-
MEV Ecosystem Evolution From Ethereum 1.0
Authors:
Rasheed,
Yash Chaurasia,
Parth Desai,
Sujit Gujar
Abstract:
Smart contracts led to the emergence of the decentralized finance (DeFi) marketplace within blockchain ecosystems, where diverse participants engage in financial activities. In traditional finance, there are possibilities to create values, e.g., arbitrage offers to create value from market inefficiencies or front-running offers to extract value for the participants having privileged roles. Such op…
▽ More
Smart contracts led to the emergence of the decentralized finance (DeFi) marketplace within blockchain ecosystems, where diverse participants engage in financial activities. In traditional finance, there are possibilities to create values, e.g., arbitrage offers to create value from market inefficiencies or front-running offers to extract value for the participants having privileged roles. Such opportunities are readily available -- searching programmatically in DeFi. It is commonly known as Maximal Extractable Value (MEV) in the literature. In this survey, first, we show how lucrative such opportunities can be. Next, we discuss how protocol-following participants trying to capture such opportunities threaten to sabotage blockchain's performance and the core tenets of decentralization, transparency, and trustlessness that blockchains are based on. Then, we explain different attempts by the community in the past to address these issues and the problems introduced by these solutions. Finally, we review the current state of research trying to restore trustlessness and decentralization to provide all DeFi participants with a fair marketplace.
△ Less
Submitted 19 June, 2024;
originally announced June 2024.
-
An evaluation of a microprocessor with two independent hardware execution threads coupled through a shared cache
Authors:
Madhav P. Desai
Abstract:
We investigate the utility of augmenting a microprocessor with a single execution pipeline by adding a second copy of the execution pipeline in parallel with the existing one. The resulting dual-hardware-threaded microprocessor has two identical, independent, single-issue in-order execution pipelines (hardware threads) which share a common memory sub-system (consisting of instruction and data cach…
▽ More
We investigate the utility of augmenting a microprocessor with a single execution pipeline by adding a second copy of the execution pipeline in parallel with the existing one. The resulting dual-hardware-threaded microprocessor has two identical, independent, single-issue in-order execution pipelines (hardware threads) which share a common memory sub-system (consisting of instruction and data caches together with a memory management unit). From a design perspective, the assembly and verification of the dual threaded processor is simplified by the use of existing verified implementations of the execution pipeline and a memory unit. Because the memory unit is shared by the two hardware threads, the relative area overhead of adding the second hardware thread is 25\% of the area of the existing single threaded processor. Using an FPGA implementation we evaluate the performance of the dual threaded processor relative to the single threaded one. On applications which can be parallelized, we observe speedups of 1.6X to 1.88X. For applications that are not parallelizable, the speedup is more modest. We also observe that the dual threaded processor performance is degraded on applications which generate large numbers of cache misses.
△ Less
Submitted 28 May, 2023;
originally announced May 2023.
-
A study linking patient EHR data to external death data at Stanford Medicine
Authors:
Alvaro Andres Alvarez Peralta,
Priya Desai,
Somalee Datta
Abstract:
This manuscript explores linking real-world patient data with external death data in the context of research Clinical Data Warehouses (r-CDWs). We specifically present the linking of Electronic Health Records (EHR) data for Stanford Health Care (SHC) patients and data from the Social Security Administration (SSA) Limited Access Death Master File (LADMF) made available by the US Department of Comme…
▽ More
This manuscript explores linking real-world patient data with external death data in the context of research Clinical Data Warehouses (r-CDWs). We specifically present the linking of Electronic Health Records (EHR) data for Stanford Health Care (SHC) patients and data from the Social Security Administration (SSA) Limited Access Death Master File (LADMF) made available by the US Department of Commerce's National Technical Information Service (NTIS).
