-
Constraining extended teleparallel gravity via cosmography: A model-independent approach
Authors:
Sai Swagat Mishra,
N. S. Kavya,
P. K. Sahoo,
V. Venkatesha
Abstract:
As a classical approach, the dynamics of the Universe, influenced by its dark components, are unveiled through prior modifications of Einstein's equations. Cosmography, on the other hand, is a highly efficient tool for reconstructing any modified theory in a model-independent manner. By employing kinematic variables, it offers a profound explanation for cosmic expansion. Although the cosmographica…
▽ More
As a classical approach, the dynamics of the Universe, influenced by its dark components, are unveiled through prior modifications of Einstein's equations. Cosmography, on the other hand, is a highly efficient tool for reconstructing any modified theory in a model-independent manner. By employing kinematic variables, it offers a profound explanation for cosmic expansion. Although the cosmographical approach has been highly successful in several geometric theories in recent years, it has not been extensively explored in coupled gravities. With this in mind, we intend to constrain an extended teleparallel gravity model, $f(T,\mathcal{T})$, through cosmographic parameters. We utilize Taylor series expansion, assuming a minimally coupled form, to constrain the unknowns involved in the series. To achieve this, we conduct a Markov Chain Monte Carlo analysis (MCMC) using three different datasets (CC, BAO, and Pantheon+SH0ES). The constrained results obtained from MCMC are then compared and verified using various cosmological parameters. Finally, we compare the resulting models with \textbf{three} well-known $f(T,\mathcal{T})$ models.
△ Less
Submitted 10 June, 2024;
originally announced June 2024.
-
Cosmic expansion beyond $Λ$CDM: Investigating power-law and logarithmic corrections
Authors:
M. Koussour,
N. S. Kavya,
V. Venkatesha,
N. Myrzakulov
Abstract:
The cosmic acceleration observed in the expansion of the Universe has sparked extensive research into the nature of dark energy, which is known to constitute approximately 70\% of the Universe's energy content. In this study, we explore two parametrizations of the Hubble parameter, namely power-law and logarithmic corrections, as alternatives to the standard $Λ$CDM model. Using observational data…
▽ More
The cosmic acceleration observed in the expansion of the Universe has sparked extensive research into the nature of dark energy, which is known to constitute approximately 70\% of the Universe's energy content. In this study, we explore two parametrizations of the Hubble parameter, namely power-law and logarithmic corrections, as alternatives to the standard $Λ$CDM model. Using observational data from Cosmic Chronometers (CC), Pantheon+, and the Baryonic Acoustic Oscillations (BAO) datasets, we investigate the dynamics of essential cosmological parameters, including the deceleration parameter, energy density, pressure, and equation of state (EoS) parameter. The $Om(z)$ diagnostic test is employed to classify different dark energy models. Our cosmological models, with the power-law and logarithmic corrections, are found to provide a good fit to the recent observational data and efficiently describe the cosmic expansion scenario.
△ Less
Submitted 31 January, 2024;
originally announced January 2024.
-
GreenScan: Towards large-scale terrestrial monitoring the health of urban trees using mobile sensing
Authors:
Akshit Gupta,
Simone Mora,
Fan Zhang,
Martine Rutten,
R. Venkatesha Prasad,
Carlo Ratti
Abstract:
Healthy urban greenery is a fundamental asset to mitigate climate change phenomena such as extreme heat and air pollution. However, urban trees are often affected by abiotic and biotic stressors that hamper their functionality, and whenever not timely managed, even their survival. While the current greenery inspection techniques can help in taking effective measures, they often require a high amou…
▽ More
Healthy urban greenery is a fundamental asset to mitigate climate change phenomena such as extreme heat and air pollution. However, urban trees are often affected by abiotic and biotic stressors that hamper their functionality, and whenever not timely managed, even their survival. While the current greenery inspection techniques can help in taking effective measures, they often require a high amount of human labor, making frequent assessments infeasible at city-wide scales. In this paper, we present GreenScan, a ground-based sensing system designed to provide health assessments of urban trees at high spatio-temporal resolutions, with low costs. The system utilises thermal and multi-spectral imaging sensors fused using a custom computer vision model in order to estimate two tree health indexes. The evaluation of the system was performed through data collection experiments in Cambridge, USA. Overall, this work illustrates a novel approach for autonomous mobile ground-based tree health monitoring on city-wide scales at high temporal resolutions with low-costs.
△ Less
Submitted 6 April, 2024; v1 submitted 21 December, 2023;
originally announced December 2023.
-
Conformally symmetric wormhole solutions supported by non-commutative geometry in $f(Q,T)$ gravity
Authors:
Chaitra Chooda Chalavadi,
V. Venkatesha,
N. S. Kavya,
S. V. Divya Rashmi
Abstract:
This manuscript investigates wormhole solutions within the framework of extended symmetric teleparallel gravity, incorporating non-commutative geometry, and conformal symmetries. To achieve this, we examine the linear wormhole model with anisotropic fluid under Gaussian and Lorentzian distributions. The primary objective is to derive wormhole solutions while considering the influence of the shape…
▽ More
This manuscript investigates wormhole solutions within the framework of extended symmetric teleparallel gravity, incorporating non-commutative geometry, and conformal symmetries. To achieve this, we examine the linear wormhole model with anisotropic fluid under Gaussian and Lorentzian distributions. The primary objective is to derive wormhole solutions while considering the influence of the shape function on model parameters under Gaussian and Lorentzian distributions. The resulting shape function satisfies all the necessary conditions for a traversable wormhole. Furthermore, we analyze the characteristics of the energy conditions and provide a detailed graphical discussion of the matter contents via energy conditions. Additionally, we explore the effect of anisotropy under Gaussian and Lorentzian distributions. Finally, we present our conclusions based on the obtained results.
△ Less
Submitted 15 December, 2023;
originally announced December 2023.
-
Open Gimbal: A 3 Degrees of Freedom Open Source Sensing and Testing Platform for Nano and Micro UAVs
Authors:
Suryansh Sharma,
Tristan Dijkstra,
R. Venkatesha Prasad
Abstract:
Testing the aerodynamics of micro- and nano-UAVs without actually flying is highly challenging. To address this issue, we introduce Open Gimbal, a specially designed 3 Degrees of Freedom platform that caters to the unique requirements of micro- and nano-UAVs. This platform allows for unrestricted and free rotational motion, enabling comprehensive experimentation and evaluation of these UAVs. Our a…
▽ More
Testing the aerodynamics of micro- and nano-UAVs without actually flying is highly challenging. To address this issue, we introduce Open Gimbal, a specially designed 3 Degrees of Freedom platform that caters to the unique requirements of micro- and nano-UAVs. This platform allows for unrestricted and free rotational motion, enabling comprehensive experimentation and evaluation of these UAVs. Our approach focuses on simplicity and accessibility. We developed an open-source, 3D printable electro-mechanical design that has minimal size and low complexity. This design facilitates easy replication and customization, making it widely accessible to researchers and developers. Addressing the challenges of sensing flight dynamics at a small scale, we have devised an integrated wireless batteryless sensor subsystem. Our innovative solution eliminates the need for complex wiring and instead uses wireless power transfer for sensor data reception. To validate the effectiveness of open gimbal, we thoroughly evaluate and test its communication link and sensing performance using a typical nano-quadrotor. Through comprehensive testing, we verify the reliability and accuracy of open gimbal in real-world scenarios. These advancements provide valuable tools and insights for researchers and developers working with mUAVs and nUAVs, contributing to the progress of this rapidly evolving field.
△ Less
Submitted 4 October, 2023;
originally announced October 2023.
-
Governing accelerating Universe via newly reconstructed Hubble parameter by employing empirical data simulations
Authors:
L. Sudharani,
Kazuharu Bamba,
N. S. Kavya,
V. Venkatesha
Abstract:
A new parametrization of the Hubble parameter is proposed to explore the issue of the cosmological landscape. The constraints on model parameters are derived through the Markov Chain Monte Carlo (MCMC) method by employing a comprehensive union of datasets such as 34 data points from cosmic chronometers (CC), 42 points from baryonic acoustic oscillations (BAO), a recently updated set of 1701 Panthe…
▽ More
A new parametrization of the Hubble parameter is proposed to explore the issue of the cosmological landscape. The constraints on model parameters are derived through the Markov Chain Monte Carlo (MCMC) method by employing a comprehensive union of datasets such as 34 data points from cosmic chronometers (CC), 42 points from baryonic acoustic oscillations (BAO), a recently updated set of 1701 Pantheon$^+$ (P22) data points derived from Type Ia supernovae (SNeIa), and 162 data points from gamma-ray bursts (GRBs). Furthermore, the models are compared by using the Akaike Information Criterion (AIC) and Bayesian Information Criterion (BIC), so that a comparative assessment of model performance can be available. Additionally, we compare the Dainotti relation via Gaussian likelihood analysis versus new likelihoods and Calibration of the Dainotti relation through a model-independent method. The kinematic behavior of the models is also investigated by encompassing the transition from deceleration to acceleration and the evolution of the jerk parameter. From the analysis of the parametric models, it is strongly indicated that the Universe is currently undergoing an accelerated phase with diagnostics of the model validating the quintessence phase.
△ Less
Submitted 3 May, 2024; v1 submitted 31 August, 2023;
originally announced September 2023.
