023;
originally announced July 2023.
-
DreamSim: Learning New Dimensions of Human Visual Similarity using Synthetic Data
Authors:
Stephanie Fu,
Netanel Tamir,
Shobhita Sundaram,
Lucy Chai,
Richard Zhang,
Tali Dekel,
Phillip Isola
Abstract:
Current perceptual similarity metrics operate at the level of pixels and patches. These metrics compare images in terms of their low-level colors and textures, but fail to capture mid-level similarities and differences in image layout, object pose, and semantic content. In this paper, we develop a perceptual metric that assesses images holistically. Our first step is to collect a new dataset of hu…
▽ More
Current perceptual similarity metrics operate at the level of pixels and patches. These metrics compare images in terms of their low-level colors and textures, but fail to capture mid-level similarities and differences in image layout, object pose, and semantic content. In this paper, we develop a perceptual metric that assesses images holistically. Our first step is to collect a new dataset of human similarity judgments over image pairs that are alike in diverse ways. Critical to this dataset is that judgments are nearly automatic and shared by all observers. To achieve this we use recent text-to-image models to create synthetic pairs that are perturbed along various dimensions. We observe that popular perceptual metrics fall short of explaining our new data, and we introduce a new metric, DreamSim, tuned to better align with human perception. We analyze how our metric is affected by different visual attributes, and find that it focuses heavily on foreground objects and semantic content while also being sensitive to color and layout. Notably, despite being trained on synthetic data, our metric generalizes to real images, giving strong results on retrieval and reconstruction tasks. Furthermore, our metric outperforms both prior learned metrics and recent large vision models on these tasks.
△ Less
Submitted 8 December, 2023; v1 submitted 15 June, 2023;
originally announced June 2023.
-
Predictive Maneuver Planning with Deep Reinforcement Learning (PMP-DRL) for comfortable and safe autonomous driving
Authors:
Jayabrata Chowdhury,
Vishruth Veerendranath,
Suresh Sundaram,
Narasimhan Sundararajan
Abstract:
This paper presents a Predictive Maneuver Planning with Deep Reinforcement Learning (PMP-DRL) model for maneuver planning. Traditional rule-based maneuver planning approaches often have to improve their abilities to handle the variabilities of real-world driving scenarios. By learning from its experience, a Reinforcement Learning (RL)-based driving agent can adapt to changing driving conditions an…
▽ More
This paper presents a Predictive Maneuver Planning with Deep Reinforcement Learning (PMP-DRL) model for maneuver planning. Traditional rule-based maneuver planning approaches often have to improve their abilities to handle the variabilities of real-world driving scenarios. By learning from its experience, a Reinforcement Learning (RL)-based driving agent can adapt to changing driving conditions and improve its performance over time. Our proposed approach combines a predictive model and an RL agent to plan for comfortable and safe maneuvers. The predictive model is trained using historical driving data to predict the future positions of other surrounding vehicles. The surrounding vehicles' past and predicted future positions are embedded in context-aware grid maps. At the same time, the RL agent learns to make maneuvers based on this spatio-temporal context information. Performance evaluation of PMP-DRL has been carried out using simulated environments generated from publicly available NGSIM US101 and I80 datasets. The training sequence shows the continuous improvement in the driving experiences. It shows that proposed PMP-DRL can learn the trade-off between safety and comfortability. The decisions generated by the recent imitation learning-based model are compared with the proposed PMP-DRL for unseen scenarios. The results clearly show that PMP-DRL can handle complex real-world scenarios and make better comfortable and safe maneuver decisions than rule-based and imitative models.
△ Less
Submitted 15 June, 2023;
originally announced June 2023.
