-
Beyond the Bridge: Contention-Based Covert and Side Channel Attacks on Multi-GPU Interconnect
Authors:
Yicheng Zhang,
Ravan Nazaraliyev,
Sankha Baran Dutta,
Nael Abu-Ghazaleh,
Andres Marquez,
Kevin Barker
Abstract:
High-speed interconnects, such as NVLink, are integral to modern multi-GPU systems, acting as a vital link between CPUs and GPUs. This study highlights the vulnerability of multi-GPU systems to covert and side channel attacks due to congestion on interconnects. An adversary can infer private information about a victim's activities by monitoring NVLink congestion without needing special permissions…
▽ More
High-speed interconnects, such as NVLink, are integral to modern multi-GPU systems, acting as a vital link between CPUs and GPUs. This study highlights the vulnerability of multi-GPU systems to covert and side channel attacks due to congestion on interconnects. An adversary can infer private information about a victim's activities by monitoring NVLink congestion without needing special permissions. Leveraging this insight, we develop a covert channel attack across two GPUs with a bandwidth of 45.5 kbps and a low error rate, and introduce a side channel attack enabling attackers to fingerprint applications through the shared NVLink interconnect.
△ Less
Submitted 2 May, 2024; v1 submitted 4 April, 2024;
originally announced April 2024.
-
Rediscovering Ranganathan: A Prismatic View of His Life through the Knowledge Graph Spectrum
Authors:
B. Dutta,
S. Arzoo
Abstract:
The present study puts forward a novel biographical knowledge graph (KG) on Prof. S. R. Ranganathan, one of the pioneering figures in the Library and Information Science (LIS) domain. It has been found that most of the relevant facts about Ranganathan exist in a variety of resources (e.g., books, essays, journal articles, websites, blogs, etc.), offering information in a fragmented and piecemeal w…
▽ More
The present study puts forward a novel biographical knowledge graph (KG) on Prof. S. R. Ranganathan, one of the pioneering figures in the Library and Information Science (LIS) domain. It has been found that most of the relevant facts about Ranganathan exist in a variety of resources (e.g., books, essays, journal articles, websites, blogs, etc.), offering information in a fragmented and piecemeal way. With this dedicated KG (henceforth known as RKG), we hope to furnish a 360-degree view of his life and achievements. To the best of our knowledge, such a dedicated representation is unparalleled in its scope and coverage: using state-of-the-art technology for anyone to openly access, use/re-use, and contribute. Inspired by Ranganathan's theories and ideas, the KG was developed using a "facet-based methodology" at two levels: in the identification of the vital biographical aspects and the development of the ontological model. Finally, with this study, we call for a community-driven effort to enhance the KG and pay homage to the Father of Library Science on the hundredth anniversary of his revitalizing the LIS domain through his enduring participation.
△ Less
Submitted 29 January, 2024; v1 submitted 22 November, 2023;
originally announced January 2024.
-
Systematic Analysis of COVID-19 Ontologies
Authors:
Debanjali Bain,
Biswanath Dutta
Abstract:
This comprehensive study conducts an in-depth analysis of existing COVID-19 ontologies, scrutinizing their objectives, classifications, design methodologies, and domain focal points. The study is conducted through a dual-stage approach, commencing with a systematic review of relevant literature and followed by an ontological assessment utilizing a parametric methodology. Through this meticulous pr…
▽ More
This comprehensive study conducts an in-depth analysis of existing COVID-19 ontologies, scrutinizing their objectives, classifications, design methodologies, and domain focal points. The study is conducted through a dual-stage approach, commencing with a systematic review of relevant literature and followed by an ontological assessment utilizing a parametric methodology. Through this meticulous process, twenty-four COVID-19 Ontologies (CovOs) are selected and examined. The findings highlight the scope, intended purpose, granularity of ontology, modularity, formalism, vocabulary reuse, and extent of domain coverage. The analysis reveals varying levels of formality in ontology development, a prevalent preference for utilizing OWL as the representational language, and diverse approaches to constructing class hierarchies within the models. Noteworthy is the recurrent reuse of ontologies like OBO models (CIDO, GO, etc.) alongside CODO. The METHONTOLOGY approach emerges as a favored design methodology, often coupled with application-based or data-centric evaluation methods. Our study provides valuable insights for the scientific community and COVID-19 ontology developers, supplemented by comprehensive ontology metrics. By meticulously evaluating and documenting COVID-19 information-driven ontological models, this research offers a comparative cross-domain perspective, shedding light on knowledge representation variations. The present study significantly enhances understanding of CovOs, serving as a consolidated resource for comparative analysis and future development, while also pinpointing research gaps and domain emphases, thereby guiding the trajectory of future ontological advancements.