The data analysis framework presented in this manuscript extends prior approaches and is generalizable to linking any two cross-organizational real-world patient data sources. Electronic Health Record (EHR) data and NTIS LADMF are heavily used resources at other medical centers and we expect that the methods and learnings presented here will be valuable to others. Our findings suggest that strong linkages are incomplete and weak linkages are noisy i.e., there is no good linkage rule that provides coverage and accuracy. Furthermore, the best linkage rule for any two datasets is different from the best linkage rule for two other datasets i.e., there is no generalization of linkage rules. Finally, LADMF, a commonly used external death data resource for r-CDWs, has a significant gap in death data making it necessary for r-CDWs to seek out more than one external death data source. We anticipate that presentation of multiple linkages will make it hard to present the linkage outcome to the end user.
This manuscript is a resource in support of Stanford Medicine STARR (STAnford medicine Research data Repository) r-CDWs. The data are stored and analyzed as PHI in our HIPAA-compliant data center and are used under research and development (R&D) activities of STARR IRB.
△ Less
Submitted 2 November, 2022;
originally announced November 2022.
-
Nice perfume. How long did you marinate in it? Multimodal Sarcasm Explanation
Authors:
Poorav Desai,
Tanmoy Chakraborty,
Md Shad Akhtar
Abstract:
Sarcasm is a pervading linguistic phenomenon and highly challenging to explain due to its subjectivity, lack of context and deeply-felt opinion. In the multimodal setup, sarcasm is conveyed through the incongruity between the text and visual entities. Although recent approaches deal with sarcasm as a classification problem, it is unclear why an online post is identified as sarcastic. Without prope…
▽ More
Sarcasm is a pervading linguistic phenomenon and highly challenging to explain due to its subjectivity, lack of context and deeply-felt opinion. In the multimodal setup, sarcasm is conveyed through the incongruity between the text and visual entities. Although recent approaches deal with sarcasm as a classification problem, it is unclear why an online post is identified as sarcastic. Without proper explanation, end users may not be able to perceive the underlying sense of irony. In this paper, we propose a novel problem -- Multimodal Sarcasm Explanation (MuSE) -- given a multimodal sarcastic post containing an image and a caption, we aim to generate a natural language explanation to reveal the intended sarcasm. To this end, we develop MORE, a new dataset with explanation of 3510 sarcastic multimodal posts. Each explanation is a natural language (English) sentence describing the hidden irony. We benchmark MORE by employing a multimodal Transformer-based architecture. It incorporates a cross-modal attention in the Transformer's encoder which attends to the distinguishing features between the two modalities. Subsequently, a BART-based auto-regressive decoder is used as the generator. Empirical results demonstrate convincing results over various baselines (adopted for MuSE) across five evaluation metrics. We also conduct human evaluation on predictions and obtain Fleiss' Kappa score of 0.4 as a fair agreement among 25 evaluators.
△ Less
Submitted 9 December, 2021;
originally announced December 2021.
-
Continual Learning with Differential Privacy
Authors:
Pradnya Desai,
Phung Lai,
NhatHai Phan,
My T. Thai
Abstract:
In this paper, we focus on preserving differential privacy (DP) in continual learning (CL), in which we train ML models to learn a sequence of new tasks while memorizing previous tasks. We first introduce a notion of continual adjacent databases to bound the sensitivity of any data record participating in the training process of CL. Based upon that, we develop a new DP-preserving algorithm for CL…
▽ More
In this paper, we focus on preserving differential privacy (DP) in continual learning (CL), in which we train ML models to learn a sequence of new tasks while memorizing previous tasks. We first introduce a notion of continual adjacent databases to bound the sensitivity of any data record participating in the training process of CL. Based upon that, we develop a new DP-preserving algorithm for CL with a data sampling strategy to quantify the privacy risk of training data in the well-known Averaged Gradient Episodic Memory (A-GEM) approach by applying a moments accountant. Our algorithm provides formal guarantees of privacy for data records across tasks in CL. Preliminary theoretical analysis and evaluations show that our mechanism tightens the privacy loss while maintaining a promising model utility.
△ Less
Submitted 11 October, 2021;
originally announced October 2021.
