-
Vision Mamba: Cutting-Edge Classification of Alzheimer's Disease with 3D MRI Scans
Authors:
Muthukumar K A,
Amit Gurung,
Priya Ranjan
Abstract:
Classifying 3D MRI images for early detection of Alzheimer's disease is a critical task in medical imaging. Traditional approaches using Convolutional Neural Networks (CNNs) and Transformers face significant challenges in this domain. CNNs, while effective in capturing local spatial features, struggle with long-range dependencies and often require extensive computational resources for high-resolut…
▽ More
Classifying 3D MRI images for early detection of Alzheimer's disease is a critical task in medical imaging. Traditional approaches using Convolutional Neural Networks (CNNs) and Transformers face significant challenges in this domain. CNNs, while effective in capturing local spatial features, struggle with long-range dependencies and often require extensive computational resources for high-resolution 3D data. Transformers, on the other hand, excel in capturing global context but suffer from quadratic complexity in inference time and require substantial memory, making them less efficient for large-scale 3D MRI data. To address these limitations, we propose the use of Vision Mamba, an advanced model based on State Space Models (SSMs), for the classification of 3D MRI images to detect Alzheimer's disease. Vision Mamba leverages dynamic state representations and the selective scan algorithm, allowing it to efficiently capture and retain important spatial information across 3D volumes. By dynamically adjusting state transitions based on input features, Vision Mamba can selectively retain relevant information, leading to more accurate and computationally efficient processing of 3D MRI data. Our approach combines the parallelizable nature of convolutional operations during training with the efficient, recurrent processing of states during inference. This architecture not only improves computational efficiency but also enhances the model's ability to handle long-range dependencies within 3D medical images. Experimental results demonstrate that Vision Mamba outperforms traditional CNN and Transformer models accuracy, making it a promising tool for the early detection of Alzheimer's disease using 3D MRI data.
△ Less
Submitted 9 June, 2024;
originally announced June 2024.
-
3D Guidance Law for Maximal Coverage and Target Enclosing with Inherent Safety
Authors:
Praveen Kumar Ranjan,
Abhinav Sinha,
Yongcan Cao
Abstract:
In this paper, we address the problem of enclosing an arbitrarily moving target in three dimensions by a single pursuer, which is an unmanned aerial vehicle (UAV), for maximum coverage while also ensuring the pursuer's safety by preventing collisions with the target. The proposed guidance strategy steers the pursuer to a safe region of space surrounding the target, allowing it to maintain a certai…
▽ More
In this paper, we address the problem of enclosing an arbitrarily moving target in three dimensions by a single pursuer, which is an unmanned aerial vehicle (UAV), for maximum coverage while also ensuring the pursuer's safety by preventing collisions with the target. The proposed guidance strategy steers the pursuer to a safe region of space surrounding the target, allowing it to maintain a certain distance from the latter while offering greater flexibility in positioning and converging to any orbit within this safe zone. Our approach is distinguished by the use of nonholonomic constraints to model vehicles with accelerations serving as control inputs and coupled engagement kinematics to craft the pursuer's guidance law meticulously. Furthermore, we leverage the concept of the Lyapunov Barrier Function as a powerful tool to constrain the distance between the pursuer and the target within asymmetric bounds, thereby ensuring the pursuer's safety within the predefined region. To validate the efficacy and robustness of our algorithm, we conduct experimental tests by implementing a high-fidelity quadrotor model within Software-in-the-loop (SITL) simulations, encompassing various challenging target maneuver scenarios. The results obtained showcase the resilience of the proposed guidance law, effectively handling arbitrarily maneuvering targets, vehicle/autopilot dynamics, and external disturbances. Our method consistently delivers stable global enclosing behaviors, even in response to aggressive target maneuvers, and requires only relative information for successful execution.
△ Less
Submitted 24 April, 2024;
originally announced April 2024.