△ Less
Submitted 15 September, 2023;
originally announced October 2023.
-
Study of variations of citation-based parameters for selected Indian science journals
Authors:
Bidyarthi Dutta
Abstract:
The ratio of the total number of citations to the total number of cited papers was predicted as a constant by Garfield. But, later he observed the changing nature of this constant over time. Scientometricians thus preferred to call it Garfield Ratio rather than Garfield Constant. The Garfield Ratio is a very well-known citation-based parameter, which actually indicates the average citation per cit…
▽ More
The ratio of the total number of citations to the total number of cited papers was predicted as a constant by Garfield. But, later he observed the changing nature of this constant over time. Scientometricians thus preferred to call it Garfield Ratio rather than Garfield Constant. The Garfield Ratio is a very well-known citation-based parameter, which actually indicates the average citation per cited article. However, Garfield still pointed out that behind this ratio some deeper regularity may be found. In this paper, an analysis of this indicator, the Garfield Ratio is attempted for twelve distinguished Indian science journals over twelve years time span ranging from 2009 to 2020.
△ Less
Submitted 6 September, 2023;
originally announced October 2023.
-
Data-driven Knowledge Fusion for Deep Multi-instance Learning
Authors:
Yu-Xuan Zhang,
Zhengchun Zhou,
Xingxing He,
Avik Ranjan Adhikary,
Bapi Dutta
Abstract:
Multi-instance learning (MIL) is a widely-applied technique in practical applications that involve complex data structures. MIL can be broadly categorized into two types: traditional methods and those based on deep learning. These approaches have yielded significant results, especially with regards to their problem-solving strategies and experimental validation, providing valuable insights for res…
▽ More
Multi-instance learning (MIL) is a widely-applied technique in practical applications that involve complex data structures. MIL can be broadly categorized into two types: traditional methods and those based on deep learning. These approaches have yielded significant results, especially with regards to their problem-solving strategies and experimental validation, providing valuable insights for researchers in the MIL field. However, a considerable amount of knowledge is often trapped within the algorithm, leading to subsequent MIL algorithms that solely rely on the model's data fitting to predict unlabeled samples. This results in a significant loss of knowledge and impedes the development of more intelligent models. In this paper, we propose a novel data-driven knowledge fusion for deep multi-instance learning (DKMIL) algorithm. DKMIL adopts a completely different idea from existing deep MIL methods by analyzing the decision-making of key samples in the data set (referred to as the data-driven) and using the knowledge fusion module designed to extract valuable information from these samples to assist the model's training. In other words, this module serves as a new interface between data and the model, providing strong scalability and enabling the use of prior knowledge from existing algorithms to enhance the learning ability of the model. Furthermore, to adapt the downstream modules of the model to more knowledge-enriched features extracted from the data-driven knowledge fusion module, we propose a two-level attention module that gradually learns shallow- and deep-level features of the samples to achieve more effective classification. We will prove the scalability of the knowledge fusion module while also verifying the efficacy of the proposed architecture by conducting experiments on 38 data sets across 6 categories.
△ Less
Submitted 24 April, 2023;
originally announced April 2023.
-
PatchRot: A Self-Supervised Technique for Training Vision Transformers
Authors:
Sachin Chhabra,
Prabal Bijoy Dutta,
Hemanth Venkateswara,
Baoxin Li
Abstract:
Vision transformers require a huge amount of labeled data to outperform convolutional neural networks. However, labeling a huge dataset is a very expensive process. Self-supervised learning techniques alleviate this problem by learning features similar to supervised learning in an unsupervised way. In this paper, we propose a self-supervised technique PatchRot that is crafted for vision transforme…
▽ More
Vision transformers require a huge amount of labeled data to outperform convolutional neural networks. However, labeling a huge dataset is a very expensive process. Self-supervised learning techniques alleviate this problem by learning features similar to supervised learning in an unsupervised way. In this paper, we propose a self-supervised technique PatchRot that is crafted for vision transformers. PatchRot rotates images and image patches and trains the network to predict the rotation angles. The network learns to extract both global and local features from an image. Our extensive experiments on different datasets showcase PatchRot training learns rich features which outperform supervised learning and compared baseline.
△ Less
Submitted 27 October, 2022;
originally announced October 2022.
