4,045 results on '"Bedi, P"'
Search Results
202. Go-stimuli probability influences response bias in the sustained attention to response task: a signal detection theory perspective
- Author
-
Bedi, Aman, Russell, Paul N., and Helton, William S.
- Published
- 2023
- Full Text
- View/download PDF
203. Efektivitas pemberdayaan masyarakat dengan menggunakan dana desa di Kabupaten Pasaman Barat (studi kasus di nagari maju dan nagari berkembang)
- Author
-
Wulan Bedi Pratama, Ira Wahyuni Syarfi, and Hasnah Hasnah
- Subjects
Social Sciences ,Science - Abstract
Kebermanfaatan dana desa bagi masyarakat dapat dilihat dari efektifitas penggunaan dana desa terutama untuk pemberdayaan masyarakat. Tujuan penelitian ini adalah mengungkap proses pemberdayaan masyarakat serta menganalisis pemberdayaan masyarakat melalui dana desa. Metode yang digunakan adalah multi-kasus. Analisis data dilakukan dengan menggunakan metode deskriptif kualitatif untuk mengetahui pelaksanaan pemberdayaan masyarakat, dan analisis kuantitatif untuk mengetahui tingkat efektivitas pemberdayaan masyarakat. Hasil menunjukkan bahwa proses pemberdayaan masyarakat dengan menggunakan dana desa pada kedua nagari belum menunjukkan proses yang baik, dan efektivitas pemberdayaan masyarakat yang dilakukan masih belum efektif. Terdapat perbedaan tingkat efektivitas pemberdayaan masyarakat di antara kedua nagari yang diteliti yaitu nagari maju termasuk dalam kategori kurang efektif (37,4) dan nagari berkembang termasuk dalam kategori tidak efektif (31,6). Oleh karena itu, seluruh proses pemberdayaan harus melibatkan masyarakat serta peran pendamping desa juga harus ditingkatkan untuk memberi masyarakat nagari pemahaman yang lebih baik tentang tujuan dan pentingnya kegiatan pemberdayaan tersebut.
- Published
- 2023
- Full Text
- View/download PDF
204. Survival and Recovery From Postmyocardial Infarction Apical Wall Rupture With a Complex Course
- Author
-
Hussam Al Hennawi, Angad Bedi, Jesse Cheng, Philip Lim, Nawar Al-Rawas, Mauricio Garrido, Aswin Mathew, and Jennifer A. Mazzoni
- Subjects
Diseases of the circulatory (Cardiovascular) system ,RC666-701 - Abstract
Ventricular wall rupture is associated with poor outcomes subsequent to an acute myocardial infarction. We describe a case of postmyocardial infarction apical wall rupture following percutaneous coronary intervention. Our case emphasizes the importance of swift evaluation, diagnosis, and management to enhance survival in individuals confronting this critical condition.
- Published
- 2024
- Full Text
- View/download PDF
205. Aggregating, Summarizing, and Restructuring News-Related Tweets into Compositions Using Deep Learning
- Author
-
Richa Sharma, Anjali Thukral, Yatin Kapoor, Ashwani Varshney, and Punam Bedi
- Subjects
BERT ,k-means ,T5 transformer ,semantic clustering ,sentence ordering ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
With the advent of microblogging platforms like Twitter, there has been a substantial shift toward digital media for getting acquainted with ongoing global issues. Although Twitter is an incredible source of information for real-time news, the information is widely scattered, opinionated, and unorganized, making it tedious for users to apprise themselves of the latest issues. Therefore, this study proposes a framework to automatically generate short news compositions from tweets utilizing state-of-the-art artificial intelligence techniques. The proposed framework scrapes tweets from authentic news Twitter handles, semantically analyzes and clusters them, predicts sentence ordering of the formed clusters, and summarizes the text of the clusters to produce structured compositions automatically. The generated compositions are further augmented with their corresponding sentiment scores to provide an overall perspective to the end-user toward the news topic in consideration. Evaluating the automatically generated compositions shows that the proposed framework is 77.5% efficient in generating quality compositions.
- Published
- 2024
- Full Text
- View/download PDF
206. PDSE-Lite: lightweight framework for plant disease severity estimation based on Convolutional Autoencoder and Few-Shot Learning
- Author
-
Punam Bedi, Pushkar Gole, and Sudeep Marwaha
- Subjects
Convolutional Autoencoder ,few-shot learning ,deep learning ,automatic plant disease severity estimation ,AI in agriculture ,Plant culture ,SB1-1110 - Abstract
Plant disease diagnosis with estimation of disease severity at early stages still remains a significant research challenge in agriculture. It is helpful in diagnosing plant diseases at the earliest so that timely action can be taken for curing the disease. Existing studies often rely on labor-intensive manually annotated large datasets for disease severity estimation. In order to conquer this problem, a lightweight framework named “PDSE-Lite” based on Convolutional Autoencoder (CAE) and Few-Shot Learning (FSL) is proposed in this manuscript for plant disease severity estimation with few training instances. The PDSE-Lite framework is designed and developed in two stages. In first stage, a lightweight CAE model is built and trained to reconstruct leaf images from original leaf images with minimal reconstruction loss. In subsequent stage, pretrained layers of the CAE model built in the first stage are utilized to develop the image classification and segmentation models, which are then trained using FSL. By leveraging FSL, the proposed framework requires only a few annotated instances for training, which significantly reduces the human efforts required for data annotation. Disease severity is then calculated by determining the percentage of diseased leaf pixels obtained through segmentation out of the total leaf pixels. The PDSE-Lite framework’s performance is evaluated on Apple-Tree-Leaf-Disease-Segmentation (ATLDS) dataset. However, the proposed framework can identify any plant disease and quantify the severity of identified diseases. Experimental results reveal that the PDSE-Lite framework can accurately detect healthy and four types of apple tree diseases as well as precisely segment the diseased area from leaf images by using only two training samples from each class of the ATLDS dataset. Furthermore, the PDSE-Lite framework’s performance is compared with existing state-of-the-art techniques, and it is found that this framework outperformed these approaches. The proposed framework’s applicability is further verified by statistical hypothesis testing using Student t-test. The results obtained from this test confirm that the proposed framework can precisely estimate the plant disease severity with a confidence interval of 99%. Hence, by reducing the reliance on large-scale manual data annotation, the proposed framework offers a promising solution for early-stage plant disease diagnosis and severity estimation.
- Published
- 2024
- Full Text
- View/download PDF
207. Outcomes and complications of postoperative seroma cavities following soft-tissue sarcoma resection
- Author
-
Logan M. Andryk, John C. Neilson, Adam N. Wooldridge, Donald A. Hackbarth, Meena Bedi, Keith E. Baynes, John A. LoGiudice, Sonia M. Slusarczyk, and David M. King
- Subjects
seroma ,sarcoma ,infections ,soft tissue tumor ,fluid collection ,Neoplasms. Tumors. Oncology. Including cancer and carcinogens ,RC254-282 - Abstract
IntroductionSeroma development is a known complication following extremity and trunk soft-tissue sarcoma (STS) resection. The purpose of this study is to evaluate and characterize seroma outcomes and the development of associated complications.MethodsA retrospective review of 123 patients who developed postoperative seromas following STS resection at a single institution was performed. Various patient and surgical factors were analyzed to determine their effect on overall seroma outcomes.Results77/123 seromas (62.6%) were uncomplicated, 30/123 (24.4%) developed infection, and 16/123 (13.0%) were symptomatic and required aspiration or drainage for symptom relief at an average of 12.2 months postoperatively. 65/123 (52.8%) seromas resolved spontaneously at an average time of 12.41 months. Seromas in the lower extremity (p=0.028), surgical resection volume >864 cm3, (p=42 cm3 (p=864 cm3 and a large seroma volume >42 cm3 are risk factors for complications.
