-
Qiskit HumanEval: An Evaluation Benchmark For Quantum Code Generative Models
Authors:
Sanjay Vishwakarma,
Francis Harkins,
Siddharth Golecha,
Vishal Sharathchandra Bajpe,
Nicolas Dupuis,
Luca Buratti,
David Kremer,
Ismael Faro,
Ruchir Puri,
Juan Cruz-Benito
Abstract:
Quantum programs are typically developed using quantum Software Development Kits (SDKs). The rapid advancement of quantum computing necessitates new tools to streamline this development process, and one such tool could be Generative Artificial intelligence (GenAI). In this study, we introduce and use the Qiskit HumanEval dataset, a hand-curated collection of tasks designed to benchmark the ability…
▽ More
Quantum programs are typically developed using quantum Software Development Kits (SDKs). The rapid advancement of quantum computing necessitates new tools to streamline this development process, and one such tool could be Generative Artificial intelligence (GenAI). In this study, we introduce and use the Qiskit HumanEval dataset, a hand-curated collection of tasks designed to benchmark the ability of Large Language Models (LLMs) to produce quantum code using Qiskit - a quantum SDK. This dataset consists of more than 100 quantum computing tasks, each accompanied by a prompt, a canonical solution, a comprehensive test case, and a difficulty scale to evaluate the correctness of the generated solutions. We systematically assess the performance of a set of LLMs against the Qiskit HumanEval dataset's tasks and focus on the models ability in producing executable quantum code. Our findings not only demonstrate the feasibility of using LLMs for generating quantum code but also establish a new benchmark for ongoing advancements in the field and encourage further exploration and development of GenAI-driven tools for quantum code generation.
△ Less
Submitted 20 June, 2024;
originally announced June 2024.
-
GUARD-D-LLM: An LLM-Based Risk Assessment Engine for the Downstream uses of LLMs
Authors:
sundaraparipurnan Narayanan,
Sandeep Vishwakarma
Abstract:
Amidst escalating concerns about the detriments inflicted by AI systems, risk management assumes paramount importance, notably for high-risk applications as demanded by the European Union AI Act. Guidelines provided by ISO and NIST aim to govern AI risk management; however, practical implementations remain scarce in scholarly works. Addressing this void, our research explores risks emanating from…
▽ More
Amidst escalating concerns about the detriments inflicted by AI systems, risk management assumes paramount importance, notably for high-risk applications as demanded by the European Union AI Act. Guidelines provided by ISO and NIST aim to govern AI risk management; however, practical implementations remain scarce in scholarly works. Addressing this void, our research explores risks emanating from downstream uses of large language models (LLMs), synthesizing a taxonomy grounded in earlier research. Building upon this foundation, we introduce a novel LLM-based risk assessment engine (GUARD-D-LLM: Guided Understanding and Assessment for Risk Detection for Downstream use of LLMs) designed to pinpoint and rank threats relevant to specific use cases derived from text-based user inputs. Integrating thirty intelligent agents, this innovative approach identifies bespoke risks, gauges their severity, offers targeted suggestions for mitigation, and facilitates risk-aware development. The paper also documents the limitations of such an approach along with way forward suggestions to augment experts in such risk assessment thereby leveraging GUARD-D-LLM in identifying risks early on and enabling early mitigations. This paper and its associated code serve as a valuable resource for developers seeking to mitigate risks associated with LLM-based applications.
△ Less
Submitted 2 April, 2024;
originally announced June 2024.
-
Qiskit Code Assistant: Training LLMs for generating Quantum Computing Code
Authors:
Nicolas Dupuis,
Luca Buratti,
Sanjay Vishwakarma,
Aitana Viudes Forrat,
David Kremer,
Ismael Faro,
Ruchir Puri,
Juan Cruz-Benito
Abstract:
Code Large Language Models (Code LLMs) have emerged as powerful tools, revolutionizing the software development landscape by automating the coding process and reducing time and effort required to build applications. This paper focuses on training Code LLMs to specialize in the field of quantum computing. We begin by discussing the unique needs of quantum computing programming, which differ signifi…
▽ More
Code Large Language Models (Code LLMs) have emerged as powerful tools, revolutionizing the software development landscape by automating the coding process and reducing time and effort required to build applications. This paper focuses on training Code LLMs to specialize in the field of quantum computing. We begin by discussing the unique needs of quantum computing programming, which differ significantly from classical programming approaches or languages. A Code LLM specializing in quantum computing requires a foundational understanding of quantum computing and quantum information theory. However, the scarcity of available quantum code examples and the rapidly evolving field, which necessitates continuous dataset updates, present significant challenges. Moreover, we discuss our work on training Code LLMs to produce high-quality quantum code using the Qiskit library. This work includes an examination of the various aspects of the LLMs used for training and the specific training conditions, as well as the results obtained with our current models. To evaluate our models, we have developed a custom benchmark, similar to HumanEval, which includes a set of tests specifically designed for the field of quantum computing programming using Qiskit. Our findings indicate that our model outperforms existing state-of-the-art models in quantum computing tasks. We also provide examples of code suggestions, comparing our model to other relevant code LLMs. Finally, we introduce a discussion on the potential benefits of Code LLMs for quantum computing computational scientists, researchers, and practitioners. We also explore various features and future work that could be relevant in this context.
△ Less
Submitted 29 May, 2024;
originally announced May 2024.
-
Would You Trust an AI Doctor? Building Reliable Medical Predictions with Kernel Dropout Uncertainty
Authors:
Ubaid Azam,
Imran Razzak,
Shelly Vishwakarma,
Hakim Hacid,
Dell Zhang,
Shoaib Jameel
Abstract:
The growing capabilities of AI raise questions about their trustworthiness in healthcare, particularly due to opaque decision-making and limited data availability. This paper proposes a novel approach to address these challenges, introducing a Bayesian Monte Carlo Dropout model with kernel modelling. Our model is designed to enhance reliability on small medical datasets, a crucial barrier to the w…
▽ More
The growing capabilities of AI raise questions about their trustworthiness in healthcare, particularly due to opaque decision-making and limited data availability. This paper proposes a novel approach to address these challenges, introducing a Bayesian Monte Carlo Dropout model with kernel modelling. Our model is designed to enhance reliability on small medical datasets, a crucial barrier to the wider adoption of AI in healthcare. This model leverages existing language models for improved effectiveness and seamlessly integrates with current workflows. We demonstrate significant improvements in reliability, even with limited data, offering a promising step towards building trust in AI-driven medical predictions and unlocking its potential to improve patient care.
△ Less
Submitted 16 April, 2024;
originally announced April 2024.
