-
Energy-aware Incremental OTA Update for Flash-based Batteryless IoT Devices
Authors:
Wei Wei,
Jishnu Banerjee,
Sahidul Islam,
Chen Pan,
Mimi Xie
Abstract:
Over-the-air (OTA) firmware updates are essential for updating and maintaining IoT devices, especially those batteryless devices reliant on energy harvesting power sources. Flash memory, favored for its low cost and high density, is extensively used for data storage in many IoT devices. However, due to its high energy demands for update operations, there is often insufficient energy for code updat…
▽ More
Over-the-air (OTA) firmware updates are essential for updating and maintaining IoT devices, especially those batteryless devices reliant on energy harvesting power sources. Flash memory, favored for its low cost and high density, is extensively used for data storage in many IoT devices. However, due to its high energy demands for update operations, there is often insufficient energy for code updates. This paper proposes an incremental flash-based OTA update approach tailored for energy harvesting IoT devices, tackling the challenges brought by limited memory resources and fluctuating energy availability. Our approach is composed of three techniques: segmentbased update packet design, deferred flash segment writes, and checkpoint-free update resumption. Segment-based update packet design segments firmware updates into smaller packets, each tailored for specific memory segments, thereby minimizing unnecessary flash operations and conserving energy. Deferred flash segment writes accumulate packets in Static Random-Access Memory (SRAM) for collective processing, reducing the frequency of energy-intensive operations. Crucially, our checkpointfree update resumption ensures efficient recovery from power interruptions without significant energy cost on data backup. Through thorough experimental evaluation, we have observed that our approach significantly reduces the total energy consumed during OTA updates, and decreases the average total update time in energy harvesting environments.
△ Less
Submitted 17 June, 2024;
originally announced June 2024.
-
Using Large Pretrained Language Models for Answering User Queries from Product Specifications
Authors:
Kalyani Roy,
Smit Shah,
Nithish Pai,
Jaidam Ramtej,
Prajit Prashant Nadkarn,
Jyotirmoy Banerjee,
Pawan Goyal,
Surender Kumar
Abstract:
While buying a product from the e-commerce websites, customers generally have a plethora of questions. From the perspective of both the e-commerce service provider as well as the customers, there must be an effective question answering system to provide immediate answers to the user queries. While certain questions can only be answered after using the product, there are many questions which can be…
▽ More
While buying a product from the e-commerce websites, customers generally have a plethora of questions. From the perspective of both the e-commerce service provider as well as the customers, there must be an effective question answering system to provide immediate answers to the user queries. While certain questions can only be answered after using the product, there are many questions which can be answered from the product specification itself. Our work takes a first step in this direction by finding out the relevant product specifications, that can help answering the user questions. We propose an approach to automatically create a training dataset for this problem. We utilize recently proposed XLNet and BERT architectures for this problem and find that they provide much better performance than the Siamese model, previously applied for this problem. Our model gives a good performance even when trained on one vertical and tested across different verticals.
△ Less
Submitted 29 May, 2020;
originally announced May 2020.
-
A Log-Euclidean and Total Variation based Variational Framework for Computational Sonography
Authors:
Jyotirmoy Banerjee,
Premal A. Patel,
Fred Ushakov,
Donald Peebles,
Jan Deprest,
Sebastien Ourselin,
David Hawkes,
Tom Vercauteren
Abstract:
We propose a spatial compounding technique and variational framework to improve 3D ultrasound image quality by compositing multiple ultrasound volumes acquired from different probe orientations. In the composite volume, instead of intensity values, we estimate a tensor at every voxel. The resultant tensor image encapsulates the directional information of the underlying imaging data and can be used…
▽ More
We propose a spatial compounding technique and variational framework to improve 3D ultrasound image quality by compositing multiple ultrasound volumes acquired from different probe orientations. In the composite volume, instead of intensity values, we estimate a tensor at every voxel. The resultant tensor image encapsulates the directional information of the underlying imaging data and can be used to generate ultrasound volumes from arbitrary, potentially unseen, probe positions. Extending the work of Hennersperger et al., we introduce a log-Euclidean framework to ensure that the tensors are positive-definite, eventually ensuring non-negative images. Additionally, we regularise the underpinning ill-posed variational problem while preserving edge information by relying on a total variation penalisation of the tensor field in the log domain. We present results on in vivo human data to show the efficacy of the approach.
