-
Guarding a Target Area from a Heterogeneous Group of Cooperative Attackers
Authors:
Yoonjae Lee,
Goutam Das,
Daigo Shishika,
Efstathios Bakolas
Abstract:
In this paper, we investigate a multi-agent target guarding problem in which a single defender seeks to capture multiple attackers aiming to reach a high-value target area. In contrast to previous studies, the attackers herein are assumed to be heterogeneous in the sense that they have not only different speeds but also different weights representing their respective degrees of importance (e.g., t…
▽ More
In this paper, we investigate a multi-agent target guarding problem in which a single defender seeks to capture multiple attackers aiming to reach a high-value target area. In contrast to previous studies, the attackers herein are assumed to be heterogeneous in the sense that they have not only different speeds but also different weights representing their respective degrees of importance (e.g., the amount of allocated resources). The objective of the attacker team is to jointly minimize the weighted sum of their final levels of proximity to the target area, whereas the defender aims to maximize the same value. Using geometric arguments, we construct candidate equilibrium control policies that require the solution of a (possibly nonconvex) optimization problem. Subsequently, we validate the optimality of the candidate control policies using parametric optimization techniques. Lastly, we provide numerical examples to illustrate how cooperative behaviors emerge within the attacker team due to their heterogeneity.
△ Less
Submitted 30 June, 2024;
originally announced July 2024.
-
Unified Map Handling for Robotic Systems: Enhancing Interoperability and Efficiency Across Diverse Environments
Authors:
James R. Heselden,
Gautham P. Das
Abstract:
Map** is a time-consuming process for deploying robotic systems to new environments. The handling of maps is also risk-adverse when not managed effectively. We propose here, a standardised approach to handling such maps in a manner which focuses on the information contained wherein such as global location, object positions, topology, and occupancy. As part of this approach, associated management…
▽ More
Map** is a time-consuming process for deploying robotic systems to new environments. The handling of maps is also risk-adverse when not managed effectively. We propose here, a standardised approach to handling such maps in a manner which focuses on the information contained wherein such as global location, object positions, topology, and occupancy. As part of this approach, associated management scripts are able to assist with generation of maps both through direct and indirect information restructuring, and with template and procedural generation of missing data. These approaches are able to, when combined, improve the handling of maps to enable more efficient deployments and higher interoperability between platforms. Alongside this, a collection of sample datasets of fully-mapped environments are included covering areas such as agriculture, urban roadways, and indoor environments.
△ Less
Submitted 20 April, 2024;
originally announced April 2024.
-
ABACUS: An Impairment Aware Joint Optimal Dynamic RMLSA in Elastic Optical Networks
Authors:
M Jyothi Kiran,
Venkatesh Chebolu,
Goutam Das,
Raja Datta
Abstract:
The challenge of optimal Routing and Spectrum Assignment (RSA) is significant in Elastic Optical Networks. Integrating adaptive modulation formats into the RSA problem - Routing, Modulation Level, and Spectrum Assignment - broadens allocation options and increases complexity. The conventional RSA approach entails predetermining fixed paths and then allocating spectrum within them separately. Howev…
▽ More
The challenge of optimal Routing and Spectrum Assignment (RSA) is significant in Elastic Optical Networks. Integrating adaptive modulation formats into the RSA problem - Routing, Modulation Level, and Spectrum Assignment - broadens allocation options and increases complexity. The conventional RSA approach entails predetermining fixed paths and then allocating spectrum within them separately. However, expanding the path set for optimality may not be advisable due to the substantial increase in paths with network size expansion. This paper delves into a novel approach called RMLSA, which proposes a comprehensive solution addressing both route determination and spectrum assignment simultaneously. An objective function named ABACUS, Adaptive Balance of Average Clustering and Utilization of Spectrum, is chosen for its capability to adjust and assign significance to average clustering and spectrum utilization. Our approach involves formulating an Integer Linear Programming model with a straightforward relationship between path and spectrum constraints. The model also integrates Physical Layer Impairments to ensure end-to-end Quality of Transmission for requested connections while maintaining existing ones. We demonstrate that ILP can offer an optimal solution for a dynamic traffic scenario within a reasonable time complexity. To achieve this goal, we adopt a structured formulation approach where essential information is determined beforehand, thus minimizing the need for online computations.
△ Less
Submitted 20 April, 2024;
originally announced April 2024.
-
Improved Total Domination and Total Roman Domination in Unit Disk Graphs
Authors:
Sasmita Rout,
Gautam Kumar Das
Abstract:
Let $G=(V, E)$ be a simple undirected graph with no isolated vertex. A set $D_t\subseteq V$ is a total dominating set of $G$ if $(i)$ $D_t$ is a dominating set, and $(ii)$ the set $D_t$ induces a subgraph with no isolated vertex. The total dominating set of minimum cardinality is called the minimum total dominating set, and the size of the minimum total dominating set is called the total dominatio…
▽ More
Let $G=(V, E)$ be a simple undirected graph with no isolated vertex. A set $D_t\subseteq V$ is a total dominating set of $G$ if $(i)$ $D_t$ is a dominating set, and $(ii)$ the set $D_t$ induces a subgraph with no isolated vertex. The total dominating set of minimum cardinality is called the minimum total dominating set, and the size of the minimum total dominating set is called the total domination number ($γ_t(G)$). Given a graph $G$, the total dominating set (TDS) problem is to find a total dominating set of minimum cardinality. A Roman dominating function (RDF) on a graph $G$ is a function $f:V\rightarrow \{0,1,2\}$ such that each vertex $v\in V$ with $f(v)=0$ is adjacent to at least one vertex $u\in V$ with $f(u)=2$. A RDF $f$ of a graph $G$ is said to be a total Roman dominating function (TRDF) if the induced subgraph of $V_1\cup V_2$ does not contain any isolated vertex, where $V_i=\{u\in V|f(u)=i\}$. Given a graph $G$, the total Roman dominating set (TRDS) problem is to minimize the weight, $W(f)=\sum_{u\in V} f(u)$, called the total Roman domination number ($γ_{tR}(G)$). In this paper, we are the first to show that the TRDS problem is NP-complete in unit disk graphs (UDGs). Furthermore, we propose a $7.17\operatorname{-}$ factor approximation algorithm for the TDS problem and a $6.03\operatorname{-}$ factor approximation algorithm for the TRDS problem in geometric unit disk graphs. The running time for both algorithms is notably bounded by $O(n\log{k})$, where $n$ represents the number of vertices in the given UDG and $k$ represents the size of the independent set in (i.e., $D$ and $V_2$ in TDS and TRDS problems, respectively) the given UDG.
△ Less
Submitted 4 April, 2024;
originally announced April 2024.
-
AXOLOTL: Fairness through Assisted Self-Debiasing of Large Language Model Outputs
Authors:
Sana Ebrahimi,
Kaiwen Chen,
Abolfazl Asudeh,
Gautam Das,
Nick Koudas
Abstract:
Pre-trained Large Language Models (LLMs) have significantly advanced natural language processing capabilities but are susceptible to biases present in their training data, leading to unfair outcomes in various applications. While numerous strategies have been proposed to mitigate bias, they often require extensive computational resources and may compromise model performance. In this work, we intro…
▽ More
Pre-trained Large Language Models (LLMs) have significantly advanced natural language processing capabilities but are susceptible to biases present in their training data, leading to unfair outcomes in various applications. While numerous strategies have been proposed to mitigate bias, they often require extensive computational resources and may compromise model performance. In this work, we introduce AXOLOTL, a novel post-processing framework, which operates agnostically across tasks and models, leveraging public APIs to interact with LLMs without direct access to internal parameters. Through a three-step process resembling zero-shot learning, AXOLOTL identifies biases, proposes resolutions, and guides the model to self-debias its outputs. This approach minimizes computational costs and preserves model performance, making AXOLOTL a promising tool for debiasing LLM outputs with broad applicability and ease of use.
△ Less
Submitted 29 February, 2024;
originally announced March 2024.
-
Near-perfect Coverage Manifold Estimation in Cellular Networks via conditional GAN
Authors:
Washim Uddin Mondal,
Veni Goyal,
Satish V. Ukkusuri,
Goutam Das,
Di Wang,
Mohamed-Slim Alouini,
Vaneet Aggarwal
Abstract:
This paper presents a conditional generative adversarial network (cGAN) that translates base station location (BSL) information of any Region-of-Interest (RoI) to location-dependent coverage probability values within a subset of that region, called the region-of-evaluation (RoE). We train our network utilizing the BSL data of India, the USA, Germany, and Brazil. In comparison to the state-of-the-a…
▽ More
This paper presents a conditional generative adversarial network (cGAN) that translates base station location (BSL) information of any Region-of-Interest (RoI) to location-dependent coverage probability values within a subset of that region, called the region-of-evaluation (RoE). We train our network utilizing the BSL data of India, the USA, Germany, and Brazil. In comparison to the state-of-the-art convolutional neural networks (CNNs), our model improves the prediction error ($L_1$ difference between the coverage manifold generated by the network under consideration and that generated via simulation) by two orders of magnitude. Moreover, the cGAN-generated coverage manifolds appear to be almost visually indistinguishable from the ground truth.
△ Less
Submitted 10 February, 2024;
originally announced February 2024.
-
TCP Slice: A semi-distributed TCP algorithm for Delay-constrained Applications
Authors:
Dibbendu Roy,
Goutam Das
Abstract:
The TCP congestion control protocol serves as the cornerstone of reliable internet communication. However, as new applications require more specific guarantees regarding data rate and delay, network management must adapt. Thus, service providers are shifting from decentralized to centralized control of the network using a software-defined network controller (SDN). The SDN classifies applications a…
▽ More
The TCP congestion control protocol serves as the cornerstone of reliable internet communication. However, as new applications require more specific guarantees regarding data rate and delay, network management must adapt. Thus, service providers are shifting from decentralized to centralized control of the network using a software-defined network controller (SDN). The SDN classifies applications and allocates logically separate resources called slices, over the physical network. We propose TCP Slice, a congestion control algorithm that meets specific delay and bandwidth guarantees. Obtaining closed-form delay bounds for a client is challenging due to dependencies on other clients and their traffic stochasticity. We use network calculus to derive the client's delay bound and incorporate it as a constraint in the Network Utility Maximization problem. We solve the resulting optimization using dual decomposition and obtain a semi-distributed TCP protocol that can be implemented with the help of SDN controller and the use of an Explicit Congestion Notification (ECN) bit. Additionally, we also propose a proactive approach for congestion control using digital twin. TCP Slice represents a significant step towards accommodating evolving internet traffic patterns and the need for better network management in the face of increasing application diversity.