-
Wormhole Geometry and Three-Dimensional Embedding in Extended Symmetric Teleparallel Gravity
Authors:
V. Venkatesha,
Chaitra Chooda Chalavadi,
N. S. Kavya,
P. K. Sahoo
Abstract:
In the present manuscript, we study traversable wormhole solutions in the background of extended symmetric teleparallel gravity with matter coupling. With the anisotropic matter distribution we probe the wormhole geometry for two different gravity models. Primarily, we consider the linear model $ f(Q,T) =Q + 2 \, ξ\,T$. Firstly, we presume a logarithmic form of shape function and analyze the scena…
▽ More
In the present manuscript, we study traversable wormhole solutions in the background of extended symmetric teleparallel gravity with matter coupling. With the anisotropic matter distribution we probe the wormhole geometry for two different gravity models. Primarily, we consider the linear model $ f(Q,T) =Q + 2 \, ξ\,T$. Firstly, we presume a logarithmic form of shape function and analyze the scenario for different redshift functions. Secondly, for a specific form of energy density, we derive a shape function and note its satisfying behavior. Next, for the non-linear model $f(Q,T) = Q + α,Q^2 + β,T$ and a specific shape function we examine the wormhole solution. Further, with the aid of embedding diagrams, we interpreted the geometry of wormhole models. Finally, we conclude results.
△ Less
Submitted 25 July, 2023;
originally announced August 2023.
-
BEAVIS: Balloon Enabled Aerial Vehicle for IoT and Sensing
Authors:
Suryansh Sharma,
Ashutosh Simha,
R. Venkatesha Prasad,
Shubham Deshmukh,
Kavin B. Saravanan,
Ravi Ramesh,
Luca Mottola
Abstract:
UAVs are becoming versatile and valuable platforms for various applications. However, the main limitation is their flying time. We present BEAVIS, a novel aerial robotic platform striking an unparalleled trade-off between the manoeuvrability of drones and the long lasting capacity of blimps. BEAVIS scores highly in applications where drones enjoy unconstrained mobility yet suffer from limited life…
▽ More
UAVs are becoming versatile and valuable platforms for various applications. However, the main limitation is their flying time. We present BEAVIS, a novel aerial robotic platform striking an unparalleled trade-off between the manoeuvrability of drones and the long lasting capacity of blimps. BEAVIS scores highly in applications where drones enjoy unconstrained mobility yet suffer from limited lifetime. A nonlinear flight controller exploiting novel, unexplored, aerodynamic phenomena to regulate the ambient pressure and enable all translational and yaw degrees of freedom is proposed without direct actuation in the vertical direction. BEAVIS has built-in rotor fault detection and tolerance. We explain the design and the necessary background in detail. We verify the dynamics of BEAVIS and demonstrate its distinct advantages, such as agility, over existing platforms including the degrees of freedom akin to a drone with 11.36x increased lifetime. We exemplify the potential of BEAVIS to become an invaluable platform for many applications.
△ Less
Submitted 2 August, 2023;
originally announced August 2023.
-
Distributed Sensing, Computing, Communication, and Control Fabric: A Unified Service-Level Architecture for 6G
Authors:
Dejan Vukobratović,
Nikolaos Bartzoudis,
Mona Ghassemian,
Firooz Saghezchi,
Peizheng Li,
Adnan Aijaz,
Ricardo Martinez,
Xueli An,
Ranga Rao Venkatesha Prasad,
Helge Lüders,
Shahid Mumtaz
Abstract:
With the advent of the multimodal immersive communication system, people can interact with each other using multiple devices for sensing, communication and/or control either onsite or remotely. As a breakthrough concept, a distributed sensing, computing, communications, and control (DS3C) fabric is introduced in this paper for provisioning 6G services in multi-tenant environments in a unified mann…
▽ More
With the advent of the multimodal immersive communication system, people can interact with each other using multiple devices for sensing, communication and/or control either onsite or remotely. As a breakthrough concept, a distributed sensing, computing, communications, and control (DS3C) fabric is introduced in this paper for provisioning 6G services in multi-tenant environments in a unified manner. The DS3C fabric can be further enhanced by natively incorporating intelligent algorithms for network automation and managing networking, computing, and sensing resources efficiently to serve vertical use cases with extreme and/or conflicting requirements. As such, the paper proposes a novel end-to-end 6G system architecture with enhanced intelligence spanning across different network, computing, and business domains, identifies vertical use cases and presents an overview of the relevant standardization and pre-standardization landscape.
△ Less
Submitted 18 July, 2023;
originally announced July 2023.
-
On possible wormhole solutions supported by non-commutative geometry within $f(R, L_m)$ gravity
Authors:
N. S. Kavya,
V. Venkatesha,
G. Mustafa,
P. K. Sahoo
Abstract:
Non-commutativity is a key feature of spacetime geometry. The current article explores the traversable wormhole solutions in the framework of $f(R,L_m)$ gravity within non-commutative geometry. By using the Gaussian and Lorentzian distributions, we construct tideless wormholes for the nonlinear $f(R,L_m)$ model $f(R,L_m)=\dfrac{R}{2}+L_m^α$. For both cases, we derive shape functions and discuss th…
▽ More
Non-commutativity is a key feature of spacetime geometry. The current article explores the traversable wormhole solutions in the framework of $f(R,L_m)$ gravity within non-commutative geometry. By using the Gaussian and Lorentzian distributions, we construct tideless wormholes for the nonlinear $f(R,L_m)$ model $f(R,L_m)=\dfrac{R}{2}+L_m^α$. For both cases, we derive shape functions and discuss the required different properties with satisfying behavior. For the required wormhole properties, we develop some new constraints. The influence of the involved model parameter on energy conditions is analyzed graphically which provides a discussion about the nature of exotic matter. Further, we check the physical behavior regarding the stability of wormhole solutions through the TOV equation. An interesting feature regarding the stability of the obtained solutions via the speed of sound parameters within the scope of average pressure is discussed. Finally, we conclude our results.
△ Less
Submitted 4 July, 2023;
originally announced July 2023.
-
Exploring wormhole solutions in curvature-matter coupling gravity supported by noncommutative geometry and conformal symmetry
Authors:
N. S. Kavya,
G. Mustafa,
V. Venkatesha,
P. K. Sahoo
Abstract:
This article explores new physically viable wormhole solutions within the framework of f(R,Lm) gravity theory, incorporating noncommutative backgrounds and conformal symmetries. The study investigates the impact of model parameters on the existence and properties of wormholes. The derived shape function is found to obey all the required criteria. Specific attention is given to traceless wormholes…
▽ More
This article explores new physically viable wormhole solutions within the framework of f(R,Lm) gravity theory, incorporating noncommutative backgrounds and conformal symmetries. The study investigates the impact of model parameters on the existence and properties of wormholes. The derived shape function is found to obey all the required criteria. Specific attention is given to traceless wormholes with Gaussian and Lorentzian distributions, investigating the behavior of the shape functions and energy conditions. In both cases, the presence of exotic fluid is confirmed.
△ Less
Submitted 7 January, 2024; v1 submitted 15 June, 2023;
originally announced June 2023.
-
Examining the Role and Limits of Batchnorm Optimization to Mitigate Diverse Hardware-noise in In-memory Computing
Authors:
Abhiroop Bhattacharjee,
Abhishek Moitra,
Youngeun Kim,
Yeshwanth Venkatesha,
Priyadarshini Panda
Abstract:
In-Memory Computing (IMC) platforms such as analog crossbars are gaining focus as they facilitate the acceleration of low-precision Deep Neural Networks (DNNs) with high area- & compute-efficiencies. However, the intrinsic non-idealities in crossbars, which are often non-deterministic and non-linear, degrade the performance of the deployed DNNs. In addition to quantization errors, most frequently…
▽ More
In-Memory Computing (IMC) platforms such as analog crossbars are gaining focus as they facilitate the acceleration of low-precision Deep Neural Networks (DNNs) with high area- & compute-efficiencies. However, the intrinsic non-idealities in crossbars, which are often non-deterministic and non-linear, degrade the performance of the deployed DNNs. In addition to quantization errors, most frequently encountered non-idealities during inference include crossbar circuit-level parasitic resistances and device-level non-idealities such as stochastic read noise and temporal drift. In this work, our goal is to closely examine the distortions caused by these non-idealities on the dot-product operations in analog crossbars and explore the feasibility of a nearly training-less solution via crossbar-aware fine-tuning of batchnorm parameters in real-time to mitigate the impact of the non-idealities. This enables reduction in hardware costs in terms of memory and training energy for IMC noise-aware retraining of the DNN weights on crossbars.
△ Less
Submitted 28 May, 2023;
originally announced May 2023.
-
Divide-and-Conquer the NAS puzzle in Resource Constrained Federated Learning Systems
Authors:
Yeshwanth Venkatesha,
Youngeun Kim,
Hyoungseob Park,
Priyadarshini Panda
Abstract:
Federated Learning (FL) is a privacy-preserving distributed machine learning approach geared towards applications in edge devices. However, the problem of designing custom neural architectures in federated environments is not tackled from the perspective of overall system efficiency. In this paper, we propose DC-NAS -- a divide-and-conquer approach that performs supernet-based Neural Architecture…
▽ More
Federated Learning (FL) is a privacy-preserving distributed machine learning approach geared towards applications in edge devices. However, the problem of designing custom neural architectures in federated environments is not tackled from the perspective of overall system efficiency. In this paper, we propose DC-NAS -- a divide-and-conquer approach that performs supernet-based Neural Architecture Search (NAS) in a federated system by systematically sampling the search space. We propose a novel diversified sampling strategy that balances exploration and exploitation of the search space by initially maximizing the distance between the samples and progressively shrinking this distance as the training progresses. We then perform channel pruning to reduce the training complexity at the devices further. We show that our approach outperforms several sampling strategies including Hadamard sampling, where the samples are maximally separated. We evaluate our method on the CIFAR10, CIFAR100, EMNIST, and TinyImagenet benchmarks and show a comprehensive analysis of different aspects of federated learning such as scalability, and non-IID data. DC-NAS achieves near iso-accuracy as compared to full-scale federated NAS with 50% fewer resources.
