Next Article in Journal
Construction Method of Probabilistic Boolean Networks Based on Imperfect Information
Next Article in Special Issue
Optimal Prefix Free Codes with Partial Sorting
Previous Article in Journal
Storage Efficient Trajectory Clustering and k-NN for Robust Privacy Preserving Spatio-Temporal Databases
Previous Article in Special Issue
Compression Challenges in Large Scale Partial Differential Equation Solvers
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Finding Patterns in Signals Using Lossy Text Compression

1
Robotics & Big Data Lab, Computer Science Department, University of Haifa, Haifa 3498838, Israel
2
School of Information and Communication Technology, Griffith University, Brisbane 4111, Australia
*
Author to whom correspondence should be addressed.
Submission received: 30 June 2019 / Revised: 28 November 2019 / Accepted: 29 November 2019 / Published: 11 December 2019
(This article belongs to the Special Issue Data Compression Algorithms and their Applications)

Abstract

:
Whether the source is autonomous car, robotic vacuum cleaner, or a quadcopter, signals from sensors tend to have some hidden patterns that repeat themselves. For example, typical GPS traces from a smartphone contain periodic trajectories such as “home, work, home, work, ⋯”. Our goal in this study was to automatically reverse engineer such signals, identify their periodicity, and then use it to compress and de-noise these signals. To do so, we present a novel method of using algorithms from the field of pattern matching and text compression to represent the “language” in such signals. Common text compression algorithms are less tailored to handle such strings. Moreover, they are lossless, and cannot be used to recover noisy signals. To this end, we define the recursive run-length encoding (RRLE) method, which is a generalization of the well known run-length encoding (RLE) method. Then, we suggest lossy and lossless algorithms to compress and de-noise such signals. Unlike previous results, running time and optimality guarantees are proved for each algorithm. Experimental results on synthetic and real data sets are provided. We demonstrate our system by showing how it can be used to turn commercial micro air-vehicles into autonomous robots. This is by reverse engineering their unpublished communication protocols and using a laptop or on-board micro-computer to control them. Our open source code may be useful for both the community of millions of toy robots users, as well as for researchers that may extend it for further protocols.

1. Introduction

1.1. Motivation: Autonomous Toy Robots

While this paper deals with a natural open problem in string compression and representation (“stringology”), its origin was in our robotics lab. Traditional labs have relatively expensive, potentially dangerous robots, such as heavy quadcopters, crawlers, and humanoids that cost thousands of dollars. However, in recent years it has become easy to order from Amazon or eBay, low-cost “toy” robots that cost a few dozen dollars. More recently, we have seen dozens types of robots in toy stores and malls, including helicopters, quadcopters, cars, small humanoids, and even combinations such as quadcopters with wheels. Due to their price, size, and plastic material, such robots can be used safely indoors (e.g., home, school, or university), are more resistant to crashes, and it is easy to fix or replace their parts.
However, these toy robots are usually not autonomous due to two main problems: (i) they have no “eyes”: sensors such as GPS allow them to know their location and position; and (ii) they are controlled via a remote controller (RC) that is supposed to be operated by a human. These commercial remote controllers usually have no published communication protocol. While a few of them might be found in the internet, they change frequently from model to model.
Unfortunately, most commercial, low-cost (<$50) toy robots (cars, quadcopters and humanoids), do not have published protocols. Moreover, their protocols frequently change over time without notice. In fact, many times we ordered a few copies of exactly the same toy robot from Amazon.com and each one of them had a different protocol. This was also the case with toy helicopters in our experimental results section.
Our goal in this study was to take these toy robots and make them autonomous. To this end, we had to solve the to above-mentioned problems. Problem (i) was already handled by developing low-cost tracking systems based on web-cameras, or on-board analog cameras [1]. In this paper we handle Problem (ii): how to automatically reverse engineer the communication protocol of the robot.
Once this protocol is known, we can imitate the remote control by producing the commands using a mini-computer, such as Arduino [2] or Raspberry Pi [3] that is connected to a transmitter or a few IR (Infra-Red) LEDs. Instead of a human with a remote control, an algorithm can then send hundreds of commands per second to the robot to result in a much more stable and autonomous robot. Such robotic, low-cost systems, that are based on this paper, can be found, e.g., in [1].
Compression or learning? As explained above, the motivation for this study was to learn a communication protocol based on given recording of sampled signals. That is, to reverse-engineer the protocol. However, this problem in principle is very related to the problem of compressing signals. This is because an efficient compression algorithm for a specific protocol is expected to use the repeated format of this protocol. For example, machine learning is used to extract a small (compressed) predictive model from a large sample data, which is used in, e.g., video compression protocols to compress real-time video, where the decoder is expected to predict the next frame via the model, and only the differences (the fitting errors of the model) are being sent by the encoder. Similarly, the results in this paper can be used to learn a protocol, to compress a message efficiently based on a given protocol, or for noise removal. The theoretical optimization problem is very similar, as explained in the next sections.