-
BayesJudge: Bayesian Kernel Language Modelling with Confidence Uncertainty in Legal Judgment Prediction
Authors:
Ubaid Azam,
Imran Razzak,
Shelly Vishwakarma,
Hakim Hacid,
Dell Zhang,
Shoaib Jameel
Abstract:
Predicting legal judgments with reliable confidence is paramount for responsible legal AI applications. While transformer-based deep neural networks (DNNs) like BERT have demonstrated promise in legal tasks, accurately assessing their prediction confidence remains crucial. We present a novel Bayesian approach called BayesJudge that harnesses the synergy between deep learning and deep Gaussian Proc…
▽ More
Predicting legal judgments with reliable confidence is paramount for responsible legal AI applications. While transformer-based deep neural networks (DNNs) like BERT have demonstrated promise in legal tasks, accurately assessing their prediction confidence remains crucial. We present a novel Bayesian approach called BayesJudge that harnesses the synergy between deep learning and deep Gaussian Processes to quantify uncertainty through Bayesian kernel Monte Carlo dropout. Our method leverages informative priors and flexible data modelling via kernels, surpassing existing methods in both predictive accuracy and confidence estimation as indicated through brier score. Extensive evaluations of public legal datasets showcase our model's superior performance across diverse tasks. We also introduce an optimal solution to automate the scrutiny of unreliable predictions, resulting in a significant increase in the accuracy of the model's predictions by up to 27\%. By empowering judges and legal professionals with more reliable information, our work paves the way for trustworthy and transparent legal AI applications that facilitate informed decisions grounded in both knowledge and quantified uncertainty.
△ Less
Submitted 16 April, 2024;
originally announced April 2024.
-
Optical and Acoustic Phonons in Turbostratic and Cubic Boron Nitride Thin Films on Diamond Substrates
Authors:
Erick Guzman,
Fariborz Kargar,
Avani Patel,
Saurabh Vishwakarma,
Dylan Wright,
Richard B. Wilson,
David J. Smith,
Robert J. Nemanich,
Alexander A. Balandin
Abstract:
We report an investigation of the bulk optical, bulk acoustic, and surface acoustic phonons in thin films of turbostratic boron nitride (t-BN) and cubic boron nitride (c-BN) grown on B-doped polycrystalline and single-crystalline diamond (001) and (111) substrates. The characteristics of different types of phonons were determined using Raman and Brillouin-Mandelstam light scattering spectroscopies…
▽ More
We report an investigation of the bulk optical, bulk acoustic, and surface acoustic phonons in thin films of turbostratic boron nitride (t-BN) and cubic boron nitride (c-BN) grown on B-doped polycrystalline and single-crystalline diamond (001) and (111) substrates. The characteristics of different types of phonons were determined using Raman and Brillouin-Mandelstam light scattering spectroscopies. The atomic structure of the films was determined using high-resolution transmission electron microscopy (HRTEM) and correlated with the Raman and Brillouin-Mandelstam spectroscopy data. The HRTEM analysis revealed that the cubic boron nitride thin films consisted of a mixture of c-BN and t-BN phases, with c-BN being the dominant phase. It was found that while visible Raman spectroscopy provided information for characterizing the t-BN phase, it faced challenges in differentiating the c-BN phase either due to the presence of high-density defects or the overlap** of the Raman features with those from the B-doped diamond substrates. In contrast, Brillouin-Mandelstam spectroscopy clearly distinguishes the bulk longitudinal and surface acoustic phonons of the c-BN thin films grown on diamond substrates. Additionally, the angle-dependent surface Brillouin-Mandelstam scattering data show the peaks associated with the Rayleigh surface acoustic waves, which have higher phase velocities in c-BN films on diamond (111) substrates. These findings provide valuable insights into the phonon characteristics of the c-BN and diamond interfaces and have important implications for the thermal management of electronic devices based on ultra-wide-band-gap materials.
△ Less
Submitted 20 July, 2023;
originally announced July 2023.
-
From Portfolio Optimization to Quantum Blockchain and Security: A Systematic Review of Quantum Computing in Finance
Authors:
Abha Naik,
Esra Yeniaras,
Gerhard Hellstern,
Grishma Prasad,
Sanjay Kumar Lalta Prasad Vishwakarma
Abstract:
In this paper, we provide an overview of the recent work in the quantum finance realm from various perspectives. The applications in consideration are Portfolio Optimization, Fraud Detection, and Monte Carlo methods for derivative pricing and risk calculation. Furthermore, we give a comprehensive overview of the applications of quantum computing in the field of blockchain technology which is a mai…
▽ More
In this paper, we provide an overview of the recent work in the quantum finance realm from various perspectives. The applications in consideration are Portfolio Optimization, Fraud Detection, and Monte Carlo methods for derivative pricing and risk calculation. Furthermore, we give a comprehensive overview of the applications of quantum computing in the field of blockchain technology which is a main concept in fintech. In that sense, we first introduce the general overview of blockchain with its main cryptographic primitives such as digital signature algorithms, hash functions, and random number generators as well as the security vulnerabilities of blockchain technologies after the merge of quantum computers considering Shor's quantum factoring and Grover's quantum search algorithms. We then discuss the privacy preserving quantum-resistant blockchain systems via threshold signatures, ring signatures, and zero-knowledge proof systems i.e. ZK-SNARKs in quantum resistant blockchains. After emphasizing the difference between the quantum-resistant blockchain and quantum-safe blockchain we mention the security countermeasures to take against the possible quantumized attacks aiming these systems. We finalize our discussion with quantum blockchain, efficient quantum mining and necessary infrastructures for constructing such systems based on quantum computing. This review has the intention to be a bridge to fill the gap between quantum computing and one of its most prominent application realms: Finance. We provide the state-of-the-art results in the intersection of finance and quantum technology for both industrial practitioners and academicians.
△ Less
Submitted 12 June, 2023;
originally announced July 2023.
-
Introduction to Topological Superconductivity and Majorana Fermions for Quantum Engineers
Authors:
Sanjay Vishwakarma,
Sai Nandan Morapakula,
Shalini D,
Srinjoy Ganguly,
Sri Krishna Sai Kankipati
Abstract:
In this tutorial paper, we provide an introduction to the briskly expanding research field of Majorana fermions in topological superconductors. We discuss several aspects of topological superconductivity and the advantages it brings to quantum computing. Mathematical derivation of the Kitaev model and BdG Hamiltonian is carried out to explain the phenomena of superconductivity and Majorana fermion…
▽ More
In this tutorial paper, we provide an introduction to the briskly expanding research field of Majorana fermions in topological superconductors. We discuss several aspects of topological superconductivity and the advantages it brings to quantum computing. Mathematical derivation of the Kitaev model and BdG Hamiltonian is carried out to explain the phenomena of superconductivity and Majorana fermions. The Majorana fermions and the Non-Abelian statistics are described in detail along with their significance for quantum engineers. The theory provided led towards the engineering of the topological qubits using Majoranas.
△ Less
Submitted 11 September, 2023; v1 submitted 16 June, 2023;
originally announced June 2023.
-
Quantum Circuit Optimization of Arithmetic circuits using ZX Calculus
Authors:
Aravind Joshi,
Akshara Kairali,
Renju Raju,
Adithya Athreya,
Reena Monica P,
Sanjay Vishwakarma,
Srinjoy Ganguly
Abstract:
Quantum computing is an emerging technology in which quantum mechanical properties are suitably utilized to perform certain compute-intensive operations faster than classical computers. Quantum algorithms are designed as a combination of quantum circuits that each require a large number of quantum gates, which is a challenge considering the limited number of qubit resources available in quantum co…
▽ More
Quantum computing is an emerging technology in which quantum mechanical properties are suitably utilized to perform certain compute-intensive operations faster than classical computers. Quantum algorithms are designed as a combination of quantum circuits that each require a large number of quantum gates, which is a challenge considering the limited number of qubit resources available in quantum computing systems. Our work proposes a technique to optimize quantum arithmetic algorithms by reducing the hardware resources and the number of qubits based on ZX calculus. We have utilised ZX calculus rewrite rules for the optimization of fault-tolerant quantum multiplier circuits where we are able to achieve a significant reduction in the number of ancilla bits and T-gates as compared to the originally required numbers to achieve fault-tolerance. Our work is the first step in the series of arithmetic circuit optimization using graphical rewrite tools and it paves the way for advancing the optimization of various complex quantum circuits and establishing the potential for new applications of the same.
