-
From Pixels to Torques with Linear Feedback
Authors:
Jeong Hun Lee,
Sam Schoedel,
Aditya Bhardwaj,
Zachary Manchester
Abstract:
We demonstrate the effectiveness of simple observer-based linear feedback policies for "pixels-to-torques" control of robotic systems using only a robot-facing camera. Specifically, we show that the matrices of an image-based Luenberger observer (linear state estimator) for a "student" output-feedback policy can be learned from demonstration data provided by a "teacher" state-feedback policy via s…
▽ More
We demonstrate the effectiveness of simple observer-based linear feedback policies for "pixels-to-torques" control of robotic systems using only a robot-facing camera. Specifically, we show that the matrices of an image-based Luenberger observer (linear state estimator) for a "student" output-feedback policy can be learned from demonstration data provided by a "teacher" state-feedback policy via simple linear-least-squares regression. The resulting linear output-feedback controller maps directly from high-dimensional raw images to torques while being amenable to the rich set of analytical tools from linear systems theory, allowing us to enforce closed-loop stability constraints in the learning problem. We also investigate a nonlinear extension of the method via the Koopman embedding. Finally, we demonstrate the surprising effectiveness of linear pixels-to-torques policies on a cartpole system, both in simulation and on real-world hardware. The policy successfully executes both stabilizing and swing-up trajectory tracking tasks using only camera feedback while subject to model mismatch, process and sensor noise, perturbations, and occlusions.
△ Less
Submitted 7 July, 2024; v1 submitted 26 June, 2024;
originally announced June 2024.
-
A Comparative Study of CNN, ResNet, and Vision Transformers for Multi-Classification of Chest Diseases
Authors:
Ananya Jain,
Aviral Bhardwaj,
Kaushik Murali,
Isha Surani
Abstract:
Large language models, notably utilizing Transformer architectures, have emerged as powerful tools due to their scalability and ability to process large amounts of data. Dosovitskiy et al. expanded this architecture to introduce Vision Transformers (ViT), extending its applicability to image processing tasks. Motivated by this advancement, we fine-tuned two variants of ViT models, one pre-trained…
▽ More
Large language models, notably utilizing Transformer architectures, have emerged as powerful tools due to their scalability and ability to process large amounts of data. Dosovitskiy et al. expanded this architecture to introduce Vision Transformers (ViT), extending its applicability to image processing tasks. Motivated by this advancement, we fine-tuned two variants of ViT models, one pre-trained on ImageNet and another trained from scratch, using the NIH Chest X-ray dataset containing over 100,000 frontal-view X-ray images. Our study evaluates the performance of these models in the multi-label classification of 14 distinct diseases, while using Convolutional Neural Networks (CNNs) and ResNet architectures as baseline models for comparison. Through rigorous assessment based on accuracy metrics, we identify that the pre-trained ViT model surpasses CNNs and ResNet in this multilabel classification task, highlighting its potential for accurate diagnosis of various lung conditions from chest X-ray images.
△ Less
Submitted 31 May, 2024;
originally announced June 2024.
-
MOSAIC: A Modular System for Assistive and Interactive Cooking
Authors:
Huaxiaoyue Wang,
Kushal Kedia,
Juntao Ren,
Rahma Abdullah,
Atiksh Bhardwaj,
Angela Chao,
Kelly Y Chen,
Nathaniel Chin,
Prithwish Dan,
Xinyi Fan,
Gonzalo Gonzalez-Pumariega,
Aditya Kompella,
Maximus Adrian Pace,
Yash Sharma,
Xiangwan Sun,
Neha Sunkara,
Sanjiban Choudhury
Abstract:
We present MOSAIC, a modular architecture for home robots to perform complex collaborative tasks, such as cooking with everyday users. MOSAIC tightly collaborates with humans, interacts with users using natural language, coordinates multiple robots, and manages an open vocabulary of everyday objects. At its core, MOSAIC employs modularity: it leverages multiple large-scale pre-trained models for g…
▽ More
We present MOSAIC, a modular architecture for home robots to perform complex collaborative tasks, such as cooking with everyday users. MOSAIC tightly collaborates with humans, interacts with users using natural language, coordinates multiple robots, and manages an open vocabulary of everyday objects. At its core, MOSAIC employs modularity: it leverages multiple large-scale pre-trained models for general tasks like language and image recognition, while using streamlined modules designed for task-specific control. We extensively evaluate MOSAIC on 60 end-to-end trials where two robots collaborate with a human user to cook a combination of 6 recipes. We also extensively test individual modules with 180 episodes of visuomotor picking, 60 episodes of human motion forecasting, and 46 online user evaluations of the task planner. We show that MOSAIC is able to efficiently collaborate with humans by running the overall system end-to-end with a real human user, completing 68.3% (41/60) collaborative cooking trials of 6 different recipes with a subtask completion rate of 91.6%. Finally, we discuss the limitations of the current system and exciting open challenges in this domain. The project's website is at https://portal-cornell.github.io/MOSAIC/
△ Less
Submitted 28 February, 2024;
originally announced February 2024.
-
Packrat: Automatic Reconfiguration for Latency Minimization in CPU-based DNN Serving
Authors:
Ankit Bhardwaj,
Amar Phanishayee,
Deepak Narayanan,
Mihail Tarta,
Ryan Stutsman
Abstract:
In this paper, we investigate how to push the performance limits of serving Deep Neural Network (DNN) models on CPU-based servers. Specifically, we observe that while intra-operator parallelism across multiple threads is an effective way to reduce inference latency, it provides diminishing returns. Our primary insight is that instead of running a single instance of a model with all available threa…
▽ More
In this paper, we investigate how to push the performance limits of serving Deep Neural Network (DNN) models on CPU-based servers. Specifically, we observe that while intra-operator parallelism across multiple threads is an effective way to reduce inference latency, it provides diminishing returns. Our primary insight is that instead of running a single instance of a model with all available threads on a server, running multiple instances each with smaller batch sizes and fewer threads for intra-op parallelism can provide lower inference latency. However, the right configuration is hard to determine manually since it is workload- (DNN model and batch size used by the serving system) and deployment-dependent (number of CPU cores on server). We present Packrat, a new serving system for online inference that given a model and batch size ($B$) algorithmically picks the optimal number of instances ($i$), the number of threads each should be allocated ($t$), and the batch sizes each should operate on ($b$) that minimizes latency. Packrat is built as an extension to TorchServe and supports online reconfigurations to avoid serving downtime. Averaged across a range of batch sizes, Packrat improves inference latency by 1.43$\times$ to 1.83$\times$ on a range of commonly used DNNs.
△ Less
Submitted 29 November, 2023;
originally announced November 2023.
-
Generation of a Compendium of Transcription Factor Cascades and Identification of Potential Therapeutic Targets using Graph Machine Learning
Authors:
Sonish Sivarajkumar,
Pratyush Tandale,
Ankit Bhardwaj,
Kipp W. Johnson,
Anoop Titus,
Benjamin S. Glicksberg,
Shameer Khader,
Kamlesh K. Yadav,
Lakshminarayanan Subramanian
Abstract:
Transcription factors (TFs) play a vital role in the regulation of gene expression thereby making them critical to many cellular processes. In this study, we used graph machine learning methods to create a compendium of TF cascades using data extracted from the STRING database. A TF cascade is a sequence of TFs that regulate each other, forming a directed path in the TF network. We constructed a k…
▽ More
Transcription factors (TFs) play a vital role in the regulation of gene expression thereby making them critical to many cellular processes. In this study, we used graph machine learning methods to create a compendium of TF cascades using data extracted from the STRING database. A TF cascade is a sequence of TFs that regulate each other, forming a directed path in the TF network. We constructed a knowledge graph of 81,488 unique TF cascades, with the longest cascade consisting of 62 TFs. Our results highlight the complex and intricate nature of TF interactions, where multiple TFs work together to regulate gene expression. We also identified 10 TFs with the highest regulatory influence based on centrality measurements, providing valuable information for researchers interested in studying specific TFs. Furthermore, our pathway enrichment analysis revealed significant enrichment of various pathways and functional categories, including those involved in cancer and other diseases, as well as those involved in development, differentiation, and cell signaling. The enriched pathways identified in this study may have potential as targets for therapeutic intervention in diseases associated with dysregulation of transcription factors. We have released the dataset, knowledge graph, and graphML methods for the TF cascades, and created a website to display the results, which can be accessed by researchers interested in using this dataset. Our study provides a valuable resource for understanding the complex network of interactions between TFs and their regulatory roles in cellular processes.
△ Less
Submitted 29 November, 2023;
originally announced November 2023.
-
InteRACT: Transformer Models for Human Intent Prediction Conditioned on Robot Actions
Authors:
Kushal Kedia,
Atiksh Bhardwaj,
Prithwish Dan,
Sanjiban Choudhury
Abstract:
In collaborative human-robot manipulation, a robot must predict human intents and adapt its actions accordingly to smoothly execute tasks. However, the human's intent in turn depends on actions the robot takes, creating a chicken-or-egg problem. Prior methods ignore such inter-dependency and instead train marginal intent prediction models independent of robot actions. This is because training cond…
▽ More
In collaborative human-robot manipulation, a robot must predict human intents and adapt its actions accordingly to smoothly execute tasks. However, the human's intent in turn depends on actions the robot takes, creating a chicken-or-egg problem. Prior methods ignore such inter-dependency and instead train marginal intent prediction models independent of robot actions. This is because training conditional models is hard given a lack of paired human-robot interaction datasets. Can we instead leverage large-scale human-human interaction data that is more easily accessible? Our key insight is to exploit a correspondence between human and robot actions that enables transfer learning from human-human to human-robot data. We propose a novel architecture, InteRACT, that pre-trains a conditional intent prediction model on large human-human datasets and fine-tunes on a small human-robot dataset. We evaluate on a set of real-world collaborative human-robot manipulation tasks and show that our conditional model improves over various marginal baselines. We also introduce new techniques to tele-operate a 7-DoF robot arm and collect a diverse range of human-robot collaborative manipulation data, which we open-source.