1.2. Run Length Encoding (RLE)

Given a string S, which represents a signal, our goal is to compress S such that the optimal compression will allow us to resolve the protocol behind that signal. The compression scheme we present in this paper is called recursive run-length encoding (RRLE), and is a natural generalization of run-length-encoding (RLE), but is more suited for semi-periodic strings that are produced by sensors on robots.
RLE is a very simple form of lossless string compression in which runs of letters (that is, sequences in which the same letter occurs in many consecutive elements of the string) are stored as pairs of one count and one single letter, rather than the original run. For example, the string S = ( a a a a a a a b b b b a a a a ) has three runs and can be represented as the vector S = ( 7 , a , 4 , b , 4 , a ) , which means that string S is consists of seven a’s, followed by four b’s, followed by four a’s. This way the string S can be represented using six letters/integers instead of 15. RLE is most useful on a string that contains many such runs.
In this paper we also use the term run (or period) to denote a periodic string. That is, a string that can be divided into a number of identical adjacent non overlapping substrings. For example, if  S = a b a b a b , the RLE will be ( 3 , a b ) which means that the string ( a b ) repeats itself three times in the string S. Similarly, the RLE of S = a b a b c b is ( 2 , a b , 1 , c b ) . In RRLE we recursively define each run (period) so that it may be further compressed using RLE in order to get even better compression as in Figure 1. For a formal definition of RRLE, see Section 2.3.

1.3. Our Contribution

The contributions that are presented in this paper are as follows.
  • Defining recursive run-length-encoding (RRLE) which extends the classic RLE and is natural for strings with repeated patterns such as in communication protocols.
  • An algorithm that computes the optimal (smallest) RRLE compression of any given string S in time polynomial in the length n = | S | of S. See Theorem 4.
  • An algorithm that recovers an unknown string S from its noisy version S ˜ in polynomial time. The only assumption is that S has a corresponding RRLE tree of O ( 1 ) levels. See Definition 1 for details. The running time is polynomial in | S | , and the result is optimal for a given trade-off cost function (compression rate versus replaced characters). See Theorem 6.
  • ( 1 + ϵ ) -approximation for the above algorithms, that takes O ( n ) time for every constant ϵ > 0 , and can be run on streaming signals and in parallel, using existing core-sets for signals. See Section 4.
  • Preliminary experimental results on synthetic and real data that support the guarantees of the theoretical results. See Section 6.
  • An open-source and home-made system for automatic reverse-engineering of remote controllers. The system was used to hack dozens of radio (PWM) and IR remote controllers in our lab. We demonstrated it on three micro air-vehicles that were bought from Amazon for less than $30 each. See [4] for more results, code, and discussions.

1.4. Related Work

Reverse Engineering. There are many systems and applications that suggest imitating remote controllers. For example, a “universal remote controller” can record IR signals and send them again by pressing on the corresponding button of this remote controller. However, such a simple controller with a small number of states, cannot replace the remote controller of, e.g., a common quadcopter with seven channels whose protocol can be used to generate unbounded types of signals.
String Algorithms. The notion of runs and periodicity of strings is at the core of many stringology questions [5,6]. It constitutes a fundamental area of string combinatorics due to important applications of text algorithms, data compression, biological sequences analysis, music analysis, etc. The notion of runs was introduced by Iliopoulos, Moore, and Smyth [5], who showed that Fibonacci words contain only a linear number of runs according to their length. Kolpakov and Kucherov [6] (see also [7], Chapter 8) proved that the property holds for any string and designed an algorithm to compute all runs in a string, which extends previous algorithms [8,9]. Other methods are presented in [7,10,11,12,13,14,15].
All of the above mentioned works have focused on exact runs; i.e., runs that include exactly the same repeated period. Other works focused on approximate runs. For example, when a string S is a concatenation of a non-empty substrings, by the modification of at most k letters, they form an exact run. This problem was widely researched [16,17,18,19,20]. However, none of these previous works have focused on recursive runs, as defined in this paper.
The RRLE compression presented in this paper is a novel definition of recursive approximate runs. Informally, our problem is an optimization problem that looks for approximate runs that include a period that may be a run by autonomously. In addition to run length encoding, RRLE is also closely related to run-length straight line program (RLSLP) compression scheme, which is an extension of straight line programs (SLPs) [21,22].
There are many other compression schemes of strings, such as SLP [23], macro schemes [24], and LZ77 [25], that might be even more useful than the RRLE suggested in this paper. However, the main goal of the study was not to simply compress strings, but actually extract patterns from noisy strings. This was the motivation for the approximation algorithm that is our main result in Section 3.
In the case of communication protocols, the idea of using recursive trees of patterns is important and more relevant than pointers that are more relevant to text documents. In addition, RRLE is not based on the longest repeated factor (substring), but rather based on finding repeated substrings that are well compressed by themselves.
This version of finding recursive approximate runs is challenging, since most known techniques for finding exact or approximate runs cannot be used here without introducing exponential running time. To the best of our knowledge, there are no known efficient (polynomial time) algorithms for the RRLE problem.
Roadmap: In Section 2, we provide the basic stringology notation needed for the algorithms, and a full definitions of the problem we are solving. In Section 3, we present our reverse engineering algorithms, which are the algorithms for exact and lossy text compression. In Section 4 we explain how we can apply these algorithms on our system. Then, in Section 5, we give an example of a protocol, and present in detail our reverse engineering system. Finally, in Section 7 we conclude this paper, and discuss some interesting directions for future work.