△ Less
Submitted 11 May, 2023;
originally announced May 2023.
-
Geometric structures of Morris-Thorne wormhole metric in $f(R,L_m)$ gravity and energy conditions
Authors:
V. Venkatesha,
N. S. Kavya,
P. K. Sahoo
Abstract:
The aim of this manuscript is to study the traversable wormhole (WH) geometries in the curvature matter coupling gravity. We investigate static spherically symmetric Morris-Thorne WHs within the context of $f(R,L_m)$ gravity. To accomplish this, we examine the WH model in four different cases (i) linear $f(R,L_m)$ model, $f(R,L_m)=αR+βL_m$ with anisotropic matter distribution having the relation…
▽ More
The aim of this manuscript is to study the traversable wormhole (WH) geometries in the curvature matter coupling gravity. We investigate static spherically symmetric Morris-Thorne WHs within the context of $f(R,L_m)$ gravity. To accomplish this, we examine the WH model in four different cases (i) linear $f(R,L_m)$ model, $f(R,L_m)=αR+βL_m$ with anisotropic matter distribution having the relation $p_r=m p_t$ (ii) linear $f(R,L_m)$ model having anisotropic matter distribution along with the equation of state parameter, $p_r=ωρ$, (iii) non-linear model $f(R,L_m)=\dfrac{1}{2}R+L_m^η$ with specific form of energy density and (iv) non-linear $f(R,L_m)$ model, $f(R,L_m)=\dfrac{1}{2}R+(1+ξR)L_m$ with isotropic matter distribution and having the linear relation between pressure and energy density, $p=ωρ$. Additionally, in the latter case, we consider a specific power-law shape function $b(r)=r_0 \left(\dfrac{r_0}{r}\right)^n$. Furthermore, we analyze the energy conditions for each WH model to verify their physical viability. As a novel outcome, we can see the validation of the null energy condition for the $f(R,L_m)$ model that suggests ruling out the necessity of exotic matter for the traversability of the WH. At last, an embedding diagram for each model is illustrated that describes the WH geometry.
△ Less
Submitted 8 May, 2023;
originally announced May 2023.
-
Static traversable wormhole solutions in $f(R,L_m)$ gravity
Authors:
N. S. Kavya,
V. Venkatesha,
G. Mustafa,
P. K. Sahoo,
S. V. Divya Rashmi
Abstract:
In this study, we explore the new wormhole solutions in the framework of new modified $f(R,L_m)$ gravity. To obtain a characteristic wormhole solution, we use anisotropic matter distribution and a specific form of energy density. As second adopt the isotropic case with a linear EoS relation as a general technique for the system and discuss several physical attributes of the system under the wormho…
▽ More
In this study, we explore the new wormhole solutions in the framework of new modified $f(R,L_m)$ gravity. To obtain a characteristic wormhole solution, we use anisotropic matter distribution and a specific form of energy density. As second adopt the isotropic case with a linear EoS relation as a general technique for the system and discuss several physical attributes of the system under the wormhole geometry. Detailed analytical and graphical discussion about the matter contents via energy conditions is discussed. In both cases, the shape function of wormhole geometry satisfies the required conditions. Several interesting points have evolved from the entire investigation along with the features of the exotic matter within the wormhole geometry. Finally, we have concluding remarks.
△ Less
Submitted 2 May, 2023;
originally announced May 2023.
-
Enhancement in Reliability for Multi-core system consisting of One Instruction Cores
Authors:
Shashikiran Venkatesha,
Ranjani Parthasarathi
Abstract:
Rapid CMOS device size reduction resulted in billions of transistors on a chip have led to integration of many cores leading to many challenges such as increased power dissipation, thermal dissipation, occurrence of transient faults and permanent faults. The mitigation of transient faults and permanent faults at the core level has become an important design parameter in a multi-core scenario. Core…
▽ More
Rapid CMOS device size reduction resulted in billions of transistors on a chip have led to integration of many cores leading to many challenges such as increased power dissipation, thermal dissipation, occurrence of transient faults and permanent faults. The mitigation of transient faults and permanent faults at the core level has become an important design parameter in a multi-core scenario. Core level techniques is a redundancy-based fault mitigation technique that improves the lifetime reliability of multi-core systems. In an asymmetric multi-core system, the smaller cores provide fault tolerance to larger cores is a core level fault mitigation technique that has gained momentum and focus from many researchers. The paper presents an economical, asymmetric multi-core system with one instruction cores (MCSOIC). The term Hardware Cost Estimation signifies power and area estimation for MCS-OIC. In MCSOIC, OIC is a warm standby redundant core. OICs provide functional support to conventional cores for shorter periods of time. To evaluate the idea, different configurations of MCSOIC is synthesized using FPGA and ASIC. The maximum power overhead and maximum area overhead are 0.46% and 11.4% respectively. The behavior of OICs in MCS-OIC is modelled using a One-Shot System (OSS) model for reliability analysis. The model parameters namely, readiness, wakeup probability and start-up-strategy for OSS are mapped to the multi-core systems with OICs. Expressions for system reliability is derived. System reliability is estimated for special cases.
△ Less
Submitted 11 April, 2023;
originally announced April 2023.
-
Exploring Temporal Information Dynamics in Spiking Neural Networks
Authors:
Youngeun Kim,
Yuhang Li,
Hyoungseob Park,
Yeshwanth Venkatesha,
Anna Hambitzer,
Priyadarshini Panda
Abstract:
Most existing Spiking Neural Network (SNN) works state that SNNs may utilize temporal information dynamics of spikes. However, an explicit analysis of temporal information dynamics is still missing. In this paper, we ask several important questions for providing a fundamental understanding of SNNs: What are temporal information dynamics inside SNNs? How can we measure the temporal information dyna…
▽ More
Most existing Spiking Neural Network (SNN) works state that SNNs may utilize temporal information dynamics of spikes. However, an explicit analysis of temporal information dynamics is still missing. In this paper, we ask several important questions for providing a fundamental understanding of SNNs: What are temporal information dynamics inside SNNs? How can we measure the temporal information dynamics? How do the temporal information dynamics affect the overall learning performance? To answer these questions, we estimate the Fisher Information of the weights to measure the distribution of temporal information during training in an empirical manner. Surprisingly, as training goes on, Fisher information starts to concentrate in the early timesteps. After training, we observe that information becomes highly concentrated in earlier few timesteps, a phenomenon we refer to as temporal information concentration. We observe that the temporal information concentration phenomenon is a common learning feature of SNNs by conducting extensive experiments on various configurations such as architecture, dataset, optimization strategy, time constant, and timesteps. Furthermore, to reveal how temporal information concentration affects the performance of SNNs, we design a loss function to change the trend of temporal information. We find that temporal information concentration is crucial to building a robust SNN but has little effect on classification accuracy. Finally, we propose an efficient iterative pruning method based on our observation on temporal information concentration. Code is available at https://github.com/Intelligent-Computing-Lab-Yale/Exploring-Temporal-Information-Dynamics-in-Spiking-Neural-Networks.
△ Less
Submitted 30 November, 2022; v1 submitted 25 November, 2022;
originally announced November 2022.
-
Constraining Anisotropic Cosmological Model in $f(\mathcal{R},\mathscr{L}_m)$ Gravity
Authors:
N. S. Kavya,
V. Venkatesha,
Sanjay Mandal,
P. K. Sahoo
Abstract:
The observational evidence regarding the present cosmological aspects tells us about the presence of very little anisotropy in the universe on a large scale. Here, in this paper, we attempt to study locally rotationally symmetric (LRS) homogeneous Bianchi-I spacetime with the isotropic matter distribution. This is done within the framework of $f(\mathcal{R},\mathscr{L}_m)$ gravity. Particularly, w…
▽ More
The observational evidence regarding the present cosmological aspects tells us about the presence of very little anisotropy in the universe on a large scale. Here, in this paper, we attempt to study locally rotationally symmetric (LRS) homogeneous Bianchi-I spacetime with the isotropic matter distribution. This is done within the framework of $f(\mathcal{R},\mathscr{L}_m)$ gravity. Particularly, we consider a non-linear $f(\mathcal{R},\mathscr{L}_m)$ model, $f(\mathcal{R},\mathscr{L}_m)=\dfrac{1}{2}\mathcal{R}+\mathscr{L}_m^{\,α}$. Furthermore, $ω$, the equation of state parameter, which is vital stuff in determining the present phase of the universe is constrained. To constrain the model parameters and the equation of state parameter, we use 57 Hubble data points and 1048 Pantheon supernovae type Ia data sample. And, for our statistical analysis, we use Markoc Chain Monte Carlo (MCMC) simulation. Moreover, with the help of obtained values of parameters, we measure the anisotropy parameter for our model.
△ Less
Submitted 17 October, 2022;
originally announced October 2022.
-
Covy: An AI-powered Robot with a Compound Vision System for Detecting Breaches in Social Distancing
Authors:
Serge Saaybi,
Amjad Yousef Majid,
R Venkatesha Prasad,
Anis Koubaa,
Chris Verhoeven
Abstract:
This paper introduces a compound vision system that enables robots to localize people up to 15m away using a cheap camera. And, it proposes a robust navigation stack that combines Deep Reinforcement Learning (DRL) and a probabilistic localization method. To test the efficacy of these systems, we prototyped a low-cost mobile robot that we call Covy. Covy can be used for applications such as promoti…
▽ More
This paper introduces a compound vision system that enables robots to localize people up to 15m away using a cheap camera. And, it proposes a robust navigation stack that combines Deep Reinforcement Learning (DRL) and a probabilistic localization method. To test the efficacy of these systems, we prototyped a low-cost mobile robot that we call Covy. Covy can be used for applications such as promoting social distancing during pandemics or estimating the density of a crowd. We evaluated Covy's performance through extensive sets of experiments both in simulated and realistic environments. Our results show that Covy's compound vision algorithm doubles the range of the used depth camera, and its hybrid navigation stack is more robust than a pure DRL-based one.