-
Self-organizing Multiagent Target Enclosing under Limited Information and Safety Guarantees
Authors:
Praveen Kumar Ranjan,
Abhinav Sinha,
Yongcan Cao
Abstract:
This paper introduces an approach to address the target enclosing problem using non-holonomic multiagent systems, where agents autonomously self-organize themselves in the desired formation around a fixed target. Our approach combines global enclosing behavior and local collision avoidance mechanisms by devising a novel potential function and sliding manifold. In our approach, agents independently…
▽ More
This paper introduces an approach to address the target enclosing problem using non-holonomic multiagent systems, where agents autonomously self-organize themselves in the desired formation around a fixed target. Our approach combines global enclosing behavior and local collision avoidance mechanisms by devising a novel potential function and sliding manifold. In our approach, agents independently move toward the desired enclosing geometry when apart and activate the collision avoidance mechanism when a collision is imminent, thereby guaranteeing inter-agent safety. We rigorously show that an agent does not need to ensure safety with every other agent and put forth a concept of the nearest colliding agent (for any arbitrary agent) with whom ensuring safety is sufficient to avoid collisions in the entire swarm. The proposed control eliminates the need for a fixed or pre-established agent arrangement around the target and requires only relative information between an agent and the target. This makes our design particularly appealing for scenarios with limited global information, hence significantly reducing communication requirements. We finally present simulation results to vindicate the efficacy of the proposed method.
△ Less
Submitted 6 April, 2024;
originally announced April 2024.
-
Secure and Privacy-Preserving Automated Machine Learning Operations into End-to-End Integrated IoT-Edge-Artificial Intelligence-Blockchain Monitoring System for Diabetes Mellitus Prediction
Authors:
Alain Hennebelle,
Leila Ismail,
Huned Materwala,
Juma Al Kaabi,
Priya Ranjan,
Rajiv Janardhanan
Abstract:
Diabetes Mellitus, one of the leading causes of death worldwide, has no cure to date and can lead to severe health complications, such as retinopathy, limb amputation, cardiovascular diseases, and neuronal disease, if left untreated. Consequently, it becomes crucial to take precautionary measures to avoid/predict the occurrence of diabetes. Machine learning approaches have been proposed and evalua…
▽ More
Diabetes Mellitus, one of the leading causes of death worldwide, has no cure to date and can lead to severe health complications, such as retinopathy, limb amputation, cardiovascular diseases, and neuronal disease, if left untreated. Consequently, it becomes crucial to take precautionary measures to avoid/predict the occurrence of diabetes. Machine learning approaches have been proposed and evaluated in the literature for diabetes prediction. This paper proposes an IoT-edge-Artificial Intelligence (AI)-blockchain system for diabetes prediction based on risk factors. The proposed system is underpinned by the blockchain to obtain a cohesive view of the risk factors data from patients across different hospitals and to ensure security and privacy of the user's data. Furthermore, we provide a comparative analysis of different medical sensors, devices, and methods to measure and collect the risk factors values in the system. Numerical experiments and comparative analysis were carried out between our proposed system, using the most accurate random forest (RF) model, and the two most used state-of-the-art machine learning approaches, Logistic Regression (LR) and Support Vector Machine (SVM), using three real-life diabetes datasets. The results show that the proposed system using RF predicts diabetes with 4.57% more accuracy on average compared to LR and SVM, with 2.87 times more execution time. Data balancing without feature selection does not show significant improvement. The performance is improved by 1.14% and 0.02% after feature selection for PIMA Indian and Sylhet datasets respectively, while it reduces by 0.89% for MIMIC III.
△ Less
Submitted 17 August, 2023; v1 submitted 13 November, 2022;
originally announced November 2022.