△ Less
Submitted 2 June, 2024; v1 submitted 21 November, 2023;
originally announced November 2023.
-
Data-Efficient Task Generalization via Probabilistic Model-based Meta Reinforcement Learning
Authors:
Arjun Bhardwaj,
Jonas Rothfuss,
Bhavya Sukhija,
Yarden As,
Marco Hutter,
Stelian Coros,
Andreas Krause
Abstract:
We introduce PACOH-RL, a novel model-based Meta-Reinforcement Learning (Meta-RL) algorithm designed to efficiently adapt control policies to changing dynamics. PACOH-RL meta-learns priors for the dynamics model, allowing swift adaptation to new dynamics with minimal interaction data. Existing Meta-RL methods require abundant meta-learning data, limiting their applicability in settings such as robo…
▽ More
We introduce PACOH-RL, a novel model-based Meta-Reinforcement Learning (Meta-RL) algorithm designed to efficiently adapt control policies to changing dynamics. PACOH-RL meta-learns priors for the dynamics model, allowing swift adaptation to new dynamics with minimal interaction data. Existing Meta-RL methods require abundant meta-learning data, limiting their applicability in settings such as robotics, where data is costly to obtain. To address this, PACOH-RL incorporates regularization and epistemic uncertainty quantification in both the meta-learning and task adaptation stages. When facing new dynamics, we use these uncertainty estimates to effectively guide exploration and data collection. Overall, this enables positive transfer, even when access to data from prior tasks or dynamic settings is severely limited. Our experiment results demonstrate that PACOH-RL outperforms model-based RL and model-based Meta-RL baselines in adapting to new dynamic conditions. Finally, on a real robotic car, we showcase the potential for efficient RL policy adaptation in diverse, data-scarce conditions.
△ Less
Submitted 6 February, 2024; v1 submitted 13 November, 2023;
originally announced November 2023.
-
ManiCast: Collaborative Manipulation with Cost-Aware Human Forecasting
Authors:
Kushal Kedia,
Prithwish Dan,
Atiksh Bhardwaj,
Sanjiban Choudhury
Abstract:
Seamless human-robot manipulation in close proximity relies on accurate forecasts of human motion. While there has been significant progress in learning forecast models at scale, when applied to manipulation tasks, these models accrue high errors at critical transition points leading to degradation in downstream planning performance. Our key insight is that instead of predicting the most likely hu…
▽ More
Seamless human-robot manipulation in close proximity relies on accurate forecasts of human motion. While there has been significant progress in learning forecast models at scale, when applied to manipulation tasks, these models accrue high errors at critical transition points leading to degradation in downstream planning performance. Our key insight is that instead of predicting the most likely human motion, it is sufficient to produce forecasts that capture how future human motion would affect the cost of a robot's plan. We present ManiCast, a novel framework that learns cost-aware human forecasts and feeds them to a model predictive control planner to execute collaborative manipulation tasks. Our framework enables fluid, real-time interactions between a human and a 7-DoF robot arm across a number of real-world tasks such as reactive stirring, object handovers, and collaborative table setting. We evaluate both the motion forecasts and the end-to-end forecaster-planner system against a range of learned and heuristic baselines while additionally contributing new datasets. We release our code and datasets at https://portal-cornell.github.io/manicast/.
△ Less
Submitted 27 November, 2023; v1 submitted 19 October, 2023;
originally announced October 2023.
-
Distributed Resource Allocation for D2D Multicast in Underlay Cellular Networks
Authors:
Mohd Saif Ali Khan,
Ajay Bhardwaj,
Samar Agnihotri
Abstract:
We address the problem of distributed resource allocation for multicast communication in device-to-device (D2D) enabled underlay cellular networks. The optimal resource allocation is crucial for maximizing the performance of such networks, which are limited by the severe co-channel interference between cellular users (CU) and D2D multicast groups. However, finding such optimal allocation for netwo…
▽ More
We address the problem of distributed resource allocation for multicast communication in device-to-device (D2D) enabled underlay cellular networks. The optimal resource allocation is crucial for maximizing the performance of such networks, which are limited by the severe co-channel interference between cellular users (CU) and D2D multicast groups. However, finding such optimal allocation for networks with large number of CUs and D2D users is challenging. Therefore, we propose a pragmatic scheme that allocates resources distributively, reducing signaling overhead and improving network scalability. Numerical simulations establish the efficacy of the proposed solution in improving the overall system throughout, compared to various existing schemes.
△ Less
Submitted 25 September, 2023;
originally announced September 2023.
-
Online Universal Dirichlet Factor Portfolios
Authors:
Purushottam Parthasarathy,
Avinash Bhardwaj,
Manjesh K. Hanawal
Abstract:
We revisit the online portfolio allocation problem and propose universal portfolios that use factor weighing to produce portfolios that out-perform uniform dirichlet allocation schemes. We show a few analytical results on the lower bounds of portfolio growth when the returns are known to follow a factor model. We also show analytically that factor weighted dirichlet sampled portfolios dominate the…
▽ More
We revisit the online portfolio allocation problem and propose universal portfolios that use factor weighing to produce portfolios that out-perform uniform dirichlet allocation schemes. We show a few analytical results on the lower bounds of portfolio growth when the returns are known to follow a factor model. We also show analytically that factor weighted dirichlet sampled portfolios dominate the wealth generated by uniformly sampled dirichlet portfolios. We corroborate our analytical results with empirical studies on equity markets that are known to be driven by factors.
△ Less
Submitted 7 November, 2023; v1 submitted 15 August, 2023;
originally announced August 2023.
-
Employing Multimodal Machine Learning for Stress Detection
Authors:
Rahee Walambe,
Pranav Nayak,
Ashmit Bhardwaj,
Ketan Kotecha
Abstract:
In the current age, human lifestyle has become more knowledge oriented leading to generation of sedentary employment. This has given rise to a number of health and mental disorders. Mental wellness is one of the most neglected but crucial aspects of today's world. Mental health issues can, both directly and indirectly, affect other sections of human physiology and impede an individual's day-to-day…
▽ More
In the current age, human lifestyle has become more knowledge oriented leading to generation of sedentary employment. This has given rise to a number of health and mental disorders. Mental wellness is one of the most neglected but crucial aspects of today's world. Mental health issues can, both directly and indirectly, affect other sections of human physiology and impede an individual's day-to-day activities and performance. However, identifying the stress and finding the stress trend for an individual leading to serious mental ailments is challenging and involves multiple factors. Such identification can be achieved accurately by fusing these multiple modalities (due to various factors) arising from behavioral patterns. Certain techniques are identified in the literature for this purpose; however, very few machine learning-based methods are proposed for such multimodal fusion tasks. In this work, a multimodal AI-based framework is proposed to monitor a person's working behavior and stress levels. We propose a methodology for efficiently detecting stress due to workload by concatenating heterogeneous raw sensor data streams (e.g., face expressions, posture, heart rate, computer interaction). This data can be securely stored and analyzed to understand and discover personalized unique behavioral patterns leading to mental strain and fatigue. The contribution of this work is twofold; proposing a multimodal AI-based strategy for fusion to detect stress and its level and secondly identify a stress pattern over a period of time. We were able to achieve 96.09% accuracy on the test set in stress detection and classification. Further, we reduce the stress scale prediction model loss to 0.036 using these modalities. This work can prove important for the community at large, specifically those working sedentary jobs to monitor and identify stress levels, especially in current times of COVID-19.
△ Less
Submitted 15 June, 2023;
originally announced June 2023.
-
Deep learning universal crater detection using Segment Anything Model (SAM)
Authors:
Iraklis Giannakis,
Anshuman Bhardwaj,
Lydia Sam,
Georgios Leontidis
Abstract:
Craters are amongst the most important morphological features in planetary exploration. To that extent, detecting, mapping and counting craters is a mainstream process in planetary science, done primarily manually, which is a very laborious and time-consuming process. Recently, machine learning (ML) and computer vision have been successfully applied for both detecting craters and estimating their…
▽ More
Craters are amongst the most important morphological features in planetary exploration. To that extent, detecting, mapping and counting craters is a mainstream process in planetary science, done primarily manually, which is a very laborious and time-consuming process. Recently, machine learning (ML) and computer vision have been successfully applied for both detecting craters and estimating their size. Existing ML approaches for automated crater detection have been trained in specific types of data e.g. digital elevation model (DEM), images and associated metadata for orbiters such as the Lunar Reconnaissance Orbiter Camera (LROC) etc.. Due to that, each of the resulting ML schemes is applicable and reliable only to the type of data used during the training process. Data from different sources, angles and setups can compromise the reliability of these ML schemes. In this paper we present a universal crater detection scheme that is based on the recently proposed Segment Anything Model (SAM) from META AI. SAM is a prompt-able segmentation system with zero-shot generalization to unfamiliar objects and images without the need for additional training. Using SAM we can successfully identify crater-looking objects in any type of data (e,g, raw satellite images Level-1 and 2 products, DEMs etc.) for different setups (e.g. Lunar, Mars) and different capturing angles. Moreover, using shape indexes, we only keep the segmentation masks of crater-like features. These masks are subsequently fitted with an ellipse, recovering both the location and the size/geometry of the detected craters.
△ Less
Submitted 16 April, 2023;
originally announced April 2023.