-
An Approach for Automatic Construction of an Algorithmic Knowledge Graph from Textual Resources
Authors:
Jyotima Patel,
Biswanath Dutta
Abstract:
There is enormous growth in various fields of research. This development is accompanied by new problems. To solve these problems efficiently and in an optimized manner, algorithms are created and described by researchers in the scientific literature. Scientific algorithms are vital for understanding and reusing existing work in numerous domains. However, algorithms are generally challenging to fin…
▽ More
There is enormous growth in various fields of research. This development is accompanied by new problems. To solve these problems efficiently and in an optimized manner, algorithms are created and described by researchers in the scientific literature. Scientific algorithms are vital for understanding and reusing existing work in numerous domains. However, algorithms are generally challenging to find. Also, the comparison among similar algorithms is difficult because of the disconnected documentation. Information about algorithms is mostly present in websites, code comments, and so on. There is an absence of structured metadata to portray algorithms. As a result, sometimes redundant or similar algorithms are published, and the researchers build them from scratch instead of reusing or expanding upon the already existing algorithm. In this paper, we introduce an approach for automatically develo** a knowledge graph (KG) for algorithmic problems from unstructured data. Because it captures information more clearly and extensively, an algorithm KG will give additional context and explainability to the algorithm metadata.
△ Less
Submitted 25 May, 2022; v1 submitted 13 May, 2022;
originally announced May 2022.
-
Spy in the GPU-box: Covert and Side Channel Attacks on Multi-GPU Systems
Authors:
Sankha Baran Dutta,
Hoda Naghibijouybari,
Arjun Gupta,
Nael Abu-Ghazaleh,
Andres Marquez,
Kevin Barker
Abstract:
The deep learning revolution has been enabled in large part by GPUs, and more recently accelerators, which make it possible to carry out computationally demanding training and inference in acceptable times. As the size of machine learning networks and workloads continues to increase, multi-GPU machines have emerged as an important platform offered on High Performance Computing and cloud data cente…
▽ More
The deep learning revolution has been enabled in large part by GPUs, and more recently accelerators, which make it possible to carry out computationally demanding training and inference in acceptable times. As the size of machine learning networks and workloads continues to increase, multi-GPU machines have emerged as an important platform offered on High Performance Computing and cloud data centers. As these machines are shared between multiple users, it becomes increasingly important to protect applications against potential attacks. In this paper, we explore the vulnerability of Nvidia's DGX multi-GPU machines to covert and side channel attacks. These machines consist of a number of discrete GPUs that are interconnected through a combination of custom interconnect (NVLink) and PCIe connections. We reverse engineer the cache hierarchy and show that it is possible for an attacker on one GPU to cause contention on the L2 cache of another GPU. We use this observation to first develop a covert channel attack across two GPUs, achieving the best bandwidth of 3.95 MB/s. We also develop a prime and probe attack on a remote GPU allowing an attacker to recover the cache hit and miss behavior of another workload. This basic capability can be used in any number of side channel attacks: we demonstrate a proof of concept attack that fingerprints the application running on the remote GPU, with high accuracy. Our work establishes for the first time the vulnerability of these machines to microarchitectural attacks, and we hope that it guides future research to improve their security.
△ Less
Submitted 29 March, 2022;
originally announced March 2022.
-
Models for Narrative Information: A Study
Authors:
Udaya Varadarajan,
Biswanath Dutta
Abstract:
The major objective of this work is to study and report the existing ontology-driven models for narrative information. The paper aims to analyze these models across various domains. The goal of this work is to bring the relevant literature, and ontology models under one umbrella, and perform a parametric comparative study. A systematic literature review methodology was adopted for an extensive lit…
▽ More
The major objective of this work is to study and report the existing ontology-driven models for narrative information. The paper aims to analyze these models across various domains. The goal of this work is to bring the relevant literature, and ontology models under one umbrella, and perform a parametric comparative study. A systematic literature review methodology was adopted for an extensive literature selection. A random stratified sampling technique was used to select the models from the literature. The findings explicate a comparative view of the narrative models across domains. The differences and similarities of knowledge representation across domains, in case of narrative information models based on ontology was identified. There are significantly fewer studies that reviewed the ontology-based narrative models. This work goes a step further by evaluating the ontologies using the parameters from narrative components. This paper will explore the basic concepts and top-level concepts in the models. Besides, this study provides a comprehensive study of the narrative theories in the context of ongoing research. The findings of this work demonstrate the similarities and differences among the elements of the ontology across domains. It also identifies the state of the art literature for ontology-based narrative information.