△ Less
Submitted 23 August, 2022; v1 submitted 14 July, 2022;
originally announced July 2022.
-
Exploring Lottery Ticket Hypothesis in Spiking Neural Networks
Authors:
Youngeun Kim,
Yuhang Li,
Hyoungseob Park,
Yeshwanth Venkatesha,
Ruokai Yin,
Priyadarshini Panda
Abstract:
Spiking Neural Networks (SNNs) have recently emerged as a new generation of low-power deep neural networks, which is suitable to be implemented on low-power mobile/edge devices. As such devices have limited memory storage, neural pruning on SNNs has been widely explored in recent years. Most existing SNN pruning works focus on shallow SNNs (2~6 layers), however, deeper SNNs (>16 layers) are propos…
▽ More
Spiking Neural Networks (SNNs) have recently emerged as a new generation of low-power deep neural networks, which is suitable to be implemented on low-power mobile/edge devices. As such devices have limited memory storage, neural pruning on SNNs has been widely explored in recent years. Most existing SNN pruning works focus on shallow SNNs (2~6 layers), however, deeper SNNs (>16 layers) are proposed by state-of-the-art SNN works, which is difficult to be compatible with the current SNN pruning work. To scale up a pruning technique towards deep SNNs, we investigate Lottery Ticket Hypothesis (LTH) which states that dense networks contain smaller subnetworks (i.e., winning tickets) that achieve comparable performance to the dense networks. Our studies on LTH reveal that the winning tickets consistently exist in deep SNNs across various datasets and architectures, providing up to 97% sparsity without huge performance degradation. However, the iterative searching process of LTH brings a huge training computational cost when combined with the multiple timesteps of SNNs. To alleviate such heavy searching cost, we propose Early-Time (ET) ticket where we find the important weight connectivity from a smaller number of timesteps. The proposed ET ticket can be seamlessly combined with a common pruning techniques for finding winning tickets, such as Iterative Magnitude Pruning (IMP) and Early-Bird (EB) tickets. Our experiment results show that the proposed ET ticket reduces search time by up to 38% compared to IMP or EB methods. Code is available at Github.
△ Less
Submitted 20 July, 2022; v1 submitted 4 July, 2022;
originally announced July 2022.
-
Quasi Yamabe Solitons on 3-Dimensional Contact Metric Manifolds with Q\varphi=\varphi Q
Authors:
V. Venkatesha,
H. Aruna Kumara
Abstract:
In this paper we initiate the study of quasi Yamabe soliton on 3-dimensional contact metric manifold with Q\varphi=\varphi Q and prove that if a 3-dimensional contact metric manifold M such that Q\varphi=\varphi Q admits a quasi Yamabe soliton with non-zero soliton vector field V being point-wise collinear with the Reeb vector field ξ, then V is a constant multiple of ξ, the scalar curvature is co…
▽ More
In this paper we initiate the study of quasi Yamabe soliton on 3-dimensional contact metric manifold with Q\varphi=\varphi Q and prove that if a 3-dimensional contact metric manifold M such that Q\varphi=\varphi Q admits a quasi Yamabe soliton with non-zero soliton vector field V being point-wise collinear with the Reeb vector field ξ, then V is a constant multiple of ξ, the scalar curvature is constant and the manifold is Sasakian. Moreover, V is Killing. Finally, we prove that if M is a 3-dimensional compact contact metric manifold such that Q\varphi=\varphi Q endowed with a quasi Yamabe soliton, then either M is flat or soliton is trivial.
△ Less
Submitted 10 August, 2022; v1 submitted 10 June, 2022;
originally announced June 2022.
-
MIME: Adapting a Single Neural Network for Multi-task Inference with Memory-efficient Dynamic Pruning
Authors:
Abhiroop Bhattacharjee,
Yeshwanth Venkatesha,
Abhishek Moitra,
Priyadarshini Panda
Abstract:
Recent years have seen a paradigm shift towards multi-task learning. This calls for memory and energy-efficient solutions for inference in a multi-task scenario. We propose an algorithm-hardware co-design approach called MIME. MIME reuses the weight parameters of a trained parent task and learns task-specific threshold parameters for inference on multiple child tasks. We find that MIME results in…
▽ More
Recent years have seen a paradigm shift towards multi-task learning. This calls for memory and energy-efficient solutions for inference in a multi-task scenario. We propose an algorithm-hardware co-design approach called MIME. MIME reuses the weight parameters of a trained parent task and learns task-specific threshold parameters for inference on multiple child tasks. We find that MIME results in highly memory-efficient DRAM storage of neural-network parameters for multiple tasks compared to conventional multi-task inference. In addition, MIME results in input-dependent dynamic neuronal pruning, thereby enabling energy-efficient inference with higher throughput on a systolic-array hardware. Our experiments with benchmark datasets (child tasks)- CIFAR10, CIFAR100, and Fashion-MNIST, show that MIME achieves ~3.48x memory-efficiency and ~2.4-3.1x energy-savings compared to conventional multi-task inference in Pipelined task mode.
△ Less
Submitted 11 April, 2022;
originally announced April 2022.
-
Addressing Client Drift in Federated Continual Learning with Adaptive Optimization
Authors:
Yeshwanth Venkatesha,
Youngeun Kim,
Hyoungseob Park,
Yuhang Li,
Priyadarshini Panda
Abstract:
Federated learning has been extensively studied and is the prevalent method for privacy-preserving distributed learning in edge devices. Correspondingly, continual learning is an emerging field targeted towards learning multiple tasks sequentially. However, there is little attention towards additional challenges emerging when federated aggregation is performed in a continual learning system. We id…
▽ More
Federated learning has been extensively studied and is the prevalent method for privacy-preserving distributed learning in edge devices. Correspondingly, continual learning is an emerging field targeted towards learning multiple tasks sequentially. However, there is little attention towards additional challenges emerging when federated aggregation is performed in a continual learning system. We identify \textit{client drift} as one of the key weaknesses that arise when vanilla federated averaging is applied in such a system, especially since each client can independently have different order of tasks. We outline a framework for performing Federated Continual Learning (FCL) by using NetTailor as a candidate continual learning approach and show the extent of the problem of client drift. We show that adaptive federated optimization can reduce the adverse impact of client drift and showcase its effectiveness on CIFAR100, MiniImagenet, and Decathlon benchmarks. Further, we provide an empirical analysis highlighting the interplay between different hyperparameters such as client and server learning rates, the number of local training iterations, and communication rounds. Finally, we evaluate our framework on useful characteristics of federated learning systems such as scalability, robustness to the skewness in clients' data distribution, and stragglers.
△ Less
Submitted 24 March, 2022;
originally announced March 2022.
-
A Survey of fault models and fault tolerance methods for 2D bus-based multi-core systems and TSV based 3D NOC many-core systems
Authors:
Shashikiran Venkatesha,
Ranjani Parthasarathi
Abstract:
Reliability has taken centre stage in the development of high-performance computing processors. A Surge of interest is noticeable in recent times in formulating fault and failure models, understanding failure mechanism and strategizing fault mitigation methods for improving the reliability of the system. The article presents a congregation of concepts illustrated one after the other for a better u…
▽ More
Reliability has taken centre stage in the development of high-performance computing processors. A Surge of interest is noticeable in recent times in formulating fault and failure models, understanding failure mechanism and strategizing fault mitigation methods for improving the reliability of the system. The article presents a congregation of concepts illustrated one after the other for a better understanding of damages caused by radiation, relevant fault models, and effects of faults. We examine the state of art fault mitigation techniques at the logical layer for digital CMOS based design and SRAM based FPGA. CMOS SRAM structure is the same for both digital CMOS and FPGA. Understanding of resilient SRAM based FPGA is necessary for develo** resilient prototypes and it facilitates a faster integration of digital CMOS designs. At the micro-architectural and architectural layer, error detection and recovery methods are discussed for bus-based multi-core systems. The Through silicon via based 3D Network on chip is the prospective solution for integrating many cores on single die. A suitable interconnection approach for petascale computing on many-core systems. The article presents an elaborate discussion on fault models, failure mechanisms, resilient 3D routers, defect tolerance methods for the TSV based 3D NOC many-core systems. Core redundancy, self-diagnosis and distributed diagnosis at the hardware level are examined for many-core systems. The article presents a gamut of fault tolerance solutions from logic level to processor core level in a multi-core and many-core scenario.
△ Less
Submitted 15 March, 2022;
originally announced March 2022.
-
Rate Coding or Direct Coding: Which One is Better for Accurate, Robust, and Energy-efficient Spiking Neural Networks?