-
Generating an interactive online map of future sea level rise along the North Shore of Vancouver: methods and insights on enabling geovisualisation for coastal communities
Authors:
Forrest DiPaola,
Anshuman Bhardwaj,
Lydia Sam
Abstract:
Contemporary sea level rise (SLR) research seldom considers enabling effective geovisualisation for the communities. This lack of knowledge transfer impedes raising awareness on climate change and its impacts. The goal of this study is to produce an online SLR map accessible to the public that allows them to interact with evolving high-resolution geospatial data and techniques. The study area was…
▽ More
Contemporary sea level rise (SLR) research seldom considers enabling effective geovisualisation for the communities. This lack of knowledge transfer impedes raising awareness on climate change and its impacts. The goal of this study is to produce an online SLR map accessible to the public that allows them to interact with evolving high-resolution geospatial data and techniques. The study area was the North Shore of Vancouver, British Columbia, Canada. While typically coarser resolution (10m+/pixel) Digital Elevation Models have been used by previous studies, we explored an open access airborne 1 metre LiDAR which has a higher resolution and vertical accuracy and can penetrate tree cover at a higher degree than most satellite imagery. A bathtub method model with hydrologic connectivity was used to delineate the inundation zones for various SLR scenarios which allows for a not overly complex model and process using standard tools such as ArcGIS and QGIS with similar levels of accuracy as more complex models, especially with the high-resolution data. Deep Learning and 3D visualizations were used to create past, present, and modelled future Land Use/Land Cover and 3D flyovers. Analysis of the possible impacts of 1m, 2m, 3m, and 4m SLR over the unique coastline, terrain and land use was detailed. The generated interactive online map helps local communities visualise and understand the future of their coastlines. We have provided a detailed methodology and the methods and results are easily reproducible for other regions. Such initiatives can help popularise community-focused geovisualisation to raise awareness about SLR.
△ Less
Submitted 15 April, 2023;
originally announced April 2023.
-
Matrix Perturbation: Davis-Kahan in the Infinity Norm
Authors:
Abhinav Bhardwaj,
Van Vu
Abstract:
Perturbation theory is developed to analyze the impact of noise on data and has been an essential part of numerical analysis. Recently, it has played an important role in designing and analyzing matrix algorithms. One of the most useful tools in this subject, the Davis-Kahan sine theorem, provides an $\ell_2$ error bound on the perturbation of the leading singular vectors (and spaces).
We focus…
▽ More
Perturbation theory is developed to analyze the impact of noise on data and has been an essential part of numerical analysis. Recently, it has played an important role in designing and analyzing matrix algorithms. One of the most useful tools in this subject, the Davis-Kahan sine theorem, provides an $\ell_2$ error bound on the perturbation of the leading singular vectors (and spaces).
We focus on the case when the signal matrix has low rank and the perturbation is random, which occurs often in practice. In an earlier paper, O'Rourke, Wang, and the second author showed that in this case, one can obtain an improved theorem. In particular, the noise-to-gap ratio condition in the original setting can be weakened considerably.
In the current paper, we develop an infinity norm version of the O'Rourke-Vu-Wang result. The key ideas in the proof are a new bootstrapping argument and the so-called iterative leave-one-out method, which may be of independent interest.
Applying the new bounds, we develop new, simple, and quick algorithms for several well-known problems, such as finding hidden partitions and matrix completion. The core of these new algorithms is the fact that one is now able to quickly approximate certain key objects in the infinity norm, which has critical advantages over approximations in the $\ell_2$ norm, Frobenius norm, or spectral norm.
△ Less
Submitted 20 November, 2023; v1 submitted 1 April, 2023;
originally announced April 2023.
-
Weakly-Supervised Deep Learning Model for Prostate Cancer Diagnosis and Gleason Grading of Histopathology Images
Authors:
Mohammad Mahdi Behzadi,
Mohammad Madani,
Hanzhang Wang,
Jun Bai,
Ankit Bhardwaj,
Anna Tarakanova,
Harold Yamase,
Ga Hie Nam,
Sheida Nabavi
Abstract:
Prostate cancer is the most common cancer in men worldwide and the second leading cause of cancer death in the United States. One of the prognostic features in prostate cancer is the Gleason grading of histopathology images. The Gleason grade is assigned based on tumor architecture on Hematoxylin and Eosin (H&E) stained whole slide images (WSI) by the pathologists. This process is time-consuming a…
▽ More
Prostate cancer is the most common cancer in men worldwide and the second leading cause of cancer death in the United States. One of the prognostic features in prostate cancer is the Gleason grading of histopathology images. The Gleason grade is assigned based on tumor architecture on Hematoxylin and Eosin (H&E) stained whole slide images (WSI) by the pathologists. This process is time-consuming and has known interobserver variability. In the past few years, deep learning algorithms have been used to analyze histopathology images, delivering promising results for grading prostate cancer. However, most of the algorithms rely on the fully annotated datasets which are expensive to generate. In this work, we proposed a novel weakly-supervised algorithm to classify prostate cancer grades. The proposed algorithm consists of three steps: (1) extracting discriminative areas in a histopathology image by employing the Multiple Instance Learning (MIL) algorithm based on Transformers, (2) representing the image by constructing a graph using the discriminative patches, and (3) classifying the image into its Gleason grades by developing a Graph Convolutional Neural Network (GCN) based on the gated attention mechanism. We evaluated our algorithm using publicly available datasets, including TCGAPRAD, PANDA, and Gleason 2019 challenge datasets. We also cross validated the algorithm on an independent dataset. Results show that the proposed model achieved state-of-the-art performance in the Gleason grading task in terms of accuracy, F1 score, and cohen-kappa. The code is available at https://github.com/NabaviLab/Prostate-Cancer.
△ Less
Submitted 24 December, 2022;
originally announced December 2022.
-
Predicting Treatment Adherence of Tuberculosis Patients at Scale
Authors:
Mihir Kulkarni,
Satvik Golechha,
Rishi Raj,
Jithin Sreedharan,
Ankit Bhardwaj,
Santanu Rathod,
Bhavin Vadera,
Jayakrishna Kurada,
Sanjay Mattoo,
Rajendra Joshi,
Kirankumar Rade,
Alpan Raval
Abstract:
Tuberculosis (TB), an infectious bacterial disease, is a significant cause of death, especially in low-income countries, with an estimated ten million new cases reported globally in $2020$. While TB is treatable, non-adherence to the medication regimen is a significant cause of morbidity and mortality. Thus, proactively identifying patients at risk of dropping off their medication regimen enables…
▽ More
Tuberculosis (TB), an infectious bacterial disease, is a significant cause of death, especially in low-income countries, with an estimated ten million new cases reported globally in $2020$. While TB is treatable, non-adherence to the medication regimen is a significant cause of morbidity and mortality. Thus, proactively identifying patients at risk of dropping off their medication regimen enables corrective measures to mitigate adverse outcomes. Using a proxy measure of extreme non-adherence and a dataset of nearly $700,000$ patients from four states in India, we formulate and solve the machine learning (ML) problem of early prediction of non-adherence based on a custom rank-based metric. We train ML models and evaluate against baselines, achieving a $\sim 100\%$ lift over rule-based baselines and $\sim 214\%$ over a random classifier, taking into account country-wide large-scale future deployment. We deal with various issues in the process, including data quality, high-cardinality categorical data, low target prevalence, distribution shift, variation across cohorts, algorithmic fairness, and the need for robustness and explainability. Our findings indicate that risk stratification of non-adherent patients is a viable, deployable-at-scale ML solution. As the official AI partner of India's Central TB Division, we are working on multiple city and state-level pilots with the goal of pan-India deployment.
△ Less
Submitted 15 November, 2022; v1 submitted 5 November, 2022;
originally announced November 2022.
-
Almost Exact Risk Budgeting with Return Forecasts for Portfolio Allocation
Authors:
Avinash Bhardwaj,
Manjesh K Hanawal,
Purushottam Parthasarathy
Abstract:
In this paper, we revisit the portfolio allocation problem with designated risk-budget [Qian, 2005]. We generalize the problem of arbitrary risk budgets with unequal correlations to one that includes return forecasts and transaction costs while keeping the no-shorting (long-only positions) constraint. We offer a convex second order cone formulation that scales well with the number of assets and ex…
▽ More
In this paper, we revisit the portfolio allocation problem with designated risk-budget [Qian, 2005]. We generalize the problem of arbitrary risk budgets with unequal correlations to one that includes return forecasts and transaction costs while keeping the no-shorting (long-only positions) constraint. We offer a convex second order cone formulation that scales well with the number of assets and explore solutions to the problem in different settings. In particular, the problem is solved on a few practical cases - on equity and bond asset allocation problems as well as formulating index constituents for the NASDAQ100 index, illustrating the benefits of this approach.
△ Less
Submitted 3 October, 2022;
originally announced October 2022.