△ Less
Submitted 4 December, 2023;
originally announced December 2023.
-
Auditing Yelp's Business Ranking and Review Recommendation Through the Lens of Fairness
Authors:
Mohit Singhal,
Javier Pacheco,
Tanushree Debi,
Seyyed Mohammad Sadegh Moosavi Khorzooghi,
Abolfazl Asudeh,
Gautam Das,
Shirin Nilizadeh
Abstract:
Web 2.0 recommendation systems, such as Yelp, connect users and businesses so that users can identify new businesses and simultaneously express their experiences in the form of reviews. Yelp recommendation software moderates user-provided content by categorizing them into recommended and not-recommended sections. Due to Yelp's substantial popularity and its high impact on local businesses' success…
▽ More
Web 2.0 recommendation systems, such as Yelp, connect users and businesses so that users can identify new businesses and simultaneously express their experiences in the form of reviews. Yelp recommendation software moderates user-provided content by categorizing them into recommended and not-recommended sections. Due to Yelp's substantial popularity and its high impact on local businesses' success, understanding the fairness of its algorithms is crucial. However, with no access to the training data and the algorithms used by such black-box systems, studying their fairness is not trivial, requiring a tremendous effort to minimize bias in data collection and consider the confounding factors in the analysis.
This large-scale data-driven study, for the first time, investigates Yelp's business ranking and review recommendation system through the lens of fairness. We define and examine 4 hypotheses to examine if Yelp's recommendation software shows bias and if Yelp's business ranking algorithm shows bias against restaurants located in specific neighborhoods. Our findings show that reviews of female and less-established users are disproportionately categorized as recommended. We also find a positive association between restaurants being located in hotspot regions and their average exposure. Furthermore, we observed some cases of severe disparity bias in cities where the hotspots are in neighborhoods with less demographic diversity or areas with higher affluence and education levels. Indeed, biases introduced by data-driven systems, including our findings in this paper, are (almost) always implicit and through proxy attributes. Still, the authors believe such implicit biases should be detected and resolved as those can create cycles of discrimination that keep increasing the social gaps between different groups even further.
△ Less
Submitted 4 August, 2023;
originally announced August 2023.
-
AI-assisted Improved Service Provisioning for Low-latency XR over 5G NR
Authors:
Moyukh Laha,
Dibbendu Roy,
Sourav Dutta,
Goutam Das
Abstract:
Extended Reality (XR) is one of the most important 5G/6G media applications that will fundamentally transform human interactions. However, ensuring low latency, high data rate, and reliability to support XR services poses significant challenges. This letter presents a novel AI-assisted service provisioning scheme that leverages predicted frames for processing rather than relying solely on actual f…
▽ More
Extended Reality (XR) is one of the most important 5G/6G media applications that will fundamentally transform human interactions. However, ensuring low latency, high data rate, and reliability to support XR services poses significant challenges. This letter presents a novel AI-assisted service provisioning scheme that leverages predicted frames for processing rather than relying solely on actual frames. This method virtually increases the network delay budget and consequently improves service provisioning, albeit at the expense of minor prediction errors. The proposed scheme is validated by extensive simulations demonstrating a multi-fold increase in supported XR users and also provides crucial network design insights.
△ Less
Submitted 18 July, 2023;
originally announced July 2023.
-
Efficient Strongly Polynomial Algorithms for Quantile Regression
Authors:
Suraj Shetiya,
Shohedul Hasan,
Abolfazl Asudeh,
Gautam Das
Abstract:
Linear Regression is a seminal technique in statistics and machine learning, where the objective is to build linear predictive models between a response (i.e., dependent) variable and one or more predictor (i.e., independent) variables. In this paper, we revisit the classical technique of Quantile Regression (QR), which is statistically a more robust alternative to the other classical technique of…
▽ More
Linear Regression is a seminal technique in statistics and machine learning, where the objective is to build linear predictive models between a response (i.e., dependent) variable and one or more predictor (i.e., independent) variables. In this paper, we revisit the classical technique of Quantile Regression (QR), which is statistically a more robust alternative to the other classical technique of Ordinary Least Square Regression (OLS). However, while there exist efficient algorithms for OLS, almost all of the known results for QR are only weakly polynomial. Towards filling this gap, this paper proposes several efficient strongly polynomial algorithms for QR for various settings. For two dimensional QR, making a connection to the geometric concept of $k$-set, we propose an algorithm with a deterministic worst-case time complexity of $\mathcal{O}(n^{4/3} polylog(n))$ and an expected time complexity of $\mathcal{O}(n^{4/3})$ for the randomized version. We also propose a randomized divide-and-conquer algorithm -- RandomizedQR with an expected time complexity of $\mathcal{O}(n\log^2{(n)})$ for two dimensional QR problem. For the general case with more than two dimensions, our RandomizedQR algorithm has an expected time complexity of $\mathcal{O}(n^{d-1}\log^2{(n)})$.
△ Less
Submitted 13 July, 2023;
originally announced July 2023.
-
MABNet: Master Assistant Buddy Network with Hybrid Learning for Image Retrieval
Authors:
Rohit Agarwal,
Gyanendra Das,
Saksham Aggarwal,
Alexander Horsch,
Dilip K. Prasad
Abstract:
Image retrieval has garnered growing interest in recent times. The current approaches are either supervised or self-supervised. These methods do not exploit the benefits of hybrid learning using both supervision and self-supervision. We present a novel Master Assistant Buddy Network (MABNet) for image retrieval which incorporates both learning mechanisms. MABNet consists of master and assistant bl…
▽ More
Image retrieval has garnered growing interest in recent times. The current approaches are either supervised or self-supervised. These methods do not exploit the benefits of hybrid learning using both supervision and self-supervision. We present a novel Master Assistant Buddy Network (MABNet) for image retrieval which incorporates both learning mechanisms. MABNet consists of master and assistant blocks, both learning independently through supervision and collectively via self-supervision. The master guides the assistant by providing its knowledge base as a reference for self-supervision and the assistant reports its knowledge back to the master by weight transfer. We perform extensive experiments on public datasets with and without post-processing.
△ Less
Submitted 6 March, 2023;
originally announced March 2023.
-
Learning cooperative behaviours in adversarial multi-agent systems
Authors:
Ni Wang,
Gautham P. Das,
Alan G. Millard
Abstract:
This work extends an existing virtual multi-agent platform called RoboSumo to create TripleSumo -- a platform for investigating multi-agent cooperative behaviors in continuous action spaces, with physical contact in an adversarial environment. In this paper we investigate a scenario in which two agents, namely `Bug' and `Ant', must team up and push another agent `Spider' out of the arena. To tackl…
▽ More
This work extends an existing virtual multi-agent platform called RoboSumo to create TripleSumo -- a platform for investigating multi-agent cooperative behaviors in continuous action spaces, with physical contact in an adversarial environment. In this paper we investigate a scenario in which two agents, namely `Bug' and `Ant', must team up and push another agent `Spider' out of the arena. To tackle this goal, the newly added agent `Bug' is trained during an ongoing match between `Ant' and `Spider'. `Bug' must develop awareness of the other agents' actions, infer the strategy of both sides, and eventually learn an action policy to cooperate. The reinforcement learning algorithm Deep Deterministic Policy Gradient (DDPG) is implemented with a hybrid reward structure combining dense and sparse rewards. The cooperative behavior is quantitatively evaluated by the mean probability of winning the match and mean number of steps needed to win.
△ Less
Submitted 10 February, 2023;
originally announced February 2023.
-
MAViC: Multimodal Active Learning for Video Captioning
Authors:
Gyanendra Das,
Xavier Thomas,
Anant Raj,
Vikram Gupta
Abstract:
A large number of annotated video-caption pairs are required for training video captioning models, resulting in high annotation costs. Active learning can be instrumental in reducing these annotation requirements. However, active learning for video captioning is challenging because multiple semantically similar captions are valid for a video, resulting in high entropy outputs even for less-informa…
▽ More
A large number of annotated video-caption pairs are required for training video captioning models, resulting in high annotation costs. Active learning can be instrumental in reducing these annotation requirements. However, active learning for video captioning is challenging because multiple semantically similar captions are valid for a video, resulting in high entropy outputs even for less-informative samples. Moreover, video captioning algorithms are multimodal in nature with a visual encoder and language decoder. Further, the sequential and combinatorial nature of the output makes the problem even more challenging. In this paper, we introduce MAViC which leverages our proposed Multimodal Semantics Aware Sequential Entropy (M-SASE) based acquisition function to address the challenges of active learning approaches for video captioning. Our approach integrates semantic similarity and uncertainty of both visual and language dimensions in the acquisition function. Our detailed experiments empirically demonstrate the efficacy of M-SASE for active learning for video captioning and improve on the baselines by a large margin.
△ Less
Submitted 11 December, 2022;
originally announced December 2022.