△ Less
Submitted 23 September, 2021;
originally announced October 2021.
-
Viewing citation trend of Indian physics and astronomy research papers since 2005 through the lens of some new indicators
Authors:
Gopinath Das,
Bidyarthi Dutta,
Anup Kumar Das
Abstract:
The indicator Citation Swing Factor (CSF) has recently been developed to measure this diffusion process quantitatively on the basis of h-core citations, excess citations and total citations. The observed or experimental value of CSF as followed from the basic definition is (dθ/dε), which resulted (-R3/he2) based on a theoretical calculation, where R2, h2 and e2 indicate total citations, h-core cit…
▽ More
The indicator Citation Swing Factor (CSF) has recently been developed to measure this diffusion process quantitatively on the basis of h-core citations, excess citations and total citations. The observed or experimental value of CSF as followed from the basic definition is (dθ/dε), which resulted (-R3/he2) based on a theoretical calculation, where R2, h2 and e2 indicate total citations, h-core citations and excess citations respectively. The later expression indicates the expected or theoretical value of CSF. This paper found out (dθ/dε) for Indian physics research output appeared in selective Indian journals since 2005 to 2020 and compared it with the respective theoretical values. The average error over entire time span is found 2.26% indicating close proximity between theoretically expected and practically observed values. Besides, three other scientometric indicators are introduced here, viz. Time-Normalised Total Cited Ratio (TC), Time-Normalised Cited Uncited Ratio (CU) and Time-Normalised Total Uncited Ratio (TU). The numerical values of these indicators are found out for the same sample and the temporal variations along with their mutual interrelationships are determined by regression analysis.
△ Less
Submitted 11 September, 2021;
originally announced September 2021.
-
Scrutinizing uncitedness of selective Indian physics and astronomy journals through the prism of some h-type indicators
Authors:
Amit Kumar Das,
Bidyarthi Dutta
Abstract:
There exist huge chunk of academic items receiving no citation years after years and remaining beyond the veil of ignorance of the academic audience. These are known as uncited items. Now, the question is, why a paper fails to get citation? The attribute of incapability of receiving citation may be termed as Uncitedness. This paper traces brief history of the concept of uncitedness sprouted first…
▽ More
There exist huge chunk of academic items receiving no citation years after years and remaining beyond the veil of ignorance of the academic audience. These are known as uncited items. Now, the question is, why a paper fails to get citation? The attribute of incapability of receiving citation may be termed as Uncitedness. This paper traces brief history of the concept of uncitedness sprouted first in 1964 in an article entitled Cybernetics, homeostasis and a model of disease by Gerson Jacobs. The concept of uncitedness was scientometrically first explained by Garfield in 1970. The uncitedness of twelve esteemed Indian physics and astronomy journals over a twelve years' (2009-2020) time span is analysed here. Besides Uncitedness Factor (UF), three other indicators are introduced here, viz. Citation per paper per Year (CY), h-core Density (HD) and Time-normalised h-index (TH). The journal-wise variational patterns of these four indicators, i.e. UF, CY, HD and TH and the relationships of UF with other three indicators are analysed. The calculated numerical values of these indicators are observed to formulate seven hypotheses, which are tested by F-Test method. The average annual rate of change of uncited paper is found 67% of total number of papers. The indicator CY is found temporally constant. The indicator HD is found nearly constant journal-wise over the entire time span, while the indicator TH is found nearly constant for all journals. The UF inversely varies with CY and TH for the journals and directly varies with TH over the years. Except few highly reputed Indian journals in physics and astronomy, majority other journals face the situation of uncitedness. The uncitedness of Indian journals in this field outshines the same for global journals by 12%, which indicates lack of circulation and timely reach of research communication to the relevant audience.
△ Less
Submitted 9 September, 2021;
originally announced September 2021.