-
Unsupervised Early Exit in DNNs with Multiple Exits
Authors:
Hari Narayan N U,
Manjesh K. Hanawal,
Avinash Bhardwaj
Abstract:
Deep Neural Networks (DNNs) are generally designed as sequentially cascaded differentiable blocks/layers with a prediction module connected only to its last layer. DNNs can be attached with prediction modules at multiple points along the backbone where inference can stop at an intermediary stage without passing through all the modules. The last exit point may offer a better prediction error but al…
▽ More
Deep Neural Networks (DNNs) are generally designed as sequentially cascaded differentiable blocks/layers with a prediction module connected only to its last layer. DNNs can be attached with prediction modules at multiple points along the backbone where inference can stop at an intermediary stage without passing through all the modules. The last exit point may offer a better prediction error but also involves more computational resources and latency. An exit point that is `optimal' in terms of both prediction error and cost is desirable. The optimal exit point may depend on the latent distribution of the tasks and may change from one task type to another. During neural inference, the ground truth of instances may not be available and error rates at each exit point cannot be estimated. Hence one is faced with the problem of selecting the optimal exit in an unsupervised setting. Prior works tackled this problem in an offline supervised setting assuming that enough labeled data is available to estimate the error rate at each exit point and tune the parameters for better accuracy. However, pre-trained DNNs are often deployed in new domains for which a large amount of ground truth may not be available. We model the problem of exit selection as an unsupervised online learning problem and use bandit theory to identify the optimal exit point. Specifically, we focus on Elastic BERT, a pre-trained multi-exit DNN to demonstrate that it `nearly' satisfies the Strong Dominance (SD) property making it possible to learn the optimal exit in an online setup without knowing the ground truth labels. We develop upper confidence bound (UCB) based algorithm named UEE-UCB that provably achieves sub-linear regret under the SD property. Thus our method provides a means to adaptively learn domain-specific optimal exit points in multi-exit DNNs. We empirically validate our algorithm on IMDb and Yelp datasets.
△ Less
Submitted 20 September, 2022;
originally announced September 2022.
-
Computer vision based vehicle tracking as a complementary and scalable approach to RFID tagging
Authors:
Pranav Kant Gaur,
Abhilash Bhardwaj,
Pritam Shete,
Mohini Laghate,
Dinesh M Sarode
Abstract:
Logging of incoming/outgoing vehicles serves as a piece of critical information for root-cause analysis to combat security breach incidents in various sensitive organizations. RFID tagging hampers the scalability of vehicle tracking solutions on both logistics as well as technical fronts. For instance, requiring each incoming vehicle(departmental or private) to be RFID tagged is a severe constrain…
▽ More
Logging of incoming/outgoing vehicles serves as a piece of critical information for root-cause analysis to combat security breach incidents in various sensitive organizations. RFID tagging hampers the scalability of vehicle tracking solutions on both logistics as well as technical fronts. For instance, requiring each incoming vehicle(departmental or private) to be RFID tagged is a severe constraint and coupling video analytics with RFID to detect abnormal vehicle movement is non-trivial. We leverage publicly available implementations of computer vision algorithms to develop an interpretable vehicle tracking algorithm using finite-state machine formalism. The state-machine consumes input from the cascaded object detection and optical character recognition(OCR) models for state transitions. We evaluated the proposed method on 75 video clips of 285 vehicles from our system deployment site. We observed that the detection rate is most affected by the speed and the type of vehicle. The highest detection rate is achieved when the vehicle movement is restricted to follow a movement restrictions(SOP) at the checkpoint similar to RFID tagging. We further analyzed 700 vehicle tracking predictions on live-data and identified that the majority of vehicle number prediction errors are due to illegible-text, image-blur, text occlusion and out-of-vocab letters in vehicle numbers. Towards system deployment and performance enhancement, we expect our ongoing system monitoring to provide evidences to establish a higher vehicle-throughput SOP at the security checkpoint as well as to drive the fine-tuning of the deployed computer-vision models and the state-machine to establish the proposed approach as a promising alternative to RFID-tagging.
△ Less
Submitted 13 September, 2022;
originally announced September 2022.
-
Persuasion Strategies in Advertisements
Authors:
Yaman Kumar Singla,
Rajat Jha,
Arunim Gupta,
Milan Aggarwal,
Aditya Garg,
Tushar Malyan,
Ayush Bhardwaj,
Rajiv Ratn Shah,
Balaji Krishnamurthy,
Changyou Chen
Abstract:
Modeling what makes an advertisement persuasive, i.e., eliciting the desired response from consumer, is critical to the study of propaganda, social psychology, and marketing. Despite its importance, computational modeling of persuasion in computer vision is still in its infancy, primarily due to the lack of benchmark datasets that can provide persuasion-strategy labels associated with ads. Motivat…
▽ More
Modeling what makes an advertisement persuasive, i.e., eliciting the desired response from consumer, is critical to the study of propaganda, social psychology, and marketing. Despite its importance, computational modeling of persuasion in computer vision is still in its infancy, primarily due to the lack of benchmark datasets that can provide persuasion-strategy labels associated with ads. Motivated by persuasion literature in social psychology and marketing, we introduce an extensive vocabulary of persuasion strategies and build the first ad image corpus annotated with persuasion strategies. We then formulate the task of persuasion strategy prediction with multi-modal learning, where we design a multi-task attention fusion model that can leverage other ad-understanding tasks to predict persuasion strategies. Further, we conduct a real-world case study on 1600 advertising campaigns of 30 Fortune-500 companies where we use our model's predictions to analyze which strategies work with different demographics (age and gender). The dataset also provides image segmentation masks, which labels persuasion strategies in the corresponding ad images on the test split. We publicly release our code and dataset https://midas-research.github.io/persuasion-advertisements/.
△ Less
Submitted 6 May, 2023; v1 submitted 20 August, 2022;
originally announced August 2022.
-
Implicit Session Contexts for Next-Item Recommendations
Authors:
Sejoon Oh,
Ankur Bhardwaj,
Jongseok Han,
Sungchul Kim,
Ryan A. Rossi,
Srijan Kumar
Abstract:
Session-based recommender systems capture the short-term interest of a user within a session. Session contexts (i.e., a user's high-level interests or intents within a session) are not explicitly given in most datasets, and implicitly inferring session context as an aggregation of item-level attributes is crude. In this paper, we propose ISCON, which implicitly contextualizes sessions. ISCON first…
▽ More
Session-based recommender systems capture the short-term interest of a user within a session. Session contexts (i.e., a user's high-level interests or intents within a session) are not explicitly given in most datasets, and implicitly inferring session context as an aggregation of item-level attributes is crude. In this paper, we propose ISCON, which implicitly contextualizes sessions. ISCON first generates implicit contexts for sessions by creating a session-item graph, learning graph embeddings, and clustering to assign sessions to contexts. ISCON then trains a session context predictor and uses the predicted contexts' embeddings to enhance the next-item prediction accuracy. Experiments on four datasets show that ISCON has superior next-item prediction accuracy than state-of-the-art models. A case study of ISCON on the Reddit dataset confirms that assigned session contexts are unique and meaningful.
△ Less
Submitted 18 August, 2022;
originally announced August 2022.
-
Exploration of an End-to-End Automatic Number-plate Recognition neural network for Indian datasets
Authors:
Sai Sirisha Nadiminti,
Pranav Kant Gaur,
Abhilash Bhardwaj
Abstract:
Indian vehicle number plates have wide variety in terms of size, font, script and shape. Development of Automatic Number Plate Recognition (ANPR) solutions is therefore challenging, necessitating a diverse dataset to serve as a collection of examples. However, a comprehensive dataset of Indian scenario is missing, thereby, hampering the progress towards publicly available and reproducible ANPR sol…
▽ More
Indian vehicle number plates have wide variety in terms of size, font, script and shape. Development of Automatic Number Plate Recognition (ANPR) solutions is therefore challenging, necessitating a diverse dataset to serve as a collection of examples. However, a comprehensive dataset of Indian scenario is missing, thereby, hampering the progress towards publicly available and reproducible ANPR solutions. Many countries have invested efforts to develop comprehensive ANPR datasets like Chinese City Parking Dataset (CCPD) for China and Application-oriented License Plate (AOLP) dataset for US. In this work, we release an expanding dataset presently consisting of 1.5k images and a scalable and reproducible procedure of enhancing this dataset towards development of ANPR solution for Indian conditions. We have leveraged this dataset to explore an End-to-End (E2E) ANPR architecture for Indian scenario which was originally proposed for Chinese Vehicle number-plate recognition based on the CCPD dataset. As we customized the architecture for our dataset, we came across insights, which we have discussed in this paper. We report the hindrances in direct reusability of the model provided by the authors of CCPD because of the extreme diversity in Indian number plates and differences in distribution with respect to the CCPD dataset. An improvement of 42.86% was observed in LP detection after aligning the characteristics of Indian dataset with Chinese dataset. In this work, we have also compared the performance of the E2E number-plate detection model with YOLOv5 model, pre-trained on COCO dataset and fine-tuned on Indian vehicle images. Given that the number Indian vehicle images used for fine-tuning the detection module and yolov5 were same, we concluded that it is more sample efficient to develop an ANPR solution for Indian conditions based on COCO dataset rather than CCPD dataset.
△ Less
Submitted 14 July, 2022;
originally announced July 2022.
-
A View Independent Classification Framework for Yoga Postures
Authors:
Mustafa Chasmai,
Nirjhar Das,
Aman Bhardwaj,
Rahul Garg
Abstract:
Yoga is a globally acclaimed and widely recommended practice for a healthy living. Maintaining correct posture while performing a Yogasana is of utmost importance. In this work, we employ transfer learning from Human Pose Estimation models for extracting 136 key-points spread all over the body to train a Random Forest classifier which is used for estimation of the Yogasanas. The results are evalua…
▽ More
Yoga is a globally acclaimed and widely recommended practice for a healthy living. Maintaining correct posture while performing a Yogasana is of utmost importance. In this work, we employ transfer learning from Human Pose Estimation models for extracting 136 key-points spread all over the body to train a Random Forest classifier which is used for estimation of the Yogasanas. The results are evaluated on an in-house collected extensive yoga video database of 51 subjects recorded from 4 different camera angles. We propose a 3 step scheme for evaluating the generalizability of a Yoga classifier by testing it on 1) unseen frames, 2) unseen subjects, and 3) unseen camera angles. We argue that for most of the applications, validation accuracies on unseen subjects and unseen camera angles would be most important. We empirically analyze over three public datasets, the advantage of transfer learning and the possibilities of target leakage. We further demonstrate that the classification accuracies critically depend on the cross validation method employed and can often be misleading. To promote further research, we have made key-points dataset and code publicly available.