-
GPTs at Factify 2022: Prompt Aided Fact-Verification
Authors:
Pawan Kumar Sahu,
Saksham Aggarwal,
Taneesh Gupta,
Gyanendra Das
Abstract:
One of the most pressing societal issues is the fight against false news. The false claims, as difficult as they are to expose, create a lot of damage. To tackle the problem, fact verification becomes crucial and thus has been a topic of interest among diverse research communities. Using only the textual form of data we propose our solution to the problem and achieve competitive results with other…
▽ More
One of the most pressing societal issues is the fight against false news. The false claims, as difficult as they are to expose, create a lot of damage. To tackle the problem, fact verification becomes crucial and thus has been a topic of interest among diverse research communities. Using only the textual form of data we propose our solution to the problem and achieve competitive results with other approaches. We present our solution based on two approaches - PLM (pre-trained language model) based method and Prompt based method. The PLM-based approach uses the traditional supervised learning, where the model is trained to take 'x' as input and output prediction 'y' as P(y|x). Whereas, Prompt-based learning reflects the idea to design input to fit the model such that the original objective may be re-framed as a problem of (masked) language modeling. We may further stimulate the rich knowledge provided by PLMs to better serve downstream tasks by employing extra prompts to fine-tune PLMs. Our experiments showed that the proposed method performs better than just fine-tuning PLMs. We achieved an F1 score of 0.6946 on the FACTIFY dataset and a 7th position on the competition leader-board.
△ Less
Submitted 29 June, 2022;
originally announced June 2022.
-
Skyrmion-Magnetic Tunnel Junction Synapse with Mixed Synaptic Plasticity for Neuromorphic Computing
Authors:
Aijaz H. Lone,
Arnab Ganguly,
Selma Amara,
Gobind Das,
H. Fariborzi
Abstract:
Magnetic skyrmion-based data storage and unconventional computing devices have gained increasing attention due to their topological protection, small size, and low driving current. However, skyrmion creation, deletion, and motion are still being studied. In this study, we propose a skyrmion-based neuromorphic magnetic tunnel junction (MTJ) device with both long- and short-term plasticity (LTP and…
▽ More
Magnetic skyrmion-based data storage and unconventional computing devices have gained increasing attention due to their topological protection, small size, and low driving current. However, skyrmion creation, deletion, and motion are still being studied. In this study, we propose a skyrmion-based neuromorphic magnetic tunnel junction (MTJ) device with both long- and short-term plasticity (LTP and STP) (mixed synaptic plasticity). We showed that plasticity could be controlled by magnetic field, spin-orbit torque (SOT), and the voltage-controlled magnetic anisotropy (VCMA) switching mechanism. LTP depends on the skyrmion density and is manipulated by the SOT and magnetic field while STP is controlled by the VCMA. The LTP property of the device was utilized for static image recognition. By incorporating the STP feature, the device gained additional temporal filtering ability and could adapt to a dynamic environment. The skyrmions were conserved and confined to a nanotrack to minimize the skyrmion nucleation energy. The synapse device was trained and tested for emulating a deep neural network. We observed that when the skyrmion density was increased, the inference accuracy improved: 90% accuracy was achieved by the system at the highest density. We further demonstrated the dynamic environment learning and inference capabilities of the proposed device.
△ Less
Submitted 30 May, 2022;
originally announced May 2022.
-
CCOMPASSION: A Hybrid Cloudlet Placement Framework over Passive Optical Access Networks
Authors:
Sourav Mondal,
Goutam Das,
Elaine Wong
Abstract:
Cloud-based computing technology is one of the most significant technical advents of the last decade and extension of this facility towards access networks by aggregation of cloudlets is a step further. To fulfill the ravenous demand for computational resources entangled with the stringent latency requirements of computationally-heavy applications related to augmented reality, cognitive assistance…
▽ More
Cloud-based computing technology is one of the most significant technical advents of the last decade and extension of this facility towards access networks by aggregation of cloudlets is a step further. To fulfill the ravenous demand for computational resources entangled with the stringent latency requirements of computationally-heavy applications related to augmented reality, cognitive assistance and context-aware computation, installation of cloudlets near the access segment is a very promising solution because of its support for wide geographical network distribution, low latency, mobility and heterogeneity. In this paper, we propose a novel framework, Cloudlet Cost OptiMization over PASSIve Optical Network (CCOMPASSION), and formulate a nonlinear mixed-integer program to identify optimal cloudlet placement locations such that installation cost is minimized whilst meeting the capacity and latency constraints. Considering urban, suburban and rural scenarios as commonly-used network deployment models, we investigate the feasibility of the proposed model over them and provide guidance on the overall cloudlet facility installation over optical access network. We also study the percentage of incremental energy budget in the presence of cloudlets of the existing network. The final results from our proposed model can be considered as fundamental cornerstones for network planning with hybrid cloudlet network architectures.
△ Less
Submitted 25 February, 2022;
originally announced February 2022.
-
Deep Learning based Coverage and Rate Manifold Estimation in Cellular Networks
Authors:
Washim Uddin Mondal,
Praful D. Mankar,
Goutam Das,
Vaneet Aggarwal,
Satish V. Ukkusuri
Abstract:
This article proposes Convolutional Neural Network-based Auto Encoder (CNN-AE) to predict location-dependent rate and coverage probability of a network from its topology. We train the CNN utilising BS location data of India, Brazil, Germany, and the USA and compare its performance with stochastic geometry (SG) based analytical models. In comparison to the best-fitted SG-based model, CNN-AE improve…
▽ More
This article proposes Convolutional Neural Network-based Auto Encoder (CNN-AE) to predict location-dependent rate and coverage probability of a network from its topology. We train the CNN utilising BS location data of India, Brazil, Germany, and the USA and compare its performance with stochastic geometry (SG) based analytical models. In comparison to the best-fitted SG-based model, CNN-AE improves the coverage and rate prediction errors by a margin of as large as $40\%$ and $25\%$ respectively. As an application, we propose a low complexity, provably convergent algorithm that, using trained CNN-AE, can compute locations of new BSs that need to be deployed in a network in order to satisfy pre-defined spatially heterogeneous performance goals.
△ Less
Submitted 21 August, 2022; v1 submitted 13 February, 2022;
originally announced February 2022.
-
Robust QoT Assured Resource Allocation in Shared Backup Path Protection Based EONs
Authors:
Venkatesh Chebolu,
Sadananda Behera,
Goutam Das
Abstract:
Survivability is mission-critical for elastic optical networks (EONs) as they are expected to carry an enormous amount of data. In this paper, we consider the problem of designing shared backup path protection (SBPP) based EON that facilitates the minimum quality-of-transmission (QoT) assured allocation against physical layer impairments (PLIs) under any single link/shared risk link group (SRLG) f…
▽ More
Survivability is mission-critical for elastic optical networks (EONs) as they are expected to carry an enormous amount of data. In this paper, we consider the problem of designing shared backup path protection (SBPP) based EON that facilitates the minimum quality-of-transmission (QoT) assured allocation against physical layer impairments (PLIs) under any single link/shared risk link group (SRLG) failure for static and dynamic traffic scenarios. In general, the effect of PLIs on lightpath varies based on the location of failure of a link as it introduces different active working and backup paths. To address these issues in the design of SBPP EON, we formulate a mixed integer linear programming (MILP) based robust optimization framework for static traffic with the objective of minimizing overall fragmentation. In this process, we use the efficient bitloading technique for spectrum allocation for the first time in survivable EONs. In addition, we propose a novel SBPP-impairment aware (SBPP-IA) algorithm considering the limitations of MILP for larger networks. For this purpose, we introduce a novel sorting technique named most congested working-least congested backup first (MCW-LCBF) to sort the given set of static requests. Next, we employ our SBPP-IA algorithm for dynamic traffic scenario and compare it with existing algorithms in terms of different QoT parameters. We demonstrated through simulations that our study provides around 40% more QoT guaranteed requests compared to existing ones.
△ Less
Submitted 13 January, 2022;
originally announced January 2022.
-
Online Slice Reconfiguration for End-to-End QoE in 6G Applications
Authors:
Dibbendu Roy,
Aravinda S. Rao,
Tansu Alpcan,
Akilan Wick,
Goutam Das,
Marimuthu Palaniswami
Abstract:
End-to-end (E2E) quality of experience (QoE) for 6G applications depends on the synchronous allocation of networking and computing resources, also known as slicing. However, the relationship between the resources and the E2E QoE outcomes is typically stochastic and non-stationary. Existing works consider known resource demands for slicing and formulate optimization problems for slice reconfigurati…
▽ More
End-to-end (E2E) quality of experience (QoE) for 6G applications depends on the synchronous allocation of networking and computing resources, also known as slicing. However, the relationship between the resources and the E2E QoE outcomes is typically stochastic and non-stationary. Existing works consider known resource demands for slicing and formulate optimization problems for slice reconfiguration. In this work, we create and manage slices by learning the relationship between E2E QoE and resources. We develop a gradient-based online slice reconfiguration algorithm (OSRA) to reconfigure and manage slices in resource-constrained scenarios for radio access networks (RAN). We observe that our methodology meets the QoE requirements with high accuracy compared to existing approaches. It improves upon the existing approaches by approximately 98\% for bursty traffic variations. Our algorithm has fast convergence and achieves low E2E delay violations for lower priority slices.
△ Less
Submitted 13 January, 2022;
originally announced January 2022.
-
Achieving AI-enabled Robust End-to-End Quality of Experience over Radio Access Networks
Authors:
Dibbendu Roy,
Aravinda S. Rao,
Tansu Alpcan,
Goutam Das,
Marimuthu Palaniswami
Abstract:
Emerging applications such as Augmented Reality, the Internet of Vehicles and Remote Surgery require both computing and networking functions working in harmony. The End-to-end (E2E) quality of experience (QoE) for these applications depends on the synchronous allocation of networking and computing resources. However, the relationship between the resources and the E2E QoE outcomes is typically stoc…
▽ More
Emerging applications such as Augmented Reality, the Internet of Vehicles and Remote Surgery require both computing and networking functions working in harmony. The End-to-end (E2E) quality of experience (QoE) for these applications depends on the synchronous allocation of networking and computing resources. However, the relationship between the resources and the E2E QoE outcomes is typically stochastic and non-linear. In order to make efficient resource allocation decisions, it is essential to model these relationships. This article presents a novel machine-learning based approach to learn these relationships and concurrently orchestrate both resources for this purpose. The machine learning models further help make robust allocation decisions regarding stochastic variations and simplify robust optimization to a conventional constrained optimization. When resources are insufficient to accommodate all application requirements, our framework supports executing some of the applications with minimal degradation (graceful degradation) of E2E QoE. We also show how we can implement the learning and optimization methods in a distributed fashion by the Software-Defined Network (SDN) and Kubernetes technologies. Our results show that deep learning-based modelling achieves E2E QoE with approximately 99.8\% accuracy, and our robust joint-optimization technique allocates resources efficiently when compared to existing differential services alternatives.