-
Securing Federated Learning against Overwhelming Collusive Attackers
Authors:
Priyesh Ranjan,
Ashish Gupta,
Federico CorĂ²,
Sajal K. Das
Abstract:
In the era of a data-driven society with the ubiquity of Internet of Things (IoT) devices storing large amounts of data localized at different places, distributed learning has gained a lot of traction, however, assuming independent and identically distributed data (iid) across the devices. While relaxing this assumption that anyway does not hold in reality due to the heterogeneous nature of device…
▽ More
In the era of a data-driven society with the ubiquity of Internet of Things (IoT) devices storing large amounts of data localized at different places, distributed learning has gained a lot of traction, however, assuming independent and identically distributed data (iid) across the devices. While relaxing this assumption that anyway does not hold in reality due to the heterogeneous nature of devices, federated learning (FL) has emerged as a privacy-preserving solution to train a collaborative model over non-iid data distributed across a massive number of devices. However, the appearance of malicious devices (attackers), who intend to corrupt the FL model, is inevitable due to unrestricted participation. In this work, we aim to identify such attackers and mitigate their impact on the model, essentially under a setting of bidirectional label flip** attacks with collusion. We propose two graph theoretic algorithms, based on Minimum Spanning Tree and k-Densest graph, by leveraging correlations between local models. Our FL model can nullify the influence of attackers even when they are up to 70% of all the clients whereas prior works could not afford more than 50% of clients as attackers. The effectiveness of our algorithms is ascertained through experiments on two benchmark datasets, namely MNIST and Fashion-MNIST, with overwhelming attackers. We establish the superiority of our algorithms over the existing ones using accuracy, attack success rate, and early detection round.
△ Less
Submitted 28 September, 2022;
originally announced September 2022.
-
Automated Classification of Hand-grip action on Objects using Machine Learning
Authors:
Anju Mishra,
Shanu Sharma,
Sanjay Kumar,
Priya Ranjan,
Amit Ujlayan
Abstract:
Brain computer interface is the current area of research to provide assistance to disabled persons. To cope up with the growing needs of BCI applications, this paper presents an automated classification scheme for handgrip actions on objects by using Electroencephalography (EEG) data. The presented approach focuses on investigation of classifying correct and incorrect handgrip responses for object…
▽ More
Brain computer interface is the current area of research to provide assistance to disabled persons. To cope up with the growing needs of BCI applications, this paper presents an automated classification scheme for handgrip actions on objects by using Electroencephalography (EEG) data. The presented approach focuses on investigation of classifying correct and incorrect handgrip responses for objects by using EEG recorded patterns. The method starts with preprocessing of data, followed by extraction of relevant features from the epoch data in the form of discrete wavelet transform (DWT), and entropy measures. After computing feature vectors, artificial neural network classifiers used to classify the patterns into correct and incorrect handgrips on different objects. The proposed method was tested on real dataset, which contains EEG recordings from 14 persons. The results showed that the proposed approach is effective and may be useful to develop a variety of BCI based devices to control hand movements.
△ Less
Submitted 9 March, 2018;
originally announced April 2018.
-
Towards Innovative Physical Layer Design for Mobile WSN Platforms
Authors:
Malay Ranjan Tripathy,
Priya Ranjan
Abstract:
We today live in the era of dynamic and mobile wireless enabled platforms. This kind of stringent communication capability in the face of volatile and turbulent mobility demands a fresh look at physical layer in general and antenna design in particular. The dimension of the antenna is 30x35x1.6 mm^3. Multiplicity of bands is very useful for compatibility purposes where legacy robotic platforms gen…
▽ More
We today live in the era of dynamic and mobile wireless enabled platforms. This kind of stringent communication capability in the face of volatile and turbulent mobility demands a fresh look at physical layer in general and antenna design in particular. The dimension of the antenna is 30x35x1.6 mm^3. Multiplicity of bands is very useful for compatibility purposes where legacy robotic platforms generally operate in MHz range while latest robotic platforms are capable to handle GHz communication regimes and can pump data very at much greater speeds. Seven frequency bands are obtained at 700 MHz, 2.4 GHz, 3.6 GHz, 4.37 GHz, 5.8 GHz, 6.93 GHz and 7.7 GHz with bandwidth of 1.1 GHz, 0.7 GHz, 0.8 GHz, 0.23 GHz, 0.90 GHz, 0.19 GHz and 0.12 GHz respectively.
△ Less
Submitted 4 February, 2016;
originally announced February 2016.