-
An analytical study of content and contexts of keywords on physics
Authors:
Bidyarthi Dutta
Abstract:
This paper analysed author-assigned and title keywords into constituent words collected from 769 articles published in the journal Low Temperature Physics since the year 2006 to 2010. The total number of distinct keywords over the said time span has been found as 1155, which have been analyzed into 869 numbers of single words having total frequency of occurrence of 2287. The single words obtained…
▽ More
This paper analysed author-assigned and title keywords into constituent words collected from 769 articles published in the journal Low Temperature Physics since the year 2006 to 2010. The total number of distinct keywords over the said time span has been found as 1155, which have been analyzed into 869 numbers of single words having total frequency of occurrence of 2287. The single words obtained from keywords have been categorized in four broad classes, viz. eponymous word, form word, acronym and semantic word. A semantic word bears several contexts and thus may be considered as relevant in several other subject areas. These probable relevant subject areas have been found with the aid of two popular online reference tools. The semantic words are further categorized in twelve classes according to their contexts. Some parameters have been defined on the basis of associations among the words and formation of keywords in consequence, i.e. Word Association Density, Word Association Coefficient and Keyword Formation Density. The values of these parameters have been observed for different word categories. The statistics of word association tending keyword formation would be known from this study. The allied subject domains also become predictable from this study.
△ Less
Submitted 4 August, 2021;
originally announced August 2021.
-
Citation Swing Factor: An Indicator to Measure the Diffusion of Cited Items
Authors:
Bidyarthi Dutta
Abstract:
The h-index, introduced by Hirsch, is based on the mutual variation between the number of cited and source items. The temporally continuous nature of the citation accretion process causes a shift of cited items from the h-core zone to the adjacent citation-asymmetric zones, viz. h-excess zone, or h-tail zone. The name given to this shifting phenomenon is the Diffusion of Cited Items (DCI). In this…
▽ More
The h-index, introduced by Hirsch, is based on the mutual variation between the number of cited and source items. The temporally continuous nature of the citation accretion process causes a shift of cited items from the h-core zone to the adjacent citation-asymmetric zones, viz. h-excess zone, or h-tail zone. The name given to this shifting phenomenon is the Diffusion of Cited Items (DCI). In this paper, two new variables are introduced, i.e., the Fold of Excess citation over Total citations (FET), denoted by $ε^2$ and the Fold of h-core citation over Excess citations (FHE), denoted by $θ^2$. On the basis of $θ$ and $ε$, another indicator is introduced, i.e., the Citation Swing Factor (CSF), defined as $dθ/dε$, which indicates the differential coefficient of $θ$ with respect to $ε$. The time dependence of FET and FHE is also discussed. The possible solutions of are derived here. The functionality of CSF ($dθ/dε$) to measure the diffusion process quantitatively will be tested later on for journals, authors and institutions.
△ Less
Submitted 10 June, 2021;
originally announced June 2021.
-
AMV : Algorithm Metadata Vocabulary
Authors:
Biswanath Dutta,
Jyotima Patel
Abstract:
Metadata vocabularies are used in various domains of study. It provides an in-depth description of the resources. In this work, we develop Algorithm Metadata Vocabulary (AMV), a vocabulary for capturing and storing the metadata about the algorithms (a procedure or a set of rules that is followed step-by-step to solve a problem, especially by a computer). The snag faced by the researchers in the cu…
▽ More
Metadata vocabularies are used in various domains of study. It provides an in-depth description of the resources. In this work, we develop Algorithm Metadata Vocabulary (AMV), a vocabulary for capturing and storing the metadata about the algorithms (a procedure or a set of rules that is followed step-by-step to solve a problem, especially by a computer). The snag faced by the researchers in the current time is the failure of getting relevant results when searching for algorithms in any search engine. AMV is represented as a semantic model and produced OWL file, which can be directly used by anyone interested to create and publish algorithm metadata as a knowledge graph, or to provide metadata service through SPARQL endpoint. To design the vocabulary, we propose a well-defined methodology, which considers real issues faced by the algorithm users and the practitioners. The evaluation shows a promising result.
△ Less
Submitted 1 June, 2021;
originally announced June 2021.