△ Less
Submitted 6 February, 2018;
originally announced February 2018.
-
On Auxiliary Entity Allocation Problem in Multi-layered Interdependent Critical Infrastructures
Authors:
Joydeep Banerjee,
Arunabha Sen,
Chenyang Zho
Abstract:
Operation of critical infrastructures are highly interdependent on each other. Such dependencies causes failure in these infrastructures to cascade on an initial failure event. Owing to this vulnerability it is imperative to incorporate efficient strategies for their protection. Modifying dependencies by adding additional dependency implications using entities (termed as \emph{auxiliary entities})…
▽ More
Operation of critical infrastructures are highly interdependent on each other. Such dependencies causes failure in these infrastructures to cascade on an initial failure event. Owing to this vulnerability it is imperative to incorporate efficient strategies for their protection. Modifying dependencies by adding additional dependency implications using entities (termed as \emph{auxiliary entities}) is shown to mitigate this issue to a certain extent. With this finding, in this article we introduce the Auxiliary Entity Allocation problem. The objective is to maximize protection in Power and Communication infrastructures using a budget in number of dependency modifications using the auxiliary entities. The problem is proved to be NP-complete in general case. We provide an optimal solution using Integer Linear program and a heuristic for a restricted case. The efficacy of heuristic with respect to the optimal is judged through experimentation using real world data sets with heuristic deviating $6.75 \%$ from optimal on average.
△ Less
Submitted 24 January, 2017;
originally announced March 2017.
-
On Robustness in Multilayer Interdependent Network
Authors:
Joydeep Banerjee,
Chenyang Zhou,
Arunabha Sen
Abstract:
Critical Infrastructures like power and communication networks are highly interdependent on each other for their full functionality. Many significant research have been pursued to model the interdependency and failure analysis of these interdependent networks. However, most of these models fail to capture the complex interdependencies that might actually exist between the infrastructures. The \emp…
▽ More
Critical Infrastructures like power and communication networks are highly interdependent on each other for their full functionality. Many significant research have been pursued to model the interdependency and failure analysis of these interdependent networks. However, most of these models fail to capture the complex interdependencies that might actually exist between the infrastructures. The \emph{Implicative Interdependency Model} that utilizes Boolean Logic to capture complex interdependencies was recently proposed which overcome the limitations of the existing models. A number of problems were studies based on this model. In this paper we study the \textit{Robustness} problem in Interdependent Power and Communication Network. The robustness is defined with respect to two parameters $K \in I^{+} \cup \{0\}$ and $ρ\in (0,1]$. We utilized the \emph{Implicative Interdependency Model} model to capture the complex interdependency between the two networks. The model classifies the interdependency relations into four cases. Computational complexity of the problem is analyzed for each of these cases. A polynomial time algorithm is designed for the first case that outputs the optimal solution. All the other cases are proved to be NP-complete. An in-approximability bound is provided for the third case. For the general case we formulate an Integer Linear Program to get the optimal solution and a polynomial time heuristic. The applicability of the heuristic is evaluated using power and communication network data of Maricopa County, Arizona. The experimental results showed that the heuristic almost always produced near optimal value of parameter $K$ for $ρ< 0.42$.
△ Less
Submitted 24 January, 2017;
originally announced February 2017.