△ Less
Submitted 4 June, 2023;
originally announced June 2023.
-
Efficient VQE Approach for Accurate Simulations on the Kagome Lattice
Authors:
Jyothikamalesh S,
Kaarnika A,
Dr. Mohankumar. M,
Sanjay Vishwakarma,
Srinjoy Ganguly,
Yuvaraj P
Abstract:
The Kagome lattice, a captivating lattice structure composed of interconnected triangles with frustrated magnetic properties, has garnered considerable interest in condensed matter physics, quantum magnetism, and quantum computing.The Ansatz optimization provided in this study along with extensive research on optimisation technique results us with high accuracy. This study focuses on using multipl…
▽ More
The Kagome lattice, a captivating lattice structure composed of interconnected triangles with frustrated magnetic properties, has garnered considerable interest in condensed matter physics, quantum magnetism, and quantum computing.The Ansatz optimization provided in this study along with extensive research on optimisation technique results us with high accuracy. This study focuses on using multiple ansatz models to create an effective Variational Quantum Eigensolver (VQE) on the Kagome lattice. By comparing various optimisation methods and optimising the VQE ansatz models, the main goal is to estimate ground state attributes with high accuracy. This study advances quantum computing and advances our knowledge of quantum materials with complex lattice structures by taking advantage of the distinctive geometric configuration and features of the Kagome lattice. Aiming to improve the effectiveness and accuracy of VQE implementations, the study examines how Ansatz Modelling, quantum effects, and optimization techniques interact in VQE algorithm. The findings and understandings from this study provide useful direction for upcoming improvements in quantum algorithms,quantum machine learning and the investigation of quantum materials on the Kagome Lattice.
△ Less
Submitted 1 June, 2023;
originally announced June 2023.
-
A Universal Quantum Technology Education Program
Authors:
Sanjay Vishwakarma,
Shalini D,
Srinjoy Ganguly,
Sai Nandan Morapakula
Abstract:
Quantum technology is an emerging cutting-edge field which offers a new paradigm for computation and research in the field of physics, mathematics and other scientific disciplines. This technology is of strategic importance to governments globally and heavy investments and budgets are being sanctioned to gain competitive advantage in terms of military, space and education. Due to this, it is impor…
▽ More
Quantum technology is an emerging cutting-edge field which offers a new paradigm for computation and research in the field of physics, mathematics and other scientific disciplines. This technology is of strategic importance to governments globally and heavy investments and budgets are being sanctioned to gain competitive advantage in terms of military, space and education. Due to this, it is important to understand the educational and research needs required to implement this technology at a large scale. Here, we propose a novel universal quantum technology master's curriculum which comprises a balance between quantum hardware and software skills to enhance the employability of professionals thereby reducing the skill shortage faced by the academic institutions and organizations today. The proposed curriculum holds the potential to revolutionize the quantum education ecosystem by reducing the pressure of hiring PhDs faced by startups and promoting the growth of a balanced scientific mindset in quantum research.
△ Less
Submitted 30 May, 2023; v1 submitted 25 May, 2023;
originally announced May 2023.
-
Optimal partition of feature using Bayesian classifier
Authors:
Sanjay Vishwakarma,
Srinjoy Ganguly
Abstract:
The Naive Bayesian classifier is a popular classification method employing the Bayesian paradigm. The concept of having conditional dependence among input variables sounds good in theory but can lead to a majority vote style behaviour. Achieving conditional independence is often difficult, and they introduce decision biases in the estimates. In Naive Bayes, certain features are called independent…
▽ More
The Naive Bayesian classifier is a popular classification method employing the Bayesian paradigm. The concept of having conditional dependence among input variables sounds good in theory but can lead to a majority vote style behaviour. Achieving conditional independence is often difficult, and they introduce decision biases in the estimates. In Naive Bayes, certain features are called independent features as they have no conditional correlation or dependency when predicting a classification. In this paper, we focus on the optimal partition of features by proposing a novel technique called the Comonotone-Independence Classifier (CIBer) which is able to overcome the challenges posed by the Naive Bayes method. For different datasets, we clearly demonstrate the efficacy of our technique, where we achieve lower error rates and higher or equivalent accuracy compared to models such as Random Forests and XGBoost.
△ Less
Submitted 27 April, 2023;
originally announced April 2023.
-
Mimetic Muscle Rehabilitation Analysis Using Clustering of Low Dimensional 3D Kinect Data
Authors:
Sumit Kumar Vishwakarma,
Sanjeev Kumar,
Shrey Aggarwal,
Jan Mareš
Abstract:
Facial nerve paresis is a severe complication that arises post-head and neck surgery; This results in articulation problems, facial asymmetry, and severe problems in non-verbal communication. To overcome the side effects of post-surgery facial paralysis, rehabilitation requires which last for several weeks. This paper discusses an unsupervised approach to rehabilitating patients who have temporary…
▽ More
Facial nerve paresis is a severe complication that arises post-head and neck surgery; This results in articulation problems, facial asymmetry, and severe problems in non-verbal communication. To overcome the side effects of post-surgery facial paralysis, rehabilitation requires which last for several weeks. This paper discusses an unsupervised approach to rehabilitating patients who have temporary facial paralysis due to damage in mimetic muscles. The work aims to make the rehabilitation process objective compared to the current subjective approach, such as House-Brackmann (HB) scale. Also, the approach will assist clinicians by reducing their workload in assessing the improvement during rehabilitation. This paper focuses on the clustering approach to monitor the rehabilitation process. We compare the results obtained from different clustering algorithms on various forms of the same data set, namely dynamic form, data expressed as functional data using B-spline basis expansion, and by finding the functional principal components of the functional data. The study contains data set of 85 distinct patients with 120 measurements obtained using a Kinect stereo-vision camera. The method distinguish effectively between patients with the least and greatest degree of facial paralysis, however patients with adjacent degrees of paralysis provide some challenges. In addition, we compared the cluster results to the HB scale outputs.
△ Less
Submitted 15 February, 2023;
originally announced February 2023.