-
Leaky Buddies: Cross-Component Covert Channels on Integrated CPU-GPU Systems
Authors:
Sankha Baran Dutta,
Hoda Naghibijouybari,
Nael Abu-Ghazaleh,
Andres Marquez,
Kevin Barker
Abstract:
Graphics Processing Units (GPUs) are a ubiquitous component across the range of today's computing platforms, from phones and tablets, through personal computers, to high-end server class platforms. With the increasing importance of graphics and video workloads, recent processors are shipped with GPU devices that are integrated on the same chip. Integrated GPUs share some resources with the CPU and…
▽ More
Graphics Processing Units (GPUs) are a ubiquitous component across the range of today's computing platforms, from phones and tablets, through personal computers, to high-end server class platforms. With the increasing importance of graphics and video workloads, recent processors are shipped with GPU devices that are integrated on the same chip. Integrated GPUs share some resources with the CPU and as a result, there is a potential for microarchitectural attacks from the GPU to the CPU or vice versa. We believe this type of attack, crossing the component boundary (GPU to CPU or vice versa) is novel, introducing unique challenges, but also providing the attacker with new capabilities that must be considered when we design defenses against microarchitectrual attacks in these environments. Specifically, we consider the potential for covert channel attacks that arise either from shared microarchitectural components (such as caches) or through shared contention domains (e.g., shared buses). We illustrate these two types of channels by develo** two reliable covert channel attacks. The first covert channel uses the shared LLC cache in Intel's integrated GPU architectures. The second is a contention based channel targeting the ring bus connecting the CPU and GPU to the LLC. Cross component channels introduce a number of new challenges that we had to overcome since they occur across heterogeneous components that use different computation models and are interconnected using asymmetric memory hierarchies. We also exploit GPU parallelism to increase the bandwidth of the communication, even without relying on a common clock. The LLC based channel achieves a bandwidth of 120 kbps with a low error rate of 2%, while the contention based channel delivers up to 400 kbps with a 0.8% error rate.
△ Less
Submitted 18 November, 2020;
originally announced November 2020.
-
Programming Active Cohesive Granular Matter with Mechanically Induced Phase Changes
Authors:
Shengkai Li,
Bahnisikha Dutta,
Sarah Cannon,
Joshua J. Daymude,
Ram Avinery,
Enes Aydin,
Andréa W. Richa,
Daniel I. Goldman,
Dana Randall
Abstract:
Active matter physics and swarm robotics have provided powerful tools for the study and control of ensembles driven by internal sources. At the macroscale, controlling swarms typically utilizes significant memory, processing power, and coordination unavailable at the microscale, e.g., for colloidal robots, which could be useful for fighting disease, fabricating intelligent textiles, and designing…
▽ More
Active matter physics and swarm robotics have provided powerful tools for the study and control of ensembles driven by internal sources. At the macroscale, controlling swarms typically utilizes significant memory, processing power, and coordination unavailable at the microscale, e.g., for colloidal robots, which could be useful for fighting disease, fabricating intelligent textiles, and designing nanocomputers. To develop principles that that can leverage physics of interactions and thus can be utilized across scales, we take a two-pronged approach: a theoretical abstraction of self-organizing particle systems and an experimental robot system of active cohesive granular matter that intentionally lacks digital electronic computation and communication, using minimal (or no) sensing and control, to test theoretical predictions. We consider the problems of aggregation, dispersion, and collective transport. As predicted by the theory, as a parameter representing interparticle attraction increases, the robots transition from a dispersed phase to an aggregated one, forming a dense, compact collective. When aggregated, the collective can transport non-robot "impurities" in their environment, thus performing an emergent task driven by the physics underlying the transition. These results point to a fruitful interplay between algorithm design and active matter robophysics that can result in new nonequilibrium physics and principles for programming collectives without the need for complex algorithms or capabilities.
△ Less
Submitted 2 February, 2021; v1 submitted 11 September, 2020;
originally announced September 2020.
-
CODO: An Ontology for Collection and Analysis of Covid-19 Data
Authors:
B. Dutta,
M. DeBellis
Abstract:
The COviD-19 Ontology for cases and patient information (CODO) provides a model for the collection and analysis of data about the COVID-19 pandemic. The ontology provides a standards-based open-source model that facilitates the integration of data from heterogeneous data sources. The ontology was designed by analysing disparate COVID-19 data sources such as datasets, literature, services, etc. The…
▽ More
The COviD-19 Ontology for cases and patient information (CODO) provides a model for the collection and analysis of data about the COVID-19 pandemic. The ontology provides a standards-based open-source model that facilitates the integration of data from heterogeneous data sources. The ontology was designed by analysing disparate COVID-19 data sources such as datasets, literature, services, etc. The ontology follows the best practices for vocabularies by re-using concepts from other leading vocabularies and by using the W3C standards RDF, OWL, SWRL, and SPARQL. The ontology already has one independent user and has incorporated real-world data from the government of India.
△ Less
Submitted 2 September, 2020;
originally announced September 2020.