-
Integrating Flowsheet Data in OMOP Common Data Model for Clinical Research
Authors:
Tina Seto,
Lillian Sung,
Jose Posada,
Priyamvada Desai,
Susan Weber,
Somalee Datta
Abstract:
Flowsheet data presents unique challenges and opportunities for integration into standardized Common Data Models (CDMs) such as the Observational Medical Outcomes Partnership (OMOP) CDM from the Observational Health Data Sciences and Informatics (OHDSI) program. These data are a potentially rich source of detailed curated health outcomes data such as pain scores, vital signs, lines drains and airw…
▽ More
Flowsheet data presents unique challenges and opportunities for integration into standardized Common Data Models (CDMs) such as the Observational Medical Outcomes Partnership (OMOP) CDM from the Observational Health Data Sciences and Informatics (OHDSI) program. These data are a potentially rich source of detailed curated health outcomes data such as pain scores, vital signs, lines drains and airways (LDA) and other measurements that can be invaluable in building a robust model of patient health journey during an inpatient stay. We present two approaches to integration of flowsheet measures into the OMOP CDM. One approach was computationally straightforward but of potentially limited research utility. The second approach was far more computationally and labor intensive and involved mapping to standardized terms in controlled clinical vocabularies such as Logical Observation Identifiers Names and Codes (LOINC), resulting in a research data set of higher utility to population health studies.
△ Less
Submitted 16 September, 2021;
originally announced September 2021.
-
An efficient reverse-lookup table based strategy for solving the synonym and cache coherence problem in virtually indexed, virtually tagged caches
Authors:
Madhav P. Desai,
Aniket Deshmukh
Abstract:
Virtually indexed and virtually tagged (VIVT) caches are an attractive option for micro-processor level-1 caches, because of their fast response time and because they are cheaper to implement than more complex caches such as virtually-indexed physical-tagged (VIPT) caches. The level-1 VIVT cache becomes even simpler to construct if it is implemented as a direct-mapped cache (VIVT-DM cache). Howeve…
▽ More
Virtually indexed and virtually tagged (VIVT) caches are an attractive option for micro-processor level-1 caches, because of their fast response time and because they are cheaper to implement than more complex caches such as virtually-indexed physical-tagged (VIPT) caches. The level-1 VIVT cache becomes even simpler to construct if it is implemented as a direct-mapped cache (VIVT-DM cache). However, VIVT and VIVT-DM caches have some drawbacks. When the number of sets in the cache is larger than the smallest page size, there is a possibility of synonyms (two or more virtual addresses mapped to the same physical address) existing in the cache. Further, maintenance of cache coherence across multiple processors requires a physical to virtual translation mechanism in the hardware. We describe a simple, efficient reverse lookup table based approach to address the synonym and the coherence problems in VIVT (both set associative and direct-mapped) caches. In particular, the proposed scheme does not disturb the critical memory access paths in a typical micro-processor, and requires a low overhead for its implementation. We have implemented and validated the scheme in the AJIT 32-bit microprocessor core (an implementation of the SPARC-V8 ISA) and the implementation uses approximately 2% of the gates and 5.3% of the memory bits in the processor core.
△ Less
Submitted 1 August, 2021;
originally announced August 2021.
-
Taxonomic survey of Hindi Language NLP systems
Authors:
Nikita P. Desai,
Prof.,
Vipul K. Dabhi
Abstract:
Natural Language processing (NLP) represents the task of automatic handling of natural human language by machines.There is large spectrum of possible applications of NLP which help in automating tasks like translating text from one language to other, retrieving and summarizing data from very huge repositories, spam email filtering, identifying fake news in digital media, find sentiment and feedbac…
▽ More
Natural Language processing (NLP) represents the task of automatic handling of natural human language by machines.There is large spectrum of possible applications of NLP which help in automating tasks like translating text from one language to other, retrieving and summarizing data from very huge repositories, spam email filtering, identifying fake news in digital media, find sentiment and feedback of people, find political opinions and views of people on various government policies, provide effective medical assistance based on past history records of patient etc. Hindi is the official language of India with nearly 691 million users in India and 366 million in rest of world. At present, a number of government and private sector projects and researchers in India and abroad, are working towards developing NLP applications and resources for Indian languages. This survey gives a report of the resources and applications available for Hindi language NLP.