-
Daksha: On Alert for High Energy Transients
Authors:
Varun Bhalerao,
Santosh Vadawale,
Shriharsh Tendulkar,
Dipankar Bhattacharya,
Vikram Rana,
Hitesh Kumar L. Adalja,
Hrishikesh Belatikar,
Mahesh Bhaganagare,
Gulab Dewangan,
Abhijeet Ghodgaonkar,
Shiv Kumar Goyal,
Suresh Gunasekaran,
P J Guruprasad,
Jayprakash G. Koyande,
Salil Kulkarni,
APK Kutty,
Tinkal Ladiya,
Deepak Marla,
Sujay Mate,
N. P. S. Mithun,
Rakesh Mote,
Sanjoli Narang,
Ayush Nema,
Sudhanshu Nimbalkar,
Archana Pai
, et al. (23 additional authors not shown)
Abstract:
We present Daksha, a proposed high energy transients mission for the study of electromagnetic counterparts of gravitational wave sources, and gamma ray bursts. Daksha will comprise of two satellites in low earth equatorial orbits, on opposite sides of earth. Each satellite will carry three types of detectors to cover the entire sky in an energy range from 1 keV to >1 MeV. Any transients detected o…
▽ More
We present Daksha, a proposed high energy transients mission for the study of electromagnetic counterparts of gravitational wave sources, and gamma ray bursts. Daksha will comprise of two satellites in low earth equatorial orbits, on opposite sides of earth. Each satellite will carry three types of detectors to cover the entire sky in an energy range from 1 keV to >1 MeV. Any transients detected on-board will be announced publicly within minutes of discovery. All photon data will be downloaded in ground station passes to obtain source positions, spectra, and light curves. In addition, Daksha will address a wide range of science cases including monitoring X-ray pulsars, studies of magnetars, solar flares, searches for fast radio burst counterparts, routine monitoring of bright persistent high energy sources, terrestrial gamma-ray flashes, and probing primordial black hole abundances through lensing. In this paper, we discuss the technical capabilities of Daksha, while the detailed science case is discussed in a separate paper.
△ Less
Submitted 27 January, 2024; v1 submitted 22 November, 2022;
originally announced November 2022.
-
Science with the Daksha High Energy Transients Mission
Authors:
Varun Bhalerao,
Disha Sawant,
Archana Pai,
Shriharsh Tendulkar,
Santosh Vadawale,
Dipankar Bhattacharya,
Vikram Rana,
Hitesh Kumar L. Adalja,
G C Anupama,
Suman Bala,
Smaranika Banerjee,
Judhajeet Basu,
Hrishikesh Belatikar,
Paz Beniamini,
Mahesh Bhaganagare,
Ankush Bhaskar,
Soumyadeep Bhattacharjee,
Sukanta Bose,
Brad Cenko,
Mehul Vijay Chanda,
Gulab Dewangan,
Vishal Dixit,
Anirban Dutta,
Priyanka Gawade,
Abhijeet Ghodgaonkar
, et al. (50 additional authors not shown)
Abstract:
We present the science case for the proposed Daksha high energy transients mission. Daksha will comprise of two satellites covering the entire sky from 1~keV to $>1$~MeV. The primary objectives of the mission are to discover and characterize electromagnetic counterparts to gravitational wave source; and to study Gamma Ray Bursts (GRBs). Daksha is a versatile all-sky monitor that can address a wide…
▽ More
We present the science case for the proposed Daksha high energy transients mission. Daksha will comprise of two satellites covering the entire sky from 1~keV to $>1$~MeV. The primary objectives of the mission are to discover and characterize electromagnetic counterparts to gravitational wave source; and to study Gamma Ray Bursts (GRBs). Daksha is a versatile all-sky monitor that can address a wide variety of science cases. With its broadband spectral response, high sensitivity, and continuous all-sky coverage, it will discover fainter and rarer sources than any other existing or proposed mission. Daksha can make key strides in GRB research with polarization studies, prompt soft spectroscopy, and fine time-resolved spectral studies. Daksha will provide continuous monitoring of X-ray pulsars. It will detect magnetar outbursts and high energy counterparts to Fast Radio Bursts. Using Earth occultation to measure source fluxes, the two satellites together will obtain daily flux measurements of bright hard X-ray sources including active galactic nuclei, X-ray binaries, and slow transients like Novae. Correlation studies between the two satellites can be used to probe primordial black holes through lensing. Daksha will have a set of detectors continuously pointing towards the Sun, providing excellent hard X-ray monitoring data. Closer to home, the high sensitivity and time resolution of Daksha can be leveraged for the characterization of Terrestrial Gamma-ray Flashes.
△ Less
Submitted 27 January, 2024; v1 submitted 22 November, 2022;
originally announced November 2022.
-
PSP-HDRI$+$: A Synthetic Dataset Generator for Pre-Training of Human-Centric Computer Vision Models
Authors:
Salehe Erfanian Ebadi,
Saurav Dhakad,
Sanjay Vishwakarma,
Chunpu Wang,
You-Cyuan Jhang,
Maciek Chociej,
Adam Crespi,
Alex Thaman,
Sujoy Ganguly
Abstract:
We introduce a new synthetic data generator PSP-HDRI$+$ that proves to be a superior pre-training alternative to ImageNet and other large-scale synthetic data counterparts. We demonstrate that pre-training with our synthetic data will yield a more general model that performs better than alternatives even when tested on out-of-distribution (OOD) sets. Furthermore, using ablation studies guided by p…
▽ More
We introduce a new synthetic data generator PSP-HDRI$+$ that proves to be a superior pre-training alternative to ImageNet and other large-scale synthetic data counterparts. We demonstrate that pre-training with our synthetic data will yield a more general model that performs better than alternatives even when tested on out-of-distribution (OOD) sets. Furthermore, using ablation studies guided by person keypoint estimation metrics with an off-the-shelf model architecture, we show how to manipulate our synthetic data generator to further improve model performance.
△ Less
Submitted 11 July, 2022;
originally announced July 2022.
-
MDPose: Human Skeletal Motion Reconstruction Using WiFi Micro-Doppler Signatures
Authors:
Chong Tang,
Wenda Li,
Shelly Vishwakarma,
Fangzhan Shi,
Simon Julier,
Kevin Chetty
Abstract:
Motion tracking systems based on optical sensors typically often suffer from issues, such as poor lighting conditions, occlusion, limited coverage, and may raise privacy concerns. More recently, radio frequency (RF)-based approaches using commercial WiFi devices have emerged which offer low-cost ubiquitous sensing whilst preserving privacy. However, the output of an RF sensing system, such as Rang…
▽ More
Motion tracking systems based on optical sensors typically often suffer from issues, such as poor lighting conditions, occlusion, limited coverage, and may raise privacy concerns. More recently, radio frequency (RF)-based approaches using commercial WiFi devices have emerged which offer low-cost ubiquitous sensing whilst preserving privacy. However, the output of an RF sensing system, such as Range-Doppler spectrograms, cannot represent human motion intuitively and usually requires further processing. In this study, MDPose, a novel framework for human skeletal motion reconstruction based on WiFi micro-Doppler signatures, is proposed. It provides an effective solution to track human activities by reconstructing a skeleton model with 17 key points, which can assist with the interpretation of conventional RF sensing outputs in a more understandable way. Specifically, MDPose has various incremental stages to gradually address a series of challenges: First, a denoising algorithm is implemented to remove any unwanted noise that may affect the feature extraction and enhance weak Doppler signatures. Secondly, the convolutional neural network (CNN)-recurrent neural network (RNN) architecture is applied to learn temporal-spatial dependency from clean micro-Doppler signatures and restore key points' velocity information. Finally, a pose optimising mechanism is employed to estimate the initial state of the skeleton and to limit the increase of error. We have conducted comprehensive tests in a variety of environments using numerous subjects with a single receiver radar system to demonstrate the performance of MDPose, and report 29.4mm mean absolute error over all key points positions, which outperforms state-of-the-art RF-based pose estimation systems.
△ Less
Submitted 11 January, 2022;
originally announced January 2022.