-
EMEEDP: Enhanced Multi-hop Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network
Authors:
Sunil Kumar,
Priya Ranjan,
R. Radhakrishnan
Abstract:
In WSN (Wireless Sensor Network) every sensor node sensed the data and transmit it to the CH (Cluster head) or BS (Base Station). Sensors are randomly deployed in unreachable areas, where battery replacement or battery charge is not possible. For this reason, Energy conservation is the important design goal while develo** a routing and distributed protocol to increase the lifetime of WSN. In thi…
▽ More
In WSN (Wireless Sensor Network) every sensor node sensed the data and transmit it to the CH (Cluster head) or BS (Base Station). Sensors are randomly deployed in unreachable areas, where battery replacement or battery charge is not possible. For this reason, Energy conservation is the important design goal while develo** a routing and distributed protocol to increase the lifetime of WSN. In this paper, an enhanced energy efficient distributed protocol for heterogeneous WSN have been reported. EMEEDP is proposed for heterogeneous WSN to increase the lifetime of the network. An efficient algorithm is proposed in the form of flowchart and based on various clustering equation proved that the proposed work accomplishes longer lifetime with improved QOS parameters parallel to MEEP. A WSN implemented and tested using Raspberry Pi devices as a base station, temperature sensors as a node and xively.com as a cloud. Users use data for decision purpose or business purposes from xively.com using internet.
△ Less
Submitted 14 November, 2014; v1 submitted 12 November, 2014;
originally announced November 2014.
-
A new Bayesian ensemble of trees classifier for identifying multi-class labels in satellite images
Authors:
Reshu Agarwal,
Pritam Ranjan,
Hugh Chipman
Abstract:
Classification of satellite images is a key component of many remote sensing applications. One of the most important products of a raw satellite image is the classified map which labels the image pixels into meaningful classes. Though several parametric and non-parametric classifiers have been developed thus far, accurate labeling of the pixels still remains a challenge. In this paper, we propose…
▽ More
Classification of satellite images is a key component of many remote sensing applications. One of the most important products of a raw satellite image is the classified map which labels the image pixels into meaningful classes. Though several parametric and non-parametric classifiers have been developed thus far, accurate labeling of the pixels still remains a challenge. In this paper, we propose a new reliable multiclass-classifier for identifying class labels of a satellite image in remote sensing applications. The proposed multiclass-classifier is a generalization of a binary classifier based on the flexible ensemble of regression trees model called Bayesian Additive Regression Trees (BART). We used three small areas from the LANDSAT 5 TM image, acquired on August 15, 2009 (path/row: 08/29, L1T product, UTM map projection) over Kings County, Nova Scotia, Canada to classify the land-use. Several prediction accuracy and uncertainty measures have been used to compare the reliability of the proposed classifier with the state-of-the-art classifiers in remote sensing.
△ Less
Submitted 31 May, 2013; v1 submitted 15 April, 2013;
originally announced April 2013.
-
Nonlinear Instabilities in D2TCP-II
Authors:
Abhisek Mukhopadhyay,
Priya Ranjan
Abstract:
In the era of heavy-duty transmission control protocols (TCP), adapted for extremely hi-bandwidth datacenters, the fundamental question of stable interaction with either proposed active queue management(AQM) or popularly discussed Random Early Detection (RED) remains a hotly debated issue. While there are claims of "oscillation" only dynamical behavior, there are equally large number of claims whi…
▽ More
In the era of heavy-duty transmission control protocols (TCP), adapted for extremely hi-bandwidth datacenters, the fundamental question of stable interaction with either proposed active queue management(AQM) or popularly discussed Random Early Detection (RED) remains a hotly debated issue. While there are claims of "oscillation" only dynamical behavior, there are equally large number of claims which demonstrate the chaotic nature of different flavors of TCP and their AQM interaction. In this work, we provide a sound and analytical mathematical model of DTCP/D2TCP and study their interaction with threshold based packet marking policy. Our work shows that for a simple scenario this interaction is chaotic in nature and has large variability in dynamical behavior over orders of magnitude changes in parameter range as demonstrated by bifurcation diagrams. We conclude with numerical simulation evidence that chaotic behavior of protocols is inherent in their design which they inherit from their early vanilla TCP days, and it has serious implications for data-center throughput, load batching and collapse in Incast kind of scenario.