-
On Hardening Problems in Critical Infrastructure Systems
Authors:
Joydeep Banerjee,
Kaustav Basu,
Arunabha Sen
Abstract:
The power and communication networks are highly interdependent and form a part of the critical infrastructure of a country. Similarly, dependencies exist within the networks itself. It is essential to have a model which captures these dependencies precisely. Previous research has proposed certain models but these models have certain limitations. The limitations of the aforementioned models have be…
▽ More
The power and communication networks are highly interdependent and form a part of the critical infrastructure of a country. Similarly, dependencies exist within the networks itself. It is essential to have a model which captures these dependencies precisely. Previous research has proposed certain models but these models have certain limitations. The limitations of the aforementioned models have been overcome by the Implicative Interdependency Model, which uses Boolean Logic to denote the dependencies. This paper formulates the Entity Hardening problem and the Targeted Entity Hardening problem using the Implicative Interdependency Model. The Entity Hardening problem describes a situation where an operator, with a limited budget, must decide which entities to harden, which in turn would minimize the damage, provided a set of entities fail initially. The Targeted Entity Hardening problem is a restricted version of the Entity Hardening problem. This problem presents a scenario where, the protection of certain entities is of higher priority. If these entities were to be nonfunctional, the economic and societal damage would be higher when compared to other entities being nonfunctional. It has been shown that both problems are NP-Complete. An Integer Linear Program (ILP) has been devised to find the optimal solution. A heuristic has been described whose accuracy is found by comparing its performance with the optimal solution using real-world and simulated data.
△ Less
Submitted 31 May, 2017; v1 submitted 24 January, 2017;
originally announced January 2017.
-
Using complex networks towards information retrieval and diagnostics in multidimensional imaging
Authors:
Soumya Jyoti Banerjee,
Mohammad Azharuddin,
Debanjan Sen,
Smruti Savale,
Himadri Datta,
Anjan Kr Dasgupta,
Soumen Roy
Abstract:
We present a fresh and broad yet simple approach towards information retrieval in general and diagnostics in particular by applying the theory of complex networks on multidimensional, dynamic images. We demonstrate a successful use of our method with the time series generated from high content thermal imaging videos of patients suffering from the aqueous deficient dry eye (ADDE) disease. Remarkabl…
▽ More
We present a fresh and broad yet simple approach towards information retrieval in general and diagnostics in particular by applying the theory of complex networks on multidimensional, dynamic images. We demonstrate a successful use of our method with the time series generated from high content thermal imaging videos of patients suffering from the aqueous deficient dry eye (ADDE) disease. Remarkably, network analyses of thermal imaging time series of contact lens users and patients upon whom Laser-Assisted in situ Keratomileusis (Lasik) surgery has been conducted, exhibit pronounced similarity with results obtained from ADDE patients. We also propose a general framework for the transformation of multidimensional images to networks for futuristic biometry. Our approach is general and scalable to other fluctuation-based devices where network parameters derived from fluctuations, act as effective discriminators and diagnostic markers.
△ Less
Submitted 1 December, 2015; v1 submitted 8 June, 2015;
originally announced June 2015.
-
On the Entity Hardening Problem in Multi-layered Interdependent Networks
Authors:
Joydeep Banerjee,
Arun Das,
Chenyang Zhou,
Anisha Mazumder,
Arunabha Sen
Abstract:
The power grid and the communication network are highly interdependent on each other for their well being. In recent times the research community has shown significant interest in modeling such interdependent networks and studying the impact of failures on these networks. Although a number of models have been proposed, many of them are simplistic in nature and fail to capture the complex interdepe…
▽ More
The power grid and the communication network are highly interdependent on each other for their well being. In recent times the research community has shown significant interest in modeling such interdependent networks and studying the impact of failures on these networks. Although a number of models have been proposed, many of them are simplistic in nature and fail to capture the complex interdependencies that exist between the entities of these networks. To overcome the limitations, recently an Implicative Interdependency Model that utilizes Boolean Logic, was proposed and a number of problems were studied. In this paper we study the entity hardening problem, where by entity hardening we imply the ability of the network operator to ensure that an adversary (be it Nature or human) cannot take a network entity from operative to inoperative state. Given that the network operator with a limited budget can only harden k entities, the goal of the entity hardening problem is to identify the set of k entities whose hardening will ensure maximum benefit for the operator, i.e. maximally reduce the ability of the adversary to degrade the network. We show that the problem is solvable in polynomial time for some cases, whereas for others it is NP-complete. We provide the optimal solution using ILP, and propose a heuristic approach to solve the problem. We evaluate the efficacy of our heuristic using power and communication network data of Maricopa County, Arizona. The experiments show that our heuristic almost always produces near optimal results.