-
A Decentralized Spike-based Learning Framework for Sequential Capture in Discrete Perimeter Defense Problem
Authors:
Mohammed Thousif,
Shridhar Velhal,
Suresh Sundaram,
Shirin Dora
Abstract:
This paper proposes a novel Decentralized Spike-based Learning (DSL) framework for the discrete Perimeter Defense Problem (d-PDP). A team of defenders is operating on the perimeter to protect the circular territory from radially incoming intruders. At first, the d-PDP is formulated as a spatio-temporal multi-task assignment problem (STMTA). The problem of STMTA is then converted into a multi-label…
▽ More
This paper proposes a novel Decentralized Spike-based Learning (DSL) framework for the discrete Perimeter Defense Problem (d-PDP). A team of defenders is operating on the perimeter to protect the circular territory from radially incoming intruders. At first, the d-PDP is formulated as a spatio-temporal multi-task assignment problem (STMTA). The problem of STMTA is then converted into a multi-label learning problem to obtain labels of segments that defenders have to visit in order to protect the perimeter. The DSL framework uses a Multi-Label Classifier using Synaptic Efficacy Function spiking neuRON (MLC-SEFRON) network for deterministic multi-label learning. Each defender contains a single MLC-SEFRON network. Each MLC-SEFRON network is trained independently using input from its own perspective for decentralized operations. The input spikes to the MLC-SEFRON network can be directly obtained from the spatio-temporal information of defenders and intruders without any extra pre-processing step. The output of MLC-SEFRON contains the labels of segments that a defender has to visit in order to protect the perimeter. Based on the multi-label output from the MLC-SEFRON a trajectory is generated for a defender using a Consensus-Based Bundle Algorithm (CBBA) in order to capture the intruders. The target multi-label output for training MLC-SEFRON is obtained from an expert policy. Also, the MLC-SEFRON trained for a defender can be directly used for obtaining labels of segments assigned to another defender without any retraining. The performance of MLC-SEFRON has been evaluated for full observation and partial observation scenarios of the defender. The overall performance of the DSL framework is then compared with expert policy along with other existing learning algorithms. The scalability of the DSL has been evaluated using an increasing number of defenders.
△ Less
Submitted 26 May, 2023;
originally announced May 2023.
-
The Minimizer of the Sum of Two Strongly Convex Functions
Authors:
Kananart Kuwaranancharoen,
Shreyas Sundaram
Abstract:
The problem of finding the minimizer of a sum of convex functions is central to the field of optimization. In cases where the functions themselves are not fully known (other than their individual minimizers and convexity parameters), it is of interest to understand the region containing the potential minimizers of the sum based only on those known quantities. Characterizing this region in the case…
▽ More
The problem of finding the minimizer of a sum of convex functions is central to the field of optimization. In cases where the functions themselves are not fully known (other than their individual minimizers and convexity parameters), it is of interest to understand the region containing the potential minimizers of the sum based only on those known quantities. Characterizing this region in the case of multivariate strongly convex functions is far more complicated than the univariate case. In this paper, we provide both outer and inner approximations for the region containing the minimizer of the sum of two strongly convex functions, subject to a constraint on the norm of the gradient at the minimizer of the sum. In particular, we explicitly characterize the boundary and interior of both outer and inner approximations. Interestingly, the boundaries as well as the interiors turn out to be identical and we show that the boundary of the region containing the potential minimizers is also identical to that of the outer and inner approximations.
△ Less
Submitted 22 May, 2023;
originally announced May 2023.
-
Ramanujan sums and rectangular power sums
Authors:
John Shareshian,
Sheila Sundaram
Abstract:
For a fixed nonnegative integer $u$ and positive integer $n$, we investigate the symmetric function \[\sum_{d|n} \left(c_d(\tfrac{n}{d})\right)^u p_d^{\tfrac{n}{d}},\]
where $p_n$ denotes the $n$th power sum symmetric function, and $c_d(r)$ is a Ramanujan sum, equal to the sum of the $r$th powers of all the primitive $d$th roots of unity. We establish the Schur positivity of these functions for…
▽ More
For a fixed nonnegative integer $u$ and positive integer $n$, we investigate the symmetric function \[\sum_{d|n} \left(c_d(\tfrac{n}{d})\right)^u p_d^{\tfrac{n}{d}},\]
where $p_n$ denotes the $n$th power sum symmetric function, and $c_d(r)$ is a Ramanujan sum, equal to the sum of the $r$th powers of all the primitive $d$th roots of unity. We establish the Schur positivity of these functions for $u=0$ and $u=1$, showing that, in each case, the associated representation of the symmetric group $\mathfrak{S}_n$ decomposes into a sum of Foulkes representations, that is, representations induced from the irreducibles of the cyclic subgroup generated by the long cycle. We also conjecture Schur positivity for the case $u= 2$.
△ Less
Submitted 28 November, 2023; v1 submitted 19 May, 2023;
originally announced May 2023.
-
Moments of Colored Permutation Statistics on Conjugacy Classes
Authors:
Jesse Campion Loth,
Michael Levet,
Kevin Liu,
Sheila Sundaram,
Mei Yin
Abstract:
In this paper, we consider the moments of statistics on conjugacy classes of the colored permutation groups $\mathfrak{S}_{n,r}=\mathbb{Z}_r\wr \mathfrak{S}_n$. We first show that any fixed moment coincides on all conjugacy classes where all cycles have sufficiently long length. Additionally, for permutation statistics that can be realized via a process we call symmetric extensions, these moments…
▽ More
In this paper, we consider the moments of statistics on conjugacy classes of the colored permutation groups $\mathfrak{S}_{n,r}=\mathbb{Z}_r\wr \mathfrak{S}_n$. We first show that any fixed moment coincides on all conjugacy classes where all cycles have sufficiently long length. Additionally, for permutation statistics that can be realized via a process we call symmetric extensions, these moments are polynomials in $n$. Finally, for the descent statistic on the hyperoctahedral group $B_n\cong \mathfrak{S}_{n,2}$, we show that its distribution on conjugacy classes without short cycles satisfies a central limit theorem. Our results build on and generalize previous work of Fulman (\textit{J. Comb. Theory Ser. A.}, 1998), Hamaker and Rhoades (arXiv, 2022), and Campion Loth, Levet, Liu, Stucky, Sundaram, and Yin (arXiv, 2023). In particular, our techniques utilize the combinatorial framework introduced by Campion Loth, Levet, Liu, Stucky, Sundaram, and Yin.