- Published
- 2024
- Full Text
- View/download PDF
208. GMACO-P: GPU assisted Preemptive MACO algorithm for enabling Smart Transportation
- Author
-
Jindal, Vinita and Bedi, Punam
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
Vehicular Ad-hoc NETworks (VANETs) are developing at a very fast pace to enable smart transportation in urban cities, by designing some mechanisms for decreasing travel time for commuters by reducing congestion. Inefficient Traffic signals and routing mechanisms are the major factors that contribute to the increase of road congestion. For smoother traffic movement and reducing congestion on the roads, the waiting time at intersections must be reduced and an optimal path should be chosen simultaneously. In this paper, A GPU assisted Preemptive MACO (GMACO-P) algorithm has been proposed to minimize the total travel time of the commuters. GMACO-P is an improvement of MACO-P algorithm that uses the harnessing the power of the GPU to provide faster computations for further minimizing the travel time. The MACO-P algorithm is based on an existing MACO algorithm that avoid the path with the congestion. The MACO-P algorithm reduces the average queue length at intersections by incorporating preemption that ensures less waiting time. In this paper, GMACO-P algorithm is proposed harnessing the power of GPU to improve MACO-P to further reduce the travel time. The GMACO-P algorithm is executed with CUDA toolkit 7.5 using C language and the obtained results were compared with existing Dijkstra, ACO, MACO, MACO-P, parallel implementation of the Dijkstra, ACO and MACO algorithms. Obtained results show the significant reduction in the travel time after using the proposed GMACO-P algorithm., Comment: 13 pages
- Published
- 2020
209. Named Data Networking for Content Delivery Network Workflows
- Author
-
Thelagathoti, Rama Krishna, Mastorakis, Spyridon, Shah, Anant, Bedi, Harkeerat, and Shannigrahi, Susmit
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
In this work we investigate Named Data Networking's (NDN's) architectural properties and features, such as content caching and intelligent packet forwarding, in the context of a Content Delivery Network (CDN) workflows. More specifically, we evaluate NDN's properties for PoP (Point of Presence) to PoP and PoP to device connectivity. We use the Apache Traffic Server (ATS) platform to create an HTTP, CDN-like caching hierarchy in order to compare NDN with HTTP-based content delivery. Overall, our work demonstrates that properties inherent to NDN can benefit content providers and users alike. Our experimental results demonstrate that HTTP is faster under stable conditions due to a mature software stack. However, NDN performs better in the presence of packet loss, even for a loss rate as low as 0.1%, due to packet-level caching in the network and fast retransmissions from close upstreams and fast retransmissions from close upstreams. We further show that the Time To First Byte (TTFB) in NDN is consistently lower than HTTP (~100ms in HTTP vs ~50ms in NDN), a vital requirement for CDNs, in addition to supporting transparent failover to another upstream when a failure occurs in the network. Moreover, we examine implementation agnostic (implementation choices can be Software Defined Networking, Information Centric Networking, or something else) network properties that can benefit CDN workflows., Comment: 6 pages. The paper has been accepted for publication by the 9th IEEE International Conference on Cloud Networking (CloudNet), 2020
- Published
- 2020
210. I-SiamIDS: an improved Siam-IDS for handling class imbalance in network-based intrusion detection systems
- Author
-
Bedi, Punam, Gupta, Neha, and Jindal, Vinita
- Subjects
Computer Science - Cryptography and Security - Abstract
NIDSs identify malicious activities by analyzing network traffic. NIDSs are trained with the samples of benign and intrusive network traffic. Training samples belong to either majority or minority classes depending upon the number of available instances. Majority classes consist of abundant samples for the normal traffic as well as for recurrent intrusions. Whereas, minority classes include fewer samples for unknown events or infrequent intrusions. NIDSs trained on such imbalanced data tend to give biased predictions against minority attack classes, causing undetected or misclassified intrusions. Past research works handled this class imbalance problem using data-level approaches that either increase minority class samples or decrease majority class samples in the training data set. Although these data-level balancing approaches indirectly improve the performance of NIDSs, they do not address the underlying issue in NIDSs i.e. they are unable to identify attacks having limited training data only. This paper proposes an algorithm-level approach called I-SiamIDS, which is a two-layer ensemble for handling class imbalance problem. I-SiamIDS identifies both majority and minority classes at the algorithm-level without using any data-level balancing techniques. The first layer of I-SiamIDS uses an ensemble of b-XGBoost, Siamese-NN and DNN for hierarchical filtration of input samples to identify attacks. These attacks are then sent to the second layer of I-SiamIDS for classification into different attack classes using m-XGBoost. As compared to its counterparts, I-SiamIDS showed significant improvement in terms of Accuracy, Recall, Precision, F1-score and values of AUC for both NSL-KDD and CIDDS-001 datasets. To further strengthen the results, computational cost analysis was also performed to study the acceptability of the proposed I-SiamIDS., Comment: 21 pages
- Published
- 2020
- Full Text
- View/download PDF
211. Projections for COVID-19 spread in India and its worst affected five states using the Modified SEIRD and LSTM models
- Author
-
Bedi, Punam, Shivani, Gole, Pushkar, Gupta, Neha, and Jindal, Vinita
- Subjects
Quantitative Biology - Populations and Evolution ,Computer Science - Computers and Society ,Physics - Physics and Society ,K.4.2 ,G.1.7 ,G.1.10 ,I.2.6 - Abstract
The last leg of the year 2019 gave rise to a virus named COVID-19 (Corona Virus Disease 2019). Since the beginning of this infection in India, the government implemented several policies and restrictions to curtail its spread among the population. As the time passed, these restrictions were relaxed and people were advised to follow precautionary measures by themselves. These timely decisions taken by the Indian government helped in decelerating the spread of COVID-19 to a large extent. Despite these decisions, the pandemic continues to spread and hence, there is an urgent need to plan and control the spread of this disease. This is possible by finding the future predictions about the spread. Scientists across the globe are working towards estimating the future growth of COVID-19. This paper proposes a Modified SEIRD (Susceptible-Exposed-Infected-Recovered-Deceased) model for projecting COVID-19 infections in India and its five states having the highest number of total cases. In this model, exposed compartment contains individuals which may be asymptomatic but infectious. Deep Learning based Long Short-Term Memory (LSTM) model has also been used in this paper to perform short-term projections. The projections obtained from the proposed Modified SEIRD model have also been compared with the projections made by LSTM for next 30 days. The epidemiological data up to 15th August 2020 has been used for carrying out predictions in this paper. These predictions will help in arranging adequate medical infrastructure and providing proper preventive measures to handle the current pandemic. The effect of different lockdowns imposed by the Indian government has also been used in modelling and analysis in the proposed Modified SEIRD model. The results presented in this paper will act as a beacon for future policy-making to control the COVID-19 spread in India.
- Published
- 2020
212. Conservative Stochastic Optimization with Expectation Constraints
- Author
-
Akhtar, Zeeshan, Bedi, Amrit Singh, and Rajawat, Ketan
- Subjects
Mathematics - Optimization and Control ,Computer Science - Machine Learning ,Electrical Engineering and Systems Science - Signal Processing - Abstract
This paper considers stochastic convex optimization problems where the objective and constraint functions involve expectations with respect to the data indices or environmental variables, in addition to deterministic convex constraints on the domain of the variables. Although the setting is generic and arises in different machine learning applications, online and efficient approaches for solving such problems have not been widely studied. Since the underlying data distribution is unknown a priori, a closed-form solution is generally not available, and classical deterministic optimization paradigms are not applicable. State-of-the-art approaches, such as those using the saddle point framework, can ensure that the optimality gap as well as the constraint violation decay as $\O\left(T^{-\frac{1}{2}}\right)$ where $T$ is the number of stochastic gradients. The domain constraints are assumed simple and handled via projection at every iteration. In this work, we propose a novel conservative stochastic optimization algorithm (CSOA) that achieves zero constraint violation and $\O\left(T^{-\frac{1}{2}}\right)$ optimality gap. Further, the projection operation (for scenarios when calculating projection is expensive) in the proposed algorithm can be avoided by considering the conditional gradient or Frank-Wolfe (FW) variant of the algorithm. The state-of-the-art stochastic FW variants achieve an optimality gap of $\O\left(T^{-\frac{1}{3}}\right)$ after $T$ iterations, though these algorithms have not been applied to problems with functional expectation constraints. In this work, we propose the FW-CSOA algorithm that is not only projection-free but also achieves zero constraint violation with $\O\left(T^{-\frac{1}{4}}\right)$ decay of the optimality gap. The efficacy of the proposed algorithms is tested on two relevant problems: fair classification and structured matrix completion.