△ Less
Submitted 30 January, 2021;
originally announced February 2021.
-
Peridynamics-based discrete element method (PeriDEM) model of granular systems involving breakage of arbitrarily shaped particles
Authors:
Prashant K. Jha,
Prathamesh S. Desai,
Debdeep Bhattacharya,
Robert Lipton
Abstract:
Usage, manipulation, transport, delivery, and mixing of granular or particulate media, comprised of spherical or polyhedral particles, is commonly encountered in industrial sectors of construction (cement and rock fragments), pharmaceutics (tablets), and transportation (ballast). Elucidating particulate media's behavior in concert with particle attrition (i.e., particle wear and subsequent particl…
▽ More
Usage, manipulation, transport, delivery, and mixing of granular or particulate media, comprised of spherical or polyhedral particles, is commonly encountered in industrial sectors of construction (cement and rock fragments), pharmaceutics (tablets), and transportation (ballast). Elucidating particulate media's behavior in concert with particle attrition (i.e., particle wear and subsequent particle fragmentation) is essential for predicting the performance and increasing the efficiency of engineering systems using such media. Discrete element method (DEM) based techniques can describe the interaction between particles but cannot model intra-particle deformation, especially intra-particle fracture. On the other hand, peridynamics provides the means to account for intra-particle deformation and fracture due to contact forces between particles. The present study proposes a hybrid model referred to as \textit{PeriDEM} that combines the advantages of peridynamics and DEM. The model parameters can be tuned to achieve desired DEM contact forces, damping effects, and intra-particle stiffness. Two particle impacts and compressive behavior of multi-particle systems are thoroughly investigated. The model can account for any arbitrarily shaped particle in general. Spherical, hexagonal, and non-convex particle shapes are simulated in the present study. The effect of mesh resolution on intra-particle peridynamics is explicitly studied. The proposed hybrid model opens a new avenue to explore the complicated interactions encountered in discrete particle dynamics that involve the formation of force chains, particle interlocking, particle attrition, wear, and the eventual breakage.
△ Less
Submitted 23 February, 2021; v1 submitted 14 October, 2020;
originally announced October 2020.
-
Is This the Right Time to Post My Task? An Empirical Analysis on a Task Similarity Arrival in TopCoder
Authors:
Razieh Saremi,
Mostaan Lotfalian Saremi,
Prasad Desai,
Robert Anzalone
Abstract:
Existed studies have shown that crowd workers are more interested in taking similar tasks in terms of context, field, and required technology, rather than tasks from the same project. Therefore, it is important for task owners to not only be able to plan 'when the new task should arrive?' but also, to justify 'what the strategic task arrival plan should be?' in order to receive a valid submission…
▽ More
Existed studies have shown that crowd workers are more interested in taking similar tasks in terms of context, field, and required technology, rather than tasks from the same project. Therefore, it is important for task owners to not only be able to plan 'when the new task should arrive?' but also, to justify 'what the strategic task arrival plan should be?' in order to receive a valid submission for the posted task. To address these questions this research reports an empirical analysis on the impact of similar task arrival in the platform, on both tasks' success level and workers' performance. Our study supports that 1- A higher number of arrival tasks with similarity level greater than 70% will negatively impact on task competition level, 2- A bigger pool of similar open and arrival tasks would lead to lower worker attraction and elasticity, and 3- Workers who register for tasks with lower similarity level are more reliable to make a valid submission and 4- arriving task to the pool of 60% similar task will provide the highest chance of receiving a valid submission.
△ Less
Submitted 26 April, 2020;
originally announced April 2020.