△ Less
Submitted 14 August, 2022; v1 submitted 27 June, 2022;
originally announced June 2022.
-
IRC-safe Graph Autoencoder for unsupervised anomaly detection
Authors:
Oliver Atkinson,
Akanksha Bhardwaj,
Christoph Englert,
Partha Konar,
Vishal S. Ngairangbam,
Michael Spannowsky
Abstract:
Anomaly detection through employing machine learning techniques has emerged as a novel powerful tool in the search for new physics beyond the Standard Model. Historically similar to the development of jet observables, theoretical consistency has not always assumed a central role in the fast development of algorithms and neural network architectures. In this work, we construct an infrared and colli…
▽ More
Anomaly detection through employing machine learning techniques has emerged as a novel powerful tool in the search for new physics beyond the Standard Model. Historically similar to the development of jet observables, theoretical consistency has not always assumed a central role in the fast development of algorithms and neural network architectures. In this work, we construct an infrared and collinear safe autoencoder based on graph neural networks by employing energy-weighted message passing. We demonstrate that whilst this approach has theoretically favourable properties, it also exhibits formidable sensitivity to non-QCD structures.
△ Less
Submitted 31 July, 2022; v1 submitted 26 April, 2022;
originally announced April 2022.
-
MHATC: Autism Spectrum Disorder identification utilizing multi-head attention encoder along with temporal consolidation modules
Authors:
Ranjeet Ranjan Jha,
Abhishek Bhardwaj,
Devin Garg,
Arnav Bhavsar,
Aditya Nigam
Abstract:
Resting-state fMRI is commonly used for diagnosing Autism Spectrum Disorder (ASD) by using network-based functional connectivity. It has been shown that ASD is associated with brain regions and their inter-connections. However, discriminating based on connectivity patterns among imaging data of the control population and that of ASD patients' brains is a non-trivial task. In order to tackle said c…
▽ More
Resting-state fMRI is commonly used for diagnosing Autism Spectrum Disorder (ASD) by using network-based functional connectivity. It has been shown that ASD is associated with brain regions and their inter-connections. However, discriminating based on connectivity patterns among imaging data of the control population and that of ASD patients' brains is a non-trivial task. In order to tackle said classification task, we propose a novel deep learning architecture (MHATC) consisting of multi-head attention and temporal consolidation modules for classifying an individual as a patient of ASD. The devised architecture results from an in-depth analysis of the limitations of current deep neural network solutions for similar applications. Our approach is not only robust but computationally efficient, which can allow its adoption in a variety of other research and clinical settings.
△ Less
Submitted 27 December, 2021;
originally announced January 2022.
-
Multi-Image Visual Question Answering
Authors:
Harsh Raj,
Janhavi Dadhania,
Akhilesh Bhardwaj,
Prabuchandran KJ
Abstract:
While a lot of work has been done on developing models to tackle the problem of Visual Question Answering, the ability of these models to relate the question to the image features still remain less explored. We present an empirical study of different feature extraction methods with different loss functions. We propose New dataset for the task of Visual Question Answering with multiple image inputs…
▽ More
While a lot of work has been done on developing models to tackle the problem of Visual Question Answering, the ability of these models to relate the question to the image features still remain less explored. We present an empirical study of different feature extraction methods with different loss functions. We propose New dataset for the task of Visual Question Answering with multiple image inputs having only one ground truth, and benchmark our results on them. Our final model utilising Resnet + RCNN image features and Bert embeddings, inspired from stacked attention network gives 39% word accuracy and 99% image accuracy on CLEVER+TinyImagenet dataset.
△ Less
Submitted 6 February, 2022; v1 submitted 27 December, 2021;
originally announced December 2021.
-
Performance Analysis and Optimization of Bidirectional Overlay Cognitive Radio Networks with Hybrid-SWIPT
Authors:
Addanki Prathima,
Devendra Singh Gurjar,
Ha H. Nguyen,
Ajay Bhardwaj
Abstract:
This paper considers a cooperative cognitive radio network with two primary users (PUs) and two secondary users (SUs) that enables two-way communications of primary and secondary systems in conjunction with non-linear energy harvesting based simultaneous wireless information and power transfer (SWIPT). With the considered network, SUs are able to realize their communications over the licensed spec…
▽ More
This paper considers a cooperative cognitive radio network with two primary users (PUs) and two secondary users (SUs) that enables two-way communications of primary and secondary systems in conjunction with non-linear energy harvesting based simultaneous wireless information and power transfer (SWIPT). With the considered network, SUs are able to realize their communications over the licensed spectrum while extending relay assistance to the PUs. The overall bidirectional end-to-end transmission takes place in four phases, which include both energy harvesting (EH) and information transfer. A non-linear energy harvester with a hybrid SWIPT scheme is adopted in which both power-splitting and time-switching EH techniques are used. The SUs aid in relay cooperation by performing an amplify-and-forward operation, whereas selection combining technique is adopted at the PUs to extract the intended signal from multiple received signals broadcasted by the SUs. Accurate outage probability expressions for the primary and secondary links are derived under the Nakagami-$m$ fading environment. Further, the system behavior is analyzed with respect to achievable system throughput and energy efficiency. Since the performance of the considered system is strongly affected by the spectrum sharing factor and hybrid SWIPT parameters, particle swarm optimization is implemented to optimize the system parameters so as to maximize the system throughput and energy efficiency. Simulation results are provided to corroborate the performance analysis and give useful insights into the system behavior concerning various system/channel parameters.
△ Less
Submitted 6 January, 2021;
originally announced January 2021.
-
Empowering Knowledge Distillation via Open Set Recognition for Robust 3D Point Cloud Classification
Authors:
Ayush Bhardwaj,
Sakshee Pimpale,
Saurabh Kumar,
Biplab Banerjee
Abstract:
Real-world scenarios pose several challenges to deep learning based computer vision techniques despite their tremendous success in research. Deeper models provide better performance, but are challenging to deploy and knowledge distillation allows us to train smaller models with minimal loss in performance. The model also has to deal with open set samples from classes outside the ones it was traine…
▽ More
Real-world scenarios pose several challenges to deep learning based computer vision techniques despite their tremendous success in research. Deeper models provide better performance, but are challenging to deploy and knowledge distillation allows us to train smaller models with minimal loss in performance. The model also has to deal with open set samples from classes outside the ones it was trained on and should be able to identify them as unknown samples while classifying the known ones correctly. Finally, most existing image recognition research focuses only on using two-dimensional snapshots of the real world three-dimensional objects. In this work, we aim to bridge these three research fields, which have been developed independently until now, despite being deeply interrelated. We propose a joint Knowledge Distillation and Open Set recognition training methodology for three-dimensional object recognition. We demonstrate the effectiveness of the proposed method via various experiments on how it allows us to obtain a much smaller model, which takes a minimal hit in performance while being capable of open set recognition for 3D point cloud data.
△ Less
Submitted 25 October, 2020;
originally announced October 2020.
-
Estimation and Decomposition of Rack Force for Driving on Uneven Roads
Authors:
Akshay Bhardwaj,
Daniel Slavin,
John Walsh,
James Freudenberg,
R. Brent Gillespie
Abstract:
The force transmitted from the front tires to the steering rack of a vehicle, called the rack force, plays an important role in the function of electric power steering (EPS) systems. Estimates of rack force can be used by EPS to attenuate road feedback and reduce driver effort. Further, estimates of the components of rack force (arising, for example, due to steering angle and road profile) can be…
▽ More
The force transmitted from the front tires to the steering rack of a vehicle, called the rack force, plays an important role in the function of electric power steering (EPS) systems. Estimates of rack force can be used by EPS to attenuate road feedback and reduce driver effort. Further, estimates of the components of rack force (arising, for example, due to steering angle and road profile) can be used to separately compensate for each component and thereby enhance steering feel. In this paper, we present three vehicle and tire model-based rack force estimators that utilize sensed steering angle and road profile to estimate total rack force and individual components of rack force. We test and compare the real-time performance of the estimators by performing driving experiments with non-aggressive and aggressive steering maneuvers on roads with low and high frequency profile variations. The results indicate that for aggressive maneuvers the estimators using non-linear tire models produce more accurate rack force estimates. Moreover, only the estimator that incorporates a semi-empirical Rigid Ring tire model is able to capture rack force variation for driving on a road with high frequency profile variation. Finally, we present results from a simulation study to validate the component-wise estimates of rack force.
△ Less
Submitted 12 July, 2020; v1 submitted 29 June, 2020;
originally announced June 2020.
-
The Effects of Driver Coupling and Automation Impedance on Emergency Steering Interventions
Authors:
Akshay Bhardwaj,
Yidu Lu,
Selina Pan,
Nadine Sarter,
Brent Gillespie
Abstract:
Automatic emergency steering maneuvers can be used to avoid more obstacles than emergency braking alone. While a steer-by-wire system can decouple the driver who might act as a disturbance during the emergency steering maneuver, the alternative in which the steering wheel remains coupled can enable the driver to cover for automation faults and conform to regulations that require the driver to reta…
▽ More
Automatic emergency steering maneuvers can be used to avoid more obstacles than emergency braking alone. While a steer-by-wire system can decouple the driver who might act as a disturbance during the emergency steering maneuver, the alternative in which the steering wheel remains coupled can enable the driver to cover for automation faults and conform to regulations that require the driver to retain control authority. In this paper we present results from a driving simulator study with 48 participants in which we tested the performance of three emergency steering intervention schemes. In the first scheme, the driver was decoupled and the automation system had full control over the vehicle. In the second and third schemes, the driver was coupled and the automation system was either given a high impedance or a low impedance. Two types of unexpected automation faults were also simulated. Results showed that a high impedance automation system results in significantly fewer collisions during intended steering interventions but significantly higher collisions during automation faults when compared to a low impedance automation system. Moreover, decoupling the driver did not seem to significantly influence the time required to hand back control to the driver. When coupled, drivers were able to cover for a faulty automation system and avoid obstacles to a certain degree, though differences by condition were significant for only one type of automation fault.