- Published
- 2020
- Full Text
- View/download PDF
213. Predicting Visual Importance Across Graphic Design Types
- Author
-
Fosco, Camilo, Casser, Vincent, Bedi, Amish Kumar, O'Donovan, Peter, Hertzmann, Aaron, and Bylinskii, Zoya
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Graphics ,Computer Science - Human-Computer Interaction ,Electrical Engineering and Systems Science - Image and Video Processing - Abstract
This paper introduces a Unified Model of Saliency and Importance (UMSI), which learns to predict visual importance in input graphic designs, and saliency in natural images, along with a new dataset and applications. Previous methods for predicting saliency or visual importance are trained individually on specialized datasets, making them limited in application and leading to poor generalization on novel image classes, while requiring a user to know which model to apply to which input. UMSI is a deep learning-based model simultaneously trained on images from different design classes, including posters, infographics, mobile UIs, as well as natural images, and includes an automatic classification module to classify the input. This allows the model to work more effectively without requiring a user to label the input. We also introduce Imp1k, a new dataset of designs annotated with importance information. We demonstrate two new design interfaces that use importance prediction, including a tool for adjusting the relative importance of design elements, and a tool for reflowing designs to new aspect ratios while preserving visual importance. The model, code, and importance dataset are available at https://predimportance.mit.edu .
- Published
- 2020
214. Variational Policy Gradient Method for Reinforcement Learning with General Utilities
- Author
-
Zhang, Junyu, Koppel, Alec, Bedi, Amrit Singh, Szepesvari, Csaba, and Wang, Mengdi
- Subjects
Computer Science - Machine Learning ,Statistics - Machine Learning - Abstract
In recent years, reinforcement learning (RL) systems with general goals beyond a cumulative sum of rewards have gained traction, such as in constrained problems, exploration, and acting upon prior experiences. In this paper, we consider policy optimization in Markov Decision Problems, where the objective is a general concave utility function of the state-action occupancy measure, which subsumes several of the aforementioned examples as special cases. Such generality invalidates the Bellman equation. As this means that dynamic programming no longer works, we focus on direct policy search. Analogously to the Policy Gradient Theorem \cite{sutton2000policy} available for RL with cumulative rewards, we derive a new Variational Policy Gradient Theorem for RL with general utilities, which establishes that the parametrized policy gradient may be obtained as the solution of a stochastic saddle point problem involving the Fenchel dual of the utility function. We develop a variational Monte Carlo gradient estimation algorithm to compute the policy gradient based on sample paths. We prove that the variational policy gradient scheme converges globally to the optimal policy for the general objective, though the optimization problem is nonconvex. We also establish its rate of convergence of the order $O(1/t)$ by exploiting the hidden convexity of the problem, and proves that it converges exponentially when the problem admits hidden strong convexity. Our analysis applies to the standard RL problem with cumulative rewards as a special case, in which case our result improves the available convergence rate.
- Published
- 2020
215. Rational Degree Algebraic Geometry
- Author
-
Bedi, Harpreet Singh
- Subjects
Mathematics - General Mathematics - Abstract
Elementary Algebraic Geometry can be described as study of zeros of polynomials with integer degrees, this idea can be naturally carried over to `polynomials' with rational degree. This paper explores affine varieties, tangent space and projective space for such polynomials and notes the differences and similarities between rational and integer degrees. The line bundles $\mathcal{O}(n),n\in\mathbb{Q}$ are also constructed and their \v{C}ech cohomology computed., Comment: Comments welcome
- Published
- 2020
216. Regret and Belief Complexity Trade-off in Gaussian Process Bandits via Information Thresholding
- Author
-
Bedi, Amrit Singh, Peddireddy, Dheeraj, Aggarwal, Vaneet, Sadler, Brian M., and Koppel, Alec
- Subjects
Computer Science - Machine Learning ,Computer Science - Information Theory ,Statistics - Machine Learning - Abstract
Bayesian optimization is a framework for global search via maximum a posteriori updates rather than simulated annealing, and has gained prominence for decision-making under uncertainty. In this work, we cast Bayesian optimization as a multi-armed bandit problem, where the payoff function is sampled from a Gaussian process (GP). Further, we focus on action selections via upper confidence bound (UCB) or expected improvement (EI) due to their prevalent use in practice. Prior works using GPs for bandits cannot allow the iteration horizon $T$ to be large, as the complexity of computing the posterior parameters scales cubically with the number of past observations. To circumvent this computational burden, we propose a simple statistical test: only incorporate an action into the GP posterior when its conditional entropy exceeds an $\epsilon$ threshold. Doing so permits us to precisely characterize the trade-off between regret bounds of GP bandit algorithms and complexity of the posterior distributions depending on the compression parameter $\epsilon$ for both discrete and continuous action sets. To best of our knowledge, this is the first result which allows us to obtain sublinear regret bounds while still maintaining sublinear growth rate of the complexity of the posterior which is linear in the existing literature. Moreover, a provably finite bound on the complexity could be achieved but the algorithm would result in $\epsilon$-regret which means $\textbf{Reg}_T/T \rightarrow \mathcal{O}(\epsilon)$ as $T\rightarrow \infty$. Experimentally, we observe state of the art accuracy and complexity trade-offs for GP bandit algorithms applied to global optimization, suggesting the merits of compressed GPs in bandit settings.
- Published
- 2020
217. Asynchronous and Parallel Distributed Pose Graph Optimization
- Author
-
Tian, Yulun, Koppel, Alec, Bedi, Amrit Singh, and How, Jonathan P.
- Subjects
Mathematics - Optimization and Control ,Computer Science - Multiagent Systems ,Computer Science - Robotics - Abstract
We present Asynchronous Stochastic Parallel Pose Graph Optimization (ASAPP), the first asynchronous algorithm for distributed pose graph optimization (PGO) in multi-robot simultaneous localization and mapping. By enabling robots to optimize their local trajectory estimates without synchronization, ASAPP offers resiliency against communication delays and alleviates the need to wait for stragglers in the network. Furthermore, ASAPP can be applied on the rank-restricted relaxations of PGO, a crucial class of non-convex Riemannian optimization problems that underlies recent breakthroughs on globally optimal PGO. Under bounded delay, we establish the global first-order convergence of ASAPP using a sufficiently small stepsize. The derived stepsize depends on the worst-case delay and inherent problem sparsity, and furthermore matches known result for synchronous algorithms when there is no delay. Numerical evaluations on simulated and real-world datasets demonstrate favorable performance compared to state-of-the-art synchronous approach, and show ASAPP's resilience against a wide range of delays in practice., Comment: full paper with appendices
- Published
- 2020
- Full Text
- View/download PDF
218. Cautious Reinforcement Learning via Distributional Risk in the Dual Domain
- Author
-
Zhang, Junyu, Bedi, Amrit Singh, Wang, Mengdi, and Koppel, Alec
- Subjects
Statistics - Machine Learning ,Computer Science - Artificial Intelligence ,Computer Science - Machine Learning ,Electrical Engineering and Systems Science - Systems and Control ,Mathematics - Optimization and Control - Abstract
We study the estimation of risk-sensitive policies in reinforcement learning problems defined by a Markov Decision Process (MDPs) whose state and action spaces are countably finite. Prior efforts are predominately afflicted by computational challenges associated with the fact that risk-sensitive MDPs are time-inconsistent. To ameliorate this issue, we propose a new definition of risk, which we call caution, as a penalty function added to the dual objective of the linear programming (LP) formulation of reinforcement learning. The caution measures the distributional risk of a policy, which is a function of the policy's long-term state occupancy distribution. To solve this problem in an online model-free manner, we propose a stochastic variant of primal-dual method that uses Kullback-Lieber (KL) divergence as its proximal term. We establish that the number of iterations/samples required to attain approximately optimal solutions of this scheme matches tight dependencies on the cardinality of the state and action spaces, but differs in its dependence on the infinity norm of the gradient of the risk measure. Experiments demonstrate the merits of this approach for improving the reliability of reward accumulation without additional computational burdens.