△ Less
Submitted 20 December, 2014;
originally announced December 2014.
-
Slow poisoning and destruction of networks: Edge proximity and its implications for biological and infrastructure networks
Authors:
Soumya Jyoti Banerjee,
Saptarshi Sinha,
Soumen Roy
Abstract:
We propose a network metric, edge proximity, ${\cal P}_e$, which demonstrates the importance of specific edges in a network, hitherto not captured by existing network metrics. The effects of removing edges with high ${\cal P}_e$ might initially seem inconspicuous but are eventually shown to be very harmful for networks. Compared to existing strategies, the removal of edges by ${\cal P}_e$ leads to…
▽ More
We propose a network metric, edge proximity, ${\cal P}_e$, which demonstrates the importance of specific edges in a network, hitherto not captured by existing network metrics. The effects of removing edges with high ${\cal P}_e$ might initially seem inconspicuous but are eventually shown to be very harmful for networks. Compared to existing strategies, the removal of edges by ${\cal P}_e$ leads to a remarkable increase in the diameter and average shortest path length in undirected real and random networks till the first disconnection and well beyond. ${\cal P}_e$ can be consistently used to rupture the network into two nearly equal parts, thus presenting a very potent strategy to greatly harm a network. Targeting by ${\cal P}_e$ causes notable efficiency loss in U.S. and European power grid networks. ${\cal P}_e$ identifies proteins with essential cellular functions in protein-protein interaction networks. It pinpoints regulatory neural connections and important portions of the neural and brain networks, respectively. Energy flow interactions identified by ${\cal P}_e$ form the backbone of long food web chains. Finally, we scrutinize the potential of ${\cal P}_e$ in edge controllability dynamics of directed networks.
△ Less
Submitted 11 February, 2015; v1 submitted 29 September, 2014;
originally announced September 2014.
-
Analysis of d-Hop Dominating Set Problem for Directed Graph with Indegree Bounded by One
Authors:
Joydeep Banerjee,
Arun Das,
Arunabha Sen
Abstract:
Efficient communication between nodes in ad-hoc networks can be established through repeated cluster formations with designated \textit{cluster-heads}. In this context minimum d-hop dominating set problem was introduced for cluster formation in ad-hoc networks and is proved to be NP-complete. Hence, an exact solution to this problem for certain subclass of graphs (representing an ad-hoc network) c…
▽ More
Efficient communication between nodes in ad-hoc networks can be established through repeated cluster formations with designated \textit{cluster-heads}. In this context minimum d-hop dominating set problem was introduced for cluster formation in ad-hoc networks and is proved to be NP-complete. Hence, an exact solution to this problem for certain subclass of graphs (representing an ad-hoc network) can be beneficial. In this short paper we perform computational complexity analysis of minimum d-hop dominating set problem for directed graphs with in-degree bounded by $1$. The optimum solution of the problem can be found polynomially by exploiting certain properties of the graph under consideration. For a digraph $G_{D}=(V_D,E_D)$ an $\mathcal{O}(|V_D|^2)$ solution is provided to the problem.
△ Less
Submitted 25 January, 2017; v1 submitted 28 April, 2014;
originally announced April 2014.