△ Less
Submitted 27 December, 2023; v1 submitted 19 May, 2023;
originally announced May 2023.
-
On the Geometric Convergence of Byzantine-Resilient Distributed Optimization Algorithms
Authors:
Kananart Kuwaranancharoen,
Shreyas Sundaram
Abstract:
The problem of designing distributed optimization algorithms that are resilient to Byzantine adversaries has received significant attention. For the Byzantine-resilient distributed optimization problem, the goal is to (approximately) minimize the average of the local cost functions held by the regular (non adversarial) agents in the network. In this paper, we provide a general algorithmic framewor…
▽ More
The problem of designing distributed optimization algorithms that are resilient to Byzantine adversaries has received significant attention. For the Byzantine-resilient distributed optimization problem, the goal is to (approximately) minimize the average of the local cost functions held by the regular (non adversarial) agents in the network. In this paper, we provide a general algorithmic framework for Byzantine-resilient distributed optimization which includes some state-of-the-art algorithms as special cases. We analyze the convergence of algorithms within the framework, and derive a geometric rate of convergence of all regular agents to a ball around the optimal solution (whose size we characterize). Furthermore, we show that approximate consensus can be achieved geometrically fast under some minimal conditions. Our analysis provides insights into the relationship among the convergence region, distance between regular agents' values, step-size, and properties of the agents' functions for Byzantine-resilient distributed optimization.
△ Less
Submitted 26 March, 2024; v1 submitted 18 May, 2023;
originally announced May 2023.
-
Topology of Cut Complexes of Graphs
Authors:
Margaret Bayer,
Mark Denker,
Marija Jelić Milutinović,
Rowan Rowlands,
Sheila Sundaram,
Lei Xue
Abstract:
We define the $k$-cut complex of a graph $G$ with vertex set $V(G)$ to be the simplicial complex whose facets are the complements of sets of size $k$ in $V(G)$ inducing disconnected subgraphs of $G$. This generalizes the Alexander dual of a graph complex studied by Fröberg (1990), and Eagon and Reiner (1998). We describe the effect of various graph operations on the cut complex, and study its shel…
▽ More
We define the $k$-cut complex of a graph $G$ with vertex set $V(G)$ to be the simplicial complex whose facets are the complements of sets of size $k$ in $V(G)$ inducing disconnected subgraphs of $G$. This generalizes the Alexander dual of a graph complex studied by Fröberg (1990), and Eagon and Reiner (1998). We describe the effect of various graph operations on the cut complex, and study its shellability, homotopy type and homology for various families of graphs, including trees, cycles, complete multipartite graphs, and the prism $K_n \times K_2$, using techniques from algebraic topology, discrete Morse theory and equivariant poset topology.
△ Less
Submitted 1 February, 2024; v1 submitted 26 April, 2023;
originally announced April 2023.
-
A Dynamic Heterogeneous Team-based Non-iterative Approach for Online Pick-up and Just-In-Time Delivery Problems
Authors:
Shridhar Velhal,
Srikrishna B R,
Mukunda Bharatheesha,
Suresh Sundaram
Abstract:
This paper presents a non-iterative approach for finding the assignment of heterogeneous robots to efficiently execute online Pickup and Just-In-Time Delivery (PJITD) tasks with optimal resource utilization. The PJITD assignments problem is formulated as a spatio-temporal multi-task assignment (STMTA) problem. The physical constraints on the map and vehicle dynamics are incorporated in the cost fo…
▽ More
This paper presents a non-iterative approach for finding the assignment of heterogeneous robots to efficiently execute online Pickup and Just-In-Time Delivery (PJITD) tasks with optimal resource utilization. The PJITD assignments problem is formulated as a spatio-temporal multi-task assignment (STMTA) problem. The physical constraints on the map and vehicle dynamics are incorporated in the cost formulation. The linear sum assignment problem is formulated for the heterogeneous STMTA problem. The recently proposed Dynamic Resource Allocation with Multi-task assignments (DREAM) approach has been modified to solve the heterogeneous PJITD problem. At the start, it computes the minimum number of robots required (with their types) to execute given heterogeneous PJITD tasks. These required robots are added to the team to guarantee the feasibility of all PJITD tasks. Then robots in an updated team are assigned to execute the PJITD tasks while minimizing the total cost for the team to execute all PJITD tasks. The performance of the proposed non-iterative approach has been validated using high-fidelity software-in-loop simulations and hardware experiments. The simulations and experimental results clearly indicate that the proposed approach is scalable and provides optimal resource utilization.