- Published
- 2020
219. Online Trajectory Optimization Using Inexact Gradient Feedback for Time-Varying Environments
- Author
-
Nutalapati, Mohan Krishna, Bedi, Amrit Singh, Rajawat, Ketan, and Coupechoux, Marceau
- Subjects
Mathematics - Optimization and Control - Abstract
This paper considers the problem of online trajectory design under time-varying environments. We formulate the general trajectory optimization problem within the framework of time-varying constrained convex optimization and proposed a novel version of the online gradient ascent algorithm for such problems. Moreover, the gradient feedback is noisy and allows us to use the proposed algorithm for a range of practical applications where it is difficult to acquire the true gradient. In contrast to the most available literature, we present the offline sublinear regret of the proposed algorithm up to the path length variations of the optimal offline solution, the cumulative gradient, and the error in the gradient variations. Furthermore, we establish a lower bound on the offline dynamic regret, which defines the optimality of any trajectory. To show the efficacy of the proposed algorithm, we consider two practical problems of interest. First, we consider a device to device (D2D) communications setting, and the goal is to design a user trajectory while maximizing its connectivity to the internet. The second problem is associated with the online planning of energy-efficient trajectories for unmanned surface vehicles (USV) under strong disturbances in ocean environments with both static and dynamic goal locations. The detailed simulation results demonstrate the significance of the proposed algorithm on synthetic and real data sets. Video on the real-world datasets can be found at {https://www.youtube.com/watch?v=FcRqqWtpf\_0}, Comment: arXiv admin note: text overlap with arXiv:1804.04860
- Published
- 2020
220. A Survey on Intrusion Detection and Prevention Systems
- Author
-
Gupta, Neha, Jindal, Vinita, and Bedi, Punam
- Published
- 2023
- Full Text
- View/download PDF
221. Implementation of a Triage Protocol Outside the Hospital Setting for Timely Referral During the COVID-19 Second Wave in Chennai, India
- Author
-
Alby John, Jagadeesan M, Polani Rubeshkumar, Parasuraman Ganeshkumar, Hemalatha Masanam Sriramulu, Manish Narnaware, Gagandeep Singh Bedi, and Prabhdeep Kaur
- Subjects
Medicine - Abstract
India experienced a surge in COVID-19 cases during the second wave in the period of April-June 2021. A rapid rise in cases posed challenges to triaging patients in hospital settings. Chennai, the fourth largest metropolitan city in India with an 8 million population, reported 7564 COVID-19 cases on May 12, 2021, nearly 3 times higher than the number of cases in the peak of COVID-19 in 2020. A sudden surge of cases overwhelmed the health system. We had established standalone triage centers outside the hospitals in the first wave, which catered to up to 2500 patients per day. In addition, we implemented a home-based triage protocol from May 26, 2021, to evaluate patients with COVID-19 who were aged ≤45 years without comorbidities. Among the 27,816 reported cases between May 26 and June 24, 2021, a total of 16,022 (57.6%) were aged ≤45 years without comorbidities. The field teams triaged 15,334 (55.1%), and 10,917 (39.2%) patients were evaluated at triage centers. Among 27,816 cases, 19,219 (69.1%) were advised to self-isolate at home, 3290 (11.8%) were admitted to COVID-19 care centers, and 1714 (6.2%) were admitted to hospitals. Only 3513 (12.7%) patients opted for the facility of their choice. We implemented a scalable triage strategy covering nearly 90% of the patients in a large metropolitan city during the COVID-19 surge. The process enabled early referral of high-risk patients and ensured evidence-informed treatment. We believe that the out-of-hospital triage strategy can be rapidly implemented in low-resource settings.
- Published
- 2023
- Full Text
- View/download PDF
222. Experiences of and support for black women in ecology, evolution, and marine science
- Author
-
Nikki Traylor-Knowles, Anamica Bedi de Silva, Anjali D. Boyd, Karlisa A. Callwood, Alexandra C. D. Davis, Giselle Hall, Victoria Moreno, and Cinda P. Scott
- Subjects
black women ,ecology ,evolution ,marine science ,white supremacy culture ,Science ,General. Including nature conservation, geographical distribution ,QH1-199.5 - Abstract
Systemic racism and sexism are well documented in ecology, evolution, and marine science. To combat this, institutions are making concerted efforts to recruit more diverse people by focusing on the recruitment of Black people. However, despite these initiatives, white supremacy culture still prevails. The retention of Black people in ecology, evolution, and marine science has not increased in the ways that were hoped for. This is particularly true for Black women, who struggle to find a safe working environment that values their contributions and allows them to openly celebrate their own culture and identity. In this perspective article, we discuss the challenges that Black women face every day, and the needs of Black women to thrive in ecology, evolution, and marine science. We have written this directly to Black women and provide information on not only our challenges, but our stories. However, readers of all identities are welcome to listen and examine their role in perpetuating systemic racism and sexism. Lastly, we discuss support mechanisms for navigating ecology, evolution, and marine science spaces so that Black women can thrive.
- Published
- 2023
- Full Text
- View/download PDF
223. An Exercise for Teaching Employment Termination
- Author
-
Skowronski, Mark S. and Bedi, Akanksha
- Abstract
Teaching students how to terminate an employee in a safe, legal, and humane manner provides them with a valuable management skill. This article describes an exercise for teaching students how to conduct termination meetings, guiding them through the process of creating a termination script that is consistent with best practices from the literature. This exercise also helps students develop confidence and enhance their skills by role-playing the termination meeting and responding to the interpersonal challenges of such meetings.