△ Less
Submitted 31 December, 2012;
originally announced December 2012.
-
An Application-oriented Model for Wireless Sensor Networks integrated with Telecom Infra
Authors:
Dhruv Srivastava,
Dr. Priya Ranjan
Abstract:
This paper aims to propose a significant way of remote access and real time monitoring of a particular geographic area by integrating wireless sensor clouds with existing Telecom infrastructure and applications built around them through a gateway. This utility is very potent for environment monitoring in harsh and inaccessible places like mines, nuclear reactors, etc. We demonstrate a scaled down…
▽ More
This paper aims to propose a significant way of remote access and real time monitoring of a particular geographic area by integrating wireless sensor clouds with existing Telecom infrastructure and applications built around them through a gateway. This utility is very potent for environment monitoring in harsh and inaccessible places like mines, nuclear reactors, etc. We demonstrate a scaled down version of multi-hop network of wireless sensor nodes and its integration with existing telecom network infrastructure via a gateway. The kind of results achieved like temperature monitoring etc. gives a glimpse of an enormous step ahead in mine safety.
△ Less
Submitted 8 September, 2010;
originally announced September 2010.
-
Hybrid CDN structure with a P2P based streaming protocol
Authors:
Saumay Pushp,
Priya Ranjan
Abstract:
Over the last decade, internet has seen an exponential increase in its growth.With more and more people using it, efficient data delivery over the internet has become a key issue. Peer-to-peer (P2P)/seed sharing based networks have several desirable features for content distribution, such as low costs, scalability, and fault tolerance. While the invention of each of such specialized systems has im…
▽ More
Over the last decade, internet has seen an exponential increase in its growth.With more and more people using it, efficient data delivery over the internet has become a key issue. Peer-to-peer (P2P)/seed sharing based networks have several desirable features for content distribution, such as low costs, scalability, and fault tolerance. While the invention of each of such specialized systems has improved the user experience, some fundamental shortcomings of these systems have often been neglected. These shortcomings of content distribution systems have become severe bottlenecks in scalability of the internet.In order to combine the desired features of classical Content Distribution Networks (CDNs) and P2P/seed sharing based networks, we propose a hybrid CDN structure with a P2P/seed sharing based streaming protocol in the access network . In this work, we focus on the problem of data redundancy (at each node) and show how severely it impacts the network economics and the experience of end-user and hence leads to low traffic load and redundancy
△ Less
Submitted 17 April, 2010;
originally announced April 2010.
-
Chaotic Transitions in Wall Following Robots
Authors:
Harry W. Bullen IV,
Priya Ranjan
Abstract:
In this paper we examine how simple agents similar to Braitenberg vehicles can exhibit chaotic movement patterns. The agents are wall following robots as described by Steve Mesburger and Alfred Hubler in their paper "Chaos in Wall Following Robots". These agents uses a simple forward facing distance sensor, with a limited field of view "phi" for navigation. An agent drives forward at a constant…
▽ More
In this paper we examine how simple agents similar to Braitenberg vehicles can exhibit chaotic movement patterns. The agents are wall following robots as described by Steve Mesburger and Alfred Hubler in their paper "Chaos in Wall Following Robots". These agents uses a simple forward facing distance sensor, with a limited field of view "phi" for navigation. An agent drives forward at a constant velocity and uses the sensor to turn right when it is too close to an object and left when it is too far away.
For a flat wall the agent stays a fixed distance from the wall and travels along it, regardless of the sensor's capabilities. But, if the wall represents a periodic function, the agent drives on a periodic path when the sensor has a narrow field of view. The agent's trajectory transitions to chaos when the sensor's field of view is increased. Numerical experiments were performed with square, triangle, and sawtooth waves for the wall, to find this pattern. The bifurcations of the agents were analyzed, finding both border collision and period doubling bifurcations. Detailed experimental results will be reported separately.
△ Less
Submitted 25 August, 2009;
originally announced August 2009.