△ Less
Submitted 14 April, 2023;
originally announced April 2023.
-
Multi-Robot Persistent Monitoring: Minimizing Latency and Number of Robots with Recharging Constraints
Authors:
Ahmad Bilal Asghar,
Shreyas Sundaram,
Stephen L. Smith
Abstract:
In this paper we study multi-robot path planning for persistent monitoring tasks. We consider the case where robots have a limited battery capacity with a discharge time $D$. We represent the areas to be monitored as the vertices of a weighted graph. For each vertex, there is a constraint on the maximum allowable time between robot visits, called the latency. The objective is to find the minimum n…
▽ More
In this paper we study multi-robot path planning for persistent monitoring tasks. We consider the case where robots have a limited battery capacity with a discharge time $D$. We represent the areas to be monitored as the vertices of a weighted graph. For each vertex, there is a constraint on the maximum allowable time between robot visits, called the latency. The objective is to find the minimum number of robots that can satisfy these latency constraints while also ensuring that the robots periodically charge at a recharging depot. The decision version of this problem is known to be PSPACE-complete. We present a $O(\frac{\log D}{\log \log D}\log ρ)$ approximation algorithm for the problem where $ρ$ is the ratio of the maximum and the minimum latency constraints. We also present an orienteering based heuristic to solve the problem and show empirically that it typically provides higher quality solutions than the approximation algorithm. We extend our results to provide an algorithm for the problem of minimizing the maximum weighted latency given a fixed number of robots. We evaluate our algorithms on large problem instances in a patrolling scenario and in a wildfire monitoring application. We also compare the algorithms with an existing solver on benchmark instances.
△ Less
Submitted 15 March, 2023;
originally announced March 2023.
-
On the Benefits of Leveraging Structural Information in Planning Over the Learned Model
Authors:
Jiajun Shen,
Kananart Kuwaranancharoen,
Raid Ayoub,
Pietro Mercati,
Shreyas Sundaram
Abstract:
Model-based Reinforcement Learning (RL) integrates learning and planning and has received increasing attention in recent years. However, learning the model can incur a significant cost (in terms of sample complexity), due to the need to obtain a sufficient number of samples for each state-action pair. In this paper, we investigate the benefits of leveraging structural information about the system…
▽ More
Model-based Reinforcement Learning (RL) integrates learning and planning and has received increasing attention in recent years. However, learning the model can incur a significant cost (in terms of sample complexity), due to the need to obtain a sufficient number of samples for each state-action pair. In this paper, we investigate the benefits of leveraging structural information about the system in terms of reducing sample complexity. Specifically, we consider the setting where the transition probability matrix is a known function of a number of structural parameters, whose values are initially unknown. We then consider the problem of estimating those parameters based on the interactions with the environment. We characterize the difference between the Q estimates and the optimal Q value as a function of the number of samples. Our analysis shows that there can be a significant saving in sample complexity by leveraging structural information about the model. We illustrate the findings by considering several problems including controlling a queuing system with heterogeneous servers, and seeking an optimal path in a stochastic windy gridworld.
△ Less
Submitted 15 March, 2023;
originally announced March 2023.
-
Learning Dynamical Systems by Leveraging Data from Similar Systems
Authors:
Lei Xin,
Lintao Ye,
George Chiu,
Shreyas Sundaram
Abstract:
We consider the problem of learning the dynamics of a linear system when one has access to data generated by an auxiliary system that shares similar (but not identical) dynamics, in addition to data from the true system. We use a weighted least squares approach, and provide finite sample error bounds of the learned model as a function of the number of samples and various system parameters from the…
▽ More
We consider the problem of learning the dynamics of a linear system when one has access to data generated by an auxiliary system that shares similar (but not identical) dynamics, in addition to data from the true system. We use a weighted least squares approach, and provide finite sample error bounds of the learned model as a function of the number of samples and various system parameters from the two systems as well as the weight assigned to the auxiliary data. We show that the auxiliary data can help to reduce the intrinsic system identification error due to noise, at the price of adding a portion of error that is due to the differences between the two system models. We further provide a data-dependent bound that is computable when some prior knowledge about the systems, such as upper bounds on noise levels and model difference, is available. This bound can also be used to determine the weight that should be assigned to the auxiliary data during the model training stage.