- Published
- 2022
- Full Text
- View/download PDF
224. Pathogenic LMNA variants disrupt cardiac lamina-chromatin interactions and de-repress alternative fate genes
- Author
-
Shah, Parisha P, Lv, Wenjian, Rhoades, Joshua H, Poleshko, Andrey, Abbey, Deepti, Caporizzo, Matthew A, Linares-Saldana, Ricardo, Heffler, Julie G, Sayed, Nazish, Thomas, Dilip, Wang, Qiaohong, Stanton, Liam J, Bedi, Kenneth, Morley, Michael P, Cappola, Thomas P, Owens, Anjali T, Margulies, Kenneth B, Frank, David B, Wu, Joseph C, Rader, Daniel J, Yang, Wenli, Prosser, Benjamin L, Musunuru, Kiran, and Jain, Rajan
- Subjects
Cardiovascular ,Stem Cell Research - Induced Pluripotent Stem Cell ,Stem Cell Research - Induced Pluripotent Stem Cell - Human ,Stem Cell Research ,Heart Disease ,Genetics ,Aetiology ,2.1 Biological and endogenous factors ,Cardiomyopathy ,Dilated ,Chromatin ,Humans ,Induced Pluripotent Stem Cells ,Lamin Type A ,Mutation ,Myocytes ,Cardiac ,genome organization ,hiPSC ,laminopathy ,peripheral heterochromatin ,Biological Sciences ,Medical and Health Sciences ,Developmental Biology - Abstract
Pathogenic mutations in LAMIN A/C (LMNA) cause abnormal nuclear structure and laminopathies. These diseases have myriad tissue-specific phenotypes, including dilated cardiomyopathy (DCM), but how LMNA mutations result in tissue-restricted disease phenotypes remains unclear. We introduced LMNA mutations from individuals with DCM into human induced pluripotent stem cells (hiPSCs) and found that hiPSC-derived cardiomyocytes, in contrast to hepatocytes or adipocytes, exhibit aberrant nuclear morphology and specific disruptions in peripheral chromatin. Disrupted regions were enriched for transcriptionally active genes and regions with lower LAMIN B1 contact frequency. The lamina-chromatin interactions disrupted in mutant cardiomyocytes were enriched for genes associated with non-myocyte lineages and correlated with higher expression of those genes. Myocardium from individuals with LMNA variants similarly showed aberrant expression of non-myocyte pathways. We propose that the lamina network safeguards cellular identity and that pathogenic LMNA variants disrupt peripheral chromatin with specific epigenetic and molecular characteristics, causing misexpression of genes normally expressed in other cell types.
- Published
- 2021
225. Inter-Frame Video Compression based on Adaptive Fuzzy Inference System Compression of Multiple Frame Characteristics
- Author
-
Arief Bramanto Wicaksono Putra, Rheo Malani, Bedi Suprapty, Achmad Fanany Onnilita Gaffar, and Roman Voliansky
- Subjects
Information resources (General) ,ZA3040-5185 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Video compression is used for storage or bandwidth efficiency in clip video information. Video compression involves encoders and decoders. Video compression uses intra-frame, inter-frame, and block-based methods. Video compression compresses nearby frame pairs into one compressed frame using inter-frame compression. This study defines odd and even neighboring frame pairings. Motion estimation, compensation, and frame difference underpin video compression methods. In this study, adaptive FIS (Fuzzy Inference System) compresses and decompresses each odd-even frame pair. First, adaptive FIS trained on all feature pairings of each odd-even frame pair. Video compression-decompression uses the taught adaptive FIS as a codec. The features utilized are "mean", "std (standard deviation)", "mad (mean absolute deviation)", and "mean (std)". This study uses all video frames' average DCT (Discrete Cosine Transform) components as a quality parameter. The adaptive FIS training feature and amount of odd-even frame pairings affect compression ratio variation. The proposed approach achieves CR=25.39% and P=80.13%. "Mean" performs best overall (P=87.15%). "Mean (mad)" has the best compression ratio (CR=24.68%) for storage efficiency. The "std" feature compresses the video without decompression since it has the lowest quality change (Q_dct=10.39%).
- Published
- 2023
- Full Text
- View/download PDF
226. Mapping routine measles vaccination in low- and middle-income countries
- Author
-
Sbarra, Alyssa N, Rolfe, Sam, Nguyen, Jason Q, Earl, Lucas, Galles, Natalie C, Marks, Ashley, Abbas, Kaja M, Abbasi-Kangevari, Mohsen, Abbastabar, Hedayat, Abd-Allah, Foad, Abdelalim, Ahmed, Abdollahi, Mohammad, Abegaz, Kedir Hussein, Abiy, Hailemariam Abiy Alemu, Abolhassani, Hassan, Abreu, Lucas Guimaraes, Abrigo, Michael RM, Abushouk, Abdelrahman I, Accrombessi, Manfred Mario Kokou, Adabi, Maryam, Adebayo, Oladimeji M, Adekanmbi, Victor, Adetokunboh, Olatunji O, Adham, Davoud, Afarideh, Mohsen, Aghaali, Mohammad, Ahmad, Tauseef, Ahmadi, Raman, Ahmadi, Keivan, Ahmed, Muktar Beshir, Alanezi, Fahad Mashhour, Alanzi, Turki M, Alcalde-Rabanal, Jacqueline Elizabeth, Alemnew, Birhan Tamene, Ali, Beriwan Abdulqadir, Ali, Muhammad, Alijanzadeh, Mehran, Alinia, Cyrus, Alipoor, Reza, Alipour, Vahid, Alizade, Hesam, Aljunid, Syed Mohamed, Almasi, Ali, Almasi-Hashiani, Amir, Al-Mekhlafi, Hesham M, Altirkawi, Khalid A, Amare, Bekalu, Amini, Saeed, Amini-Rarani, Mostafa, Amiri, Fatemeh, Amit, Arianna Maever L, Amugsi, Dickson A, Ancuceanu, Robert, Andrei, Catalina Liliana, Anjomshoa, Mina, Ansari, Fereshteh, Ansari-Moghaddam, Alireza, Ansha, Mustafa Geleto, Antonio, Carl Abelardo T, Antriyandarti, Ernoiz, Anvari, Davood, Arabloo, Jalal, Arab-Zozani, Morteza, Aremu, Olatunde, Armoon, Bahram, Aryal, Krishna K, Arzani, Afsaneh, Asadi-Aliabadi, Mehran, Asgari, Samaneh, Atafar, Zahra, Ausloos, Marcel, Awoke, Nefsu, Quintanilla, Beatriz Paulina Ayala, Ayanore, Martin Amogre, Aynalem, Yared Asmare, Azadmehr, Abbas, Azari, Samad, Babaee, Ebrahim, Badawi, Alaa, Badiye, Ashish D, Bahrami, Mohammad Amin, Baig, Atif Amin, Bakhtiari, Ahad, Balakrishnan, Senthilkumar, Banach, Maciej, Banik, Palash Chandra, Barac, Aleksandra, Baradaran-Seyed, Zahra, Baraki, Adhanom Gebreegziabher, Basu, Sanjay, Bayati, Mohsen, Bayou, Yibeltal Tebekaw, Bedi, Neeraj, Behzadifar, Masoud, Bell, Michelle L, Berbada, Dessalegn Ajema, Berhe, Kidanemaryam, Bhattarai, Suraj, Bhutta, Zulfiqar A, and Bijani, Ali
- Subjects
Biomedical and Clinical Sciences ,Clinical Sciences ,Human Society ,Pediatric ,Immunization ,Clinical Research ,Prevention ,Vaccine Related ,3.4 Vaccines ,Prevention of disease and conditions ,and promotion of well-being ,Good Health and Well Being ,Child ,Child ,Preschool ,Developed Countries ,Geographic Mapping ,Healthcare Disparities ,Humans ,Internationality ,Measles ,Rural Health ,Uncertainty ,Urban Health ,Vaccination ,Vaccination Refusal ,Local Burden of Disease Vaccine Coverage Collaborators ,General Science & Technology - Abstract
The safe, highly effective measles vaccine has been recommended globally since 1974, yet in 2017 there were more than 17 million cases of measles and 83,400 deaths in children under 5 years old, and more than 99% of both occurred in low- and middle-income countries (LMICs)1-4. Globally comparable, annual, local estimates of routine first-dose measles-containing vaccine (MCV1) coverage are critical for understanding geographically precise immunity patterns, progress towards the targets of the Global Vaccine Action Plan (GVAP), and high-risk areas amid disruptions to vaccination programmes caused by coronavirus disease 2019 (COVID-19)5-8. Here we generated annual estimates of routine childhood MCV1 coverage at 5 × 5-km2 pixel and second administrative levels from 2000 to 2019 in 101 LMICs, quantified geographical inequality and assessed vaccination status by geographical remoteness. After widespread MCV1 gains from 2000 to 2010, coverage regressed in more than half of the districts between 2010 and 2019, leaving many LMICs far from the GVAP goal of 80% coverage in all districts by 2019. MCV1 coverage was lower in rural than in urban locations, although a larger proportion of unvaccinated children overall lived in urban locations; strategies to provide essential vaccination services should address both geographical contexts. These results provide a tool for decision-makers to strengthen routine MCV1 immunization programmes and provide equitable disease protection for all children.