△ Less
Submitted 13 January, 2022;
originally announced January 2022.
-
Roman Domination in Convex Bipartite Graphs
Authors:
Sasmita Rout,
Gautam K. Das
Abstract:
In the Roman domination problem, an undirected simple graph $G(V,E)$ is given. The objective of Roman domination problem is to find a function $f:V\rightarrow {\{0,1,2\}}$ such that for any vertex $v\in V$ with $f(v)=0$ must be adjacent to at least one vertex $u\in V$ with $f(u)=2$ and $\sum_{u\in V} f(u)$, called Roman domination number, is minimized. It is already proven that the Roman dominatio…
▽ More
In the Roman domination problem, an undirected simple graph $G(V,E)$ is given. The objective of Roman domination problem is to find a function $f:V\rightarrow {\{0,1,2\}}$ such that for any vertex $v\in V$ with $f(v)=0$ must be adjacent to at least one vertex $u\in V$ with $f(u)=2$ and $\sum_{u\in V} f(u)$, called Roman domination number, is minimized. It is already proven that the Roman domination problem (RDP) is NP-complete for general graphs and it remains NP-complete for bipartite graphs. In this paper, we propose a dynamic programming based polynomial time algorithm for RDP in convex bipartite graph.
△ Less
Submitted 17 November, 2021;
originally announced November 2021.
-
Viewing citation trend of Indian physics and astronomy research papers since 2005 through the lens of some new indicators
Authors:
Gopinath Das,
Bidyarthi Dutta,
Anup Kumar Das
Abstract:
The indicator Citation Swing Factor (CSF) has recently been developed to measure this diffusion process quantitatively on the basis of h-core citations, excess citations and total citations. The observed or experimental value of CSF as followed from the basic definition is (dθ/dε), which resulted (-R3/he2) based on a theoretical calculation, where R2, h2 and e2 indicate total citations, h-core cit…
▽ More
The indicator Citation Swing Factor (CSF) has recently been developed to measure this diffusion process quantitatively on the basis of h-core citations, excess citations and total citations. The observed or experimental value of CSF as followed from the basic definition is (dθ/dε), which resulted (-R3/he2) based on a theoretical calculation, where R2, h2 and e2 indicate total citations, h-core citations and excess citations respectively. The later expression indicates the expected or theoretical value of CSF. This paper found out (dθ/dε) for Indian physics research output appeared in selective Indian journals since 2005 to 2020 and compared it with the respective theoretical values. The average error over entire time span is found 2.26% indicating close proximity between theoretically expected and practically observed values. Besides, three other scientometric indicators are introduced here, viz. Time-Normalised Total Cited Ratio (TC), Time-Normalised Cited Uncited Ratio (CU) and Time-Normalised Total Uncited Ratio (TU). The numerical values of these indicators are found out for the same sample and the temporal variations along with their mutual interrelationships are determined by regression analysis.
△ Less
Submitted 11 September, 2021;
originally announced September 2021.
-
Achieving QoS for Real-Time Bursty Applications over Passive Optical Networks
Authors:
Dibbendu Roy,
Aravinda S. Rao,
Tansu Alpcan,
Goutam Das,
Marimuthu Palaniswami
Abstract:
Emerging real-time applications such as those classified under ultra-reliable low latency (uRLLC) generate bursty traffic and have strict Quality of Service (QoS) requirements. Passive Optical Network (PON) is a popular access network technology, which is envisioned to handle such applications at the access segment of the network. However, the existing standards cannot handle strict QoS constraint…
▽ More
Emerging real-time applications such as those classified under ultra-reliable low latency (uRLLC) generate bursty traffic and have strict Quality of Service (QoS) requirements. Passive Optical Network (PON) is a popular access network technology, which is envisioned to handle such applications at the access segment of the network. However, the existing standards cannot handle strict QoS constraints. The available solutions rely on instantaneous heuristic decisions and maintain QoS constraints (mostly bandwidth) in an average sense. Existing works with optimal strategies are computationally complex and are not suitable for uRLLC applications. This paper presents a novel computationally-efficient, far-sighted bandwidth allocation policy design for facilitating bursty traffic in a PON framework while satisfying strict QoS (age of information/delay and bandwidth) requirements of modern applications. To this purpose, first we design a delay-tracking mechanism which allows us to model the resource allocation problem from a control-theoretic viewpoint as a Model Predictive Control (MPC). MPC helps in taking far-sighted decisions regarding resource allocations and captures the time-varying dynamics of the network. We provide computationally efficient polynomial-time solutions and show its implementation in the PON framework. Compared to existing approaches, MPC reduces delay violations by approximately 15% for a delay-constrained application of 1ms target. Our approach is also robust to varying traffic arrivals.
△ Less
Submitted 5 September, 2021;
originally announced September 2021.
-
Adaptive Rate NOMA for Cellular IoT Networks
Authors:
G. Sreya,
S. Saigadha,
Praful D. Mankar,
Goutam Das,
Harpreet S. Dhillon
Abstract:
Internet-of-Things (IoT) technology is envisioned to enable a variety of real-time applications by interconnecting billions of sensors/devices deployed to observe some random physical processes. These IoT devices rely on low-power wide-area wireless connectivity for transmitting, mostly fixed- but small-size, status updates of their associated random processes. The cellular networks are seen as a…
▽ More
Internet-of-Things (IoT) technology is envisioned to enable a variety of real-time applications by interconnecting billions of sensors/devices deployed to observe some random physical processes. These IoT devices rely on low-power wide-area wireless connectivity for transmitting, mostly fixed- but small-size, status updates of their associated random processes. The cellular networks are seen as a natural candidate for providing reliable wireless connectivity to IoT devices. However, the conventional orthogonal multiple access (OMA) to these massive number of devices is expected to degrade the spectral efficiency. As a promising alternative to OMA, the cellular base stations (BSs) can employ non-orthogonal multiple access (NOMA) for the uplink transmissions of mobile users and IoT devices. In particular, the uplink NOMA can be configured such that the mobile user can adapt transmission rate based on its channel condition while the IoT device transmits at a fixed rate. For this setting, we analyze the ergodic capacity of mobile users and the mean local delay of IoT devices using stochastic geometry. Our analysis demonstrates that the above NOMA configuration can provide better ergodic capacity for mobile users compare to OMA when IoT devices' delay constraint is strict. Furthermore, we also show that NOMA can support a larger packet size for IoT devices than OMA under the same delay constraint.
△ Less
Submitted 3 December, 2021; v1 submitted 18 August, 2021;
originally announced August 2021.
-
Approximation Algorithms For The Dispersion Problems in a Metric Space
Authors:
Pawan K. Mishra,
Gautam K. Das
Abstract:
In this article, we consider the $c$-dispersion problem in a metric space $(X,d)$. Let $P=\{p_{1}, p_{2}, \ldots, p_{n}\}$ be a set of $n$ points in a metric space $(X,d)$. For each point $p \in P$ and $S \subseteq P$, we define $cost_{c}(p,S)$ as the sum of distances from $p$ to the nearest $c $ points in $S \setminus \{p\}$, where $c\geq 1$ is a fixed integer. We define…
▽ More
In this article, we consider the $c$-dispersion problem in a metric space $(X,d)$. Let $P=\{p_{1}, p_{2}, \ldots, p_{n}\}$ be a set of $n$ points in a metric space $(X,d)$. For each point $p \in P$ and $S \subseteq P$, we define $cost_{c}(p,S)$ as the sum of distances from $p$ to the nearest $c $ points in $S \setminus \{p\}$, where $c\geq 1$ is a fixed integer. We define $cost_{c}(S)=\min_{p \in S}\{cost_{c}(p,S)\}$ for $S \subseteq P$. In the $c$-dispersion problem, a set $P$ of $n$ points in a metric space $(X,d)$ and a positive integer $k \in [c+1,n]$ are given. The objective is to find a subset $S\subseteq P$ of size $k$ such that $cost_{c}(S)$ is maximized. We propose a simple polynomial time greedy algorithm that produces a $2c$-factor approximation result for the $c$-dispersion problem in a metric space. The best known result for the $c$-dispersion problem in the Euclidean metric space $(X,d)$ is $2c^2$, where $P \subseteq \mathbb{R}^2$ and the distance function is Euclidean distance [ Amano, K. and Nakano, S. I., Away from Rivals, CCCG, pp.68-71, 2018 ]. We also prove that the $c$-dispersion problem in a metric space is $W[1]$-hard.
△ Less
Submitted 9 June, 2021; v1 submitted 19 May, 2021;
originally announced May 2021.