△ Less
Submitted 24 May, 2024; v1 submitted 8 February, 2023;
originally announced February 2023.
-
Permutation Statistics in Conjugacy Classes of the Symmetric Group
Authors:
Jesse Campion Loth,
Michael Levet,
Kevin Liu,
Eric Nathan Stucky,
Sheila Sundaram,
Mei Yin
Abstract:
We introduce the notion of a weighted inversion statistic on the symmetric group, and examine its distribution on each conjugacy class. Our work generalizes the study of several common permutation statistics, including the number of inversions, the number of descents, the major index, and the number of excedances. As a consequence, we obtain explicit formulas for the first moments of several stati…
▽ More
We introduce the notion of a weighted inversion statistic on the symmetric group, and examine its distribution on each conjugacy class. Our work generalizes the study of several common permutation statistics, including the number of inversions, the number of descents, the major index, and the number of excedances. As a consequence, we obtain explicit formulas for the first moments of several statistics by conjugacy class. We also show that when the cycle lengths are sufficiently large, the higher moments of arbitrary permutation statistics are independent of the conjugacy class. Fulman (J. Comb. Theory Ser. A., 1998) previously established this result for major index and descents. We obtain these results, in part, by generalizing the techniques of Fulman (ibid.), and introducing the notion of permutation constraints. For permutation statistics that can be realized via symmetric constraints, we show that each moment is a polynomial in the degree of the symmetric group.
△ Less
Submitted 17 May, 2023; v1 submitted 2 January, 2023;
originally announced January 2023.
-
Pieri rules for skew dual immaculate functions
Authors:
Elizabeth Niese,
Sheila Sundaram,
Stephanie van Willigenburg,
Shiyun Wang
Abstract:
In this paper we give Pieri rules for skew dual immaculate functions and their recently discovered row-strict counterparts. We establish our rules using a right-action analogue of the skew Littlewood-Richardson rule for Hopf algebras of Lam-Lauve-Sottile. We also obtain Pieri rules for row-strict (dual) immaculate functions.
In this paper we give Pieri rules for skew dual immaculate functions and their recently discovered row-strict counterparts. We establish our rules using a right-action analogue of the skew Littlewood-Richardson rule for Hopf algebras of Lam-Lauve-Sottile. We also obtain Pieri rules for row-strict (dual) immaculate functions.
△ Less
Submitted 21 December, 2022;
originally announced December 2022.
-
Fully complex-valued deep learning model for visual perception
Authors:
Aniruddh Sikdar,
Sumanth Udupa,
Suresh Sundaram
Abstract:
Deep learning models operating in the complex domain are used due to their rich representation capacity. However, most of these models are either restricted to the first quadrant of the complex plane or project the complex-valued data into the real domain, causing a loss of information. This paper proposes that operating entirely in the complex domain increases the overall performance of complex-v…
▽ More
Deep learning models operating in the complex domain are used due to their rich representation capacity. However, most of these models are either restricted to the first quadrant of the complex plane or project the complex-valued data into the real domain, causing a loss of information. This paper proposes that operating entirely in the complex domain increases the overall performance of complex-valued models. A novel, fully complex-valued learning scheme is proposed to train a Fully Complex-valued Convolutional Neural Network (FC-CNN) using a newly proposed complex-valued loss function and training strategy. Benchmarked on CIFAR-10, SVHN, and CIFAR-100, FC-CNN has a 4-10% gain compared to its real-valued counterpart, maintaining the model complexity. With fewer parameters, it achieves comparable performance to state-of-the-art complex-valued models on CIFAR-10 and SVHN. For the CIFAR-100 dataset, it achieves state-of-the-art performance with 25% fewer parameters. FC-CNN shows better training efficiency and much faster convergence than all the other models.
△ Less
Submitted 14 December, 2022;
originally announced December 2022.
-
Fully Complex-valued Fully Convolutional Multi-feature Fusion Network (FC2MFN) for Building Segmentation of InSAR images
Authors:
Aniruddh Sikdar,
Sumanth Udupa,
Suresh Sundaram,
Narasimhan Sundararajan
Abstract:
Building segmentation in high-resolution InSAR images is a challenging task that can be useful for large-scale surveillance. Although complex-valued deep learning networks perform better than their real-valued counterparts for complex-valued SAR data, phase information is not retained throughout the network, which causes a loss of information. This paper proposes a Fully Complex-valued, Fully Conv…
▽ More
Building segmentation in high-resolution InSAR images is a challenging task that can be useful for large-scale surveillance. Although complex-valued deep learning networks perform better than their real-valued counterparts for complex-valued SAR data, phase information is not retained throughout the network, which causes a loss of information. This paper proposes a Fully Complex-valued, Fully Convolutional Multi-feature Fusion Network(FC2MFN) for building semantic segmentation on InSAR images using a novel, fully complex-valued learning scheme. The network learns multi-scale features, performs multi-feature fusion, and has a complex-valued output. For the particularity of complex-valued InSAR data, a new complex-valued pooling layer is proposed that compares complex numbers considering their magnitude and phase. This helps the network retain the phase information even through the pooling layer. Experimental results on the simulated InSAR dataset show that FC2MFN achieves better results compared to other state-of-the-art methods in terms of segmentation performance and model complexity.
