-
DOST -- Domain Obedient Self-supervised Training for Multi Label Classification with Noisy Labels
Authors:
Soumadeep Saha,
Utpal Garain,
Arijit Ukil,
Arpan Pal,
Sundeep Khandelwal
Abstract:
The enormous demand for annotated data brought forth by deep learning techniques has been accompanied by the problem of annotation noise. Although this issue has been widely discussed in machine learning literature, it has been relatively unexplored in the context of "multi-label classification" (MLC) tasks which feature more complicated kinds of noise. Additionally, when the domain in question ha…
▽ More
The enormous demand for annotated data brought forth by deep learning techniques has been accompanied by the problem of annotation noise. Although this issue has been widely discussed in machine learning literature, it has been relatively unexplored in the context of "multi-label classification" (MLC) tasks which feature more complicated kinds of noise. Additionally, when the domain in question has certain logical constraints, noisy annotations often exacerbate their violations, making such a system unacceptable to an expert. This paper studies the effect of label noise on domain rule violation incidents in the MLC task, and incorporates domain rules into our learning algorithm to mitigate the effect of noise. We propose the Domain Obedient Self-supervised Training (DOST) paradigm which not only makes deep learning models more aligned to domain rules, but also improves learning performance in key metrics and minimizes the effect of annotation noise. This novel approach uses domain guidance to detect offending annotations and deter rule-violating predictions in a self-supervised manner, thus making it more "data efficient" and domain compliant. Empirical studies, performed over two large scale multi-label classification datasets, demonstrate that our method results in improvement across the board, and often entirely counteracts the effect of noise.
△ Less
Submitted 9 August, 2023;
originally announced August 2023.
-
SRDCNN: Strongly Regularized Deep Convolution Neural Network Architecture for Time-series Sensor Signal Classification Tasks
Authors:
Arijit Ukil,
Antonio Jara,
Leandro Marin
Abstract:
Deep Neural Networks (DNN) have been successfully used to perform classification and regression tasks, particularly in computer vision based applications. Recently, owing to the widespread deployment of Internet of Things (IoT), we identify that the classification tasks for time series data, specifically from different sensors are of utmost importance. In this paper, we present SRDCNN: Strongly Re…
▽ More
Deep Neural Networks (DNN) have been successfully used to perform classification and regression tasks, particularly in computer vision based applications. Recently, owing to the widespread deployment of Internet of Things (IoT), we identify that the classification tasks for time series data, specifically from different sensors are of utmost importance. In this paper, we present SRDCNN: Strongly Regularized Deep Convolution Neural Network (DCNN) based deep architecture to perform time series classification tasks. The novelty of the proposed approach is that the network weights are regularized by both L1 and L2 norm penalties. Both of the regularization approaches jointly address the practical issues of smaller number of training instances, requirement of quicker training process, avoiding overfitting problem by incorporating sparsification of weight vectors as well as through controlling of weight values. We compare the proposed method (SRDCNN) with relevant state-of-the-art algorithms including different DNNs using publicly available time series classification benchmark (the UCR/UEA archive) time series datasets and demonstrate that the proposed method provides superior performance. We feel that SRDCNN warrants better generalization capability to the deep architecture by profoundly controlling the network parameters to combat the training instance insufficiency problem of real-life time series sensor signals.
△ Less
Submitted 14 July, 2020;
originally announced July 2020.