-
A game of hide and seek in networks
Authors:
Francis Bloch,
Bhaskar Dutta,
Marcin Dziubinski
Abstract:
We propose and study a strategic model of hiding in a network, where the network designer chooses the links and his position in the network facing the seeker who inspects and disrupts the network. We characterize optimal networks for the hider, as well as equilibrium hiding and seeking strategies on these networks. We show that optimal networks are either equivalent to cycles or variants of a core…
▽ More
We propose and study a strategic model of hiding in a network, where the network designer chooses the links and his position in the network facing the seeker who inspects and disrupts the network. We characterize optimal networks for the hider, as well as equilibrium hiding and seeking strategies on these networks. We show that optimal networks are either equivalent to cycles or variants of a core-periphery networks where every node in the periphery is connected to a single node in the core.
△ Less
Submitted 9 January, 2020;
originally announced January 2020.
-
Theoretical analysis and propositions for "ontology citation"
Authors:
Biswanath Dutta
Abstract:
Ontology citation, the practice of referring the ontology in a similar fashion the scientific community routinely follows in providing the bibliographic references to other scholarly works, has not received enough attention it supposed to. Interestingly, so far none of the existing standard citation styles (e.g., APA, CMOS, and IEEE) have included ontology as a citable information source in the li…
▽ More
Ontology citation, the practice of referring the ontology in a similar fashion the scientific community routinely follows in providing the bibliographic references to other scholarly works, has not received enough attention it supposed to. Interestingly, so far none of the existing standard citation styles (e.g., APA, CMOS, and IEEE) have included ontology as a citable information source in the list of citable information sources such as journal article, book, website, etc. Also, not much work can be found in the literature on this topic though there are various issues and aspects of it that demand a thorough study. For instance, what to cite? Is it the publication that describes the ontology, or the ontology itself? The citation format, style, illustration of motivations of ontology citation, the citation principles, ontology impact factor, citation analysis, and so forth. In this work, we primarily analyse the current ontology citation practices and the related issues. We illustrate the various motivations and the basic principles of ontology citation. We also propose a template for referring the source of ontologies.
△ Less
Submitted 5 September, 2018;
originally announced September 2018.
-
A Novel Information Theoretic Framework for Finding Semantic Similarity in WordNet
Authors:
Abhijit Adhikari,
Shivang Singh,
Deepjyoti Mondal,
Biswanath Dutta,
Animesh Dutta
Abstract:
Information content (IC) based measures for finding semantic similarity is gaining preferences day by day. Semantics of concepts can be highly characterized by information theory. The conventional way for calculating IC is based on the probability of appearance of concepts in corpora. Due to data sparseness and corpora dependency issues of those conventional approaches, a new corpora independent i…
▽ More
Information content (IC) based measures for finding semantic similarity is gaining preferences day by day. Semantics of concepts can be highly characterized by information theory. The conventional way for calculating IC is based on the probability of appearance of concepts in corpora. Due to data sparseness and corpora dependency issues of those conventional approaches, a new corpora independent intrinsic IC calculation measure has evolved. In this paper, we mainly focus on such intrinsic IC model and several topological aspects of the underlying ontology. Accuracy of intrinsic IC calculation and semantic similarity measure rely on these aspects deeply. Based on these analysis we propose an information theoretic framework which comprises an intrinsic IC calculator and a semantic similarity model. Our approach is compared with state of the art semantic similarity measures based on corpora dependent IC calculation as well as intrinsic IC based methods using several benchmark data set. We also compare our model with the related Edge based, Feature based and Distributional approaches. Experimental results show that our intrinsic IC model gives high correlation value when applied to different semantic similarity models. Our proposed semantic similarity model also achieves significant results when embedded with some state of the art IC models including ours.
△ Less
Submitted 19 July, 2016;
originally announced July 2016.
-
GPU accelerated Nature Inspired Methods for Modelling Large Scale Bi-Directional Pedestrian Movement
Authors:
Sankha Baran Dutta,
Robert McLeod,
Marcia Friesen
Abstract:
Pedestrian movement, although ubiquitous and well-studied, is still not that well understood due to the complicating nature of the embedded social dynamics. Interest among researchers in simulating pedestrian movement and interactions has grown significantly in part due to increased computational and visualization capabilities afforded by high power computing. Different approaches have been adopte…
▽ More
Pedestrian movement, although ubiquitous and well-studied, is still not that well understood due to the complicating nature of the embedded social dynamics. Interest among researchers in simulating pedestrian movement and interactions has grown significantly in part due to increased computational and visualization capabilities afforded by high power computing. Different approaches have been adopted to simulate pedestrian movement under various circumstances and interactions. In the present work, bi-directional crowd movement is simulated where an equal numbers of individuals try to reach the opposite sides of an environment. Two movement methods are considered. First a Least Effort Model (LEM) is investigated where agents try to take an optimal path with as minimal changes from their intended path as possible. Following this, a modified form of Ant Colony Optimization (ACO) is proposed, where individuals are guided by a goal of reaching the other side in a least effort mode as well as a pheromone trail left by predecessors. The basic idea is to increase agent interaction, thereby more closely reflecting a real world scenario. The methodology utilizes Graphics Processing Units (GPUs) for general purpose computing using the CUDA platform. Because of the inherent parallel properties associated with pedestrian movement such as proximate interactions of individuals on a 2D grid, GPUs are well suited. The main feature of the implementation undertaken here is that the parallelism is data driven. The data driven implementation leads to a speedup up to 18x compared to its sequential counterpart running on a single threaded CPU. The numbers of pedestrians considered in the model ranged from 2K to 100K representing numbers typical of mass gathering events. A detailed discussion addresses implementation challenges faced and averted.