-
OPERAnet: A Multimodal Activity Recognition Dataset Acquired from Radio Frequency and Vision-based Sensors
Authors:
Mohammud J. Bocus,
Wenda Li,
Shelly Vishwakarma,
Roget Kou,
Chong Tang,
Karl Woodbridge,
Ian Craddock,
Ryan McConville,
Raul Santos-Rodriguez,
Kevin Chetty,
Robert Piechocki
Abstract:
This paper presents a comprehensive dataset intended to evaluate passive Human Activity Recognition (HAR) and localization techniques with measurements obtained from synchronized Radio-Frequency (RF) devices and vision-based sensors. The dataset consists of RF data including Channel State Information (CSI) extracted from a WiFi Network Interface Card (NIC), Passive WiFi Radar (PWR) built upon a So…
▽ More
This paper presents a comprehensive dataset intended to evaluate passive Human Activity Recognition (HAR) and localization techniques with measurements obtained from synchronized Radio-Frequency (RF) devices and vision-based sensors. The dataset consists of RF data including Channel State Information (CSI) extracted from a WiFi Network Interface Card (NIC), Passive WiFi Radar (PWR) built upon a Software Defined Radio (SDR) platform, and Ultra-Wideband (UWB) signals acquired via commercial off-the-shelf hardware. It also consists of vision/Infra-red based data acquired from Kinect sensors. Approximately 8 hours of annotated measurements are provided, which are collected across two rooms from 6 participants performing 6 daily activities. This dataset can be exploited to advance WiFi and vision-based HAR, for example, using pattern recognition, skeletal representation, deep learning algorithms or other novel approaches to accurately recognize human activities. Furthermore, it can potentially be used to passively track a human in an indoor environment. Such datasets are key tools required for the development of new algorithms and methods in the context of smart homes, elderly care, and surveillance applications.
△ Less
Submitted 8 October, 2021;
originally announced October 2021.
-
Neural Style Transfer Enhanced Training Support For Human Activity Recognition
Authors:
Shelly Vishwakarma,
Wenda Li,
Chong Tang,
Karl Woodbridge,
Raviraj Adve,
Kevin Chetty
Abstract:
This work presents an application of Integrated sensing and communication (ISAC) system for monitoring human activities directly related to healthcare. Real-time monitoring of humans can assist professionals in providing healthy living enabling technologies to ensure the health, safety, and well-being of people of all age groups. To enhance the human activity recognition performance of the ISAC sy…
▽ More
This work presents an application of Integrated sensing and communication (ISAC) system for monitoring human activities directly related to healthcare. Real-time monitoring of humans can assist professionals in providing healthy living enabling technologies to ensure the health, safety, and well-being of people of all age groups. To enhance the human activity recognition performance of the ISAC system, we propose to use synthetic data generated through our human micro-Doppler simulator, SimHumalator to augment our limited measurement data. We generate a more realistic micro-Doppler signature dataset using a style-transfer neural network. The proposed network extracts environmental effects such as noise, multipath, and occlusions effects directly from the measurement data and transfers these features to our clean simulated signatures. This results in more realistic-looking signatures qualitatively and quantitatively. We use these enhanced signatures to augment our measurement data and observe an improvement in the classification performance by 5% compared to no augmentation case. Further, we benchmark the data augmentation performance of the style transferred signatures with three other synthetic datasets -- clean simulated spectrograms (no environmental effects), simulated data with added AWGN noise, and simulated data with GAN generated noise. The results indicate that style transferred simulated signatures well captures environmental factors more than any other synthetic dataset.
△ Less
Submitted 27 July, 2021;
originally announced July 2021.
-
FMNet: Latent Feature-wise Map** Network for Cleaning up Noisy Micro-Doppler Spectrogram
Authors:
Chong Tang,
Wenda Li,
Shelly Vishwakarma,
Fangzhan Shi,
Simon Julier,
Kevin Chetty
Abstract:
Micro-Doppler signatures contain considerable information about target dynamics. However, the radar sensing systems are easily affected by noisy surroundings, resulting in uninterpretable motion patterns on the micro-Doppler spectrogram. Meanwhile, radar returns often suffer from multipath, clutter and interference. These issues lead to difficulty in, for example motion feature extraction, activit…
▽ More
Micro-Doppler signatures contain considerable information about target dynamics. However, the radar sensing systems are easily affected by noisy surroundings, resulting in uninterpretable motion patterns on the micro-Doppler spectrogram. Meanwhile, radar returns often suffer from multipath, clutter and interference. These issues lead to difficulty in, for example motion feature extraction, activity classification using micro Doppler signatures ($μ$-DS), etc. In this paper, we propose a latent feature-wise map** strategy, called Feature Map** Network (FMNet), to transform measured spectrograms so that they more closely resemble the output from a simulation under the same conditions. Based on measured spectrogram and the matched simulated data, our framework contains three parts: an Encoder which is used to extract latent representations/features, a Decoder outputs reconstructed spectrogram according to the latent features, and a Discriminator minimizes the distance of latent features of measured and simulated data. We demonstrate the FMNet with six activities data and two experimental scenarios, and final results show strong enhanced patterns and can keep actual motion information to the greatest extent. On the other hand, we also propose a novel idea which trains a classifier with only simulated data and predicts new measured samples after cleaning them up with the FMNet. From final classification results, we can see significant improvements.
△ Less
Submitted 9 July, 2021;
originally announced July 2021.
-
SimHumalator: An Open Source WiFi Based Passive Radar Human Simulator For Activity Recognition
Authors:
Shelly Vishwakarma,
Wenda Li,
Chong Tang,
Karl Woodbridge,
Raviraj Adve,
Kevin Chetty
Abstract:
This work presents a simulation framework to generate human micro-Dopplers in WiFi based passive radar scenarios, wherein we simulate IEEE 802.11g complaint WiFi transmissions using MATLAB's WLAN toolbox and human animation models derived from a marker-based motion capture system. We integrate WiFi transmission signals with the human animation data to generate the micro-Doppler features that incor…
▽ More
This work presents a simulation framework to generate human micro-Dopplers in WiFi based passive radar scenarios, wherein we simulate IEEE 802.11g complaint WiFi transmissions using MATLAB's WLAN toolbox and human animation models derived from a marker-based motion capture system. We integrate WiFi transmission signals with the human animation data to generate the micro-Doppler features that incorporate the diversity of human motion characteristics, and the sensor parameters. In this paper, we consider five human activities. We uniformly benchmark the classification performance of multiple machine learning and deep learning models against a common dataset. Further, we validate the classification performance using the real radar data captured simultaneously with the motion capture system. We present experimental results using simulations and measurements demonstrating good classification accuracy of $\geq$ 95\% and $\approx$ 90\%, respectively.
△ Less
Submitted 2 March, 2021;
originally announced March 2021.