Authors:
Youngeun Kim,
Hyoungseob Park,
Abhishek Moitra,
Abhiroop Bhattacharjee,
Yeshwanth Venkatesha,
Priyadarshini Panda
Abstract:
Recent Spiking Neural Networks (SNNs) works focus on an image classification task, therefore various coding techniques have been proposed to convert an image into temporal binary spikes. Among them, rate coding and direct coding are regarded as prospective candidates for building a practical SNN system as they show state-of-the-art performance on large-scale datasets. Despite their usage, there is…
▽ More
Recent Spiking Neural Networks (SNNs) works focus on an image classification task, therefore various coding techniques have been proposed to convert an image into temporal binary spikes. Among them, rate coding and direct coding are regarded as prospective candidates for building a practical SNN system as they show state-of-the-art performance on large-scale datasets. Despite their usage, there is little attention to comparing these two coding schemes in a fair manner. In this paper, we conduct a comprehensive analysis of the two codings from three perspectives: accuracy, adversarial robustness, and energy-efficiency. First, we compare the performance of two coding techniques with various architectures and datasets. Then, we measure the robustness of the coding techniques on two adversarial attack methods. Finally, we compare the energy-efficiency of two coding schemes on a digital hardware platform. Our results show that direct coding can achieve better accuracy especially for a small number of timesteps. In contrast, rate coding shows better robustness to adversarial attacks owing to the non-differentiable spike generation process. Rate coding also yields higher energy-efficiency than direct coding which requires multi-bit precision for the first layer. Our study explores the characteristics of two codings, which is an important design consideration for building SNNs. The code is made available at https://github.com/Intelligent-Computing-Lab-Yale/Rate-vs-Direct.
△ Less
Submitted 12 April, 2022; v1 submitted 31 January, 2022;
originally announced February 2022.
-
Neural Architecture Search for Spiking Neural Networks
Authors:
Youngeun Kim,
Yuhang Li,
Hyoungseob Park,
Yeshwanth Venkatesha,
Priyadarshini Panda
Abstract:
Spiking Neural Networks (SNNs) have gained huge attention as a potential energy-efficient alternative to conventional Artificial Neural Networks (ANNs) due to their inherent high-sparsity activation. However, most prior SNN methods use ANN-like architectures (e.g., VGG-Net or ResNet), which could provide sub-optimal performance for temporal sequence processing of binary information in SNNs. To add…
▽ More
Spiking Neural Networks (SNNs) have gained huge attention as a potential energy-efficient alternative to conventional Artificial Neural Networks (ANNs) due to their inherent high-sparsity activation. However, most prior SNN methods use ANN-like architectures (e.g., VGG-Net or ResNet), which could provide sub-optimal performance for temporal sequence processing of binary information in SNNs. To address this, in this paper, we introduce a novel Neural Architecture Search (NAS) approach for finding better SNN architectures. Inspired by recent NAS approaches that find the optimal architecture from activation patterns at initialization, we select the architecture that can represent diverse spike activation patterns across different data samples without training. Moreover, to further leverage the temporal information among the spikes, we search for feed forward connections as well as backward connections (i.e., temporal feedback connections) between layers. Interestingly, SNASNet found by our search algorithm achieves higher performance with backward connections, demonstrating the importance of designing SNN architecture for suitably using temporal information. We conduct extensive experiments on three image recognition benchmarks where we show that SNASNet achieves state-of-the-art performance with significantly lower timesteps (5 timesteps). Code is available at Github.
△ Less
Submitted 20 July, 2022; v1 submitted 23 January, 2022;
originally announced January 2022.
-
A Survey of fault mitigation techniques for multi-core architectures
Authors:
Shashikiran Venkatesha,
Ranjani Parthasarathi
Abstract:
Fault tolerance in multi-core architecture has attracted attention of research community for the past 20 years. Rapid improvements in the CMOS technology resulted in exponential growth of transistor density. It resulted in increased challenges for designing resilient multi-core architecture at the same pace. The article presents a survey of fault tolerant methods like fault detection, recovery, re…
▽ More
Fault tolerance in multi-core architecture has attracted attention of research community for the past 20 years. Rapid improvements in the CMOS technology resulted in exponential growth of transistor density. It resulted in increased challenges for designing resilient multi-core architecture at the same pace. The article presents a survey of fault tolerant methods like fault detection, recovery, re-configurability and repair techniques for multi-core architectures. Salvaging at micro-architectural and architectural level are also discussed. Gamut of fault tolerant approaches discussed in this article have tangible improvements on the reliability of the multi-core architectures. Every concept in the seminal articles is examined with respect to relevant metrics like performance cost, area overhead, fault coverage, level of protection, detection latency and Mean Time To Failure. The existing literature is critically examined. New research directions in the form of new fault tolerant design alternatives for both homogeneous and heterogeneous multi-core architectures are presented. Brief on an analytical approach for fault tolerating model is suggested for Intel and AMD based modern homogeneous multi-core architecture are presented to enhance the understanding of the readers about the architecture with respect to performance degradation, memory access time and execution time.
△ Less
Submitted 30 December, 2021;
originally announced December 2021.
-
Towards Enabling High-Five Over WiFi
Authors:
Vineet Gokhale,
Mohamad Eid,
Kees Kroep,
R. Venkatesha Prasad,
Vijay Rao
Abstract:
The next frontier for immersive applications is enabling sentience over the Internet. Tactile Internet (TI) envisages transporting skills by providing Ultra-Low Latency (ULL) communications for transporting touch senses. In this work, we focus our study on the first/last mile communication, where the future generation WiFi-7 is pitched as the front-runner for ULL applications. We discuss a few can…
▽ More
The next frontier for immersive applications is enabling sentience over the Internet. Tactile Internet (TI) envisages transporting skills by providing Ultra-Low Latency (ULL) communications for transporting touch senses. In this work, we focus our study on the first/last mile communication, where the future generation WiFi-7 is pitched as the front-runner for ULL applications. We discuss a few candidate features of WiFi-7 and highlight its major pitfalls with respect to ULL communication. Further, through a specific implementation of WiFi-7 (vanilla WiFi-7) in our custom simulator, we demonstrate the impact of one of the pitfalls - standard practice of using jitter buffer in conjunction with frame aggregation - on TI communication. To circumvent this, we propose Non-Buffered Scheme (NoBuS) - a simple MAC layer enhancement for enabling TI applications on WiFi-7. NoBuS trades off packet loss for latency enabling swift synchronization between the master and controlled domains. Our findings reveal that employing NoBuS yields a significant improvement in RMSE of TI signals. Further, we show that the worst-case WiFi latency with NoBuS is 3.72 ms - an order of magnitude lower than vanilla WiFi-7 even under highly congested network conditions.
△ Less
Submitted 2 November, 2021;
originally announced November 2021.
-
Deep Reinforcement Learning Versus Evolution Strategies: A Comparative Survey
Authors:
Amjad Yousef Majid,
Serge Saaybi,
Tomas van Rietbergen,
Vincent Francois-Lavet,
R Venkatesha Prasad,
Chris Verhoeven
Abstract:
Deep Reinforcement Learning (DRL) and Evolution Strategies (ESs) have surpassed human-level control in many sequential decision-making problems, yet many open challenges still exist. To get insights into the strengths and weaknesses of DRL versus ESs, an analysis of their respective capabilities and limitations is provided. After presenting their fundamental concepts and algorithms, a comparison i…
▽ More
Deep Reinforcement Learning (DRL) and Evolution Strategies (ESs) have surpassed human-level control in many sequential decision-making problems, yet many open challenges still exist. To get insights into the strengths and weaknesses of DRL versus ESs, an analysis of their respective capabilities and limitations is provided. After presenting their fundamental concepts and algorithms, a comparison is provided on key aspects such as scalability, exploration, adaptation to dynamic environments, and multi-agent learning. Then, the benefits of hybrid algorithms that combine concepts from DRL and ESs are highlighted. Finally, to have an indication about how they compare in real-world applications, a survey of the literature for the set of applications they support is provided.
△ Less
Submitted 28 September, 2021;
originally announced October 2021.
-
CGEMs: A Metric Model for Automatic Code Generation using GPT-3
Authors:
Aishwarya Narasimhan,
Krishna Prasad Agara Venkatesha Rao,
Veena M B
Abstract:
Today, AI technology is showing its strengths in almost every industry and walks of life. From text generation, text summarization, chatbots, NLP is being used widely. One such paradigm is automatic code generation. An AI could be generating anything; hence the output space is unconstrained. A self-driving car is driven for 100 million miles to validate its safety, but tests cannot be written to m…
▽ More
Today, AI technology is showing its strengths in almost every industry and walks of life. From text generation, text summarization, chatbots, NLP is being used widely. One such paradigm is automatic code generation. An AI could be generating anything; hence the output space is unconstrained. A self-driving car is driven for 100 million miles to validate its safety, but tests cannot be written to monitor and cover an unconstrained space. One of the solutions to validate AI-generated content is to constrain the problem and convert it from abstract to realistic, and this can be accomplished by either validating the unconstrained algorithm using theoretical proofs or by using Monte-Carlo simulation methods. In this case, we use the latter approach to test/validate a statistically significant number of samples. This hypothesis of validating the AI-generated code is the main motive of this work and to know if AI-generated code is reliable, a metric model CGEMs is proposed. This is an extremely challenging task as programs can have different logic with different naming conventions, but the metrics must capture the structure and logic of the program. This is similar to the importance grammar carries in AI-based text generation, Q&A, translations, etc. The various metrics that are garnered in this work to support the evaluation of generated code are as follows: Compilation, NL description to logic conversion, number of edits needed, some of the commonly used static-code metrics and NLP metrics. These metrics are applied to 80 codes generated using OpenAI's GPT-3. Post which a Neural network is designed for binary classification (acceptable/not acceptable quality of the generated code). The inputs to this network are the values of the features obtained from the metrics. The model achieves a classification accuracy of 76.92% and an F1 score of 55.56%. XAI is augmented for model interpretability.
△ Less
Submitted 23 August, 2021;
originally announced August 2021.