△ Less
Submitted 16 December, 2014;
originally announced December 2014.
-
Design Of A Reconfigurable DSP Processor With Bit Efficient Residue Number System
Authors:
Chaitali Biswas Dutta,
Partha Garai,
Amitabha Sinha
Abstract:
Residue Number System (RNS), which originates from the Chinese Remainder Theorem, offers a promising future in VLSI because of its carry-free operations in addition, subtraction and multiplication. This property of RNS is very helpful to reduce the complexity of calculation in many applications. A residue number system represents a large integer using a set of smaller integers, called residues. Bu…
▽ More
Residue Number System (RNS), which originates from the Chinese Remainder Theorem, offers a promising future in VLSI because of its carry-free operations in addition, subtraction and multiplication. This property of RNS is very helpful to reduce the complexity of calculation in many applications. A residue number system represents a large integer using a set of smaller integers, called residues. But the area overhead, cost and speed not only depend on this word length, but also the selection of moduli, which is a very crucial step for residue system. This parameter determines bit efficiency, area, frequency etc. In this paper a new moduli set selection technique is proposed to improve bit efficiency which can be used to construct a residue system for digital signal processing environment. Subsequently, it is theoretically proved and illustrated using examples, that the proposed solution gives better results than the schemes reported in the literature. The novelty of the architecture is shown by comparison the different schemes reported in the literature. Using the novel moduli set, a guideline for a Reconfigurable Processor is presented here that can process some predefined functions. As RNS minimizes the carry propagation, the scheme can be implemented in Real Time Signal Processing & other fields where high speed computations are required.
△ Less
Submitted 22 November, 2012;
originally announced November 2012.
-
Full-Rate Full-Diversity Achieving MIMO Precoding with Partial CSIT
Authors:
Biswajit Dutta,
Somsubhra Barik,
A. Chockalingam
Abstract:
In this paper, we consider a $n_t\times n_r$ multiple-input multiple-output (MIMO) channel subjected to block fading. Reliability (in terms of achieved diversity order) and rate (in number of symbols transmitted per channel use) are of interest in such channels. We propose a new precoding scheme which achieves both full diversity ($n_tn_r$th order diversity) as well as full rate ($n_t$ symbols per…
▽ More
In this paper, we consider a $n_t\times n_r$ multiple-input multiple-output (MIMO) channel subjected to block fading. Reliability (in terms of achieved diversity order) and rate (in number of symbols transmitted per channel use) are of interest in such channels. We propose a new precoding scheme which achieves both full diversity ($n_tn_r$th order diversity) as well as full rate ($n_t$ symbols per channel use) using partial channel state information at the transmitter (CSIT), applicable in MIMO systems including $n_r<n_t$ asymmetric MIMO. The proposed scheme achieves full diversity and improved coding gain through an optimization over the choice of constellation sets. The optimization maximizes $d_{min}^2$ for our precoding scheme subject to an energy constraint. The scheme requires feedback of $n_t-1$ angle parameter values, compared to $2n_tn_r$ real coefficients in case of full CSIT. Error rate performance results for $3\times 1$, $3\times 2$, $4\times 1$, $8\times 1$ precoded MIMO systems (with $n_t=3,3,4,8$ symbols per channel use, respectively) show that the proposed precoding achieves 3rd, 6th, 4th and 8th order diversities, respectively. These performances are shown to be better than other precoding schemes in the literature; the better performance is due to the choice of the signal sets and the feedback angles in the proposed scheme.
△ Less
Submitted 24 March, 2011;
originally announced March 2011.