-
Modeling and Real-Time Scheduling of DC Platform Supply Vessel for Fuel Efficient Operation
Authors:
Kuntal Satpathi,
VSK Murthy Balijepalli,
Abhisek Ukil
Abstract:
DC marine architecture integrated with variable speed diesel generators (DGs) has garnered the attention of the researchers primarily because of its ability to deliver fuel efficient operation. This paper aims in modeling and to autonomously perform real-time load scheduling of dc platform supply vessel (PSV) with an objective to minimize specific fuel oil consumption (SFOC) for better fuel effici…
▽ More
DC marine architecture integrated with variable speed diesel generators (DGs) has garnered the attention of the researchers primarily because of its ability to deliver fuel efficient operation. This paper aims in modeling and to autonomously perform real-time load scheduling of dc platform supply vessel (PSV) with an objective to minimize specific fuel oil consumption (SFOC) for better fuel efficiency. Focus has been on the modeling of various components and control routines, which are envisaged to be an integral part of dc PSVs. Integration with photovoltaic-based energy storage system (ESS) has been considered as an option to cater for the short time load transients. In this context, this paper proposes a real-time transient simulation scheme, which comprises of optimized generation scheduling of generators and ESS using dc optimal power flow algorithm. This framework considers real dynamics of dc PSV during various marine operations with possible contingency scenarios, such as outage of generation systems, abrupt load changes, and unavailability of ESS. The proposed modeling and control routines with real-time transient simulation scheme have been validated utilizing the real-time marine simulation platform. The results indicate that the coordinated treatment of renewable based ESS with DGs operating with optimized speed yields better fuel savings. This has been observed in improved SFOC operating trajectory for critical marine missions. Furthermore, SFOC minimization at multiple suboptimal points with its treatment in the real-time marine system is also highlighted.
△ Less
Submitted 27 October, 2017;
originally announced October 2017.
-
Carnot Efficiency of Publication
Authors:
Abhisek Ukil
Abstract:
This paper analyzes publication efficiency in terms of Hirsch-index or h-index and total citations, with an analogy to the Carnot efficiency used in thermodynamics. Such publication efficiency, with typical value of 30%, can be utilized to normalize the research output judgment, favoring quality outputs in reduced quantity, which is currently lacking in many discipline.
This paper analyzes publication efficiency in terms of Hirsch-index or h-index and total citations, with an analogy to the Carnot efficiency used in thermodynamics. Such publication efficiency, with typical value of 30%, can be utilized to normalize the research output judgment, favoring quality outputs in reduced quantity, which is currently lacking in many discipline.
△ Less
Submitted 27 August, 2017;
originally announced August 2017.
-
Practical Denoising of MEG Data using Wavelet Transform
Authors:
A. Ukil
Abstract:
Magnetoencephalography (MEG) is an important noninvasive, nonhazardous technology for functional brain map**, measuring the magnetic fields due to the intracellular neuronal current flow in the brain. However, the inherent level of noise in the data collection process is large enough to obscure the signal(s) of interest most often. In this paper, a practical denoising technique based on the wave…
▽ More
Magnetoencephalography (MEG) is an important noninvasive, nonhazardous technology for functional brain map**, measuring the magnetic fields due to the intracellular neuronal current flow in the brain. However, the inherent level of noise in the data collection process is large enough to obscure the signal(s) of interest most often. In this paper, a practical denoising technique based on the wavelet transform and the multiresolution signal decomposition technique is presented. The proposed technique is substantiated by the application results using three different mother wavelets on the recorded MEG signal.
△ Less
Submitted 23 March, 2015;
originally announced March 2015.
-
Feeder Load Balancing using Neural Network
Authors:
A. Ukil,
W. Siti,
J. Jordaan
Abstract:
The distribution system problems, such as planning, loss minimization, and energy restoration, usually involve the phase balancing or network reconfiguration procedures. The determination of an optimal phase balance is, in general, a combinatorial optimization problem. This paper proposes optimal reconfiguration of the phase balancing using the neural network, to switch on and off the different sw…
▽ More
The distribution system problems, such as planning, loss minimization, and energy restoration, usually involve the phase balancing or network reconfiguration procedures. The determination of an optimal phase balance is, in general, a combinatorial optimization problem. This paper proposes optimal reconfiguration of the phase balancing using the neural network, to switch on and off the different switches, allowing the three phases supply by the transformer to the end-users to be balanced. This paper presents the application examples of the proposed method using the real and simulated test data.