△ Less
Submitted 15 September, 2020; v1 submitted 10 June, 2020;
originally announced June 2020.
-
Performance metrics for intervention-triggering prediction models do not reflect an expected reduction in outcomes from using the model
Authors:
Alejandro Schuler,
Aashish Bhardwaj,
Vincent Liu
Abstract:
Clinical researchers often select among and evaluate risk prediction models using standard machine learning metrics based on confusion matrices. However, if these models are used to allocate interventions to patients, standard metrics calculated from retrospective data are only related to model utility (in terms of reductions in outcomes) under certain assumptions. When predictions are delivered r…
▽ More
Clinical researchers often select among and evaluate risk prediction models using standard machine learning metrics based on confusion matrices. However, if these models are used to allocate interventions to patients, standard metrics calculated from retrospective data are only related to model utility (in terms of reductions in outcomes) under certain assumptions. When predictions are delivered repeatedly throughout time (e.g. in a patient encounter), the relationship between standard metrics and utility is further complicated. Several kinds of evaluations have been used in the literature, but it has not been clear what the target of estimation is in each evaluation. We synthesize these approaches, determine what is being estimated in each of them, and discuss under what assumptions those estimates are valid. We demonstrate our insights using simulated data as well as real data used in the design of an early warning system. Our theoretical and empirical results show that evaluations without interventional data either do not estimate meaningful quantities, require strong assumptions, or are limited to estimating best-case scenario bounds.
△ Less
Submitted 2 June, 2020;
originally announced June 2020.
-
Impedance Modulation for Negotiating Control Authority in a Haptic Shared Control Paradigm
Authors:
Vahid Izadi,
Akshay Bhardwaj,
Amir H. Ghasemi
Abstract:
Communication and cooperation among team members can be enhanced significantly with physical interaction. Successful collaboration requires the integration of the individual partners' intentions into a shared action plan, which may involve a continuous negotiation of intentions and roles. This paper presents an adaptive haptic shared control framework wherein a human driver and an automation syste…
▽ More
Communication and cooperation among team members can be enhanced significantly with physical interaction. Successful collaboration requires the integration of the individual partners' intentions into a shared action plan, which may involve a continuous negotiation of intentions and roles. This paper presents an adaptive haptic shared control framework wherein a human driver and an automation system are physically connected through a motorized steering wheel. By virtue of haptic feedback, the driver and automation system can monitor each other actions and can still intuitively express their control intentions. The objective of this paper is to develop a systematic model for an automation system that can vary its impedance such that the control authority can transit between the two agents intuitively and smoothly. To this end, we defined a cost function that not only ensures the safety of the collaborative task but also takes account of the assistive behavior of the automation system. We employed a predictive controller based on modified least square to modulate the automation system impedance such that the cost function is optimized. The results demonstrate the significance of the proposed approach for negotiating the control authority, specifically when humans and automation are in a non-cooperative mode. Furthermore, the performance of the adaptive haptic shared control is compared with the traditional fixed automation impedance haptic shared control paradigm.
△ Less
Submitted 19 March, 2020; v1 submitted 21 January, 2020;
originally announced January 2020.
-
A Human-AI Loop Approach for Joint Keyword Discovery and Expectation Estimation in Micropost Event Detection
Authors:
Akansha Bhardwaj,
Jie Yang,
Philippe Cudré-Mauroux
Abstract:
Microblogging platforms such as Twitter are increasingly being used in event detection. Existing approaches mainly use machine learning models and rely on event-related keywords to collect the data for model training. These approaches make strong assumptions on the distribution of the relevant micro-posts containing the keyword -- referred to as the expectation of the distribution -- and use it as…
▽ More
Microblogging platforms such as Twitter are increasingly being used in event detection. Existing approaches mainly use machine learning models and rely on event-related keywords to collect the data for model training. These approaches make strong assumptions on the distribution of the relevant micro-posts containing the keyword -- referred to as the expectation of the distribution -- and use it as a posterior regularization parameter during model training. Such approaches are, however, limited as they fail to reliably estimate the informativeness of a keyword and its expectation for model training. This paper introduces a Human-AI loop approach to jointly discover informative keywords for model training while estimating their expectation. Our approach iteratively leverages the crowd to estimate both keyword specific expectation and the disagreement between the crowd and the model in order to discover new keywords that are most beneficial for model training. These keywords and their expectation not only improve the resulting performance but also make the model training process more transparent. We empirically demonstrate the merits of our approach, both in terms of accuracy and interpretability, on multiple real-world datasets and show that our approach improves the state of the art by 24.3%.
△ Less
Submitted 2 December, 2019;
originally announced December 2019.
-
When a Period Is Not a Full Stop: Light Curve Structure Reveals Fundamental Parameters of Cepheid and RR Lyrae Stars
Authors:
Earl P. Bellinger,
Shashi M. Kanbur,
Anupam Bhardwaj,
Marcella Marconi
Abstract:
The period of pulsation and the structure of the light curve for Cepheid and RR Lyrae variables depend on the fundamental parameters of the star: mass, radius, luminosity, and effective temperature. Here we train artificial neural networks on theoretical pulsation models to predict the fundamental parameters of these stars based on their period and light curve structure. We find significant improv…
▽ More
The period of pulsation and the structure of the light curve for Cepheid and RR Lyrae variables depend on the fundamental parameters of the star: mass, radius, luminosity, and effective temperature. Here we train artificial neural networks on theoretical pulsation models to predict the fundamental parameters of these stars based on their period and light curve structure. We find significant improvements to estimates of these parameters made using light curve structure and period over estimates made using only the period. Given that the models are able to reproduce most observables, we find that the fundamental parameters of these stars can be estimated up to 60% more accurately when light curve structure is taken into consideration. We quantify which aspects of light curve structure are most important in determining fundamental parameters, and find for example that the second Fourier amplitude component of RR Lyrae light curves is even more important than period in determining the effective temperature of the star. We apply this analysis to observations of hundreds Cepheids in the Large Magellanic Cloud and thousands of RR Lyrae in the Magellanic Clouds and Galactic bulge to produce catalogs of estimated masses, radii, luminosities, and other parameters of these stars. As an example application, we estimate Wesenheit indices and use those to derive distance moduli to the Magellanic Clouds of $μ_{\text{LMC},\text{CEP}} = 18.688 \pm 0.093$, $μ_{\text{LMC},\text{RRL}} = 18.52 \pm 0.14$, and $μ_{\text{SMC},\text{RRL}} = 18.88 \pm 0.17$ mag.
△ Less
Submitted 25 November, 2019;
originally announced November 2019.
-
Easy Mobile Meter Reading for Non-Smart Meters: Comparison of AWS Rekognition and Google Cloud Vision Approaches
Authors:
Maria Spichkova,
Johan van Zyl,
Siddharth Sachdev,
Ashish Bhardwaj,
Nirav Desai
Abstract:
Electricity and gas meter reading is a time consuming task, which is done manually in most cases. There are some approaches proposing use of smart meters that report their readings automatically. However, this solution is expensive and requires (1) replacement of the existing meters, even when they are functional and new, and (2) large changes of the whole system dealing with the meter readings. T…
▽ More
Electricity and gas meter reading is a time consuming task, which is done manually in most cases. There are some approaches proposing use of smart meters that report their readings automatically. However, this solution is expensive and requires (1) replacement of the existing meters, even when they are functional and new, and (2) large changes of the whole system dealing with the meter readings. This paper presents results of a project on automation of the meter reading process for the standard (non-smart) meters using computer vision techniques, focusing on the comparison of two computer vision techniques, Google Cloud Vision and AWS Rekognition.
△ Less
Submitted 21 October, 2019;
originally announced October 2019.
-
SentiCite: An Approach for Publication Sentiment Analysis
Authors:
Dominique Mercier,
Akansha Bhardwaj,
Andreas Dengel,
Sheraz Ahmed
Abstract:
With the rapid growth in the number of scientific publications, year after year, it is becoming increasingly difficult to identify quality authoritative work on a single topic. Though there is an availability of scientometric measures which promise to offer a solution to this problem, these measures are mostly quantitative and rely, for instance, only on the number of times an article is cited. Wi…
▽ More
With the rapid growth in the number of scientific publications, year after year, it is becoming increasingly difficult to identify quality authoritative work on a single topic. Though there is an availability of scientometric measures which promise to offer a solution to this problem, these measures are mostly quantitative and rely, for instance, only on the number of times an article is cited. With this approach, it becomes irrelevant if an article is cited 10 times in a positive, negative or neutral way. In this context, it is quite important to study the qualitative aspect of a citation to understand its significance. This paper presents a novel system for sentiment analysis of citations in scientific documents (SentiCite) and is also capable of detecting nature of citations by targeting the motivation behind a citation, e.g., reference to a dataset, reading reference. Furthermore, the paper also presents two datasets (SentiCiteDB and IntentCiteDB) containing about 2,600 citations with their ground truth for sentiment and nature of citation. SentiCite along with other state-of-the-art methods for sentiment analysis are evaluated on the presented datasets. Evaluation results reveal that SentiCite outperforms state-of-the-art methods for sentiment analysis in scientific publications by achieving a F1-measure of 0.71.