△ Less
Submitted 14 December, 2022;
originally announced December 2022.
-
Multi-Modal Domain Fusion for Multi-modal Aerial View Object Classification
Authors:
Sumanth Udupa,
Aniruddh Sikdar,
Suresh Sundaram
Abstract:
Object detection and classification using aerial images is a challenging task as the information regarding targets are not abundant. Synthetic Aperture Radar(SAR) images can be used for Automatic Target Recognition(ATR) systems as it can operate in all-weather conditions and in low light settings. But, SAR images contain salt and pepper noise(speckle noise) that cause hindrance for the deep learni…
▽ More
Object detection and classification using aerial images is a challenging task as the information regarding targets are not abundant. Synthetic Aperture Radar(SAR) images can be used for Automatic Target Recognition(ATR) systems as it can operate in all-weather conditions and in low light settings. But, SAR images contain salt and pepper noise(speckle noise) that cause hindrance for the deep learning models to extract meaningful features. Using just aerial view Electro-optical(EO) images for ATR systems may also not result in high accuracy as these images are of low resolution and also do not provide ample information in extreme weather conditions. Therefore, information from multiple sensors can be used to enhance the performance of Automatic Target Recognition(ATR) systems. In this paper, we explore a methodology to use both EO and SAR sensor information to effectively improve the performance of the ATR systems by handling the shortcomings of each of the sensors. A novel Multi-Modal Domain Fusion(MDF) network is proposed to learn the domain invariant features from multi-modal data and use it to accurately classify the aerial view objects. The proposed MDF network achieves top-10 performance in the Track-1 with an accuracy of 25.3 % and top-5 performance in Track-2 with an accuracy of 34.26 % in the test phase on the PBVS MAVOC Challenge dataset [18].
△ Less
Submitted 14 December, 2022;
originally announced December 2022.
-
Siamese based Neural Network for Offline Writer Identification on word level data
Authors:
Vineet Kumar,
Suresh Sundaram
Abstract:
Handwriting recognition is one of the desirable attributes of document comprehension and analysis. It is concerned with the documents writing style and characteristics that distinguish the authors. The diversity of text images, notably in images with varying handwriting, makes the process of learning good features difficult in cases where little data is available. In this paper, we propose a novel…
▽ More
Handwriting recognition is one of the desirable attributes of document comprehension and analysis. It is concerned with the documents writing style and characteristics that distinguish the authors. The diversity of text images, notably in images with varying handwriting, makes the process of learning good features difficult in cases where little data is available. In this paper, we propose a novel scheme to identify the author of a document based on the input word image. Our method is text independent and does not impose any constraint on the size of the input image under examination. To begin with, we detect crucial components in handwriting and extract regions surrounding them using Scale Invariant Feature Transform (SIFT). These patches are designed to capture individual writing features (including allographs, characters, or combinations of characters) that are likely to be unique for an individual writer. These features are then passed through a deep Convolutional Neural Network (CNN) in which the weights are learned by applying the concept of Similarity learning using Siamese network. Siamese network enhances the discrimination power of CNN by map** similarity between different pairs of input image. Features learned at different scales of the extracted SIFT key-points are encoded using Sparse PCA, each components of the Sparse PCA is assigned a saliency score signifying its level of significance in discriminating different writers effectively. Finally, the weighted Sparse PCA corresponding to each SIFT key-points is combined to arrive at a final classification score for each writer. The proposed algorithm was evaluated on two publicly available databases (namely IAM and CVL) and is able to achieve promising result, when compared with other deep learning based algorithm.
△ Less
Submitted 17 November, 2022;
originally announced November 2022.