- Published
- 2021
227. Evaluating Thresholds to Adopt Hypofractionated Preoperative Radiotherapy as Standard of Care in Sarcoma.
- Author
-
Valle, Luca F, Bernthal, Nicholas, Eilber, Fritz C, Shabason, Jacob E, Bedi, Meena, and Kalbasi, Anusha
- Subjects
Clinical Research ,Rare Diseases ,Clinical Trials and Supportive Activities ,Clinical Sciences ,Oncology and Carcinogenesis ,Oncology & Carcinogenesis - Abstract
IntroductionData supporting hypofractionated preoperative radiation therapy (RT) for patients with extremity and trunk soft tissue sarcoma (STS) are currently limited to phase II single-institution studies. We sought to understand the type and thresholds of clinical evidence required for experts to adopt hypofractionated RT as a standard-of-care option for patients with STS.MethodsAn electronic survey was distributed to multidisciplinary sarcoma experts. The survey queried whether data from a theoretical, multi-institutional, phase II study of 5-fraction preoperative RT could change practice. Using endpoints from RTOG 0630 as a reference, the survey also queried thresholds for acceptable local control, wound complication, and late toxicity for the study protocol to be accepted as a standard-of-care option. Responses were logged from 8/27/2020 to 9/8/2020 and summarized graphically.ResultsThe survey response rate was 55.3% (47/85). Local control is the most important clinical outcome for sarcoma specialists when evaluating whether an RT regimen should be considered standard of care. 17% (8/47) of providers require randomized phase III evidence to consider hypofractionated preoperative RT as a standard-of-care option, whereas 10.6% (5/47) of providers already view this as a standard-of-care option. Of providers willing to change practice based on phase II data, most (78%, 29/37) would accept local control rates equivalent to or less than those in RTOG 0630, as long as the rate was higher than 85%. However, 51.3% (19/37) would require wound complication rates superior to those reported in RTOG 0630, and 46% (17/37) of respondents would accept late toxicity rates inferior to RTOG 0630.ConclusionConsensus building is needed among clinicians regarding the type and threshold of evidence needed to evaluate hypofractionated RT as a standard-of-care option. A collaborative consortium-based approach may be the most pragmatic means for developing consensus protocols and pooling data to gradually introduce hypofractionated preoperative RT into routine practice.
- Published
- 2021
228. Retraction Note: Assessment of anti-psoriatic activity of bakuchiol-loaded solid lipid nanoparticles-based gel: design, characterization, and mechanistic insight via NF-kB signaling pathway
- Author
-
Attri, Shivani, Kumar, Ajay, Kaur, Kirandeep, Kaur, Prabhjot, Punj, Sanha, Bedi, Neena, Tuli, Hardeep Singh, and Arora, Saroj
- Published
- 2024
- Full Text
- View/download PDF
229. Early Exacerbation Relapse is Increased in Patients with Asthma and Bronchiectasis (a Post hoc Analysis)
- Author
-
Hill, Andrew R., Bedi, Pallavi, Cartlidge, Manjit K., Turnbull, Kim, Donaldson, Samantha, Clarke, Andrea, Crowe, Jane, Campbell, Kadiga, Franguylan, Ruzanna, Rossi, Adriano G., and Hill, Adam T.
- Published
- 2023
- Full Text
- View/download PDF
230. Photoanode modified with nanostructures for efficiency enhancement in DSSC: a review
- Author
-
Kumar, Yogesh, Chhalodia, Tushar, Bedi, Paramjeet Kaur Gumber, and Meena, P. L.
- Published
- 2023
- Full Text
- View/download PDF
231. Knowledge graph enrichment from clinical narratives using NLP, NER, and biomedical ontologies for healthcare applications
- Author
-
Thukral, Anjali, Dhiman, Shivani, Meher, Ravi, and Bedi, Punam
- Published
- 2023
- Full Text
- View/download PDF
232. Design, synthesis, and biological evaluation of 2, 4-dichlorophenoxyacetamide chalcone hybrids as potential c-Met kinase inhibitors
- Author
-
Bhojwani, Heena, Patil, Sanskruti, Joshi, Urmila, Bhor, Vikrant, and Bedi, Parul
- Published
- 2023
- Full Text
- View/download PDF
233. Teaching a Sexuality Counseling Course: Counselors-in-Training Experience and Implications for Professional Counseling Programs
- Author
-
Cardona, Betty, Farago, Reka, and Bedi, Robinder P.
- Abstract
The purpose of this study was to examine the lived experiences of fifteen counselors-in-training (CITs) who had completed a sexuality counseling course. The study design was a thematic analysis of qualitative codes developed through a constant comparative method applied to transcribed interviews. Four themes were found: (a) competency issues, (b) sensitivity concerns, (c) awareness of a need for continued exposure throughout all their education and training, and (d) disappointment in the level and availability of education and training outside of this one course in their program. Data-driven suggestions for how to better to prepare CITs through sexuality counseling courses are offered.
- Published
- 2022
- Full Text
- View/download PDF
234. Efficacy of a Novel Augmentative and Alternative Communication System in Promoting Requesting Skills in Young Children with Autism Spectrum Disorder in India: A Pilot Study
- Author
-
Srinivasan, Sudha, Patel, Siddhi, Khade, Avadhut, Bedi, Gaganjot, Mohite, Jyoti, Sen, Ajanta, and Poovaiah, Ravi
- Abstract
Background & aims: The study assessed the efficacy of a novel, child-friendly, socio-culturally sensitive, icon-based Augmentative and Alternative Communication (AAC) system called Jellow Communicator, in teaching requesting skills to young children with Autism Spectrum Disorder (ASD) in a special school in Mumbai, India. Jellow is a comprehensive AAC system with a lexicon and pictorial library designed using a participatory, user-centric design process. The content of Jellow has been developed bearing in mind the socio-cultural and linguistic diversity of India. Jellow is available in low-tech (flashcards, booklet) and high-tech (Android and iOS app and desktop application) versions. Methods: The quasi-experimental longitudinal study involved seventeen 3.5-12-year-old children with ASD with communication challenges. Children were taught to use the Jellow AAC system to request for preferred items, as part of their regular speech therapy sessions. Each child received one-on-one training sessions with a licensed speech therapist twice a week over a 3-month duration, with each session lasting around 20-30 min. A systematic training protocol adapted from the original Picture Exchange Communication System (PECS) was developed to train children to use the Jellow system, progressing from flashcards to the app version of Jellow. Behavioral training strategies such as modeling, least-to-most prompting, differential reinforcement, and behavior chain interruption were used to facilitate requesting behaviors. The speech therapist assessed children's developmental level across multiple domains at pretest and posttest. We coded 3 videos per child, i.e., one early, one mid, and one late training session each, to assess changes in children's stage of communication, spontaneous requesting abilities, level of attention during training trials, and average time to completion for requesting trials. In addition, caregivers filled out questionnaires to assess training-related changes in children's adaptive functioning levels as well as the psychosocial impact of the Jellow AAC system on children's quality of life. Results: Children significantly improved their stage of communication, and a majority of children transitioned from flashcards to using the Jellow app to request for preferred items. Children also increased the proportion of spontaneous requests over the course of training. Caregivers reported a positive perceived psychosocial impact of the Jellow AAC system on their child's self-esteem, adaptability, and competence. Conclusions: The findings from our pilot study support the use of the novel, socio-culturally adapted, Jellow Communicator AAC system for teaching requesting skills to young children with ASD who use multiple communication modalities. Future studies should replicate our findings with a larger group of participants using a randomized controlled trial design. Implications: This is the first experimental study to systematically assess the effects of an indigenously-developed comprehensive AAC system adapted to the sociocultural and linguistic landscape of India. Our study results provide support for the use of the cost-effective Jellow Communicator AAC system in facilitating requesting skills in children with ASD who use multiple communication modalities. Clinicians can use low-tech and high-tech versions of Jellow to promote communication skills in children with ASD.