-
Learning from Natural Noise to Denoise Micro-Doppler Spectrogram
Authors:
Chong Tang,
Wenda Li,
Shelly Vishwakarma,
Karl Woodbridge,
Simon Julier,
Kevin Chetty
Abstract:
Micro-Doppler analysis has become increasingly popular in recent years owning to the ability of the technique to enhance classification strategies. Applications include recognising everyday human activities, distinguishing drone from birds, and identifying different types of vehicles. However, noisy time-frequency spectrograms can significantly affect the performance of the classifier and must be…
▽ More
Micro-Doppler analysis has become increasingly popular in recent years owning to the ability of the technique to enhance classification strategies. Applications include recognising everyday human activities, distinguishing drone from birds, and identifying different types of vehicles. However, noisy time-frequency spectrograms can significantly affect the performance of the classifier and must be tackled using appropriate denoising algorithms. In recent years, deep learning algorithms have spawned many deep neural network-based denoising algorithms. For these methods, noise modelling is the most important part and is used to assist in training. In this paper, we decompose the problem and propose a novel denoising scheme: first, a Generative Adversarial Network (GAN) is used to learn the noise distribution and correlation from the real-world environment; then, a simulator is used to generate clean Micro-Doppler spectrograms; finally, the generated noise and clean simulation data are combined as the training data to train a Convolutional Neural Network (CNN) denoiser. In experiments, we qualitatively and quantitatively analyzed this procedure on both simulation and measurement data. Besides, the idea of learning from natural noise can be applied well to other existing frameworks and demonstrate greater performance than other noise models.
△ Less
Submitted 13 February, 2021;
originally announced February 2021.
-
Sparsity Based Autoencoders for Denoising Cluttered Radar Signatures
Authors:
Shobha Sundar Ram,
Shelly Vishwakarma,
Akanksha Sneh,
Kainat Yasmeen
Abstract:
Narrowband and broadband indoor radar images significantly deteriorate in the presence of target dependent and independent static and dynamic clutter arising from walls. A stacked and sparse denoising autoencoder (StackedSDAE) is proposed for mitigating wall clutter in indoor radar images. The algorithm relies on the availability of clean images and corresponding noisy images during training and r…
▽ More
Narrowband and broadband indoor radar images significantly deteriorate in the presence of target dependent and independent static and dynamic clutter arising from walls. A stacked and sparse denoising autoencoder (StackedSDAE) is proposed for mitigating wall clutter in indoor radar images. The algorithm relies on the availability of clean images and corresponding noisy images during training and requires no additional information regarding the wall characteristics. The algorithm is evaluated on simulated Doppler-time spectrograms and high range resolution profiles generated for diverse radar frequencies and wall characteristics in around-the-corner radar (ACR) scenarios. Additional experiments are performed on range-enhanced frontal images generated from measurements gathered from a wideband RF imaging sensor. The results from the experiments show that the StackedSDAE successfully reconstructs images that closely resemble those that would be obtained in free space conditions. Further, the incorporation of sparsity and depth in the hidden layer representations within the autoencoder makes the algorithm more robust to low signal to noise ratio (SNR) and label mismatch between clean and corrupt data during training than the conventional single layer DAE. For example, the denoised ACR signatures show a structural similarity above 0.75 to clean free space images at SNR of -10dB and label mismatch error of 50%.
△ Less
Submitted 29 January, 2021;
originally announced January 2021.
-
Science with the $AstroSat$ Soft X-ray Telescope: an overview
Authors:
Sudip Bhattacharyya,
Kulinder Pal Singh,
Gordon Stewart,
Sunil Chandra,
Gulab C. Dewangan,
Nilima S. Kamble,
Sandeep Vishwakarma,
Jayprakash G. Koyande,
Varsha Chitnis
Abstract:
The Soft X-ray Telescope (SXT) aboard the $AstroSat$ satellite is the first Indian X-ray telescope in space. It is a modest size X-ray telescope with a charge coupled device (CCD) camera in the focal plane, which provides X-ray images in the $\sim 0.3-8.0$ keV band. A forte of SXT is in providing undistorted spectra of relatively bright X-ray sources, in which it excels some current large CCD-base…
▽ More
The Soft X-ray Telescope (SXT) aboard the $AstroSat$ satellite is the first Indian X-ray telescope in space. It is a modest size X-ray telescope with a charge coupled device (CCD) camera in the focal plane, which provides X-ray images in the $\sim 0.3-8.0$ keV band. A forte of SXT is in providing undistorted spectra of relatively bright X-ray sources, in which it excels some current large CCD-based X-ray telescopes. Here, we highlight some of the published spectral and timing results obtained using the SXT data to demonstrate the capabilities and overall performance of this telescope.
△ Less
Submitted 3 January, 2021;
originally announced January 2021.
-
Observations of bright stars with AstroSat Soft X-ray Telescope
Authors:
K. P. Singh,
G. Stewart,
S. Chandra,
G. C. Dewangan,
S. Bhattacharyya,
N. S. Kamble,
S. Vishwakarma,
J. G. Koyande
Abstract:
We present observations of four bright stars observed with the AstroSat Soft X-ray Telescope (SXT). Visible light from bright stars like these can leak through the very thin filter in front of the CCD in the focal plane CCD camera of the SXT and thus making the extraction of X-ray events difficult. Here, we show how to extract the X-ray events without contamination by the visible light. The proced…
▽ More
We present observations of four bright stars observed with the AstroSat Soft X-ray Telescope (SXT). Visible light from bright stars like these can leak through the very thin filter in front of the CCD in the focal plane CCD camera of the SXT and thus making the extraction of X-ray events difficult. Here, we show how to extract the X-ray events without contamination by the visible light. The procedure applied to four bright stars here demonstrates how reliable X-ray information can be derived in such cases. The sample of bright stars studied here consists of two A spectral types (HIP 19265, HIP 88580), one G/K Giant (Capella), and a nearby M-type dwarf (HIP 23309). No X-ray emission is observed from the A-type stars, as expected. X-ray spectra of Capella and HIP 23309 are derived and modeled here, and compared with the previous X-ray observations of these stars to show the reliability of the method used. We find that optical light can start to leak in the very soft energy bands below 0.5 keV for stars with V=8 mag. In the process, we present the first X-ray spectrum of HIP 23309.
△ Less
Submitted 3 December, 2020;
originally announced December 2020.
-
Automated Source Code Generation and Auto-completion Using Deep Learning: Comparing and Discussing Current Language-Model-Related Approaches
Authors:
Juan Cruz-Benito,
Sanjay Vishwakarma,
Francisco Martin-Fernandez,
Ismael Faro
Abstract:
In recent years, the use of deep learning in language models gained much attention. Some research projects claim that they can generate text that can be interpreted as human-writing, enabling new possibilities in many application areas. Among the different areas related to language processing, one of the most notable in applying this type of modeling is programming languages. For years, the Machin…
▽ More
In recent years, the use of deep learning in language models gained much attention. Some research projects claim that they can generate text that can be interpreted as human-writing, enabling new possibilities in many application areas. Among the different areas related to language processing, one of the most notable in applying this type of modeling is programming languages. For years, the Machine Learning community has been researching this software engineering area, pursuing goals like applying different approaches to auto-complete, generate, fix, or evaluate code programmed by humans. Considering the increasing popularity of the Deep-Learning-enabled language models approach, we detected a lack of empirical papers that compare different deep learning architectures to create and use language models based on programming code. This paper compares different neural network architectures like AWD-LSTMs, AWD-QRNNs, and Transformer while using transfer learning and different tokenizations to see how they behave in building language models using a Python dataset for code generation and filling mask tasks. Considering the results, we discuss each approach's different strengths and weaknesses and what gaps we find to evaluate the language models or apply them in a real programming context.
△ Less
Submitted 12 January, 2021; v1 submitted 16 September, 2020;
originally announced September 2020.