△ Less
Submitted 20 March, 2015;
originally announced March 2015.
-
Neural Network-Based Active Learning in Multivariate Calibration
Authors:
A. Ukil,
J. Bernasconi
Abstract:
In chemometrics, data from infrared or near-infrared (NIR) spectroscopy are often used to identify a compound or to analyze the composition of amaterial. This involves the calibration of models that predict the concentration ofmaterial constituents from the measured NIR spectrum. An interesting aspect of multivariate calibration is to achieve a particular accuracy level with a minimum number of tr…
▽ More
In chemometrics, data from infrared or near-infrared (NIR) spectroscopy are often used to identify a compound or to analyze the composition of amaterial. This involves the calibration of models that predict the concentration ofmaterial constituents from the measured NIR spectrum. An interesting aspect of multivariate calibration is to achieve a particular accuracy level with a minimum number of training samples, as this reduces the number of laboratory tests and thus the cost of model building. In these chemometric models, the input refers to a proper representation of the spectra and the output to the concentrations of the sample constituents. The search for a most informative new calibration sample thus has to be performed in the output space of the model, rather than in the input space as in conventionalmodeling problems. In this paper, we propose to solve the corresponding inversion problem by utilizing the disagreements of an ensemble of neural networks to represent the prediction error in the unexplored component space. The next calibration sample is then chosen at a composition where the individual models of the ensemble disagree most. The results obtained for a realistic chemometric calibration example show that the proposed active learning can achieve a given calibration accuracy with less training samples than random sampling.
△ Less
Submitted 19 March, 2015;
originally announced March 2015.
-
Adjusted Haar Wavelet for Application in the Power Systems Disturbance Analysis
Authors:
A. Ukil,
R. Zivanovic
Abstract:
Abrupt change detection based on the wavelet transform and threshold method is very effective in detecting the abrupt changes and hence segmenting the signals recorded during disturbances in the electrical power network. The wavelet method estimates the time-instants of the changes in the signal model parameters during the pre-fault condition, after initiation of fault, after circuit-breaker openi…
▽ More
Abrupt change detection based on the wavelet transform and threshold method is very effective in detecting the abrupt changes and hence segmenting the signals recorded during disturbances in the electrical power network. The wavelet method estimates the time-instants of the changes in the signal model parameters during the pre-fault condition, after initiation of fault, after circuit-breaker opening and auto-reclosure. Certain kinds of disturbance signals do not show distinct abrupt changes in the signal parameters. In those cases, the standard mother wavelets fail to achieve correct event-specific segmentations. A new adjustment technique to the standard Haar wavelet is proposed in this paper, by introducing 2n adjusting zeros in the Haar wavelet scaling filter, n being a positive integer. This technique is quite effective in segmenting those fault signals into pre- and post-fault segments, and it is an improvement over the standard mother wavelets for this application. This paper presents many practical examples where recorded signals from the power network in South Africa have been used.
△ Less
Submitted 18 March, 2015;
originally announced March 2015.
-
Abrupt Change Detection in Power System Fault Analysis using Adaptive Whitening Filter and Wavelet Transform
Authors:
A. Ukil,
R. Zivanovic
Abstract:
This paper describes the application of the adaptive whitening filter and the wavelet transform used to detect the abrupt changes in the signals recorded during disturbances in the electrical power network in South Africa. Main focus has been to estimate exactly the time-instants of the changes in the signal model parameters during the pre-fault condition and following events like initiation of fa…
▽ More
This paper describes the application of the adaptive whitening filter and the wavelet transform used to detect the abrupt changes in the signals recorded during disturbances in the electrical power network in South Africa. Main focus has been to estimate exactly the time-instants of the changes in the signal model parameters during the pre-fault condition and following events like initiation of fault, circuit-breaker opening, auto-reclosure of the circuit-breakers. The key idea is to decompose the fault signals, de-noised using the adaptive whitening filter, into effective detailed and smoothed version using the multiresolution signal decomposition technique based on discrete wavelet transform. Then we apply the threshold method on the decomposed signals to estimate the change time-instants, segmenting the fault signals into the event-specific sections for further signal processing and analysis. This paper presents application on the recorded signals in the power transmission network of South Africa.