-
Energy Efficient Data Recovery from Corrupted LoRa Frames
Authors:
Niloofar Yazdani,
Nikolaos Kouvelas,
R Venkatesha Prasad,
Daniel E. Lucani
Abstract:
High frame-corruption is widely observed in Long Range Wide Area Networks (LoRaWAN) due to the coexistence with other networks in ISM bands and an Aloha-like MAC layer. LoRa's Forward Error Correction (FEC) mechanism is often insufficient to retrieve corrupted data. In fact, real-life measurements show that at least one-fourth of received transmissions are corrupted. When more frames are dropped,…
▽ More
High frame-corruption is widely observed in Long Range Wide Area Networks (LoRaWAN) due to the coexistence with other networks in ISM bands and an Aloha-like MAC layer. LoRa's Forward Error Correction (FEC) mechanism is often insufficient to retrieve corrupted data. In fact, real-life measurements show that at least one-fourth of received transmissions are corrupted. When more frames are dropped, LoRa nodes usually switch over to higher spreading factors (SF), thus increasing transmission times and increasing the required energy. This paper introduces ReDCoS, a novel coding technique at the application layer that improves recovery of corrupted LoRa frames, thus reducing the overall transmission time and energy invested by LoRa nodes by several-fold. ReDCoS utilizes lightweight coding techniques to pre-encode the transmitted data. Therefore, the inbuilt Cyclic Redundancy Check (CRC) that follows is computed based on an already encoded data. At the receiver, we use both the CRC and the coded data to recover data from a corrupted frame beyond the built-in Error Correcting Code (ECC). We compare the performance of ReDCoS to (I) the standard FEC of vanilla-LoRaWAN, and to (ii) RS coding applied as ECC to the data of LoRaWAN. The results indicated a 54x and 13.5x improvement of decoding ratio, respectively, when 20 data symbols were sent. Furthermore, we evaluated ReDCoS on-field using LoRa SX1261 transceivers showing that it outperformed RS-coding by factor of at least 2x (and up to 6x) in terms of the decoding ratio while consuming 38.5% less energy per correctly received transmission.
△ Less
Submitted 19 July, 2021;
originally announced July 2021.
-
ETVO: Effectively Measuring Tactile Internet with Experimental Validation
Authors:
H. J. C. Kroep,
V. Gokhale,
J. Verburg,
R. Venkatesha Prasad
Abstract:
The next frontier in communications is teleoperation -- manipulation and control of remote environments with feedback. Compared to conventional networked applications, teleoperation poses widely different requirements, ultra-low latency (ULL) is primary. Realizing ULL communication demands significant redesign of conventional networking techniques, and the network infrastructure envisioned for ach…
▽ More
The next frontier in communications is teleoperation -- manipulation and control of remote environments with feedback. Compared to conventional networked applications, teleoperation poses widely different requirements, ultra-low latency (ULL) is primary. Realizing ULL communication demands significant redesign of conventional networking techniques, and the network infrastructure envisioned for achieving this is termed as Tactile Internet (TI). The design of the network infrastructure and meaningful performance metrics are crucial for seamless TI communication. However, existing performance metrics fall severely short of comprehensively characterizing TI performance. We take the first step towards bridging this gap. We take Dynamic Time War**(DTW) as the basis of our work and identify necessary changes for characterizing TI performance. Through substantial refinements to DTW, we design Effective Time- and Value-Offset (ETVO) -- a new method for measuring the fine-grained performance of TI systems. Through an in-depth objective analysis, we demonstrate the improvements of ETVO over DTW. Through human-in-the-loop subjective experiments, we demonstrate how and why existing QoS and QoE methods fall short of estimating the TI session performance accurately. Using subjective experiments, we demonstrate the behavior of the proposed metrics, their ability to match theoretically derived performance, and finally their ability to reflect user satisfaction in a practical setting. The results are highly encouraging.
△ Less
Submitted 12 July, 2021;
originally announced July 2021.
-
Federated Learning with Spiking Neural Networks
Authors:
Yeshwanth Venkatesha,
Youngeun Kim,
Leandros Tassiulas,
Priyadarshini Panda
Abstract:
As neural networks get widespread adoption in resource-constrained embedded devices, there is a growing need for low-power neural systems. Spiking Neural Networks (SNNs)are emerging to be an energy-efficient alternative to the traditional Artificial Neural Networks (ANNs) which are known to be computationally intensive. From an application perspective, as federated learning involves multiple energ…
▽ More
As neural networks get widespread adoption in resource-constrained embedded devices, there is a growing need for low-power neural systems. Spiking Neural Networks (SNNs)are emerging to be an energy-efficient alternative to the traditional Artificial Neural Networks (ANNs) which are known to be computationally intensive. From an application perspective, as federated learning involves multiple energy-constrained devices, there is a huge scope to leverage energy efficiency provided by SNNs. Despite its importance, there has been little attention on training SNNs on a large-scale distributed system like federated learning. In this paper, we bring SNNs to a more realistic federated learning scenario. Specifically, we propose a federated learning framework for decentralized and privacy-preserving training of SNNs. To validate the proposed federated learning framework, we experimentally evaluate the advantages of SNNs on various aspects of federated learning with CIFAR10 and CIFAR100 benchmarks. We observe that SNNs outperform ANNs in terms of overall accuracy by over 15% when the data is distributed across a large number of clients in the federation while providing up to5.3x energy efficiency. In addition to efficiency, we also analyze the sensitivity of the proposed federated SNN framework to data distribution among the clients, stragglers, and gradient noise and perform a comprehensive comparison with ANNs.
△ Less
Submitted 11 June, 2021;
originally announced June 2021.
-
PrivateSNN: Privacy-Preserving Spiking Neural Networks
Authors:
Youngeun Kim,
Yeshwanth Venkatesha,
Priyadarshini Panda
Abstract:
How can we bring both privacy and energy-efficiency to a neural system? In this paper, we propose PrivateSNN, which aims to build low-power Spiking Neural Networks (SNNs) from a pre-trained ANN model without leaking sensitive information contained in a dataset. Here, we tackle two types of leakage problems: 1) Data leakage is caused when the networks access real training data during an ANN-SNN con…
▽ More
How can we bring both privacy and energy-efficiency to a neural system? In this paper, we propose PrivateSNN, which aims to build low-power Spiking Neural Networks (SNNs) from a pre-trained ANN model without leaking sensitive information contained in a dataset. Here, we tackle two types of leakage problems: 1) Data leakage is caused when the networks access real training data during an ANN-SNN conversion process. 2) Class leakage is caused when class-related features can be reconstructed from network parameters. In order to address the data leakage issue, we generate synthetic images from the pre-trained ANNs and convert ANNs to SNNs using the generated images. However, converted SNNs remain vulnerable to class leakage since the weight parameters have the same (or scaled) value with respect to ANN parameters. Therefore, we encrypt SNN weights by training SNNs with a temporal spike-based learning rule. Updating weight parameters with temporal data makes SNNs difficult to be interpreted in the spatial domain. We observe that the encrypted PrivateSNN eliminates data and class leakage issues with a slight performance drop (less than ~2) and significant energy-efficiency gain (about 55x) compared to the standard ANN. We conduct extensive experiments on various datasets including CIFAR10, CIFAR100, and TinyImageNet, highlighting the importance of privacy-preserving SNN training.
△ Less
Submitted 21 May, 2022; v1 submitted 7 April, 2021;
originally announced April 2021.
-
FEEL: Fast, Energy-Efficient Localization for Autonomous Indoor Vehicles
Authors:
Vineet Gokhale,
Gerardo Moyers Barrera,
R. Venkatesha Prasad
Abstract:
Autonomous vehicles have created a sensation in both outdoor and indoor applications. The famous indoor use-case is process automation inside a warehouse using Autonomous Indoor Vehicles (AIV). These vehicles need to locate themselves not only with an accuracy of a few centimetres but also within a few milliseconds in an energy-efficient manner. Due to these challenges, localization is a holy grai…
▽ More
Autonomous vehicles have created a sensation in both outdoor and indoor applications. The famous indoor use-case is process automation inside a warehouse using Autonomous Indoor Vehicles (AIV). These vehicles need to locate themselves not only with an accuracy of a few centimetres but also within a few milliseconds in an energy-efficient manner. Due to these challenges, localization is a holy grail. In this paper, we propose FEEL - an indoor localization system that uses a fusion of three low-energy sensors: IMU, UWB, and radar. We provide detailed software and hardware architecture of FEEL. Further, we propose Adaptive Sensing Algorithm (ASA) for opportunistically minimizing energy consumption of FEEL by adjusting the sensing frequency to the dynamics of the physical environment. Our extensive performance evaluation over diverse test settings reveal that FEEL provides a localization accuracy of <7cm with ultra-low latency of around 3ms. Further, ASA yields up to 20% energy saving with only a marginal trade-off in accuracy.
△ Less
Submitted 1 February, 2021;
originally announced February 2021.