-
Approximation Algorithms For The Euclidean Dispersion Problems
Authors:
Pawan K. Mishra,
Gautam K. Das
Abstract:
In this article, we consider the Euclidean dispersion problems. Let $P=\{p_{1}, p_{2}, \ldots, p_{n}\}$ be a set of $n$ points in $\mathbb{R}^2$. For each point $p \in P$ and $S \subseteq P$, we define $cost_γ(p,S)$ as the sum of Euclidean distance from $p$ to the nearest $γ$ point in $S \setminus \{p\}$. We define $cost_γ(S)=\min_{p \in S}\{cost_γ(p,S)\}$ for $S \subseteq P$. In the $γ$-dispersio…
▽ More
In this article, we consider the Euclidean dispersion problems. Let $P=\{p_{1}, p_{2}, \ldots, p_{n}\}$ be a set of $n$ points in $\mathbb{R}^2$. For each point $p \in P$ and $S \subseteq P$, we define $cost_γ(p,S)$ as the sum of Euclidean distance from $p$ to the nearest $γ$ point in $S \setminus \{p\}$. We define $cost_γ(S)=\min_{p \in S}\{cost_γ(p,S)\}$ for $S \subseteq P$. In the $γ$-dispersion problem, a set $P$ of $n$ points in $\mathbb{R}^2$ and a positive integer $k \in [γ+1,n]$ are given. The objective is to find a subset $S\subseteq P$ of size $k$ such that $cost_γ(S)$ is maximized. We consider both $2$-dispersion and $1$-dispersion problem in $\mathbb{R}^2$. Along with these, we also consider $2$-dispersion problem when points are placed on a line. In this paper, we propose a simple polynomial time $(2\sqrt 3 + ε)$-factor approximation algorithm for the $2$-dispersion problem, for any $ε> 0$, which is an improvement over the best known approximation factor $4\sqrt3$ [Amano, K. and Nakano, S. I., An approximation algorithm for the $2$-dispersion problem, IEICE Transactions on Information and Systems, Vol. 103(3), pp. 506-508, 2020]. Next, we develop a common framework for designing an approximation algorithm for the Euclidean dispersion problem. With this common framework, we improve the approximation factor to $2\sqrt 3$ for the $2$-dispersion problem in $\mathbb{R}^2$. Using the same framework, we propose a polynomial time algorithm, which returns an optimal solution for the $2$-dispersion problem when points are placed on a line. Moreover, to show the effectiveness of the framework, we also propose a $2$-factor approximation algorithm for the $1$-dispersion problem in $\mathbb{R}^2$.
△ Less
Submitted 19 May, 2021;
originally announced May 2021.
-
Learning Aided Auctioning based Spectrum Access System in a Wireless Optical Network
Authors:
Atri Mukhopadhyay,
Goutam Das
Abstract:
This paper focusses on Service Level Agreement (SLA) based end-to-end Quality of Service (QoS) maintenance across a wireless optical integrated network. We use long term evolution (LTE) based spectrum access system (SAS) in the wireless network and the optical network is comprised of an Ethernet Passive Optical Network (EPON). The proposal targets a learning-based intelligent SAS where opportunist…
▽ More
This paper focusses on Service Level Agreement (SLA) based end-to-end Quality of Service (QoS) maintenance across a wireless optical integrated network. We use long term evolution (LTE) based spectrum access system (SAS) in the wireless network and the optical network is comprised of an Ethernet Passive Optical Network (EPON). The proposal targets a learning-based intelligent SAS where opportunistic allocation of any available bandwidth is done after meeting the SLA requirements. Such an opportunistic allocation is particularly beneficial for nomadic users with varying QoS requirements. The opportunistic allocation is carried out with the help of Vickrey-Clarke-Groves (VCG) auction. The proposal allows the users of the integrated network to decide the payment they want to make in order to opportunistically avail bandwidth. Learning automata is used for the users to intelligently converge to the optimal payment value based on the network load. The payment made by the users is later used by the optical network units of the EPON to prepare the bids for the auction. The proposal has been verified through extensive simulations.
△ Less
Submitted 30 November, 2021; v1 submitted 25 April, 2021;
originally announced April 2021.
-
Queuing Analysis of Opportunistic Cognitive Radio IoT Network with Imperfect Sensing
Authors:
Asif Ahmed Sardar,
Dibbendu Roy,
Washim Uddin Mondal,
Goutam Das
Abstract:
In this paper, we analyze a Cognitive Radio-based Internet-of-Things (CR-IoT) network comprising a Primary Network Provider (PNP) and an IoT operator. The PNP uses its licensed spectrum to serve its users. The IoT operator identifies the white-space in the licensed band at regular intervals and opportunistically exploits them to serve the IoT nodes under its coverage. IoT nodes are battery-operate…
▽ More
In this paper, we analyze a Cognitive Radio-based Internet-of-Things (CR-IoT) network comprising a Primary Network Provider (PNP) and an IoT operator. The PNP uses its licensed spectrum to serve its users. The IoT operator identifies the white-space in the licensed band at regular intervals and opportunistically exploits them to serve the IoT nodes under its coverage. IoT nodes are battery-operated devices that require periodical energy replenishment. We employ the Microwave Power Transfer (MPT) technique for its superior energy transfer efficiency over long-distance. The white-space detection process is not always perfect and the IoT operator may jeopardize the PNP's transmissions due to misdetection. To reduce the possibility of such interferences, some of the spectrum holes must remain unutilized, even when the IoT nodes have data to transmit. The IoT operator needs to decide what percentage of the white-space to keep unutilized and how to judiciously use the rest for data transmission and energy-replenishment to maintain an optimal balance between the average interference inflicted on PNP's users and the Quality-of-Service (QoS) experienced by IoT nodes. Due to the periodic nature of the spectrum-sensing process, Discrete Time Markov Chain (DTMC) method can realistically model this framework. In literature, activities of the PNP and IoT operator are assumed to be mutually exclusive, for ease of analysis. Our model incorporates possible overlaps between these activities, making the analysis more realistic. Using our model, the sustainability region of the CR-IoT network can be obtained. The accuracy of our analysis is demonstrated via extensive simulation.
△ Less
Submitted 16 March, 2021;
originally announced March 2021.
-
Total Domination in Unit Disk Graphs
Authors:
Sangram K. Jena,
Gautam K. Das
Abstract:
Let $G=(V,E)$ be an undirected graph. We call $D_t \subseteq V$ as a total dominating set (TDS) of $G$ if each vertex $v \in V$ has a dominator in $D$ other than itself. Here we consider the TDS problem in unit disk graphs, where the objective is to find a minimum cardinality total dominating set for an input graph. We prove that the TDS problem is NP-hard in unit disk graphs. Next, we propose an…
▽ More
Let $G=(V,E)$ be an undirected graph. We call $D_t \subseteq V$ as a total dominating set (TDS) of $G$ if each vertex $v \in V$ has a dominator in $D$ other than itself. Here we consider the TDS problem in unit disk graphs, where the objective is to find a minimum cardinality total dominating set for an input graph. We prove that the TDS problem is NP-hard in unit disk graphs. Next, we propose an 8-factor approximation algorithm for the problem. The running time of the proposed approximation algorithm is $O(n \log k)$, where $n$ is the number of vertices of the input graph and $k$ is output size. We also show that TDS problem admits a PTAS in unit disk graphs.
△ Less
Submitted 23 July, 2020;
originally announced July 2020.
-
On Exact Distribution of Poisson-Voronoi Area in $K$-tier HetNets with Generalized Association Rule
Authors:
Washim Uddin Mondal,
Goutam Das
Abstract:
This letter characterizes the exact distribution function of a typical Voronoi area in a $K$-tier Poisson network. The users obey a generalized association (GA) rule, which is a superset of nearest base station association and maximum received power based association (with arbitrary fading) rules that are commonly adopted in the literature. Combining the Robbins' theorem and the probability genera…
▽ More
This letter characterizes the exact distribution function of a typical Voronoi area in a $K$-tier Poisson network. The users obey a generalized association (GA) rule, which is a superset of nearest base station association and maximum received power based association (with arbitrary fading) rules that are commonly adopted in the literature. Combining the Robbins' theorem and the probability generating functional of a Poisson point process, we obtain the exact moments of a typical $k$-th tier Voronoi area, $k \in \{1,...,K\}$ under the GA rule. We apply this result in several special cases. For example, we prove that in multi-tier networks with the GA rule, the mean of $k$-th tier Voronoi area can exactly be expressed in a closed-form. We also obtain simplified expressions of its higher-order moments for both average and instantaneous received power based user association. In single-tier networks with exponential fading, the later association rule provides closed-form expression of the second-order moment of a typical Voronoi area. We numerically evaluate this exact expression and compare it with an approximated result.
△ Less
Submitted 1 July, 2020;
originally announced July 2020.
-
The Generalized Independent and Dominating Set Problems on Unit Disk Graphs
Authors:
Sangram K. Jena,
Ramesh K. Jallu,
Gautam K. Das,
Subhas C. Nandy
Abstract:
In this article, we study a generalized version of the maximum independent set and minimum dominating set problems, namely, the maximum $d$-distance independent set problem and the minimum $d$-distance dominating set problem on unit disk graphs for a positive integer $d>0$. We first show that the maximum $d$-distance independent set problem and the minimum $d$-distance dominating set problem belon…
▽ More
In this article, we study a generalized version of the maximum independent set and minimum dominating set problems, namely, the maximum $d$-distance independent set problem and the minimum $d$-distance dominating set problem on unit disk graphs for a positive integer $d>0$. We first show that the maximum $d$-distance independent set problem and the minimum $d$-distance dominating set problem belongs to NP-hard class. Next, we propose a simple polynomial-time constant-factor approximation algorithms and PTAS for both the problems.
△ Less
Submitted 27 June, 2020;
originally announced June 2020.
-
Centralized and Decentralized Non-Cooperative Load-Balancing Games among Federated Cloudlets
Authors:
Sourav Mondal,
Goutam Das,
Elaine Wong
Abstract:
Edge computing servers like cloudlets from different service providers compensate scarce computational, memory, and energy resources of mobile devices, are distributed across access networks. However, depending on the mobility pattern and dynamically varying computational requirements of associated mobile devices, cloudlets at different parts of the network become either overloaded or under-loaded…
▽ More
Edge computing servers like cloudlets from different service providers compensate scarce computational, memory, and energy resources of mobile devices, are distributed across access networks. However, depending on the mobility pattern and dynamically varying computational requirements of associated mobile devices, cloudlets at different parts of the network become either overloaded or under-loaded. Hence, load balancing among neighboring cloudlets appears to be an essential research problem. Nonetheless, the existing load balancing frameworks are unsuitable for low-latency applications. Thus, in this paper, we propose an economic and non-cooperative load balancing game for low-latency applications among federated neighboring cloudlets from the same as well as different service providers and heterogeneous classes of job requests. Firstly, we propose a centralized incentive mechanism to compute the pure strategy Nash equilibrium load balancing strategies of the cloudlets under the supervision of a neutral mediator. With this mechanism, we ensure that the truthful revelation of private information to the mediator is a weakly-dominant strategy for all the federated cloudlets. Secondly, we propose a continuous-action reinforcement learning automata-based algorithm, which allows each cloudlet to independently compute the Nash equilibrium in a completely distributed network setting. We critically study the convergence properties of the designed learning algorithm, scaffolding our understanding of the underlying load balancing game for faster convergence. Furthermore, through extensive simulations, we study the impacts of exploration and exploitation on learning accuracy. This is the first study to show the effectiveness of reinforcement learning algorithms for load balancing games among neighboring cloudlets.