△ Less
Submitted 7 October, 2019;
originally announced October 2019.
-
Multiple D2D Multicasts in Underlay Cellular Networks
Authors:
Ajay Bhardwaj,
Samar Agnihotri
Abstract:
Multicasting for disseminating popular data is an interesting solution for improving the energy and spectral efficiencies of cellular networks. To improve the achievable performance of such networks, underlay device-to-device (D2D) multicast communication offers a practical solution. However, despite significant potential for providing higher throughput and lower delay, implementing underlay D2D m…
▽ More
Multicasting for disseminating popular data is an interesting solution for improving the energy and spectral efficiencies of cellular networks. To improve the achievable performance of such networks, underlay device-to-device (D2D) multicast communication offers a practical solution. However, despite significant potential for providing higher throughput and lower delay, implementing underlay D2D multicast communication poses several challenges, such as mutual interference among cellular users (CUs) and D2D multicast groups (MGs), and overhead signaling to provide channel state information, that may limit potential gains. We study a scenario where multiple D2D multicast groups may share a CU's uplink channel. We formulate an optimization problem to maximize the achievable system throughput while fulfilling quality of service (QoS) requirements of every CU and D2D MGs, subject to their corresponding maximum transmit power constraints. The formulated optimization problem is an instance of mixed integer non-linear programming (MINLP) problem, which is computationally intractable, in general. Therefore, to find a feasible solution, we propose a pragmatic two-step process of channel allocation and power allocation. In the first-step, we propose a channel allocation algorithm, which determines the subset of MGs that may share a channel subject to criteria based on two different parameters: interference and outage probabilities. Then, we propose an algorithm to allocate power to these MG subsets that maximizes the system throughput, while satisfying transmit power constraint. Numerical results show the efficacy of proposed approach in terms of higher achievable sum throughput and better spectrum efficiency with respect to various existing schemes.
△ Less
Submitted 9 September, 2019; v1 submitted 23 August, 2019;
originally announced August 2019.
-
Adaptively Preconditioned Stochastic Gradient Langevin Dynamics
Authors:
Chandrasekaran Anirudh Bhardwaj
Abstract:
Stochastic Gradient Langevin Dynamics infuses isotropic gradient noise to SGD to help navigate pathological curvature in the loss landscape for deep networks. Isotropic nature of the noise leads to poor scaling, and adaptive methods based on higher order curvature information such as Fisher Scoring have been proposed to precondition the noise in order to achieve better convergence. In this paper,…
▽ More
Stochastic Gradient Langevin Dynamics infuses isotropic gradient noise to SGD to help navigate pathological curvature in the loss landscape for deep networks. Isotropic nature of the noise leads to poor scaling, and adaptive methods based on higher order curvature information such as Fisher Scoring have been proposed to precondition the noise in order to achieve better convergence. In this paper, we describe an adaptive method to estimate the parameters of the noise and conduct experiments on well-known model architectures to show that the adaptively preconditioned SGLD method achieves convergence with the speed of adaptive first order methods such as Adam, AdaGrad etc. and achieves generalization equivalent of SGD in the test set.
△ Less
Submitted 12 June, 2019; v1 submitted 10 June, 2019;
originally announced June 2019.
-
D2D Multicast in Underlay Cellular Networks with Exclusion Zones
Authors:
Ajay Bhardwaj,
Samar Agnihotri
Abstract:
Underlay device-to-device (D2D) multicast communication has potential to improve performance of cellular networks. However, co-channel interference among cellular users (CUs) and D2D multicast groups (MGs) limits the gains of such communication. Allowing the CUs to have exclusion zones around them where no receiver of any MG can exist, is a realistic and pragmatic approach to reduce the co-channel…
▽ More
Underlay device-to-device (D2D) multicast communication has potential to improve performance of cellular networks. However, co-channel interference among cellular users (CUs) and D2D multicast groups (MGs) limits the gains of such communication. Allowing the CUs to have exclusion zones around them where no receiver of any MG can exist, is a realistic and pragmatic approach to reduce the co-channel interference of cellular transmission on D2D multicast reception. We use a stochastic geometry based approach to model this scenario. Specifically, we model the locations of CUs and D2D MG receivers with homogeneous Poisson Point Process (PPP), and Poisson Hole Process (PHP), respectively. We formulate the network sum throughput maximization problem in terms of a joint MG channel and power allocation problem with constraints on cellular and MG users maximum transmit and acceptable quality of service. We establish that the MG channel allocation problem has computational complexity that is exponential in both, the number of MGs and the number of available cellular channels. Then, we decompose this problem into two subproblems: subset selection problem and subset channel assignment problem. Based on observations and insights obtained from numerical analysis of the optimal solution of the subset selection problem in wide variety of scenarios, we propose a computationally efficient scheme that achieves almost optimal performance for the subset selection problem. We further provide a computationally efficient algorithm that achieves almost optimal performance for the subset channel assignment problem. Finally, combining these two schemes, we provide a computationally efficient and almost optimal scheme to solve the channel allocation problem, and various results and insights on the variation of the optimal system performance with respect to different system parameters
△ Less
Submitted 6 May, 2019; v1 submitted 1 May, 2019;
originally announced May 2019.
-
Dynamic Feature Scaling for K-Nearest Neighbor Algorithm
Authors:
Chandrasekaran Anirudh Bhardwaj,
Megha Mishra,
Kalyani Desikan
Abstract:
Nearest Neighbors Algorithm is a Lazy Learning Algorithm, in which the algorithm tries to approximate the predictions with the help of similar existing vectors in the training dataset. The predictions made by the K-Nearest Neighbors algorithm is based on averaging the target values of the spatial neighbors. The selection process for neighbors in the Hermitian space is done with the help of distanc…
▽ More
Nearest Neighbors Algorithm is a Lazy Learning Algorithm, in which the algorithm tries to approximate the predictions with the help of similar existing vectors in the training dataset. The predictions made by the K-Nearest Neighbors algorithm is based on averaging the target values of the spatial neighbors. The selection process for neighbors in the Hermitian space is done with the help of distance metrics such as Euclidean distance, Minkowski distance, Mahalanobis distance etc. A majority of the metrics such as Euclidean distance are scale variant, meaning that the results could vary for different range of values used for the features. Standard techniques used for the normalization of scaling factors are feature scaling method such as Z-score normalization technique, Min-Max scaling etc. Scaling methods uniformly assign equal weights to all the features, which might result in a non-ideal situation. This paper proposes a novel method to assign weights to individual feature with the help of out of bag errors obtained from constructing multiple decision tree models.
△ Less
Submitted 12 November, 2018;
originally announced November 2018.
-
Validating the Claim - Defeating HaTCh : Building Malicious IP cores
Authors:
Anshu Bhardwaj,
Subir Kr Roy
Abstract:
This paper defends the design of hardware Trojan proposed in the paper "Defeating HaTCh: Building Malicious IP Cores" by defining the four critical properties which are required to be satisfied to classify it to belong to class of Deterministic Hardware Trojan. This is to counter the claims of authors of HaTCh in their paper "Comments on Defeating HaTCh".
This paper defends the design of hardware Trojan proposed in the paper "Defeating HaTCh: Building Malicious IP Cores" by defining the four critical properties which are required to be satisfied to classify it to belong to class of Deterministic Hardware Trojan. This is to counter the claims of authors of HaTCh in their paper "Comments on Defeating HaTCh".
△ Less
Submitted 18 September, 2018;
originally announced September 2018.
-
Domain Aware Markov Logic Networks
Authors:
Happy Mittal,
Ayush Bhardwaj,
Vibhav Gogate,
Parag Singla
Abstract:
Combining logic and probability has been a long stand- ing goal of AI research. Markov Logic Networks (MLNs) achieve this by attaching weights to formulas in first-order logic, and can be seen as templates for constructing features for ground Markov networks. Most techniques for learning weights of MLNs are domain-size agnostic, i.e., the size of the domain is not explicitly taken into account whi…
▽ More
Combining logic and probability has been a long stand- ing goal of AI research. Markov Logic Networks (MLNs) achieve this by attaching weights to formulas in first-order logic, and can be seen as templates for constructing features for ground Markov networks. Most techniques for learning weights of MLNs are domain-size agnostic, i.e., the size of the domain is not explicitly taken into account while learn- ing the parameters of the model. This often results in ex- treme probabilities when testing on domain sizes different from those seen during training. In this paper, we propose Domain Aware Markov logic Networks (DA-MLNs) which present a principled solution to this problem. While defin- ing the ground network distribution, DA-MLNs divide the ground feature weight by a scaling factor which is a function of the number of connections the ground atoms appearing in the feature are involved in. We show that standard MLNs fall out as a special case of our formalism when this func- tion evaluates to a constant equal to 1. Experiments on the benchmark Friends & Smokers domain show that our ap- proach results in significantly higher accuracies compared to existing methods when testing on domains whose sizes different from those seen during training.
△ Less
Submitted 7 July, 2018; v1 submitted 3 July, 2018;
originally announced July 2018.
-
Energy- and Spectral- Efficiency Tradeoff for D2D-Multicasts in Underlay Cellular Networks
Authors:
Ajay Bhardwaj,
Samar Agnihotri
Abstract:
Underlay in-band device-to-device (D2D) multicast communication, where the same content is disseminated via direct links in a group, has the potential to improve the spectral and energy efficiencies of cellular networks. However, most of the existing approaches for this problem only address either spectral efficiency (SE) or energy efficiency (EE). We study the tradeoff between SE and EE in a sing…
▽ More
Underlay in-band device-to-device (D2D) multicast communication, where the same content is disseminated via direct links in a group, has the potential to improve the spectral and energy efficiencies of cellular networks. However, most of the existing approaches for this problem only address either spectral efficiency (SE) or energy efficiency (EE). We study the tradeoff between SE and EE in a single cell D2D integrated cellular network, where multiple D2D multicast groups (MGs) may share the uplink channel with multiple cellular users (CUs). We formulate the EE maximization problem with constraint on SE and maximum available transmission power. A power allocation algorithm is proposed to solve this problem and its efficacy is demonstrated via extensive numerical simulations. The tradeoff between SE and EE as a function of density of D2D MGs, and maximum transmission power of a MG is characterized.