-
Mitigation of Through-Wall Distortions of Frontal Radar Images using Denoising Autoencoders
Authors:
Shelly Vishwakarma,
Shobha Sundar Ram
Abstract:
Radar images of humans and other concealed objects are considerably distorted by attenuation, refraction and multipath clutter in indoor through-wall environments. While several methods have been proposed for removing target independent static and dynamic clutter, there still remain considerable challenges in mitigating target dependent clutter especially when the knowledge of the exact propagatio…
▽ More
Radar images of humans and other concealed objects are considerably distorted by attenuation, refraction and multipath clutter in indoor through-wall environments. While several methods have been proposed for removing target independent static and dynamic clutter, there still remain considerable challenges in mitigating target dependent clutter especially when the knowledge of the exact propagation characteristics or analytical framework is unavailable. In this work we focus on mitigating wall effects using a machine learning based solution -- denoising autoencoders -- that does not require prior information of the wall parameters or room geometry. Instead, the method relies on the availability of a large volume of training radar images gathered in through-wall conditions and the corresponding clean images captured in line-of-sight conditions. During the training phase, the autoencoder learns how to denoise the corrupted through-wall images in order to resemble the free space images. We have validated the performance of the proposed solution for both static and dynamic human subjects. The frontal radar images of static targets are obtained by processing wideband planar array measurement data with two-dimensional array and range processing. The frontal radar images of dynamic targets are simulated using narrowband planar array data processed with two-dimensional array and Doppler processing. In both simulation and measurement processes, we incorporate considerable diversity in the target and propagation conditions. Our experimental results, from both simulation and measurement data, show that the denoised images are considerably more similar to the free-space images when compared to the original through-wall images.
△ Less
Submitted 22 March, 2019;
originally announced March 2019.
-
Doppler-Resilient 802.11ad-Based Ultra-Short Range Automotive Joint Radar-Communications System
Authors:
Gaurav Duggal,
Shelly Vishwakarma,
Kumar Vijay Mishra,
Shobha Sundar Ram
Abstract:
We present an ultra-short range IEEE 802.11ad-based automotive joint radar-communications (JRC) framework, wherein we improve the radar's Doppler resilience by incorporating Prouhet-Thue-Morse sequences in the preamble. The proposed processing reveals detailed micro-features of common automotive objects verified through extended scattering center models of animated pedestrian, bicycle, and car tar…
▽ More
We present an ultra-short range IEEE 802.11ad-based automotive joint radar-communications (JRC) framework, wherein we improve the radar's Doppler resilience by incorporating Prouhet-Thue-Morse sequences in the preamble. The proposed processing reveals detailed micro-features of common automotive objects verified through extended scattering center models of animated pedestrian, bicycle, and car targets. Numerical experiments demonstrate $2.5$% reduction in the probability-of-false-alarm at low signal-to-noise-ratios and improvement in the peak-to-sidelobe level dynamic range up to Doppler velocities of $\pm144$ km/hr over conventional 802.11ad JRC.
△ Less
Submitted 2 May, 2020; v1 submitted 4 February, 2019;
originally announced February 2019.
-
Transmitter Optimization in Slow Fading MISO Wiretap Channel
Authors:
Sanjay Vishwakarma,
A. Chockalingam
Abstract:
In this paper, we consider the transmitter optimization problem in slow fading multiple-input-single-output (MISO) wiretap channel. The source transmits a secret message intended for $K$ users in the presence of $J$ non-colluding eavesdroppers, and operates under a total power constraint. The channels between the source and all users and eavesdroppers are assumed to be slow fading, and only statis…
▽ More
In this paper, we consider the transmitter optimization problem in slow fading multiple-input-single-output (MISO) wiretap channel. The source transmits a secret message intended for $K$ users in the presence of $J$ non-colluding eavesdroppers, and operates under a total power constraint. The channels between the source and all users and eavesdroppers are assumed to be slow fading, and only statistical channel state information (CSI) is known at the source. For a given code rate and secrecy rate pair of the wiretap code, denoted by $(R_{D}, R_{s})$, we define the non-outage event as the joint event of the link information rates to $K$ users be greater than or equal to $R_{D}$ and the link information rates to $J$ eavesdroppers be less than or equal to $(R_{D} - R_{s})$. We minimize the transmit power subject to the total power constraint and satisfying the probability of the non-outage event to be greater than or equal to a desired threshold $(1-ε)$.
△ Less
Submitted 31 January, 2016;
originally announced February 2016.
-
MIMO DF Relay Beamforming for Secrecy with Artificial Noise, Imperfect CSI, and Finite-Alphabet
Authors:
Sanjay Vishwakarma,
A. Chockalingam
Abstract:
In this paper, we consider decode-and-forward (DF) relay beamforming with imperfect channel state information (CSI), cooperative artificial noise (AN) injection, and finite-alphabet input in the presence of an user and $J$ non-colluding eavesdroppers. The communication between the source and the user is aided by a multiple-input-multiple-output (MIMO) DF relay. We use the fact that a wiretap code…
▽ More
In this paper, we consider decode-and-forward (DF) relay beamforming with imperfect channel state information (CSI), cooperative artificial noise (AN) injection, and finite-alphabet input in the presence of an user and $J$ non-colluding eavesdroppers. The communication between the source and the user is aided by a multiple-input-multiple-output (MIMO) DF relay. We use the fact that a wiretap code consists of two parts: i) common message (non-secret), and ii) secret message. The source transmits two independent messages: i) common message (non-secret), and ii) secret message. The common message is transmitted at a fixed rate $R_{0}$, and it is intended for the user. The secret message is also intended for the user but it should be kept secret from the $J$ eavesdroppers. The source and the MIMO DF relay operate under individual power constraints. In order to improve the secrecy rate, the MIMO relay also injects artificial noise. The CSI on all the links are assumed to be imperfect and CSI errors are assumed to be norm bounded. In order to maximize the worst case secrecy rate, we maximize the worst case link information rate to the user subject to: i) the individual power constraints on the source and the MIMO relay, and ii) the best case link information rates to $J$ eavesdroppers be less than or equal to $R_{0}$ in order to support a fixed common message rate $R_{0}$. Numerical results showing the effect of perfect/imperfect CSI, presence/absence of AN with finite-alphabet input on the secrecy rate are presented.
△ Less
Submitted 4 May, 2015;
originally announced May 2015.
-
Sum Secrecy Rate in MISO Full-Duplex Wiretap Channel with Imperfect CSI
Authors:
Sanjay Vishwakarma,
A. Chockalingam
Abstract:
In this paper, we consider the achievable sum secrecy rate in MISO (multiple-input-single-output) {\em full-duplex} wiretap channel in the presence of a passive eavesdropper and imperfect channel state information (CSI). We assume that the users participating in full-duplex communication have multiple transmit antennas, and that the users and the eavesdropper have single receive antenna each. The…
▽ More
In this paper, we consider the achievable sum secrecy rate in MISO (multiple-input-single-output) {\em full-duplex} wiretap channel in the presence of a passive eavesdropper and imperfect channel state information (CSI). We assume that the users participating in full-duplex communication have multiple transmit antennas, and that the users and the eavesdropper have single receive antenna each. The users have individual transmit power constraints. They also transmit jamming signals to improve the secrecy rates. We obtain the achievable perfect secrecy rate region by maximizing the worst case sum secrecy rate. We also obtain the corresponding transmit covariance matrices associated with the message signals and the jamming signals. Numerical results that show the impact of imperfect CSI on the achievable secrecy rate region are presented.