-
Activation Density based Mixed-Precision Quantization for Energy Efficient Neural Networks
Authors:
Karina Vasquez,
Yeshwanth Venkatesha,
Abhiroop Bhattacharjee,
Abhishek Moitra,
Priyadarshini Panda
Abstract:
As neural networks gain widespread adoption in embedded devices, there is a need for model compression techniques to facilitate deployment in resource-constrained environments. Quantization is one of the go-to methods yielding state-of-the-art model compression. Most approaches take a fully trained model, apply different heuristics to determine the optimal bit-precision for different layers of the…
▽ More
As neural networks gain widespread adoption in embedded devices, there is a need for model compression techniques to facilitate deployment in resource-constrained environments. Quantization is one of the go-to methods yielding state-of-the-art model compression. Most approaches take a fully trained model, apply different heuristics to determine the optimal bit-precision for different layers of the network, and retrain the network to regain any drop in accuracy. Based on Activation Density (AD)-the proportion of non-zero activations in a layer-we propose an in-training quantization method. Our method calculates bit-width for each layer during training yielding a mixed precision model with competitive accuracy. Since we train lower precision models during training, our approach yields the final quantized model at lower training complexity and also eliminates the need for re-training. We run experiments on benchmark datasets like CIFAR-10, CIFAR-100, TinyImagenet on VGG19/ResNet18 architectures and report the accuracy and energy estimates for the same. We achieve ~4.5x benefit in terms of estimated multiply-and-accumulate (MAC) reduction while reducing the training complexity by 50% in our experiments. To further evaluate the energy benefits of our proposed method, we develop a mixed-precision scalable Process In Memory (PIM) hardware accelerator platform. The hardware platform incorporates shift-add functionality for handling multi-bit precision neural network models. Evaluating the quantized models obtained with our proposed method on the PIM platform yields ~5x energy reduction compared to 16-bit models. Additionally, we find that integrating AD based quantization with AD based pruning (both conducted during training) yields up to ~198x and ~44x energy reductions for VGG19 and ResNet18 architectures respectively on PIM platform compared to baseline 16-bit precision, unpruned models.
△ Less
Submitted 12 January, 2021;
originally announced January 2021.
-
A simple Stochastic SIR model for COVID 19 Infection Dynamics for Karnataka: Learning from Europe
Authors:
Ashutosh Simha,
R. Venkatesha Prasad,
Sujay Narayana
Abstract:
In this short note we model the region-wise trends of the evolution to COVID-19 infections using a stochastic SIR model. The SIR dynamics are expressed using \textit{Itô-stochastic differential equations}. We first derive the parameters of the model from the available daily data from European regions based on a 24-day history of infections, recoveries and deaths. The derived parameters have been a…
▽ More
In this short note we model the region-wise trends of the evolution to COVID-19 infections using a stochastic SIR model. The SIR dynamics are expressed using \textit{Itô-stochastic differential equations}. We first derive the parameters of the model from the available daily data from European regions based on a 24-day history of infections, recoveries and deaths. The derived parameters have been aggregated to project future trends for the Indian subcontinent, which is currently at an early stage in the infection cycle. The projections are meant to serve as a guideline for strategizing the socio-political counter measures to mitigate COVID-19.
△ Less
Submitted 16 April, 2020; v1 submitted 26 March, 2020;
originally announced March 2020.
-
Riemann solitons and almost Riemann solitons on almost Kenmotsu manifolds
Authors:
V. Venkatesha,
H. Aruna Kumara,
Devaraja Mallesha Naik
Abstract:
The aim of this article is to study the Riemann soliton and gradient almost Riemann soliton on certain class of almost Kenmotsu manifolds. Also some suitable examples of Kenmotsu and $(κ,μ)'$-almost Kenmotsu manifolds are constructed to justify our results.
The aim of this article is to study the Riemann soliton and gradient almost Riemann soliton on certain class of almost Kenmotsu manifolds. Also some suitable examples of Kenmotsu and $(κ,μ)'$-almost Kenmotsu manifolds are constructed to justify our results.
△ Less
Submitted 2 March, 2020;
originally announced March 2020.
-
Activation Density driven Energy-Efficient Pruning in Training
Authors:
Timothy Foldy-Porto,
Yeshwanth Venkatesha,
Priyadarshini Panda
Abstract:
Neural network pruning with suitable retraining can yield networks with considerably fewer parameters than the original with comparable degrees of accuracy. Typical pruning methods require large, fully trained networks as a starting point from which they perform a time-intensive iterative pruning and retraining procedure to regain the original accuracy. We propose a novel pruning method that prune…
▽ More
Neural network pruning with suitable retraining can yield networks with considerably fewer parameters than the original with comparable degrees of accuracy. Typical pruning methods require large, fully trained networks as a starting point from which they perform a time-intensive iterative pruning and retraining procedure to regain the original accuracy. We propose a novel pruning method that prunes a network real-time during training, reducing the overall training time to achieve an efficient compressed network. We introduce an activation density based analysis to identify the optimal relative sizing or compression for each layer of the network. Our method is architecture agnostic, allowing it to be employed on a wide variety of systems. For VGG-19 and ResNet18 on CIFAR-10, CIFAR-100, and TinyImageNet, we obtain exceedingly sparse networks (up to $200 \times$ reduction in parameters and over $60 \times$ reduction in inference compute operations in the best case) with accuracy comparable to the baseline network. By reducing the network size periodically during training, we achieve total training times that are shorter than those of previously proposed pruning methods. Furthermore, training compressed networks at different epochs with our proposed method yields considerable reduction in training compute complexity ($1.6\times$ to $3.2\times$ lower) at near iso-accuracy as compared to a baseline network trained entirely from scratch.
△ Less
Submitted 12 October, 2020; v1 submitted 7 February, 2020;
originally announced February 2020.
-
Setting the Yardstick: A Quantitative Metric for Effectively Measuring Tactile Internet
Authors:
J. P. Verburg,
H. J. C. Kroep,
V. Gokhale,
R. Venkatesha Prasad,
V. Rao
Abstract:
The next frontier in communications is teleoperation -- manipulation and control of remote environments. Compared to conventional networked applications, teleoperation poses widely different requirements, ultra-low latency (ULL) being the primary one. Teleoperation, along with a host of other applications requiring ULL communication, is termed as Tactile Internet (TI). A significant redesign of co…
▽ More
The next frontier in communications is teleoperation -- manipulation and control of remote environments. Compared to conventional networked applications, teleoperation poses widely different requirements, ultra-low latency (ULL) being the primary one. Teleoperation, along with a host of other applications requiring ULL communication, is termed as Tactile Internet (TI). A significant redesign of conventional networking techniques is necessary to realize TI applications. Further, these advancements can be evaluated only when meaningful performance metrics are available. However, existing TI performance metrics fall severely short of comprehensively characterizing TI performance. In this paper, we take the first step towards bridging this gap. To this end, we propose a method that captures the fine-grained performance of TI in terms of delay and precision. We take Dynamic Time War** (DTW) as the basis of our work and identify whether it is sufficient in characterizing TI systems. We refine DTW by develo** a framework called Effective Time- and Value-Offset (ETVO) that extracts fine-grained time and value offsets between input and output signals of TI. Using ETVO, we present two quantitative metrics for TI -- Effective Delay-Derivative (EDD) and Effective Root Mean Square Error. Through rigorous experiments conducted on a realistic TI setup, we demonstrate the potential of the proposed metrics to precisely characterize TI interactions.
△ Less
Submitted 27 January, 2020; v1 submitted 6 January, 2020;
originally announced January 2020.
-
Reinforcing Edge Computing with Multipath TCP Enabled Mobile Device Clouds
Authors:
Venkatraman Balasubramanian,
Kees Kroep,
Kishor Chandra Joshi,
R. Venkatesha Prasad
Abstract:
In recent years, enormous growth has been witnessed in the computational and storage capabilities of mobile devices. However, much of this computational and storage capabilities are not always fully used. On the other hand, popularity of mobile edge computing which aims to replace the traditional centralized powerful cloud with multiple edge servers is rapidly growing. In particular, applications…
▽ More
In recent years, enormous growth has been witnessed in the computational and storage capabilities of mobile devices. However, much of this computational and storage capabilities are not always fully used. On the other hand, popularity of mobile edge computing which aims to replace the traditional centralized powerful cloud with multiple edge servers is rapidly growing. In particular, applications having strict latency requirements can be best served by the mobile edge clouds due to a reduced round-trip delay. In this paper we propose a Multi-Path TCP (MPTCP) enabled mobile device cloud (MDC) as a replacement to the existing TCP based or D2D device cloud techniques, as it effectively makes use of the available bandwidth by providing much higher throughput as well as ensures robust wireless connectivity. We investigate the congestion in mobile-device cloud formation resulting mainly due to the message passing for service providing nodes at the time of discovery, service continuity and formation of cloud composition. We propose a user space agent called congestion handler that enable offloading of packets from one sub-flow to the other under link quality constraints. Further, we discuss the benefits of this design and perform preliminary analysis of the system.
△ Less
Submitted 30 October, 2019; v1 submitted 12 September, 2019;
originally announced September 2019.
-
Adaptive Beamwidth Selection for Contention Based Access Periods in Millimeter Wave WLANs
Authors:
Kishor Chandra,
R. Venkatesha Prasad,
I. G. M. M. Niemegeers,
Abdur R. Biswas
Abstract:
60GHz wireless local area networks (WLANs) standards (e.g., IEEE 802.11ad and IEEE 802.15.3c) employ hybrid MAC protocols consisting of contention based access using CSMA/CA as well as dedicated service periods using time division multiple access (TDMA). To provide the channel access in the contention part of the protocol, quasi omni (QO) antenna patterns are defined which span over the particular…
▽ More
60GHz wireless local area networks (WLANs) standards (e.g., IEEE 802.11ad and IEEE 802.15.3c) employ hybrid MAC protocols consisting of contention based access using CSMA/CA as well as dedicated service periods using time division multiple access (TDMA). To provide the channel access in the contention part of the protocol, quasi omni (QO) antenna patterns are defined which span over the particular spatial directions and cover a limited area around access points. In this paper, we propose an algorithm to determine the beamwidth of each QO level. The proposed algorithm takes into account the spatial distribution of nodes to allocate the beamwidth of each QO level in an adaptive fashion in order to maximizes the channel utilization and satisfy the required link budget criterion. Since the proposed algorithm minimizes the collisions, it also minimizes the average time required to transmit total packets in a QO level. Proposed algorithm improves the average channel utilization up to 20-30% and reduces the time required to transmit total packets up to 40-50% for the given network parameters.