△ Less
Submitted 17 March, 2015;
originally announced March 2015.
-
Feeder Load Balancing using Fuzzy Logic and Combinatorial Optimization-based Implementation
Authors:
A. Ukil,
W. Siti
Abstract:
The distribution system problems, such as planning, loss minimization, and energy restoration, usually involve the phase balancing or network reconfiguration procedures. The determination of an optimal phase balance is, in general, a combinatorial optimization problem. This paper proposes a novel reconfiguration of the phase balancing using the fuzzy logic and the combinatorial optimization-based…
▽ More
The distribution system problems, such as planning, loss minimization, and energy restoration, usually involve the phase balancing or network reconfiguration procedures. The determination of an optimal phase balance is, in general, a combinatorial optimization problem. This paper proposes a novel reconfiguration of the phase balancing using the fuzzy logic and the combinatorial optimization-based implementation step back to back. Input to the fuzzy step is the total load per phase of the feeders. Output of the fuzzy step is the load change values, negative value for load releasing and positive value for load receiving. The output of the fuzzy step is the input to the load changing system. The load changing system uses combinatorial optimization techniques to translate the change values (kW) into number of load points and then selects the specific load points. It also performs the inter-changing of the load points between the releasing and the receiving phases in an optimal fashion. Application results using the distribution feeder network of South Africa are presented in this paper.
△ Less
Submitted 17 March, 2015;
originally announced March 2015.
-
Improved Calibration of Near-Infrared Spectra by Using Ensembles of Neural Network Models
Authors:
A. Ukil,
J. Bernasconi,
H. Braendle,
H. Buijs,
S. Bonenfant
Abstract:
IR or near-infrared (NIR) spectroscopy is a method used to identify a compound or to analyze the composition of a material. Calibration of NIR spectra refers to the use of the spectra as multivariate descriptors to predict concentrations of the constituents. To build a calibration model, state-of-the-art software predominantly uses linear regression techniques. For nonlinear calibration problems,…
▽ More
IR or near-infrared (NIR) spectroscopy is a method used to identify a compound or to analyze the composition of a material. Calibration of NIR spectra refers to the use of the spectra as multivariate descriptors to predict concentrations of the constituents. To build a calibration model, state-of-the-art software predominantly uses linear regression techniques. For nonlinear calibration problems, neural network-based models have proved to be an interesting alternative. In this paper, we propose a novel extension of the conventional neural network-based approach, the use of an ensemble of neural network models. The individual neural networks are obtained by resampling the available training data with bootstrap** or cross-validation techniques. The results obtained for a realistic calibration example show that the ensemble-based approach produces a significantly more accurate and robust calibration model than conventional regression methods.
△ Less
Submitted 17 March, 2015;
originally announced March 2015.
-
Low Autocorrelation Binary Sequences: Number Theory-based Analysis for Minimum Energy Level, Barker codes
Authors:
A. Ukil
Abstract:
Low autocorrelation binary sequences (LABS) are very important for communication applications. And it is a notoriously difficult computational problem to find binary sequences with low aperiodic autocorrelations. The problem can also be stated in terms of finding binary sequences with minimum energy levels or maximum merit factor defined by M.J.E. Golay, F=N^2/2E, N and E being the sequence length…
▽ More
Low autocorrelation binary sequences (LABS) are very important for communication applications. And it is a notoriously difficult computational problem to find binary sequences with low aperiodic autocorrelations. The problem can also be stated in terms of finding binary sequences with minimum energy levels or maximum merit factor defined by M.J.E. Golay, F=N^2/2E, N and E being the sequence length and energy respectively. Conjectured asymptotic value of F is 12.32 for very long sequences. In this paper, a theorem has been proved to show that there are finite number of possible energy levels, spaced at an equal interval of 4, for the binary sequence of a particular length. Two more theorems are proved to derive the theoretical minimum energy level of a binary sequence of even and odd length of N to be N/2, and N-1/2 respectively, making the merit factor equal to N and N^2/N-1 respectively. The derived theoretical minimum energy level successfully explains the case of N =13, for which the merit factor (F =14.083) is higher than the conjectured value. Sequence of lengths 4, 5, 7, 11, 13 are also found to be following the theoretical minimum energy level. These sequences are exactly the Barker sequences which are widely used in direct-sequence spread spectrum and pulse compression radar systems because of their low autocorrelation properties. Further analysis shows physical reasoning in support of the conjecture that Barker sequences exists only when N <= 13 (this has been proven for all odd N).