△ Less
Submitted 25 March, 2015;
originally announced March 2015.
-
Decode-and-Forward Relay Beamforming with Secret and Non-Secret Messages
Authors:
Sanjay Vishwakarma,
A. Chockalingam
Abstract:
In this paper, we study beamforming in decode-and-forward (DF) relaying using multiple relays, where the source node sends a secret message as well as a non-secret message to the destination node in the presence of multiple non-colluding eavesdroppers. The non-secret message is transmitted at a fixed rate $R_{0}$ and requires no protection from the eavesdroppers, whereas the secret message needs t…
▽ More
In this paper, we study beamforming in decode-and-forward (DF) relaying using multiple relays, where the source node sends a secret message as well as a non-secret message to the destination node in the presence of multiple non-colluding eavesdroppers. The non-secret message is transmitted at a fixed rate $R_{0}$ and requires no protection from the eavesdroppers, whereas the secret message needs to be protected from the eavesdroppers. The source and relays operate under a total power constraint. We find the optimum source powers and weights of the relays for both secret and non-secret messages which maximize the worst case secrecy rate for the secret message as well as meet the information rate constraint $R_{0}$ for the non-secret message. We solve this problem for the cases when ($i$) perfect channel state information (CSI) of all links is known, and ($ii$) only the statistical CSI of the eavesdroppers links and perfect CSI of other links are known.
△ Less
Submitted 31 January, 2014;
originally announced January 2014.
-
Transmitter Optimization in MISO Broadcast Channel with Common and Secret Messages
Authors:
Sanjay Vishwakarma,
A. Chockalingam
Abstract:
In this paper, we consider transmitter optimization in multiple-input single-output (MISO) broadcast channel with common and secret messages. The secret message is intended for $K$ users and it is transmitted with perfect secrecy with respect to $J$ eavesdroppers which are also assumed to be legitimate users in the network. The common message is transmitted at a fixed rate $R_{0}$ and it is intend…
▽ More
In this paper, we consider transmitter optimization in multiple-input single-output (MISO) broadcast channel with common and secret messages. The secret message is intended for $K$ users and it is transmitted with perfect secrecy with respect to $J$ eavesdroppers which are also assumed to be legitimate users in the network. The common message is transmitted at a fixed rate $R_{0}$ and it is intended for all $K$ users and $J$ eavesdroppers. The source operates under a total power constraint. It also injects artificial noise to improve the secrecy rate. We obtain the optimum covariance matrices associated with the common message, secret message, and artificial noise, which maximize the achievable secrecy rate and simultaneously meet the fixed rate $R_{0}$ for the common message.
△ Less
Submitted 25 January, 2014;
originally announced January 2014.
-
Power Allocation in MIMO Wiretap Channel with Statistical CSI and Finite-Alphabet Input
Authors:
Sanjay Vishwakarma,
A. Chockalingam
Abstract:
In this paper, we consider the problem of power allocation in MIMO wiretap channel for secrecy in the presence of multiple eavesdroppers. Perfect knowledge of the destination channel state information (CSI) and only the statistical knowledge of the eavesdroppers CSI are assumed. We first consider the MIMO wiretap channel with Gaussian input. Using Jensen's inequality, we transform the secrecy rate…
▽ More
In this paper, we consider the problem of power allocation in MIMO wiretap channel for secrecy in the presence of multiple eavesdroppers. Perfect knowledge of the destination channel state information (CSI) and only the statistical knowledge of the eavesdroppers CSI are assumed. We first consider the MIMO wiretap channel with Gaussian input. Using Jensen's inequality, we transform the secrecy rate max-min optimization problem to a single maximization problem. We use generalized singular value decomposition and transform the problem to a concave maximization problem which maximizes the sum secrecy rate of scalar wiretap channels subject to linear constraints on the transmit covariance matrix. We then consider the MIMO wiretap channel with finite-alphabet input. We show that the transmit covariance matrix obtained for the case of Gaussian input, when used in the MIMO wiretap channel with finite-alphabet input, can lead to zero secrecy rate at high transmit powers. We then propose a power allocation scheme with an additional power constraint which alleviates this secrecy rate loss problem, and gives non-zero secrecy rates at high transmit powers.
△ Less
Submitted 15 January, 2014;
originally announced January 2014.
-
Sum Secrecy Rate in Full-Duplex Wiretap Channel with Imperfect CSI
Authors:
Sanjay Vishwakarma,
A. Chockalingam
Abstract:
In this paper, we consider the achievable sum secrecy rate in full-duplex wiretap channel in the presence of an eavesdropper and imperfect channel state information (CSI). We assume that the users participating in full-duplex communication and the eavesdropper have single antenna each. The users have individual transmit power constraints. They also transmit jamming signals to improve the secrecy r…
▽ More
In this paper, we consider the achievable sum secrecy rate in full-duplex wiretap channel in the presence of an eavesdropper and imperfect channel state information (CSI). We assume that the users participating in full-duplex communication and the eavesdropper have single antenna each. The users have individual transmit power constraints. They also transmit jamming signals to improve the secrecy rates. We obtain the achievable perfect secrecy rate region by maximizing the sum secrecy rate. We also obtain the corresponding optimum powers of the message signals and the jamming signals. Numerical results that show the impact of imperfect CSI on the achievable secrecy rate region are presented.
△ Less
Submitted 16 January, 2014; v1 submitted 15 November, 2013;
originally announced November 2013.
-
Contribution of Acoustic Losses in the Quality Factor of a Micromechanical Resonator
Authors:
Santhosh D. Vishwakarma,
A. K. Pandey,
J. M. Parpia,
R. Pratap
Abstract:
A semi-analytical study of the acoustic radiation losses associated with various transverse vibration modes of a micromechanical (MEMS) annular resonator is presented. The quality factor, Q, of such resonators is of interest in many applications and depends on structural geometry, interaction with the external environment, and the encapsulation method. Resonators with at least one surface exposed…
▽ More
A semi-analytical study of the acoustic radiation losses associated with various transverse vibration modes of a micromechanical (MEMS) annular resonator is presented. The quality factor, Q, of such resonators is of interest in many applications and depends on structural geometry, interaction with the external environment, and the encapsulation method. Resonators with at least one surface exposed to air can display losses through acoustic radiation even at micro meter dimensions. Published experimental results suggest the dominance of acoustic losses in the Q of a MEMS drum resonator. In this study, a well established mathematical techniques to analytically model resonator vibration modes and fluid-structure interaction are used, and a semi-analytical procedure for computing Q due to acoustic radiation losses, Qac, in any vibrational mode outlined. Present technique includes calculation of the exact mode shape and its utilization in computing Qac. The dependence of Qac on the first 15 mode shapes is computed. Results are compared for the lowest 2 modes of a solid circular resonator using exact mode shapes to those of Lamb's approximate mode shapes. Comparison to published experimental results validates the predictive utility of the technique, especially for higher modes where acoustic radiation seems to be the dominant constituent of Q.
△ Less
Submitted 31 May, 2012; v1 submitted 20 April, 2012;
originally announced April 2012.