- Published
- 2022
- Full Text
- View/download PDF
235. Infant oral mutilation: data collection, clinical management and public health guidelines
- Author
-
Anjum, Zoha, Bridge, Gemma, and Bedi, Raman
- Published
- 2022
- Full Text
- View/download PDF
236. Coronal roots and stem lignin content as significant contributors for lodging tolerance in wheat (Triticum aestivum L.)
- Author
-
Singh, Jaspreet, Bedi, Seema, Gudi, Santosh, Kumar, Pradeep, and Sharma, Achla
- Published
- 2022
- Full Text
- View/download PDF
237. Synthesis and optoelectronic features of cool white light-emitting Ba3GdP3O12: Dy3+ nanophosphors for multifarious application prospects
- Author
-
Chhillar, Pooja, Bedi, Manisha, Hooda, Anju, Punia, Monika, Taxak, V. B., Khatkar, S. P., and Doon, Priti Boora
- Published
- 2022
- Full Text
- View/download PDF
238. Presumption of Innocence: Comparing Vietnamese Law with Established International Jurisprudence
- Author
-
Le, Duy Huynh Tan and Bedi, Shruti
- Published
- 2022
- Full Text
- View/download PDF
239. A contextual-bandit approach for multifaceted reciprocal recommendations in online dating
- Author
-
Kumari, Tulika, Sharma, Ravish, and Bedi, Punam
- Published
- 2022
- Full Text
- View/download PDF
240. Numerical simulations of PbS colloidal quantum dots solar cell with ZnO: PEIE-based electron transport layer
- Author
-
Madan, Jaya, Khanna, Arrik, Bedi, Paramjeet Kaur Gumber, Gautam, Rajni, and Pandey, Rahul
- Published
- 2022
- Full Text
- View/download PDF
241. Coumarin as an Elite Scaffold in Anti-Breast Cancer Drug Development: Design Strategies, Mechanistic Insights, and Structure–Activity Relationships
- Author
-
Atamjit Singh, Karanvir Singh, Kamaljit Kaur, Amandeep Singh, Aman Sharma, Kirandeep Kaur, Jaskirat Kaur, Gurleen Kaur, Uttam Kaur, Harsimran Kaur, Prabhsimran Singh, and Preet Mohinder Singh Bedi
- Subjects
coumarin ,anticancer ,breast cancer ,drug development ,structure–activity relationship ,Biology (General) ,QH301-705.5 - Abstract
Breast cancer is the most common cancer among women. Currently, it poses a significant threat to the healthcare system due to the emerging resistance and toxicity of available drug candidates in clinical practice, thus generating an urgent need for the development of new potent and safer anti-breast cancer drug candidates. Coumarin (chromone-2-one) is an elite ring system widely distributed among natural products and possesses a broad range of pharmacological properties. The unique distribution and pharmacological efficacy of coumarins attract natural product hunters, resulting in the identification of numerous natural coumarins from different natural sources in the last three decades, especially those with anti-breast cancer properties. Inspired by this, numerous synthetic derivatives based on coumarins have been developed by medicinal chemists all around the globe, showing promising anti-breast cancer efficacy. This review is primarily focused on the development of coumarin-inspired anti-breast cancer agents in the last three decades, especially highlighting design strategies, mechanistic insights, and their structure–activity relationship. Natural coumarins having anti-breast cancer efficacy are also briefly highlighted. This review will act as a guideline for researchers and medicinal chemists in designing optimum coumarin-based potent and safer anti-breast cancer agents.
- Published
- 2024
- Full Text
- View/download PDF
242. Q-GADMM: Quantized Group ADMM for Communication Efficient Decentralized Machine Learning
- Author
-
Elgabli, Anis, Park, Jihong, Bedi, Amrit S., Issaid, Chaouki Ben, Bennis, Mehdi, and Aggarwal, Vaneet
- Subjects
Computer Science - Machine Learning ,Computer Science - Distributed, Parallel, and Cluster Computing ,Computer Science - Information Theory ,Computer Science - Networking and Internet Architecture ,Statistics - Machine Learning - Abstract
In this article, we propose a communication-efficient decentralized machine learning (ML) algorithm, coined quantized group ADMM (Q-GADMM). To reduce the number of communication links, every worker in Q-GADMM communicates only with two neighbors, while updating its model via the group alternating direction method of multipliers (GADMM). Moreover, each worker transmits the quantized difference between its current model and its previously quantized model, thereby decreasing the communication payload size. However, due to the lack of centralized entity in decentralized ML, the spatial sparsity and payload compression may incur error propagation, hindering model training convergence. To overcome this, we develop a novel stochastic quantization method to adaptively adjust model quantization levels and their probabilities, while proving the convergence of Q-GADMM for convex objective functions. Furthermore, to demonstrate the feasibility of Q-GADMM for non-convex and stochastic problems, we propose quantized stochastic GADMM (Q-SGADMM) that incorporates deep neural network architectures and stochastic sampling. Simulation results corroborate that Q-GADMM significantly outperforms GADMM in terms of communication efficiency while achieving the same accuracy and convergence speed for a linear regression task. Similarly, for an image classification task using DNN, Q-SGADMM achieves significantly less total communication cost with identical accuracy and convergence speed compared to its counterpart without quantization, i.e., stochastic GADMM (SGADMM)., Comment: 19 pages, 8 figures; to appear in IEEE Transactions on Communications
- Published
- 2019
243. Optimally Compressed Nonparametric Online Learning
- Author
-
Koppel, Alec, Bedi, Amrit Singh, Rajawat, Ketan, and Sadler, Brian M.
- Subjects
Electrical Engineering and Systems Science - Signal Processing ,Computer Science - Machine Learning ,Mathematics - Optimization and Control - Abstract
Batch training of machine learning models based on neural networks is now well established, whereas to date streaming methods are largely based on linear models. To go beyond linear in the online setting, nonparametric methods are of interest due to their universality and ability to stably incorporate new information via convexity or Bayes' Rule. Unfortunately, when used online, nonparametric methods suffer a "curse of dimensionality" which precludes their use: their complexity scales at least with the time index. We survey online compression tools which bring their memory under control and attain approximate convergence. The asymptotic bias depends on a compression parameter that trades off memory and accuracy. Further, the applications to robotics, communications, economics, and power are discussed, as well as extensions to multi-agent systems.
- Published
- 2019
244. Nearly Consistent Finite Particle Estimates in Streaming Importance Sampling
- Author
-
Koppel, Alec, Bedi, Amrit Singh, Sadler, Brian M., and Elvira, Victor
- Subjects
Mathematics - Statistics Theory ,Computer Science - Computational Complexity ,Statistics - Computation - Abstract
In Bayesian inference, we seek to compute information about random variables such as moments or quantiles on the basis of {available data} and prior information. When the distribution of random variables is {intractable}, Monte Carlo (MC) sampling is usually required. {Importance sampling is a standard MC tool that approximates this unavailable distribution with a set of weighted samples.} This procedure is asymptotically consistent as the number of MC samples (particles) go to infinity. However, retaining infinitely many particles is intractable. Thus, we propose a way to only keep a \emph{finite representative subset} of particles and their augmented importance weights that is \emph{nearly consistent}. To do so in {an online manner}, we (1) embed the posterior density estimate in a reproducing kernel Hilbert space (RKHS) through its kernel mean embedding; and (2) sequentially project this RKHS element onto a lower-dimensional subspace in RKHS using the maximum mean discrepancy, an integral probability metric. Theoretically, we establish that this scheme results in a bias determined by a compression parameter, which yields a tunable tradeoff between consistency and memory. In experiments, we observe the compressed estimates achieve comparable performance to the dense ones with substantial reductions in representational complexity.