△ Less
Submitted 17 March, 2015;
originally announced March 2015.
-
A Mechanism for Detection of Cooperative Black Hole Attack in Mobile Ad Hoc Networks
Authors:
Jaydip Sen,
Sripad Koilakonda,
Arijit Ukil
Abstract:
A mobile ad hoc network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in a decentralized manner. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms,absence of centralized monitoring points, and l…
▽ More
A mobile ad hoc network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in a decentralized manner. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms,absence of centralized monitoring points, and lack of clear lines of defense. Most of the routing protocols for MANETs are thus vulnerable to various types of attacks. Ad hoc on-demand distance vector routing (AODV) is a very popular routing algorithm. However, it is vulnerable to the well-known black hole attack, where a malicious node falsely advertises good paths to a destination node during the route discovery process. This attack becomes more sever when a group of malicious nodes cooperate each other. In this paper, a defense mechanism is presented against a coordinated attack by multiple black hole nodes in a MANET. The simulation carried out on the proposed scheme has produced results that demonstrate the effectiveness of the mechanism in detection of the attack while maintaining a reasonable level of throughput in the network.
△ Less
Submitted 2 November, 2011;
originally announced November 2011.
-
Context Protecting Privacy Preservation in Ubiquitous Computing
Authors:
Arijit Ukil
Abstract:
In ubiquitous computing domain context awareness is an important issue. So, in ubiquitous computing, mere protection of message confidentiality is not sufficient for most of the applications where context-awareness can lead to near deterministic ideas. An adversary might deduce sensitive information by observing the contextual data, which when correlated with prior information about the people and…
▽ More
In ubiquitous computing domain context awareness is an important issue. So, in ubiquitous computing, mere protection of message confidentiality is not sufficient for most of the applications where context-awareness can lead to near deterministic ideas. An adversary might deduce sensitive information by observing the contextual data, which when correlated with prior information about the people and the physical locations that are being monitored by a set of sensors can reveal most of the sensitive information. So, it is obvious that for security and privacy preservation in ubiquitous computing context protection is of equal importance. In this paper, we propose a scheme which provides two layer privacy protection of user's or application's context data. Our proposed context protecting privacy preservation scheme focuses on protecting spatial and temporal contextual information. We consider the communication part of ubiquitous computing consists of tiny sensor nodes forming Wireless Sensor Networks (WSNs). Through simulation we show the efficacy of our scheme. We also demonstrate the capability of our scheme to overcome the constraints of WSNs.
△ Less
Submitted 10 August, 2011;
originally announced August 2011.