-
Temporal Waypoint Navigation of Multi-UAV Payload System using Barrier Functions
Authors:
Nishanth Rao,
Suresh Sundaram,
Pushpak Jagtap
Abstract:
Aerial package transportation often requires complex spatial and temporal specifications to be satisfied in order to ensure safe and timely delivery from one point to another. It is usually efficient to transport versatile payloads using multiple UAVs that can work collaboratively to achieve the desired task. The complex temporal specifications can be handled coherently by applying Signal Temporal…
▽ More
Aerial package transportation often requires complex spatial and temporal specifications to be satisfied in order to ensure safe and timely delivery from one point to another. It is usually efficient to transport versatile payloads using multiple UAVs that can work collaboratively to achieve the desired task. The complex temporal specifications can be handled coherently by applying Signal Temporal Logic (STL) to dynamical systems. This paper addresses the problem of waypoint navigation of a multi-UAV payload system under temporal specifications using higher-order time-varying control barrier functions (HOCBFs). The complex nonlinear system of relative degree two is transformed into a simple linear system using input-output feedback linearization. An optimization-based control law is then derived to achieve the temporal waypoint navigation of the payload. The controller's efficacy and real-time implementability are demonstrated by simulating a package delivery scenario inside a high-fidelity Gazebo simulation environment.
△ Less
Submitted 25 November, 2022;
originally announced November 2022.
-
Computationally Light Spectrally Normalized Memory Neuron Network based Estimator for GPS-Denied operation of Micro UAV
Authors:
Nishanth Rao,
Suresh Sundaram,
Varun Raghavendra
Abstract:
This paper addresses the problem of position estimation in UAVs operating in a cluttered environment where GPS information is unavailable. A model learning-based approach is proposed that takes in the rotor RPMs and past state as input and predicts the one-step-ahead position of the UAV using a novel spectral-normalized memory neural network (SN-MNN). The spectral normalization guarantees stable a…
▽ More
This paper addresses the problem of position estimation in UAVs operating in a cluttered environment where GPS information is unavailable. A model learning-based approach is proposed that takes in the rotor RPMs and past state as input and predicts the one-step-ahead position of the UAV using a novel spectral-normalized memory neural network (SN-MNN). The spectral normalization guarantees stable and reliable prediction performance. The predicted position is transformed to global coordinate frame which is then fused along with the odometry of other peripheral sensors like IMU, barometer, compass etc., using the onboard extended Kalman filter to estimate the states of the UAV. The experimental flight data collected from a motion capture facility using a micro-UAV is used to train the SN-MNN. The PX4-ECL library is used to replay the flight data using the proposed algorithm, and the estimated position is compared with actual ground truth data. The proposed algorithm doesn't require any additional onboard sensors, and is computationally light. The performance of the proposed approach is compared with the current state-of-art GPS-denied algorithms, and it can be seen that the proposed algorithm has the least RMSE for position estimates.
△ Less
Submitted 3 December, 2022; v1 submitted 11 November, 2022;
originally announced November 2022.
-
An Efficient Approach with Dynamic Multi-Swarm of UAVs for Forest Firefighting
Authors:
Josy John,
K. Harikumar,
J. Senthilnath,
Suresh Sundaram
Abstract:
In this paper, the Multi-Swarm Cooperative Information-driven search and Divide and Conquer mitigation control (MSCIDC) approach is proposed for faster detection and mitigation of forest fire by reducing the loss of biodiversity, nutrients, soil moisture, and other intangible benefits. A swarm is a cooperative group of Unmanned Aerial Vehicles (UAVs) that fly together to search and quench the fire…
▽ More
In this paper, the Multi-Swarm Cooperative Information-driven search and Divide and Conquer mitigation control (MSCIDC) approach is proposed for faster detection and mitigation of forest fire by reducing the loss of biodiversity, nutrients, soil moisture, and other intangible benefits. A swarm is a cooperative group of Unmanned Aerial Vehicles (UAVs) that fly together to search and quench the fire effectively. The multi-swarm cooperative information-driven search uses a multi-level search comprising cooperative information-driven exploration and exploitation for quick/accurate detection of fire location. The search level is selected based on the thermal sensor information about the potential fire area. The dynamicity of swarms, aided by global regulative repulsion and merging between swarms, reduces the detection and mitigation time compared to the existing methods. The local attraction among the members of the swarm helps the non-detector members to reach the fire location faster, and divide-and-conquer mitigation control ensures a non-overlap** fire sector allocation for all members quenching the fire. The performance of MSCIDC has been compared with different multi-UAV methods using a simulated environment of pine forest. The performance clearly shows that MSCIDC mitigates fire much faster than the multi-UAV methods. The Monte-Carlo simulation results indicate that the proposed method reduces the average forest area burnt by $65\%$ and mission time by $60\%$ compared to the best result case of the multi-UAV approaches, guaranteeing a faster and successful mission.
△ Less
Submitted 3 November, 2022;
originally announced November 2022.