-
Identification of $\cal K$ Most Vulnerable Nodes in Multi-layered Network Using a New Model of Interdependency
Authors:
Arunabha Sen,
Anisha Mazumder,
Joydeep Banerjee,
Arun Das,
Randy Compton
Abstract:
The critical infrastructures of the nation including the power grid and the communication network are highly interdependent. Recognizing the need for a deeper understanding of the interdependency in a multi-layered network, significant efforts have been made by the research community in the last few years to achieve this goal. Accordingly a number of models have been proposed and analyzed. Unfortu…
▽ More
The critical infrastructures of the nation including the power grid and the communication network are highly interdependent. Recognizing the need for a deeper understanding of the interdependency in a multi-layered network, significant efforts have been made by the research community in the last few years to achieve this goal. Accordingly a number of models have been proposed and analyzed. Unfortunately, most of the models are over simplified and, as such, they fail to capture the complex interdependency that exists between entities of the power grid and the communication networks involving a combination of conjunctive and disjunctive relations. To overcome the limitations of existing models, we propose a new model that is able to capture such complex interdependency relations. Utilizing this model, we provide techniques to identify the $\cal K$ most vulnerable nodes of an interdependent network. We show that the problem can be solved in polynomial time in some special cases, whereas for some others, the problem is NP-complete. We establish that this problem is equivalent to computation of a {\em fixed point} of a multilayered network system and we provide a technique for its computation utilizing Integer Linear Programming. Finally, we evaluate the efficacy of our technique using real data collected from the power grid and the communication network that span the Maricopa County of Arizona.
△ Less
Submitted 8 January, 2014;
originally announced January 2014.
-
Key to Network Controllability
Authors:
Soumya Jyoti Banerjee,
Soumen Roy
Abstract:
Liu et al recently proposed a minimum number of driver nodes needed to obtain full structural controllability over a directed network. Driver nodes are unmatched nodes, from which there are directed paths to all matched nodes. Their most important assertion is that a system's controllability is to a great extent encoded by the underlying network's degree distribution, $P(k_{in}, k_{out})$. Is the…
▽ More
Liu et al recently proposed a minimum number of driver nodes needed to obtain full structural controllability over a directed network. Driver nodes are unmatched nodes, from which there are directed paths to all matched nodes. Their most important assertion is that a system's controllability is to a great extent encoded by the underlying network's degree distribution, $P(k_{in}, k_{out})$. Is the controllability of a network decided almost completely by the immediate neighbourhood of a node, while, even slightly distant nodes play no role at all? Motivated by the above question, in this communication, we argue that an effective understanding of controllability in directed networks can be reached using distance based measures of closeness centrality and betweenness centrality and may not require the knowledge of local connectivity measures like in-degree and out-degree.
△ Less
Submitted 17 September, 2012;
originally announced September 2012.
-
Integral Value Transformations: A Class of Affine Discrete Dynamical Systems and an Application
Authors:
Sk. S. Hassan,
P. Pal Choudhury,
B. K. Nayak,
A. Ghosh,
J. Banerjee
Abstract:
In this paper, the notion of Integral Value Transformations (IVTs), a class of Discrete Dynamical Maps has been introduced. Then notion of Affine Discrete Dynamical System (ADDS) in the light of IVTs is defined and some rudimentary mathematical properties of the system are depicted. Collatz Conjecture is one of the most enigmatic problems in 20th Century. The Conjecture was posed by German Mathema…
▽ More
In this paper, the notion of Integral Value Transformations (IVTs), a class of Discrete Dynamical Maps has been introduced. Then notion of Affine Discrete Dynamical System (ADDS) in the light of IVTs is defined and some rudimentary mathematical properties of the system are depicted. Collatz Conjecture is one of the most enigmatic problems in 20th Century. The Conjecture was posed by German Mathematician L. Collatz in 1937. There are much advancement in generalizing and defining analogous conjectures, but even to the date, there is no fruitful result for the advancement for the settlement of the conjecture. We have made an effort to make a Collatz type problem in the domain of IVTs and we have been able to solve the problem in 2011 [1]. Here mainly, we have focused and inquired on Collatz-like ADDS. Finally, we have designed the Optimal Distributed and Parallel Environment (ODPE) in the light of ADDS.
△ Less
Submitted 12 October, 2011; v1 submitted 21 September, 2011;
originally announced October 2011.