△ Less
Submitted 5 May, 2021; v1 submitted 30 May, 2020;
originally announced June 2020.
-
Liar's Domination in Unit Disk Graphs
Authors:
Ramesh K. Jallu,
Sangram K. Jena,
Gautam K. Das
Abstract:
In this article, we study a variant of the minimum dominating set problem known as the minimum liar's dominating set (MLDS) problem. We prove that the MLDS problem is NP-hard in unit disk graphs. Next, we show that the recent sub-quadratic time $\frac{11}{2}$-factor approximation algorithm \cite{bhore} for the MLDS problem is erroneous and propose a simple $O(n + m)$ time 7.31-factor approximation…
▽ More
In this article, we study a variant of the minimum dominating set problem known as the minimum liar's dominating set (MLDS) problem. We prove that the MLDS problem is NP-hard in unit disk graphs. Next, we show that the recent sub-quadratic time $\frac{11}{2}$-factor approximation algorithm \cite{bhore} for the MLDS problem is erroneous and propose a simple $O(n + m)$ time 7.31-factor approximation algorithm, where $n$ and $m$ are the number of vertices and edges in the input unit disk graph, respectively. Finally, we prove that the MLDS problem admits a polynomial-time approximation scheme.
△ Less
Submitted 28 May, 2020;
originally announced May 2020.
-
Protocol design for energy efficient OLT transmitter in TWDM-PON guaranteeing SLA of up-stream and down-stream traffic
Authors:
Sourav Dutta,
Dibbendu Roy,
Goutam Das
Abstract:
Environmental and economic concerns promote research on designing energy-efficient Time and Wavelength Division Multiplexed Ethernet Passive Optical Network (TWDM-EPON), which is the future extension to TDM-EPON. In TDM-EPON, a plethora of research is already present to achieve energy savings at Optical Network Units (ONUs) which can easily be applied for TWDM-EPON ONUs. However, TWDM-EPON provide…
▽ More
Environmental and economic concerns promote research on designing energy-efficient Time and Wavelength Division Multiplexed Ethernet Passive Optical Network (TWDM-EPON), which is the future extension to TDM-EPON. In TDM-EPON, a plethora of research is already present to achieve energy savings at Optical Network Units (ONUs) which can easily be applied for TWDM-EPON ONUs. However, TWDM-EPON provides an additional opportunity for saving energy at the Optical Line Terminal (OLT). All existing protocols have primarily been designed for saving energy at the OLT receivers. The protocols to save energy at the OLT receives depends only on the Up-Stream(US) traffic scheduling while its transmitter counterpart depends on both US and Down-Stream (DS) scheduling since the OLT transmits GATE message along with DS traffic. The US and DS scheduling have a basic difference. The MAC protocol doesn't allow scheduling of US traffic of an ONU after its REPORT arrival at multiple disjoint time slots. However, this restriction is absent for DS traffic and hence, the grant-size of an ONU can be partitioned and every part can be scheduled at different times. In this paper, we propose a method for saving energy at the OLT transmitters in TWDM-EPON while satisfying the SLAs. This includes a heuristic algorithm to partition the DS grant and schedule them. Through extensive simulations, we demonstrate that the proposed method provides a significant improvement in energy efficiency as compared to existing protocols (up to 45%).
△ Less
Submitted 24 September, 2019;
originally announced September 2019.
-
On $d$-distance $m$-tuple ($\ell, r$)-domination in graphs
Authors:
Sangram K. Jena,
Ramesh K. Jallu,
Gautam K. Das
Abstract:
In this article, we study the $d$-distance $m$-tuple ($\ell, r$)-domination problem. Given a simple undirected graph $G=(V, E)$, and positive integers $d, m, \ell$ and $r$, a subset $V' \subseteq V$ is said to be a $d$-distance $m$-tuple ($\ell, r$)-dominating set if it satisfies the following conditions: (i) each vertex $v \in V$ is $d$-distance dominated by at least $m$ vertices in $V'$, and (ii…
▽ More
In this article, we study the $d$-distance $m$-tuple ($\ell, r$)-domination problem. Given a simple undirected graph $G=(V, E)$, and positive integers $d, m, \ell$ and $r$, a subset $V' \subseteq V$ is said to be a $d$-distance $m$-tuple ($\ell, r$)-dominating set if it satisfies the following conditions: (i) each vertex $v \in V$ is $d$-distance dominated by at least $m$ vertices in $V'$, and (ii) each $r$ size subset $U$ of $V$ is $d$-distance dominated by at least $\ell$ vertices in $V'$. Here, a vertex $v$ is $d$-distance dominated by another vertex $u$ means the shortest path distance between $u$ and $v$ is at most $d$ in $G$. A set $U$ is $d$-distance dominated by a set of $\ell$ vertices means size of the union of the $d$-distance neighborhood of all vertices of $U$ in $V'$ is at least $\ell$. The objective of the $d$-distance $m$-tuple ($\ell, r$)-domination problem is to find a minimum size subset $V' \subseteq V$ satisfying the above two conditions.
We prove that the problem of deciding whether a graph $G$ has (i) a 1-distance $m$-tuple ($\ell, r$)-dominating set for each fixed value of $m, \ell$, and $r$, and (ii) a $d$-distance $m$-tuple ($\ell, 2$)-dominating set for each fixed value of $d (> 1), m$, and $\ell$ of cardinality at most $k$ (here $k$ is a positive integer) are NP-complete. We also prove that for any $\varepsilon>0$, the 1-distance $m$-tuple $(\ell, r)$-domination problem and the $d$-distance $m$-tuple $(\ell,2)$-domination problem cannot be approximated within a factor of $(\frac{1}{2}- \varepsilon)\ln |V|$ and $(\frac{1}{4}- \varepsilon)\ln |V|$, respectively, unless $P = NP$.
△ Less
Submitted 19 April, 2021; v1 submitted 26 July, 2019;
originally announced July 2019.
-
Buffer-aided Resource Allocation for a Price Based Opportunistic Cognitive Radio Network
Authors:
Nilanjan Biswas,
Goutam Das,
Priyadip Ray
Abstract:
In this paper, a resource allocation problem for an opportunistic cooperative cognitive radio network is considered, where cognitive radio nodes send their hard decisions to the fusion center. The fusion center plays dual role, i.e., takes the global decision (i.e., decision about the primary user's activity) as well as allocates transmission time durations among cognitive radio nodes. Revenue bas…
▽ More
In this paper, a resource allocation problem for an opportunistic cooperative cognitive radio network is considered, where cognitive radio nodes send their hard decisions to the fusion center. The fusion center plays dual role, i.e., takes the global decision (i.e., decision about the primary user's activity) as well as allocates transmission time durations among cognitive radio nodes. Revenue based utility functions are considered at the fusion center and cognitive radio nodes. An optimization problem is formulated to maximize the fusion center's revenue while satisfying some well defined constraints. User selection among cognitive radio nodes is performed in order to make the optimization problem feasible.
△ Less
Submitted 17 May, 2019;
originally announced May 2019.
-
Approximate Query Processing using Deep Generative Models
Authors:
Saravanan Thirumuruganathan,
Shohedul Hasan,
Nick Koudas,
Gautam Das
Abstract:
Data is generated at an unprecedented rate surpassing our ability to analyze them. The database community has pioneered many novel techniques for Approximate Query Processing (AQP) that could give approximate results in a fraction of time needed for computing exact results. In this work, we explore the usage of deep learning (DL) for answering aggregate queries specifically for interactive applica…
▽ More
Data is generated at an unprecedented rate surpassing our ability to analyze them. The database community has pioneered many novel techniques for Approximate Query Processing (AQP) that could give approximate results in a fraction of time needed for computing exact results. In this work, we explore the usage of deep learning (DL) for answering aggregate queries specifically for interactive applications such as data exploration and visualization. We use deep generative models, an unsupervised learning based approach, to learn the data distribution faithfully such that aggregate queries could be answered approximately by generating samples from the learned model. The model is often compact - few hundred KBs - so that arbitrary AQP queries could be answered on the client side without contacting the database server. Our other contributions include identifying model bias and minimizing it through a rejection sampling based approach and an algorithm to build model ensembles for AQP for improved accuracy. Our extensive experiments show that our proposed approach can provide answers with high accuracy and low latency.
△ Less
Submitted 18 November, 2019; v1 submitted 24 March, 2019;
originally announced March 2019.
-
Multi-Attribute Selectivity Estimation Using Deep Learning
Authors:
Shohedul Hasan,
Saravanan Thirumuruganathan,
Jees Augustine,
Nick Koudas,
Gautam Das
Abstract:
Selectivity estimation - the problem of estimating the result size of queries - is a fundamental problem in databases. Accurate estimation of query selectivity involving multiple correlated attributes is especially challenging. Poor cardinality estimates could result in the selection of bad plans by the query optimizer. We investigate the feasibility of using deep learning based approaches for bot…
▽ More
Selectivity estimation - the problem of estimating the result size of queries - is a fundamental problem in databases. Accurate estimation of query selectivity involving multiple correlated attributes is especially challenging. Poor cardinality estimates could result in the selection of bad plans by the query optimizer. We investigate the feasibility of using deep learning based approaches for both point and range queries and propose two complementary approaches. Our first approach considers selectivity as an unsupervised deep density estimation problem. We successfully introduce techniques from neural density estimation for this purpose. The key idea is to decompose the joint distribution into a set of tractable conditional probability distributions such that they satisfy the autoregressive property. Our second approach formulates selectivity estimation as a supervised deep learning problem that predicts the selectivity of a given query. We also introduce and address a number of practical challenges arising when adapting deep learning for relational data. These include query/data featurization, incorporating query workload information in a deep learning framework and the dynamic scenario where both data and workload queries could be updated. Our extensive experiments with a special emphasis on queries with a large number of predicates and/or small result sizes demonstrates that our proposed techniques provide fast and accurate selective estimates with minimal space overhead.