-
A new paradigm for accelerating clinical data science at Stanford Medicine
Authors:
Somalee Datta,
Jose Posada,
Garrick Olson,
Wencheng Li,
Ciaran O'Reilly,
Deepa Balraj,
Joseph Mesterhazy,
Joseph Pallas,
Priyamvada Desai,
Nigam Shah
Abstract:
Stanford Medicine is building a new data platform for our academic research community to do better clinical data science. Hospitals have a large amount of patient data and researchers have demonstrated the ability to reuse that data and AI approaches to derive novel insights, support patient care, and improve care quality. However, the traditional data warehouse and Honest Broker approaches that a…
▽ More
Stanford Medicine is building a new data platform for our academic research community to do better clinical data science. Hospitals have a large amount of patient data and researchers have demonstrated the ability to reuse that data and AI approaches to derive novel insights, support patient care, and improve care quality. However, the traditional data warehouse and Honest Broker approaches that are in current use, are not scalable. We are establishing a new secure Big Data platform that aims to reduce time to access and analyze data. In this platform, data is anonymized to preserve patient data privacy and made available preparatory to Institutional Review Board (IRB) submission. Furthermore, the data is standardized such that analysis done at Stanford can be replicated elsewhere using the same analytical code and clinical concepts. Finally, the analytics data warehouse integrates with a secure data science computational facility to support large scale data analytics. The ecosystem is designed to bring the modern data science community to highly sensitive clinical data in a secure and collaborative big data analytics environment with a goal to enable bigger, better and faster science.
△ Less
Submitted 17 March, 2020;
originally announced March 2020.
-
Face Recognition Techniques: A Survey
Authors:
Raunak Dave,
Ankit Vyas,
Nikita P Desai
Abstract:
Nowadays research has expanded to extracting auxiliary information from various biometric techniques like fingerprints, face, iris, palm and voice . This information contains some major features like gender, age, beard, mustache, scars, height, hair, skin color, glasses, weight, facial marks and tattoos. All this information contributes strongly to identification of human. The major challenges tha…
▽ More
Nowadays research has expanded to extracting auxiliary information from various biometric techniques like fingerprints, face, iris, palm and voice . This information contains some major features like gender, age, beard, mustache, scars, height, hair, skin color, glasses, weight, facial marks and tattoos. All this information contributes strongly to identification of human. The major challenges that come across face recognition are to find age & gender of the person. This paper contributes a survey of various face recognition techniques for finding the age and gender. The existing techniques are discussed based on their performances. This paper also provides future directions for further research.
△ Less
Submitted 30 January, 2021; v1 submitted 20 March, 2018;
originally announced March 2018.
-
Text Detection and Recognition in images: A survey
Authors:
Tanvi Goswami,
Zankhana Barad,
Prof. Nikita P. Desai
Abstract:
Text Detection and recognition is a one of the important aspect of image processing. This paper analyzes and compares the methods to handle this task. It summarizes the fundamental problems and enumerates factors that need consideration when addressing these problems. Existing techniques are categorized as either stepwise or integrated and sub-problems are highlighted including digit localization,…
▽ More
Text Detection and recognition is a one of the important aspect of image processing. This paper analyzes and compares the methods to handle this task. It summarizes the fundamental problems and enumerates factors that need consideration when addressing these problems. Existing techniques are categorized as either stepwise or integrated and sub-problems are highlighted including digit localization, verification, segmentation and recognition. Special issues associated with the enhancement of degraded text and the processing of video text and multi-oriented text are also addressed. The categories and sub-categories of text are illustrated, benchmark datasets are enumerated, and the performance of the most representative approaches is compared. This review also provides a fundamental comparison and analysis of the remaining problems in the field.
△ Less
Submitted 2 May, 2018; v1 submitted 20 March, 2018;
originally announced March 2018.