-
Fractal String Generation and Its Application in Music Composition
Authors:
Avishek Ghosh,
Joydeep Banerjee,
Sk. S. Hassan,
P. Pal Choudhury
Abstract:
Music is a string of some of the notes out of 12 notes (Sa, Komal_re, Re, Komal_ga, Ga, Ma, Kari_ma, Pa, Komal_dha, Dha, Komal_ni, Ni) and their harmonics. Each note corresponds to a particular frequency. When such strings are encoded to form discrete sequences, different frequencies present in the music corresponds to different amplitude levels (value) of the discrete sequence. Initially, a class…
▽ More
Music is a string of some of the notes out of 12 notes (Sa, Komal_re, Re, Komal_ga, Ga, Ma, Kari_ma, Pa, Komal_dha, Dha, Komal_ni, Ni) and their harmonics. Each note corresponds to a particular frequency. When such strings are encoded to form discrete sequences, different frequencies present in the music corresponds to different amplitude levels (value) of the discrete sequence. Initially, a class of discrete sequences has been generated using logistic map. All these discrete sequences have at most n-different amplitude levels (value) (depending on the particular raga). Without loss of generality, we have chosen two discrete sequences of two types of Indian raga viz. Bhairabi and Bhupali having same number of amplitude levels to obtain/search close relatives from the class. The relative / closeness can be assured through correlation coefficient.The search is unbiased, random and non-adaptive. The obtained string is that which maximally resembles the given two sequences. The same can be thought of as a music composition of the given two strings. It is to be noted that all these string are fractal string which can be persuaded by fractal dimension.
△ Less
Submitted 27 September, 2011;
originally announced September 2011.
-
Minimization of Handoff latency by co-ordinate evaluation method using GPS based map
Authors:
Debabrata Sarddar,
Joydeep Banerjee,
Souvik Kumar Saha,
Tapas Jana,
Utpal Biswas,
M. K. Naskar
Abstract:
Handoff has become an essential criterion in mobile communication system, specially in urban areas, owing to the limited coverage area of Access Points (AP). Handover of calls between two Base Stations (BSs) is encountered frequently and it is essentially required to minimize the delay of the process. Many solutions attempting to improve this process have been proposed but only a few use geo-locat…
▽ More
Handoff has become an essential criterion in mobile communication system, specially in urban areas, owing to the limited coverage area of Access Points (AP). Handover of calls between two Base Stations (BSs) is encountered frequently and it is essentially required to minimize the delay of the process. Many solutions attempting to improve this process have been proposed but only a few use geo-location systems in the management of the handover. Here we propose to minimize the handoff latency by minimizing the number of APs scanned by the Mobile Node (MN) during each handoff procedure. We consider the whole topographical area as a two dimensional plane. By GPS, we can note down the co-ordinates of the MN at any instant. The average rate of change of its latitudinal distance and longitudinal distance with a specific time period is evaluated at the end of the given time period. With the knowledge of the given parameter, it is possible to determine the latitude and longitude of the MN after a particular instant of time. Hence, the direction of motion of the MN can be determined, which in turns gives the AP towards which the MN is headings. This reduces the number of APs to be scanned. Thus, on an overall basis, the handoff latency can be reduced by almost half to one third of its value.
△ Less
Submitted 10 August, 2010;
originally announced August 2010.
-
Minimization of Handoff Failure Probability for Next-Generation Wireless Systems
Authors:
Debabrata Sarddar,
Tapas Jana,
Souvik Kumar Saha,
Joydeep Banerjee,
Utpal Biswas,
M. K. Naskar
Abstract:
During the past few years, advances in mobile communication theory have enabled the development and deployment of different wireless technologies, complementary to each other. Hence, their integration can realize a unified wireless system that has the best features of the individual networks. Next-Generation Wireless Systems (NGWS) integrate different wireless systems, each of which is optimized f…
▽ More
During the past few years, advances in mobile communication theory have enabled the development and deployment of different wireless technologies, complementary to each other. Hence, their integration can realize a unified wireless system that has the best features of the individual networks. Next-Generation Wireless Systems (NGWS) integrate different wireless systems, each of which is optimized for some specific services and coverage area to provide ubiquitous communications to the mobile users. In this paper, we propose to enhance the handoff performance of mobile IP in wireless IP networks by reducing the false handoff probability in the NGWS handoff management protocol. Based on the information of false handoff probability, we analyze its effect on mobile speed and handoff signaling delay.
△ Less
Submitted 17 June, 2010;
originally announced June 2010.