-
Perspectives for self-driving labs in synthetic biology
Authors:
Hector Garcia Martin,
Tijana Radivojevic,
Jeremy Zucker,
Kristofer Bouchard,
Jess Sustarich,
Sean Peisert,
Dan Arnold,
Nathan Hillson,
Gyorgy Babnigg,
Jose Manuel Marti,
Christopher J. Mungall,
Gregg T. Beckham,
Lucas Waldburger,
James Carothers,
ShivShankar Sundaram,
Deb Agarwal,
Blake A. Simmons,
Tyler Backman,
Deepanwita Banerjee,
Deepti Tanjore,
Lavanya Ramakrishnan,
Anup Singh
Abstract:
Self-driving labs (SDLs) combine fully automated experiments with artificial intelligence (AI) that decides the next set of experiments. Taken to their ultimate expression, SDLs could usher a new paradigm of scientific research, where the world is probed, interpreted, and explained by machines for human benefit. While there are functioning SDLs in the fields of chemistry and materials science, we…
▽ More
Self-driving labs (SDLs) combine fully automated experiments with artificial intelligence (AI) that decides the next set of experiments. Taken to their ultimate expression, SDLs could usher a new paradigm of scientific research, where the world is probed, interpreted, and explained by machines for human benefit. While there are functioning SDLs in the fields of chemistry and materials science, we contend that synthetic biology provides a unique opportunity since the genome provides a single target for affecting the incredibly wide repertoire of biological cell behavior. However, the level of investment required for the creation of biological SDLs is only warranted if directed towards solving difficult and enabling biological questions. Here, we discuss challenges and opportunities in creating SDLs for synthetic biology.
△ Less
Submitted 1 November, 2022; v1 submitted 14 October, 2022;
originally announced October 2022.
-
A Non-iterative Spatio-temporal Multi-task Assignments based Collision-free Trajectories for Music Playing Robots
Authors:
Shridhar Velhal,
Krishna Kishore VS,
Suresh Sundaram
Abstract:
In this paper, a non-iterative spatio-temporal multi-task assignment approach is used for playing piano music by a team of robots. This paper considers the piano playing problem, in which an algorithm needs to compute the trajectories for a dynamically sized team of robots who will play the musical notes by traveling through the specific locations associated with musical notes at their respective…
▽ More
In this paper, a non-iterative spatio-temporal multi-task assignment approach is used for playing piano music by a team of robots. This paper considers the piano playing problem, in which an algorithm needs to compute the trajectories for a dynamically sized team of robots who will play the musical notes by traveling through the specific locations associated with musical notes at their respective specific times. A two-step dynamic resource allocation based on a spatio-temporal multi-task assignment problem (DREAM), has been implemented to assign robots for playing the musical tune. The algorithm computes the required number of robots to play the music in the first step. In the second step, optimal assignments are computed for the updated team of robots, which minimizes the total distance traveled by the team. Even for the individual feasible trajectories, the multi-robot execution may fail if robots encounter a collision. As some time will be utilized for this conflict resolution, robots may not be able to reach the desired location on time. This paper analyses and proves that, if robots are operating in a convex region, the solution of the DREAM approach provides collision-free trajectories. The working of the DREAM approach has been illustrated with the help of the high fidelity simulations in Gazebo operated using ROS2. The result clearly shows that the DREAM approach computes the required number of robots and assigns multiple tasks to robots in at most two steps. The simulation of the robots playing music, using computed assignments, is demonstrated in the attached video. video link: \url{https://youtu.be/XToicNm-CO8}
△ Less
Submitted 17 February, 2023; v1 submitted 14 October, 2022;
originally announced October 2022.
-
On Sums, Derivatives, and Flips of Riordan Arrays
Authors:
Caroline Bang,
Matias von Bell,
Eric Culver,
Jessica Dickson,
Stoyan Dimitrov,
Rachel Perrier,
Sheila Sundaram
Abstract:
We study three operations on Riordan arrays. First, we investigate when the sum of Riordan arrays yields another Riordan array. We characterize the $A$- and $Z$-sequences of these sums of Riordan arrays, and also identify an analog for $A$-sequences when the sum of Riordan arrays does not yield a Riordan array. In addition, we define the new operations `Der' and `Flip' on Riordan arrays. We fully…
▽ More
We study three operations on Riordan arrays. First, we investigate when the sum of Riordan arrays yields another Riordan array. We characterize the $A$- and $Z$-sequences of these sums of Riordan arrays, and also identify an analog for $A$-sequences when the sum of Riordan arrays does not yield a Riordan array. In addition, we define the new operations `Der' and `Flip' on Riordan arrays. We fully characterize the Riordan arrays resulting from these operations applied to the Appell and Lagrange subgroups of the Riordan group. Finally, we study the application of these operations to various known Riordan arrays, generating many combinatorial identities in the process.
△ Less
Submitted 5 October, 2022;
originally announced October 2022.