-
Neutron-induced strike: Study of multiple node charge collection in 14nm FinFETs
Authors:
Nanditha P. Rao,
Madhav P. Desai
Abstract:
FinFETs have replaced the conventional bulk CMOS transistors in the sub-20nm technology. One of the key issues to consider is, the vulnerability of FinFET based circuits to multiple node charge collection due to neutron-induced strikes. In this paper, we perform a device simulation based characterization study on representative layouts of 14nm bulk FinFETs in order to study the extent to which mul…
▽ More
FinFETs have replaced the conventional bulk CMOS transistors in the sub-20nm technology. One of the key issues to consider is, the vulnerability of FinFET based circuits to multiple node charge collection due to neutron-induced strikes. In this paper, we perform a device simulation based characterization study on representative layouts of 14nm bulk FinFETs in order to study the extent to which multiple transistors are affected. We find that multiple transistors do get affected and the impact can last up to five transistors away (~200nm). We show that the potential of source/drain regions in the neighborhood of the strike is a significant contributing factor. In the case of multi-fin FinFETs, the charge collected per fin is seen to reduce as the number of fins increase. Thus, smaller FinFETs are susceptible to high amounts of charge collection.
△ Less
Submitted 11 June, 2017;
originally announced June 2017.
-
Neutron induced strike: On the likelihood of multiple bit-flips in logic circuits
Authors:
Nanditha P. Rao,
Madhav P. Desai
Abstract:
High energy particles from cosmic rays or packaging materials can generate a glitch or a current transient (single event transient or SET) in a logic circuit. This SET can eventually get captured in a register resulting in a flip of the register content, which is known as soft error or single-event upset (SEU). A soft error is typically modeled as a probabilistic single bit-flip model. In developi…
▽ More
High energy particles from cosmic rays or packaging materials can generate a glitch or a current transient (single event transient or SET) in a logic circuit. This SET can eventually get captured in a register resulting in a flip of the register content, which is known as soft error or single-event upset (SEU). A soft error is typically modeled as a probabilistic single bit-flip model. In developing such abstract fault models, an important issue to consider is the likelihood of multiple bit errors caused by particle strikes. The fact that an SET causes multiple flips is noted in the literature. We perform a characterization study of the impact of an SET on a logic circuit to quantify the extent to which an SET can cause multiple bit flips. We use post-layout circuit simulations and Monte Carlo sampling scheme to get accurate bit-flip statistics. We perform our simulations on ISCAS'85, ISCAS'89 and ITC'99 benchmarks in 180nm and 65nm technologies. We find that a substantial fraction of SEU outcomes had multiple register flips. We futher analyse the individual contributions of the strike on a register and the strike on a logic gate, to multiple flips. We find that, amongst the erroneous outcomes, the probability of multiple bit-flips for 'gate-strike' cases was substantial and went up to 50%, where as those for 'register-strike' cases was just about 2%. This implies that, in principle, we can eliminate the flips due to register strikes using hardened flip-flop designs. However, in such designs, out of the remaining flips which will be due to gate strikes, a large fraction is likely to be multiple flips.
△ Less
Submitted 15 June, 2017; v1 submitted 25 December, 2016;
originally announced December 2016.
-
On Continuous-space Embedding of Discrete-parameter Queueing Systems
Authors:
Neha Karanjkar,
Madhav P. Desai,
Shalabh Bhatnagar
Abstract:
Motivated by the problem of discrete-parameter simulation optimization (DPSO) of queueing systems, we consider the problem of embedding the discrete parameter space into a continuous one so that descent-based continuous-space methods could be directly applied for efficient optimization. We show that a randomization of the simulation model itself can be used to achieve such an embedding when the ob…
▽ More
Motivated by the problem of discrete-parameter simulation optimization (DPSO) of queueing systems, we consider the problem of embedding the discrete parameter space into a continuous one so that descent-based continuous-space methods could be directly applied for efficient optimization. We show that a randomization of the simulation model itself can be used to achieve such an embedding when the objective function is a long-run average measure. Unlike spatial interpolation, the computational cost of this embedding is independent of the number of parameters in the system, making the approach ideally suited to high-dimensional problems. We describe in detail the application of this technique to discrete-time queues for embedding queue capacities, number of servers and server-delay parameters into continuous space and empirically show that the technique can produce smooth interpolations of the objective function. Through an optimization case-study of a queueing network with $10^7$ design points, we demonstrate that existing continuous optimizers can be effectively applied over such an embedding to find good solutions.