- Published
- 2019
245. Nonstationary Nonparametric Online Learning: Balancing Dynamic Regret and Model Parsimony
- Author
-
Bedi, Amrit Singh, Koppel, Alec, Rajawat, Ketan, and Sadler, Brian M.
- Subjects
Mathematics - Optimization and Control ,Computer Science - Machine Learning ,Electrical Engineering and Systems Science - Signal Processing - Abstract
An open challenge in supervised learning is \emph{conceptual drift}: a data point begins as classified according to one label, but over time the notion of that label changes. Beyond linear autoregressive models, transfer and meta learning address drift, but require data that is representative of disparate domains at the outset of training. To relax this requirement, we propose a memory-efficient \emph{online} universal function approximator based on compressed kernel methods. Our approach hinges upon viewing non-stationary learning as online convex optimization with dynamic comparators, for which performance is quantified by dynamic regret. Prior works control dynamic regret growth only for linear models. In contrast, we hypothesize actions belong to reproducing kernel Hilbert spaces (RKHS). We propose a functional variant of online gradient descent (OGD) operating in tandem with greedy subspace projections. Projections are necessary to surmount the fact that RKHS functions have complexity proportional to time. For this scheme, we establish sublinear dynamic regret growth in terms of both loss variation and functional path length, and that the memory of the function sequence remains moderate. Experiments demonstrate the usefulness of the proposed technique for online nonlinear regression and classification problems with non-stationary data.
- Published
- 2019
246. GADMM: Fast and Communication Efficient Framework for Distributed Machine Learning
- Author
-
Elgabli, Anis, Park, Jihong, Bedi, Amrit S., Bennis, Mehdi, and Aggarwal, Vaneet
- Subjects
Computer Science - Machine Learning ,Computer Science - Distributed, Parallel, and Cluster Computing ,Computer Science - Information Theory ,Computer Science - Networking and Internet Architecture ,Statistics - Machine Learning - Abstract
When the data is distributed across multiple servers, lowering the communication cost between the servers (or workers) while solving the distributed learning problem is an important problem and is the focus of this paper. In particular, we propose a fast, and communication-efficient decentralized framework to solve the distributed machine learning (DML) problem. The proposed algorithm, Group Alternating Direction Method of Multipliers (GADMM) is based on the Alternating Direction Method of Multipliers (ADMM) framework. The key novelty in GADMM is that it solves the problem in a decentralized topology where at most half of the workers are competing for the limited communication resources at any given time. Moreover, each worker exchanges the locally trained model only with two neighboring workers, thereby training a global model with a lower amount of communication overhead in each exchange. We prove that GADMM converges to the optimal solution for convex loss functions, and numerically show that it converges faster and more communication-efficient than the state-of-the-art communication-efficient algorithms such as the Lazily Aggregated Gradient (LAG) and dual averaging, in linear and logistic regression tasks on synthetic and real datasets. Furthermore, we propose Dynamic GADMM (D-GADMM), a variant of GADMM, and prove its convergence under the time-varying network topology of the workers.
- Published
- 2019
247. Adaptive Kernel Learning in Heterogeneous Networks
- Author
-
Pradhan, Hrusikesha, Bedi, Amrit Singh, Koppel, Alec, and Rajawat, Ketan
- Subjects
Mathematics - Optimization and Control ,Electrical Engineering and Systems Science - Signal Processing ,Statistics - Machine Learning - Abstract
We consider learning in decentralized heterogeneous networks: agents seek to minimize a convex functional that aggregates data across the network, while only having access to their local data streams. We focus on the case where agents seek to estimate a regression \emph{function} that belongs to a reproducing kernel Hilbert space (RKHS). To incentivize coordination while respecting network heterogeneity, we impose nonlinear proximity constraints. To solve the constrained stochastic program, we propose applying a functional variant of stochastic primal-dual (Arrow-Hurwicz) method which yields a decentralized algorithm. To handle the fact that agents' functions have complexity proportional to time (owing to the RKHS parameterization), we project the primal iterates onto subspaces greedily constructed from kernel evaluations of agents' local observations. The resulting scheme, dubbed Heterogeneous Adaptive Learning with Kernels (HALK), when used with constant step-sizes, yields $\mathcal{O}(\sqrt{T})$ attenuation in sub-optimality and exactly satisfies the constraints in the long run, which improves upon the state of the art rates for vector-valued problems.
- Published
- 2019
248. Online Learning over Dynamic Graphs via Distributed Proximal Gradient Algorithm
- Author
-
Dixit, Rishabh, Bedi, Amrit Singh, and Rajawat, Ketan
- Subjects
Mathematics - Optimization and Control ,Computer Science - Machine Learning ,Electrical Engineering and Systems Science - Signal Processing - Abstract
We consider the problem of tracking the minimum of a time-varying convex optimization problem over a dynamic graph. Motivated by target tracking and parameter estimation problems in intermittently connected robotic and sensor networks, the goal is to design a distributed algorithm capable of handling non-differentiable regularization penalties. The proposed proximal online gradient descent algorithm is built to run in a fully decentralized manner and utilizes consensus updates over possibly disconnected graphs. The performance of the proposed algorithm is analyzed by developing bounds on its dynamic regret in terms of the cumulative path length of the time-varying optimum. It is shown that as compared to the centralized case, the dynamic regret incurred by the proposed algorithm over $T$ time slots is worse by a factor of $\log(T)$ only, despite the disconnected and time-varying network topology. The empirical performance of the proposed algorithm is tested on the distributed dynamic sparse recovery problem, where it is shown to incur a dynamic regret that is close to that of the centralized algorithm.
- Published
- 2019
249. Formal Schemes of Rational Degree
- Author
-
Bedi, Harpreet Singh
- Subjects
Mathematics - Algebraic Geometry ,Mathematics - Number Theory - Abstract
Non notherian Formal schemes of perfectoid type (for example $\mathbb{Z}_p[p^{1/p^\infty}]\langle X^{1/p^\infty} \rangle$ along with its multivariate version) with rational degree are constructed and are shown to be admissible. These formal schemes are a rational degree avatar of Tate affinoid algebras and come equipped with non Notherian rings. The corresponding notion of topologically finite presentation are defined and Gabber's Lemma, admissible blow ups (Raynaud's approach) are shown to hold under certain assumptions. A new notion of rings called eka$^d$ are introduced, which recover most examples of perfectoid affinoid algebras, without resorting to Huber's construction, Witt vectors or Frobenius. This version fixes some errors in the last version
- Published
- 2019
250. Escaping Saddle Points with the Successive Convex Approximation Algorithm
- Author
-
Bedi, Amrit Singh, Rajawat, Ketan, and Aggarwal, Vaneet
- Subjects
Mathematics - Optimization and Control - Abstract
Optimizing non-convex functions is of primary importance in the vast majority of machine learning algorithms. Even though many gradient descent based algorithms have been studied, successive convex approximation based algorithms have been recently empirically shown to converge faster. However, such successive convex approximation based algorithms can get stuck in a first-order stationary point. To avoid that, we propose an algorithm that perturbs the optimization variable slightly at the appropriate iteration. In addition to achieving the same convergence rate results as the non-perturbed version, we show that the proposed algorithm converges to a second order stationary point. Thus, the proposed algorithm escapes the saddle point efficiently and does not get stuck at the first order saddle points.
- Published
- 2019
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.