△ Less
Submitted 17 June, 2019; v1 submitted 24 March, 2019;
originally announced March 2019.
-
A 1-approximation algorithm for energy-efficient TDM-PON guaranteeing SLA of up-stream and down-stream traffic
Authors:
Sourav Dutta,
Dibbendu Roy,
Goutam Das
Abstract:
Economical and environmental concerns necessitate research on designing energy-efficient optical access network especially Ethernet Passive Optical Network (EPON) which is one of the most widely accepted and deployed last-mile access network. In this paper, our primary focus is on designing a protocol for saving energy at Optical Network Units (ONUs) while satisfying the Service Label Agreement (S…
▽ More
Economical and environmental concerns necessitate research on designing energy-efficient optical access network especially Ethernet Passive Optical Network (EPON) which is one of the most widely accepted and deployed last-mile access network. In this paper, our primary focus is on designing a protocol for saving energy at Optical Network Units (ONUs) while satisfying the Service Label Agreement (SLA). The SLA of both Up-Stream (US) and Down-Stream (DS) traffic can be satisfied only if the EPON network can react to their instantaneous load change during sleep periods of ONUs and to the best of our knowledge, there doesn't exist any such proposal. Towards this target, we propose a mechanism that allows the Optical Line Terminal (OLT) to force ONUs to wake-up from sleep mode. Here, we demonstrate that if the OLT can distribute the active ONUs (transceivers are active) fairly among cycles then it provides a significant improvement in energy-efficiency. To achieve this, we formulate an ILP for fairly distributing active ONUs among cycles while satisfying the SLA of both US and DS traffic at the same time. A polynomial time $1$-approximation algorithm is proposed for solving this ILP. The convergence and the complexity analysis of the algorithm are also performed. Extensive simulations depict that fair distribution of ONUs reduces the power consumption and average delay figure at the same time and the reduction increases with an increment of the number of ONUs and round-trip time.
△ Less
Submitted 11 February, 2019;
originally announced February 2019.
-
Design of Energy-efficient EPON: a Novel Protocol Proposal and its Performance Analysis
Authors:
Sourav Dutta,
Goutam Das
Abstract:
Economical and environmental concerns necessitate network engineers to focus on energy-efficient access network design. The optical network units (ONUs), being predominantly responsible for the energy consumption of Ethernet Passive Optical Network (EPON), motivates us towards designing a novel protocol for saving energy at ONU. The proposed protocol exploits different low power modes (LPM) and op…
▽ More
Economical and environmental concerns necessitate network engineers to focus on energy-efficient access network design. The optical network units (ONUs), being predominantly responsible for the energy consumption of Ethernet Passive Optical Network (EPON), motivates us towards designing a novel protocol for saving energy at ONU. The proposed protocol exploits different low power modes (LPM) and opts for the suitable one using traffic prediction. This scheme provides a significant improvement of energy-efficiency especially at high load (~ 40%) over existing protocols. A better understanding of the performance and a deeper insight into several design aspects can only be addressed through a detailed mathematical analysis. The proposed protocol involves traffic prediction which infringes Markovian property. However, some pragmatic assumptions along with a proper selection of observation instances and state descriptions allow us to form a Discrete Time Markov Chain (DTMC) of the proposed algorithm. Thus, the primary objective of this paper is to propose a novel scheme for achieving energy-efficiency at ONU and mathematically analyze the performance of it with the help of a DTMC. The analysis reveals that the energy-efficiency is more sensitive to the power consumption of doze mode as compared to other LPM while the effect of sleep-to-wake-up time is minor.
△ Less
Submitted 20 December, 2018;
originally announced December 2018.
-
QR2: A Third-party Query Reranking Service Over Web Databases
Authors:
Yeshwanth D. Gunasekaran,
Abolfazl Asudeh,
Sona Hasani,
Nan Zhang,
Ali Jaoua,
Gautam Das
Abstract:
The ranked retrieval model has rapidly become the de-facto way for search query processing in web databases. Despite the extensive efforts on designing better ranking mechanisms, in practice, many such databases fail to address the diverse and sometimes contradicting preferences of users. In this paper, we present QR2, a third-party service that uses nothing but the public search interface of a we…
▽ More
The ranked retrieval model has rapidly become the de-facto way for search query processing in web databases. Despite the extensive efforts on designing better ranking mechanisms, in practice, many such databases fail to address the diverse and sometimes contradicting preferences of users. In this paper, we present QR2, a third-party service that uses nothing but the public search interface of a web database and enables the on-the-fly processing of queries with any user-specified ranking functions, no matter if the ranking function is supported by the database or not.
△ Less
Submitted 13 July, 2018;
originally announced July 2018.
-
PRED18: Dataset and Further Experiments with DAVIS Event Camera in Predator-Prey Robot Chasing
Authors:
Diederik Paul Moeys,
Daniel Neil,
Federico Corradi,
Emmett Kerr,
Philip Vance,
Gautham Das,
Sonya A. Coleman,
Thomas M. McGinnity,
Dermot Kerr,
Tobi Delbruck
Abstract:
Machine vision systems using convolutional neural networks (CNNs) for robotic applications are increasingly being developed. Conventional vision CNNs are driven by camera frames at constant sample rate, thus achieving a fixed latency and power consumption tradeoff. This paper describes further work on the first experiments of a closed-loop robotic system integrating a CNN together with a Dynamic a…
▽ More
Machine vision systems using convolutional neural networks (CNNs) for robotic applications are increasingly being developed. Conventional vision CNNs are driven by camera frames at constant sample rate, thus achieving a fixed latency and power consumption tradeoff. This paper describes further work on the first experiments of a closed-loop robotic system integrating a CNN together with a Dynamic and Active Pixel Vision Sensor (DAVIS) in a predator/prey scenario. The DAVIS, mounted on the predator Summit XL robot, produces frames at a fixed 15 Hz frame-rate and Dynamic Vision Sensor (DVS) histograms containing 5k ON and OFF events at a variable frame-rate ranging from 15-500 Hz depending on the robot speeds. In contrast to conventional frame-based systems, the latency and processing cost depends on the rate of change of the image. The CNN is trained offline on the 1.25h labeled dataset to recognize the position and size of the prey robot, in the field of view of the predator. During inference, combining the ten output classes of the CNN allows extracting the analog position vector of the prey relative to the predator with a mean 8.7% error in angular estimation. The system is compatible with conventional deep learning technology, but achieves a variable latency-power tradeoff that adapts automatically to the dynamics. Finally, investigations on the robustness of the algorithm, a human performance comparison and a deconvolution analysis are also explored.
△ Less
Submitted 2 July, 2018;
originally announced July 2018.
-
A Novel Geometry-based Stochastic Double Directional Analytical Model for Millimeter Wave Outdoor NLOS Channels
Authors:
Rakesh R. T.,
Debarati Sen,
Goutam Das
Abstract:
Millimeter wave (mmWave) communications which essentially employ directional antennas find applications spanning from indoor short range wireless personal area networks to outdoor cellular networks. A thorough understanding of mmWave signal propagation through the wireless channel provides valuable insights for the design of such networks which in turn dictates the achievable performance limits. H…
▽ More
Millimeter wave (mmWave) communications which essentially employ directional antennas find applications spanning from indoor short range wireless personal area networks to outdoor cellular networks. A thorough understanding of mmWave signal propagation through the wireless channel provides valuable insights for the design of such networks which in turn dictates the achievable performance limits. High path loss, penetration loss, and negligible signal scattering are certain distinctive features of the mmWave channel which necessitates the development of new mathematical models. Importantly, the impact of directional antennas which spatially filter multi-path components needs to be embodied as an integral part of the channel model. In this paper, we model outdoor directional non-line-of-sight mmWave channels using a combination of stochastic geometry and image theory by expressing channel parameters as joint functions of transmitter-receiver separation distance, antenna half power beamwidth, and antenna beam pointing direction. By approximating the signal propagation path due to first and second order reflections from buildings, closed form analytical expressions for average number of first order reflection components, path loss, and root-mean square delay spread of channel are derived. The accuracy of the model is verified by comparing numerically obtained results with experimental data reported by various urban outdoor peer-to-peer mmWave measurements, thus demonstrating the usefulness of the proposed analytical model for performance evaluation of mmWave communication networks.
△ Less
Submitted 9 April, 2018;
originally announced April 2018.
-
RRR: Rank-Regret Representative
Authors:
Abolfazl Asudeh,
Azade Nazi,
Nan Zhang,
Gautam Das,
H. V. Jagadish
Abstract:
Selecting the best items in a dataset is a common task in data exploration. However, the concept of "best" lies in the eyes of the beholder: different users may consider different attributes more important, and hence arrive at different rankings. Nevertheless, one can remove "dominated" items and create a "representative" subset of the data set, comprising the "best items" in it. A Pareto-optimal…
▽ More
Selecting the best items in a dataset is a common task in data exploration. However, the concept of "best" lies in the eyes of the beholder: different users may consider different attributes more important, and hence arrive at different rankings. Nevertheless, one can remove "dominated" items and create a "representative" subset of the data set, comprising the "best items" in it. A Pareto-optimal representative is guaranteed to contain the best item of each possible ranking, but it can be almost as big as the full data. Representative can be found if we relax the requirement to include the best item for every possible user, and instead just limit the users' "regret". Existing work defines regret as the loss in score by limiting consideration to the representative instead of the full data set, for any chosen ranking function.