△ Less
Submitted 12 February, 2018; v1 submitted 9 June, 2016;
originally announced June 2016.
-
Optimization of Discrete-parameter Multiprocessor Systems using a Novel Ergodic Interpolation Technique
Authors:
Neha V. Karanjkar,
Madhav P. Desai
Abstract:
Modern multi-core systems have a large number of design parameters, most of which are discrete-valued, and this number is likely to keep increasing as chip complexity rises. Further, the accurate evaluation of a potential design choice is computationally expensive because it requires detailed cycle-accurate system simulation. If the discrete parameter space can be embedded into a larger continuous…
▽ More
Modern multi-core systems have a large number of design parameters, most of which are discrete-valued, and this number is likely to keep increasing as chip complexity rises. Further, the accurate evaluation of a potential design choice is computationally expensive because it requires detailed cycle-accurate system simulation. If the discrete parameter space can be embedded into a larger continuous parameter space, then continuous space techniques can, in principle, be applied to the system optimization problem. Such continuous space techniques often scale well with the number of parameters.
We propose a novel technique for embedding the discrete parameter space into an extended continuous space so that continuous space techniques can be applied to the embedded problem using cycle accurate simulation for evaluating the objective function. This embedding is implemented using simulation-based ergodic interpolation, which, unlike spatial interpolation, produces the interpolated value within a single simulation run irrespective of the number of parameters. We have implemented this interpolation scheme in a cycle-based system simulator. In a characterization study, we observe that the interpolated performance curves are continuous, piece-wise smooth, and have low statistical error. We use the ergodic interpolation-based approach to solve a large multi-core design optimization problem with 31 design parameters. Our results indicate that continuous space optimization using ergodic interpolation-based embedding can be a viable approach for large multi-core design optimization problems.
△ Less
Submitted 14 July, 2015; v1 submitted 9 November, 2014;
originally announced November 2014.
-
Semantic Gateway as a Service architecture for IoT Interoperability
Authors:
Pratikkumar Desai,
Amit Sheth,
Pramod Anantharam
Abstract:
The Internet of Things (IoT) is set to occupy a substantial component of future Internet. The IoT connects sensors and devices that record physical observations to applications and services of the Internet. As a successor to technologies such as RFID and Wireless Sensor Networks (WSN), the IoT has stumbled into vertical silos of proprietary systems, providing little or no interoperability with sim…
▽ More
The Internet of Things (IoT) is set to occupy a substantial component of future Internet. The IoT connects sensors and devices that record physical observations to applications and services of the Internet. As a successor to technologies such as RFID and Wireless Sensor Networks (WSN), the IoT has stumbled into vertical silos of proprietary systems, providing little or no interoperability with similar systems. As the IoT represents future state of the Internet, an intelligent and scalable architecture is required to provide connectivity between these silos, enabling discovery of physical sensors and interpretation of messages between things. This paper proposes a gateway and Semantic Web enabled IoT architecture to provide interoperability between systems using established communication and data standards. The Semantic Gateway as Service (SGS) allows translation between messaging protocols such as XMPP, CoAP and MQTT via a multi-protocol proxy architecture. Utilization of broadly accepted specifications such as W3C's Semantic Sensor Network (SSN) ontology for semantic annotations of sensor data provide semantic interoperability between messages and support semantic reasoning to obtain higher-level actionable knowledge from low-level sensor data.
△ Less
Submitted 18 October, 2014;
originally announced October 2014.
-
A Review Paper on Oculus Rift-A Virtual Reality Headset
Authors:
Parth Rajesh Desai,
Pooja Nikhil Desai,
Komal Deepak Ajmera,
Khushbu Mehta
Abstract:
Oculus rift: Virtual reality (VR) is a burgeoning field that has the inherent potential of manipulating peoples mind with a superlative 3D experience. Oculus rift is one such application that assists in achieving the same. With the fleeting enhancements in VR it now seems very feasible to provide the user with experiences that were earlier thought to be merely a dream or a nightmare.