△ Less
Submitted 9 September, 2019;
originally announced September 2019.
-
Performance Analysis of IEEE 802.11ad MAC Protocol
Authors:
Kishor Chandra,
R. Venkatesha Prasad,
Ignas Niemegeers
Abstract:
IEEE 802.11ad specifies a hybrid medium access control (MAC) protocol consisting of contention as well as noncontention-based channel access mechanisms. Further, it also employs directional antennas to compensate for the high freespace path loss observed in 60GHz frequency band. Therefore, it significantly differs from other IEEE 802.11(b/g/n/ac) MAC protocols and thus requires new methods to anal…
▽ More
IEEE 802.11ad specifies a hybrid medium access control (MAC) protocol consisting of contention as well as noncontention-based channel access mechanisms. Further, it also employs directional antennas to compensate for the high freespace path loss observed in 60GHz frequency band. Therefore, it significantly differs from other IEEE 802.11(b/g/n/ac) MAC protocols and thus requires new methods to analyze its performance. In this paper, we propose a new analytical model for performance analysis of IEEE 802.11ad employing a threedimensional Markov chain considering all the features of IEEE 802.11ad medium access mechanisms including the presence of non-contention access and the different number of sectors due to the use of directional antennas. We show that the number of sectors has a high impact on the network throughput. We also show that the MAC packet delay is significantly affected by the duration of the contention period. Our results indicate that a suitable choice of the number of sectors and contention period can illustriously improve the channel utilization and MAC delay performance.
△ Less
Submitted 9 September, 2019;
originally announced September 2019.
-
Association, Blockage and Handoffs in IEEE 802.11ad based 60GHz Picocells- A Closer Look
Authors:
Kishor Chandra Joshi,
Rizqi Hersyandika,
R. Venkatesha Prasad
Abstract:
The link misalignment and high susceptibility to blockages are the biggest hurdles in realizing 60GHz based wireless local area networks (WLANs). However, much of the previous studies investigating 60GHz alignment and blockage issues do not provide an accurate quantitative evaluation from the perspective of WLANs. In this paper, we present an in-depth quantitative evaluation of commodity IEEE 802.…
▽ More
The link misalignment and high susceptibility to blockages are the biggest hurdles in realizing 60GHz based wireless local area networks (WLANs). However, much of the previous studies investigating 60GHz alignment and blockage issues do not provide an accurate quantitative evaluation from the perspective of WLANs. In this paper, we present an in-depth quantitative evaluation of commodity IEEE 802.11ad devices by forming a 60GHz WLAN with two docking stations mimicking as access points (APs). Through extensive experiments, we provide important insights about directional coverage pattern of antennas, communication range and co-channel interference and blockages. We are able to measure the IEEE 802.11ad link alignment and association overheads in absolute time units. With a very high accuracy (96-97%), our blockage characterization can differentiate between temporary and permanent blockages caused by humans in the indoor environment, which is a key insight. Utilizing our blockage characterization, we also demonstrate intelligent handoff to alternate APs using consumergrade IEEE 802.11ad devices. Our blockage-induced handoff experiments provide important insights that would be helpful in integrating millimeter wave based WLANs into future wireless networks.
△ Less
Submitted 9 September, 2019;
originally announced September 2019.
-
Analyzing the Trade-offs in Using Millimeter Wave Directional Links for High Data Rate Tactile Internet Applications
Authors:
Kishor Chandra Joshi,
Solmaz Niknam,
R. Venkatesha Prasad,
Balasubramaniam Natarajan
Abstract:
Ultra-low latency and high reliability communications are the two defining characteristics of Tactile Internet (TI). Nevertheless, some TI applications would also require high data-rate transfer of audio-visual information to complement the haptic data. Using Millimeter wave (mmWave) communications is an attractive choice for high datarate TI applications due to the availability of large bandwidth…
▽ More
Ultra-low latency and high reliability communications are the two defining characteristics of Tactile Internet (TI). Nevertheless, some TI applications would also require high data-rate transfer of audio-visual information to complement the haptic data. Using Millimeter wave (mmWave) communications is an attractive choice for high datarate TI applications due to the availability of large bandwidth in the mmWave bands. Moreover, mmWave radio access is also advantageous to attain the airinterface-diversity required for high reliability in TI systems as mmWave signal propagation significantly differs to sub-6GHz propagation. However, the use of narrow beamwidth in mmWave systems makes them susceptible to link misalignment-induced unreliability and high access latency. In this paper, we analyze the trade-offs between high gain of narrow beamwidth antennas and corresponding susceptibility to misalignment in mmWave links. To alleviate the effects of random antenna misalignment, we propose a beamwidth-adaptation scheme that significantly stabilize the link throughput performance.
△ Less
Submitted 9 September, 2019;
originally announced September 2019.
-
Certain Curvature Conditions on N(k)-Paracontact Metric Manifolds
Authors:
Vishnuvardhana. S. V.,
Venkatesha,
B. Phalaksha Murthy,
B. Shanmukha
Abstract:
The aim of the present paper is to study pseudo-symmetric, Ricci generalized pseudo-symmetric and generalized Ricci recurrent N(k)-Paracontact Metric Manifolds.
The aim of the present paper is to study pseudo-symmetric, Ricci generalized pseudo-symmetric and generalized Ricci recurrent N(k)-Paracontact Metric Manifolds.
△ Less
Submitted 21 January, 2019;
originally announced January 2019.
-
Results on para-Sasakian manifold admitting a quarter symmetric metric connection
Authors:
Vishnuvardhana. S. V.,
Venkatesha
Abstract:
In this paper we have studied pseudosymmetric, Ricci-pseudosymmetric and projectively pseudosymmetric para-Sasakian manifold admitting a quarter-symmetric metric connection and constructed examples of 3-dimensional and 5-dimensional para-Sasakian manifold admitting a quarter-symmetric metric connection to verify our results.
In this paper we have studied pseudosymmetric, Ricci-pseudosymmetric and projectively pseudosymmetric para-Sasakian manifold admitting a quarter-symmetric metric connection and constructed examples of 3-dimensional and 5-dimensional para-Sasakian manifold admitting a quarter-symmetric metric connection to verify our results.
△ Less
Submitted 21 January, 2019;
originally announced January 2019.
-
Certain results on (LCS)n-manifolds
Authors:
Vishnuvardhana. S. V.,
Venkatesha,
S. K. Hui
Abstract:
The purpose of the present paper is to study semi-generalized recurrent, semi-generalized Ricci recurrent and conformal Ricci soliton on (LCS)n-manifold.
The purpose of the present paper is to study semi-generalized recurrent, semi-generalized Ricci recurrent and conformal Ricci soliton on (LCS)n-manifold.
△ Less
Submitted 21 January, 2019;
originally announced January 2019.
-
$*$-Ricci solitons and gradient almost $*$-Ricci solitons on Kenmotsu manifolds
Authors:
Venkatesha Venkatesh,
Devaraja Mallesha Naik,
H Aruna Kumara
Abstract:
In this paper, we consider $*$-Ricci soliton in the frame-work of Kenmotsu manifolds. First, we prove that if the metric of a Kenmotsu manifold $M$ is a $*$-Ricci soliton, then soliton constant $λ$ is zero. For 3-dimensional case, if $M$ admits a $*$-Ricci soliton, then we show that $M$ is of constant sectional curvature -1. Next, we show that if $M$ admits a $*$-Ricci soliton whose potential vect…
▽ More
In this paper, we consider $*$-Ricci soliton in the frame-work of Kenmotsu manifolds. First, we prove that if the metric of a Kenmotsu manifold $M$ is a $*$-Ricci soliton, then soliton constant $λ$ is zero. For 3-dimensional case, if $M$ admits a $*$-Ricci soliton, then we show that $M$ is of constant sectional curvature -1. Next, we show that if $M$ admits a $*$-Ricci soliton whose potential vector field is collinear with the characteristic vector field $ξ$, then $M$ is Einstein and soliton vector field is equal to $ξ$. Finally, we prove that if $g$ is a gradient almost $*$-Ricci soliton, then either $M$ is Einstein or the potential vector field is collinear with the characteristic vector field on an open set of $M$. We verify our result by constructing examples for both $*$-Ricci soliton and gradient almost $*$-Ricci soliton.
△ Less
Submitted 16 January, 2019;
originally announced January 2019.
-
Certain results on Kenmotsu pseudo-metric manifolds
Authors:
Devaraja Mallesha Naik,
Venkatesha,
D. G. Prakasha
Abstract:
In this paper, a systematic study of Kenmotsu pseudo-metric manifolds are introduced. After studying the properties of this manifolds, we provide necessary and sufficient condition for Kenmotsu pseudo-metric manifold to have constant $\varphi$-sectional curvature, and prove the structure theorem for $ξ$-conformally flat and $\varphi$-conformally flat Kenmotsu pseudo-metric manifolds. Next, we cons…
▽ More
In this paper, a systematic study of Kenmotsu pseudo-metric manifolds are introduced. After studying the properties of this manifolds, we provide necessary and sufficient condition for Kenmotsu pseudo-metric manifold to have constant $\varphi$-sectional curvature, and prove the structure theorem for $ξ$-conformally flat and $\varphi$-conformally flat Kenmotsu pseudo-metric manifolds. Next, we consider Ricci solitons on this manifolds. In particular, we prove that an $η$-Einstein Kenmotsu pseudo-metric manifold of dimension higher than 3 admitting a Ricci soliton is Einstein, and a Kenmotsu pseudo-metric 3-manifold admitting a Ricci soliton is of constant curvature $-\varepsilon$.
△ Less
Submitted 24 December, 2019; v1 submitted 18 August, 2018;
originally announced August 2018.