However, the score is often not a meaningful number and users may not understand its absolute value. Sometimes small ranges in score can include large fractions of the data set. In contrast, users do understand the notion of rank ordering. Therefore, alternatively, we consider the position of the items in the ranked list for defining the regret and propose the {\em rank-regret representative} as the minimal subset of the data containing at least one of the top-$k$ of any possible ranking function. This problem is NP-complete. We use the geometric interpretation of items to bound their ranks on ranges of functions and to utilize combinatorial geometry notions for develo** effective and efficient approximation algorithms for the problem. Experiments on real datasets demonstrate that we can efficiently find small subsets with small rank-regrets.
△ Less
Submitted 3 March, 2018; v1 submitted 28 February, 2018;
originally announced February 2018.
-
Designing Fair Ranking Schemes
Authors:
Abolfazl Asudeh,
H. V. Jagadish,
Julia Stoyanovich,
Gautam Das
Abstract:
Items from a database are often ranked based on a combination of multiple criteria. A user may have the flexibility to accept combinations that weigh these criteria differently, within limits. On the other hand, this choice of weights can greatly affect the fairness of the produced ranking. In this paper, we develop a system that helps users choose criterion weights that lead to greater fairness.…
▽ More
Items from a database are often ranked based on a combination of multiple criteria. A user may have the flexibility to accept combinations that weigh these criteria differently, within limits. On the other hand, this choice of weights can greatly affect the fairness of the produced ranking. In this paper, we develop a system that helps users choose criterion weights that lead to greater fairness.
We consider ranking functions that compute the score of each item as a weighted sum of (numeric) attribute values, and then sort items on their score. Each ranking function can be expressed as a vector of weights, or as a point in a multi-dimensional space. For a broad range of fairness criteria, we show how to efficiently identify regions in this space that satisfy these criteria. Using this identification method, our system is able to tell users whether their proposed ranking function satisfies the desired fairness criteria and, if it does not, to suggest the smallest modification that does. We develop user-controllable approximation that and indexing techniques that are applied during preprocessing, and support sub-second response times during the online phase. Our extensive experiments on real datasets demonstrate that our methods are able to find solutions that satisfy fairness criteria effectively and efficiently.
△ Less
Submitted 4 January, 2018; v1 submitted 27 December, 2017;
originally announced December 2017.
-
Low Complexity Fair Scheduling in LTE/LTE-A Uplink Involving Multiple Traffic Classes
Authors:
Atri Mukhopadhyay,
Goutam Das
Abstract:
The bulk of the research on Long Term Evolution/Long Term Evolution-Advanced packet scheduling is concentrated in the downlink and the uplink is comparatively less explored. In up-link, channel aware scheduling with throughput maximization has been widely studied while considering an infinitely back-logged buffer model, which makes the investigations unrealistic. Therefore, we propose an optimal u…
▽ More
The bulk of the research on Long Term Evolution/Long Term Evolution-Advanced packet scheduling is concentrated in the downlink and the uplink is comparatively less explored. In up-link, channel aware scheduling with throughput maximization has been widely studied while considering an infinitely back-logged buffer model, which makes the investigations unrealistic. Therefore, we propose an optimal uplink packet scheduling pro-cedure with realistic traffic sources. Firstly, we advocate a joint channel and buffer aware algorithm, which maximizes the actual transmitted bit-count. Thereafter, we introduce delay constraints in our algorithm to support real-time traffic. We further enhance our algorithm by incorporating the varied delay and throughput requirements demanded by mixed traffic classes. Finally, we in-troduce priority flip** to minimize bandwidth starvation of lower priority traffic in presence of higher percentage of high priority traffic. We observe that a delay constraint may render the optimization-based proposals infeasible. Therefore, to avoid infeasibility, we replace the delay constraint with delay outage minimization (DOM). DOM aims at minimizing the packet drop due to delay violation. Moreover, DOM also helps in reducing the problems to a well-known assignment problem, which can be solved by applying the Hungarian algorithm. Hence, our approach delivers an optimal allocation with low computational complexity.
△ Less
Submitted 15 May, 2020; v1 submitted 9 October, 2017;
originally announced October 2017.
-
Effect of Transmission Impairments in CO-OFDM Based Elastic Optical Network Design
Authors:
Sadananda Behera,
Jithin George,
Goutam Das
Abstract:
Coherent Optical Orthogonal Frequency Division Multiplexing (CO-OFDM) based Elastic Optical Network (EON) is one of the emerging technologies being considered for next generation high data rate optical network systems. Routing and Spectrum Allocation (RSA) is an important aspect of EON. Apart from spectral fragmentation created due to spectrum continuity and contiguity constraints of RSA, transmis…
▽ More
Coherent Optical Orthogonal Frequency Division Multiplexing (CO-OFDM) based Elastic Optical Network (EON) is one of the emerging technologies being considered for next generation high data rate optical network systems. Routing and Spectrum Allocation (RSA) is an important aspect of EON. Apart from spectral fragmentation created due to spectrum continuity and contiguity constraints of RSA, transmission impairments such as shot noise, amplified spontaneous emission (ASE) beat noise due to coherent detection, crosstalk in cross-connect (XC), nonlinear interference, and filter narrowing, limit the transmission reach of optical signals in EON. This paper focuses on the cross-layer joint optimization of delay-bandwidth product, fragmentation and link congestion for RSA in CO-OFDM EON while considering the effect of physical layer impairments. First, we formulate an optimal Integer Linear Programming (ILP) that achieves load-balancing in presence of transmission impairments and minimizes delay-bandwidth product along with fragmentation. We next propose a heuristic algorithm for large networks with two different demand ordering techniques. We show the benefits of our algorithm compared to the existing load balancing algorithm.
△ Less
Submitted 14 September, 2017;
originally announced September 2017.
-
A novel online scheduling protocol for energy-efficient TWDM-OLT design
Authors:
Sourav Dutta,
Dibbendu Roy,
Chayan Bhar,
Goutam Das
Abstract:
Design of energy-efficient access networks has emerged as an important area of research, since access networks consume $80-90\%$ of the overall Internet power consumption. TWDM-PON is envisaged to be one of the widely accepted future access technologies. TWDM-PON offers an additional opportunity to save energy at the OLT along with the existing energy-efficient ONU design. In this paper, we focus…
▽ More
Design of energy-efficient access networks has emerged as an important area of research, since access networks consume $80-90\%$ of the overall Internet power consumption. TWDM-PON is envisaged to be one of the widely accepted future access technologies. TWDM-PON offers an additional opportunity to save energy at the OLT along with the existing energy-efficient ONU design. In this paper, we focus on the energy-efficient OLT design in a TWDM-PON. While most of the conventional methods employ a minimization of the number of wavelengths, we propose a novel approach which aims at minimizing the number of voids created due to scheduling. In the process, for the first time, we present a low-complexity on-line scheduling algorithm for the upstream traffic considering delay constraints. Our extensive simulations demonstrate a significant improvement in energy efficiency of $\sim 25\%$ for high load at the OLT receivers. Furthermore, we provide an analytical upper-bound on the energy-efficiency of the OLT receivers and demonstrate that the proposed protocol achieves an energy efficiency very close to the bound with a maximum deviation $\sim 2\%$ for $64$ ONUs.
△ Less
Submitted 30 August, 2017;
originally announced August 2017.
-
On Bounds of Spectral Efficiency of Optimally Beamformed NLOS Millimeter Wave Links
Authors:
Rakesh RT,
Debarati Sen,
Goutam Das
Abstract:
Beamforming is an indispensable feature for millimeter wave (mmWave) wireless communications in order to compensate for the severe path loss incurred due to high frequency operation. In this paper, we introduce a novel framework to evaluate the spectral efficiency (SE) of non-line-of-sight(NLOS) mmWave links with optimal analog beamforming. Optimality here implies the joint selection of antenna be…
▽ More
Beamforming is an indispensable feature for millimeter wave (mmWave) wireless communications in order to compensate for the severe path loss incurred due to high frequency operation. In this paper, we introduce a novel framework to evaluate the spectral efficiency (SE) of non-line-of-sight(NLOS) mmWave links with optimal analog beamforming. Optimality here implies the joint selection of antenna beams at the transmitter and receiver which simultaneously maximize the received power. We develop a mathematical framework based on the extended Saleh-Valenzuela channel model to embody the impact of optimal analog beamforming into the performance metrics for NLOS mmWave links. Practical mmWave channels are characterized by sparsity in terms of number of multi-path components; we exploit this feature to derive upper and lower bounds on SE of beamformed directional links. Simulation results reveal that the proposed approach is fairly accurate to model beamformed links in most practical operating scenarios. We also study the impact of overhead due to antenna beam training on the throughput (TP) of a link and obtain an approximate solution for optimal antenna half power beamwidth which maximizes TP.
△ Less
Submitted 23 November, 2017; v1 submitted 14 August, 2017;
originally announced August 2017.
-
Constrained Receiver Scheduling in Flexible Time and Wavelength Division Multiplexed Optical
Authors:
Chayan Bhar,
Arnab Mitra,
Goutam Das
Abstract:
An increasing bandwidth demand has mandated a shift to the time and wavelength division multiplexing (TWDM) techniques in optical access networks (OAN). Typical TWDM scheduling schemes consider scheduling of the optical line terminal receiver only. In this paper we have identified an additional collision domain that is present in TWDM schemes that offer security, in addition to bandwidth flexibili…
▽ More
An increasing bandwidth demand has mandated a shift to the time and wavelength division multiplexing (TWDM) techniques in optical access networks (OAN). Typical TWDM scheduling schemes consider scheduling of the optical line terminal receiver only. In this paper we have identified an additional collision domain that is present in TWDM schemes that offer security, in addition to bandwidth flexibility. Scheduling of the identified collision domain is termed as group scheduling. We illustrate that consideration of receiver scheduling only (as done in typical TWDM schemes) severely affects their throughput when implemented on flexible and secure TWDM architectures. A novel media access control protocol has been proposed in this paper that considers the multiple collision domains. Through simulations, we are able to illustrate that the proposed scheme achieves a high throughput. A theoretical upper bound of throughput has also been derived to explain the simulation results. Complexity reduction of the proposed scheme has been illustrated, thereby making it an attractive proposal.
△ Less
Submitted 3 August, 2017;
originally announced August 2017.