△ Less
Submitted 12 December, 2017; v1 submitted 1 December, 2017;
originally announced December 2017.
-
A Maximal Heterogeneity Based Clustering Approach for Obtaining Samples
Authors:
Megha Mishra,
Chandrasekaran Anirudh Bhardwaj,
Kalyani Desikan
Abstract:
Medical and social sciences demand sampling techniques which are robust, reliable, replicable and have the least dissimilarity between the samples obtained. Majority of the applications of sampling use randomized sampling, albeit with stratification where applicable. The randomized technique is not consistent, and may provide different samples each time, and the different samples themselves may no…
▽ More
Medical and social sciences demand sampling techniques which are robust, reliable, replicable and have the least dissimilarity between the samples obtained. Majority of the applications of sampling use randomized sampling, albeit with stratification where applicable. The randomized technique is not consistent, and may provide different samples each time, and the different samples themselves may not be similar to each other. In this paper, we introduce a novel non-statistical no-replacement sampling technique called Wobbly Center Algorithm, which relies on building clusters iteratively based on maximizing the heterogeneity inside each cluster. The algorithm works on the principle of stepwise building of clusters by finding the points with the maximal distance from the cluster center. The obtained results are validated statistically using Analysis of Variance tests by comparing the samples obtained to check if they are representative of each other. The obtained results generated from running the Wobbly Center algorithm on benchmark datasets when compared against other sampling algorithms indicate the superiority of the Wobbly Center Algorithm.
△ Less
Submitted 8 December, 2018; v1 submitted 2 September, 2017;
originally announced September 2017.
-
An Automated Compatibility Prediction Engine using DISC Theory Based Classification and Neural Networks
Authors:
Chandrasekaran Anirudh Bhardwaj,
Megha Mishra,
Sweetlin Hemalatha
Abstract:
Traditionally psychometric tests were used for profiling incoming workers. These methods use DISC profiling method to classify people into distinct personality types, which are further used to predict if a person may be a possible fit to the organizational culture. This concept is taken further by introducing a novel technique to predict if a particular pair of an incoming worker and the manager b…
▽ More
Traditionally psychometric tests were used for profiling incoming workers. These methods use DISC profiling method to classify people into distinct personality types, which are further used to predict if a person may be a possible fit to the organizational culture. This concept is taken further by introducing a novel technique to predict if a particular pair of an incoming worker and the manager being assigned are compatible at a psychological scale. This is done using multilayer perceptron neural network which can be adaptively trained to showcase the true nature of the compatibility index. The proposed prototype model is used to quantify the relevant attributes, use them to train the prediction engine, and to define the data pipeline required for it.
△ Less
Submitted 2 September, 2017;
originally announced September 2017.
-
Ontology-based Classification and Analysis of non- emergency Smart-city Events
Authors:
Monika Rani,
Sanchit Alekh,
Aditya Bhardwaj,
Abhinav Gupta,
O. P. Vyas
Abstract:
Several challenges are faced by citizens of urban centers while dealing with day-to-day events, and the absence of a centralised reporting mechanism makes event-reporting and redressal a daunting task. With the push on information technology to adapt to the needs of smart-cities and integrate urban civic services, the use of Open311 architecture presents an interesting solution. In this paper, we…
▽ More
Several challenges are faced by citizens of urban centers while dealing with day-to-day events, and the absence of a centralised reporting mechanism makes event-reporting and redressal a daunting task. With the push on information technology to adapt to the needs of smart-cities and integrate urban civic services, the use of Open311 architecture presents an interesting solution. In this paper, we present a novel approach that uses an existing Open311 ontology to classify and report non-emergency city-events, as well as to guide the citizen to the points of redressal. The use of linked open data and the semantic model serves to provide contextual meaning and make vast amounts of content hyper-connected and easily-searchable. Such a one-size-fits-all model also ensures reusability and effective visualisation and analysis of data across several cities. By integrating urban services across various civic bodies, the proposed approach provides a single endpoint to the citizen, which is imperative for smooth functioning of smart cities.
△ Less
Submitted 2 August, 2017;
originally announced August 2017.
-
User Intent Classification using Memory Networks: A Comparative Analysis for a Limited Data Scenario
Authors:
Arjun Bhardwaj,
Alexander Rudnicky
Abstract:
In this report, we provide a comparative analysis of different techniques for user intent classification towards the task of app recommendation. We analyse the performance of different models and architectures for multi-label classification over a dataset with a relative large number of classes and only a handful examples of each class. We focus, in particular, on memory network architectures, and…
▽ More
In this report, we provide a comparative analysis of different techniques for user intent classification towards the task of app recommendation. We analyse the performance of different models and architectures for multi-label classification over a dataset with a relative large number of classes and only a handful examples of each class. We focus, in particular, on memory network architectures, and compare how well the different versions perform under the task constraints. Since the classifier is meant to serve as a module in a practical dialog system, it needs to be able to work with limited training data and incorporate new data on the fly. We devise a 1-shot learning task to test the models under the above constraint. We conclude that relatively simple versions of memory networks perform better than other approaches. Although, for tasks with very limited data, simple non-parametric methods perform comparably, without needing the extra training data.
△ Less
Submitted 19 June, 2017;
originally announced June 2017.
-
Security Algorithms for Cloud Computing Environment
Authors:
Akashdeep Bhardwaj,
GVB Subrahmanyam,
Vinay Avasthi,
Hanumat Sastry
Abstract:
In symmetric key cryptography the sender as well as the receiver possess a common key. Asymmetric key cryptography involves generation of two distinct keys which are used for encryption and decryption correspondingly. The sender converts the original message to cipher text using the public key while the receiver can decipher this using his private key. This is also called Public Key Cryptography.…
▽ More
In symmetric key cryptography the sender as well as the receiver possess a common key. Asymmetric key cryptography involves generation of two distinct keys which are used for encryption and decryption correspondingly. The sender converts the original message to cipher text using the public key while the receiver can decipher this using his private key. This is also called Public Key Cryptography. For every public key there can exist only one private key that can decipher the encrypted text. Security of RSA Algorithm can be compromised using mathematical attack, by guessing the factors of a large number. It may also be compromised if one can guess the private key. In accordance with the mathematical attack, we propose a secure algorithm in this paper. In this algorithm, we try to eliminate the distribution of n which is the large number whose factors if found compromises the RSA algorithm. We also present a comparative analysis of the proposed algorithm with the RSA algorithm.
△ Less
Submitted 23 March, 2016; v1 submitted 7 December, 2015;
originally announced December 2015.
-
Three Tier Network Architecture to mitigate DDoS Attacks on Hybrid Cloud Environments
Authors:
Akashdeep Bhardwaj,
G. V. B. Subrahmanyam,
Vinay Avasthi,
Hanumat Sastry
Abstract:
Connecting the wired and wireless networks particularly the Mobile ad hoc Network is interesting in real world situations due to its usefulness and practicality. Different mechanisms have been proposed to integrate MANETs and the Internet. These strategies differ in gateway discovery mechanism, cell switching criteria, ad hoc routing protocol.In this paper, Mobile-IP is integrated with Hierarchica…
▽ More
Connecting the wired and wireless networks particularly the Mobile ad hoc Network is interesting in real world situations due to its usefulness and practicality. Different mechanisms have been proposed to integrate MANETs and the Internet. These strategies differ in gateway discovery mechanism, cell switching criteria, ad hoc routing protocol.In this paper, Mobile-IP is integrated with Hierarchical Cluster-Head Gateway Switch Routing (CGSR) Protocol to provide Internet access to the mobile node of the ad hoc Network. This paper discusses a mechanism for selecting an alternate route in case if the Cluster Head is unable to forward the packets to the destination. The proposed framework provides bi-directional connectivity between the MANET and the Internet nodes. A detailed performance comparison is made between the proposed approach and the other three-tier strategies based on mobility of cluster heads and cluster gateways and other network parameters. The experimental results indicate that the proposed architecture has better packet delivery ratio, end-end delay and mobile node-gateway connectivity ratio for providing full bi-directional connectivity.
△ Less
Submitted 23 March, 2016; v1 submitted 7 December, 2015;
originally announced December 2015.
-
Ransomware: A Rising Threat of new age Digital Extortion
Authors:
Akashdeep Bhardwaj,
G. V. B. Subrahmanyam,
Vinay Avasthi,
Hanumat Sastry
Abstract:
This article attempts to discover the surreptitious features of ransomware and to address it in information systems security research. It intends to elicit attention with regard to ransomware, a newly emerged cyber threat using such encryption technology as RSA, and to help both academic researchers and IT practitioners understand the technological characteristi…
▽ More
This article attempts to discover the surreptitious features of ransomware and to address it in information systems security research. It intends to elicit attention with regard to ransomware, a newly emerged cyber threat using such encryption technology as RSA, and to help both academic researchers and IT practitioners understand the technological characteristics of ransomware, along with its severity analysis. As ransomware infections continue to rise and attacks employing refined algorithm become increasingly sophisticated, data protection faces serious challenges. The article discusses future trends and research directions related to ransomware, and provides prevention strategies for SMEs.
△ Less
Submitted 26 March, 2016; v1 submitted 7 December, 2015;
originally announced December 2015.