-
Privacy Preserving Data Aggregation in Wireless Sensor Networks
Authors:
Arijit Ukil
Abstract:
Privacy preservation is an important issue in today's context of extreme penetration of internet and mobile technologies. It is more important in the case of Wireless Sensor Networks (WSNs) where collected data often requires in-network processing and collaborative computing. Researches in this area are mostly concentrated in applying data mining techniques to preserve the privacy content of the d…
▽ More
Privacy preservation is an important issue in today's context of extreme penetration of internet and mobile technologies. It is more important in the case of Wireless Sensor Networks (WSNs) where collected data often requires in-network processing and collaborative computing. Researches in this area are mostly concentrated in applying data mining techniques to preserve the privacy content of the data. These techniques are mostly computationally expensive and not suitable for resource limited WSN nodes. In this paper, a scheme is developed to provide privacy preservation in a much simpler way with the help of a secure key management scheme and randomized data perturbation technique. We consider a scenario in which two or more parties owning confidential data need to share only for aggregation purpose to a third party, without revealing the content of the data. Through simulation results the efficacy of our scheme and compare the result with one of the established scheme [1].
△ Less
Submitted 10 August, 2011;
originally announced August 2011.
-
Dynamic OFDMA Resource Allocation for QoS Guarantee and System Optimization of Best Effort and Non Real-time Traffic
Authors:
Arijit Ukil,
Jaydip Sen,
Debasish Bera
Abstract:
To achieve the requirement of high data rate, low latency, user fairness for next generation wireless networks, proper designing of cross-layer optimized dynamic resource allocation algorithm is prerequisite. In this paper, we propose a dynamic resource allocation scheme in Orthogonal Frequency Division Multiple Access (OFDMA) systems to optimize the non real-time (NRT) traffic, which requires all…
▽ More
To achieve the requirement of high data rate, low latency, user fairness for next generation wireless networks, proper designing of cross-layer optimized dynamic resource allocation algorithm is prerequisite. In this paper, we propose a dynamic resource allocation scheme in Orthogonal Frequency Division Multiple Access (OFDMA) systems to optimize the non real-time (NRT) traffic, which requires allocation of minimum quantum of data within a predefined time that does not incur packet loss. Most existing and proposed works on resource allocation schemes focused on traffic consisting of delay constraint real-time (RT) or delay-tolerant (NRT, Best-Effort (BE)) applications in a single scheme. In this work, we investigate the resource allocation problem in heterogeneous multiuser OFDMA system with the objective of optimizing the aggregate data delivery of NRT and BE traffic to maximize the overall system performance, by exploiting the inherent time-diversity gain in mobile wireless environment for delay-tolerant applications. Simulation results show that the proposed algorithm greatly enhances the system capacity, when compared to traditional proportional fair resource allocation algorithm.
△ Less
Submitted 6 July, 2011;
originally announced July 2011.
-
Long-Term Proportional Fair QoS Profile Follower Sub-carrier Allocation Algorithm in Dynamic OFDMA Systems
Authors:
Arijit Ukil,
Jaydip Sen,
Debasish Bera
Abstract:
In this paper, Long-Term Proportional Fair (LTPF) resource allocation algorithm in dynamic OFDMA system is presented, which provides long-term QoS guarantee (mainly throughput requirement satisfaction) to individual user and follows every user's QoS profile at long-term by incremental optimization of proportional fairness and overall system rate maximization. The LTPF algorithm dynamically allocat…
▽ More
In this paper, Long-Term Proportional Fair (LTPF) resource allocation algorithm in dynamic OFDMA system is presented, which provides long-term QoS guarantee (mainly throughput requirement satisfaction) to individual user and follows every user's QoS profile at long-term by incremental optimization of proportional fairness and overall system rate maximization. The LTPF algorithm dynamically allocates the OFDMA sub-carriers to the users in such a way that in long-term the individual QoS requirement is achieved as well as fairness among the users is maintained even in a heterogeneous traffic condition. Here more than maintaining individual user's instantaneous QoS; emphasis is given to follow mean QoS profile of all the users in long-term to retain the objectives of both proportional fairness and multi-user raw rate maximization. Compared to the algorithms, which provide proportional fair optimization and raw-rate maximization independently, this algorithm attempts to provide both kinds of optimizations simultaneously and reach an optimum point when computed in long-term by exploiting the time diversity gain of mobile wireless environment.
△ Less
Submitted 6 June, 2011;
originally announced June 2011.