Oculus rift: Virtual reality (VR) is a burgeoning field that has the inherent potential of manipulating peoples mind with a superlative 3D experience. Oculus rift is one such application that assists in achieving the same. With the fleeting enhancements in VR it now seems very feasible to provide the user with experiences that were earlier thought to be merely a dream or a nightmare.
△ Less
Submitted 5 August, 2014;
originally announced August 2014.
-
On the likelihood of multiple bit upsets in logic circuits
Authors:
Nanditha P. Rao,
Shahbaz Sarik,
Madhav P. Desai
Abstract:
Soft errors have a significant impact on the circuit reliability at nanoscale technologies. At the architectural level, soft errors are commonly modeled by a probabilistic bit-flip model. In developing such abstract fault models, an important issue to consider is the likelihood of multiple bit errors caused by particle strikes. This likelihood has been studied to a great extent in memories, but ha…
▽ More
Soft errors have a significant impact on the circuit reliability at nanoscale technologies. At the architectural level, soft errors are commonly modeled by a probabilistic bit-flip model. In developing such abstract fault models, an important issue to consider is the likelihood of multiple bit errors caused by particle strikes. This likelihood has been studied to a great extent in memories, but has not been understood to the same extent in logic circuits. In this paper, we attempt to quantify the likelihood that a single transient event can cause multiple bit errors in logic circuits consisting of combinational gates and flip-flops. In particular, we calculate the conditional probability of multiple bit-flips given that a single bit flips as a result of the transient. To calculate this conditional probability, we use a Monte Carlo technique in which samples are generated using detailed post-layout circuit simulations. Our experiments on the ISCAS'85 benchmarks and a few other circuits indicate that, this conditional probability is quite significant and can be as high as 0.31. Thus we conclude that multiple bit-flips must necessarily be considered in order to obtain a realistic architectural fault model for soft errors.
△ Less
Submitted 6 January, 2014;
originally announced January 2014.
-
On Cycles in Random Graphs
Authors:
Madhav P. Desai
Abstract:
We consider the geometric random (GR) graph on the $d-$dimensional torus with the $L_σ$ distance measure ($1 \leq σ\leq \infty$). Our main result is an exact characterization of the probability that a particular labeled cycle exists in this random graph. For $σ= 2$ and $σ= \infty$, we use this characterization to derive a series which evaluates to the cycle probability. We thus obtain an exact for…
▽ More
We consider the geometric random (GR) graph on the $d-$dimensional torus with the $L_σ$ distance measure ($1 \leq σ\leq \infty$). Our main result is an exact characterization of the probability that a particular labeled cycle exists in this random graph. For $σ= 2$ and $σ= \infty$, we use this characterization to derive a series which evaluates to the cycle probability. We thus obtain an exact formula for the expected number of Hamilton cycles in the random graph (when $σ= \infty$ and $σ= 2$). We also consider the adjacency matrix of the random graph and derive a recurrence relation for the expected values of the elementary symmetric functions evaluated on the eigenvalues (and thus the determinant) of the adjacency matrix, and a recurrence relation for the expected value of the permanent of the adjacency matrix. The cycle probability features prominently in these recurrence relations. We calculate these quantities for geometric random graphs (in the $σ= 2$ and $σ= \infty$ case) with up to $20$ vertices, and compare them with the corresponding quantities for the Erdös-Rényi (ER) random graph with the same edge probabilities. The calculations indicate that the threshold for rapid growth in the number of Hamilton cycles (as well as that for rapid growth in the permanent of the adjacency matrix) in the GR graph is lower than in the ER graph. However, as the number of vertices $n$ increases, the difference between the GR and ER thresholds reduces, and in both cases, the threshold $\sim \log(n)/n$. Also, we observe that the expected determinant can take very large values. This throws some light on the question of the maximal determinant of symmetric $0/1$ matrices.
△ Less
Submitted 30 September, 2010;
originally announced September 2010.