2. Problem Statement

In this section we define the RRLE problem and the required notation for the rest of the paper.

2.1. Basic Notations

Let Σ denote a set called alphabet, where each item in Σ is called a letter. A string is a vector P Σ n , where n 1 denotes its length. For simplicity we remove the commas and replace P = ( p 1 , , p n ) by ( p 1 p n ) . For an integer j [ i , n ] = i , i + 1 , , n , the string P = P [ i . . j ] is called a substring of P. The empty string is also considered a substring of P. If i = 1 , then P is a prefix of P, and if j = n , then P is a suffix of P. The concatenation of two strings P of length n and Q of length m, is denoted by P Q = P [ 1 . . n ] Q [ 1 . . m ] . For an integer k 1 , we denote P k = P 1 P k , where P i = P for every i [ 1 . . k ] .
An integer r [ 1 . . n ] is a factor of n ( n mod r ) = 0 ; i.e., there is an integer x 1 such that r x = n . The string P is r-periodic (or periodic in r) if P [ 1 . . r ] = P [ r + 1 . . 2 r ] = = P [ n r + 1 . . n ] ; i.e., P = P [ 1 . . r ] n r . Hence, every string of length n is n-periodic. The string P [ 1 . . r ] is the smallest period of P if there is no r [ 1 . . r 1 ] such that P is r -periodic.

2.2. Recursive Run-Length Encoding (RRLE)

In this subsection we suggest a novel generalization of the classic run-length encoding compression, called recursive run-length-encoding (RRLE) which is more suitable to our applications.
Definition 1
(Recursive run-length encoding (RRLE)). An RRLE s = ( t 1 , s 1 , , t k , s k ) is defined recursively as a 2 k -tuple, where k 1 is an integer, t i 1 is an integer, and s i is either a string or an RRLE, for every i [ 1 . . k ] . The size | s | of s is recursively defined as k + i = 1 k | s i | . Similarly, S ( s ) = u 1 t 1 u k t k where u i = s i if s i is a string, and u i = S ( s i ) ; otherwise, for every i [ 1 . . k ] , if S ( s ) = Q , then s is RRLE of the string Q. We define rcost ( Q ) to be the size of the smallest RRLE of Q, rcost ( Q ) = min s S ( s ) = Q | s | . Such an RRLE is called an optimal RRLE of Q and is denoted by s * ( Q ) .
For example, consider the string M = ( a a a b b a a a b b ) . One RLE of M is ( 3 , a , 2 , b , 3 , a , 2 , b ) . Another one is ( 2 , a a a b b ) . A possibly shorter description of the string may be as a couple of repetitions of the string a a a b b = ( 3 , a , 2 , b ) . This gives the recursive description, ( a a a b b a a a b b ) = ( 2 , a a a b b ) = ( 2 , S ( 3 , a , 2 , b ) ) .
A less trivial example is the string
a b c c c a b c c c g g h h e k m l f f f c c c d c c c d = S ( 2 , a b c c c , 2 , g , 2 , h , 1 , e k m l , 3 , f , 2 , c c c d ) = S ( 2 , S ( 1 , a b , 3 , c ) , 2 , g , 2 , h , 1 , e k m l , 3 , f , 2 , S ( 3 , c , 1 , d ) ) .
While the last expression seems longer than the first one, it can actually be represented efficiently using a RRLE tree, which is a tree, where each edge corresponds to a counter (number of repetitions), and each of its leaves corresponds to a string; see Figure 1.
A natural problem statement that follows Definition 1 is: how to compute the optimal compression of a given string.
Problem 2.
Given a string Q, compute the optimal RRLE s * ( Q ) of Q. That is, s * ( Q ) is the tuple that minimizes | s | over every tuple s which is a compression of Q; i.e., S ( s ) = Q and | s | = rcost ( Q ) . Here, S ( s ) is the string that corresponds to s as in Definition 1.

2.3. Lossy Compression

The previous subsection discussed exact (non-lossy) compression. However, given a string P, our goal is intuitively to compute a string Q which is a “lossy compression” of P in the sense that: (a) Q is similar (not necessarily identical) to P, and (b) Q takes less space in memory than P.
Of course, we can trivially define Q = P so that the similarity of P and Q will be maximized, but then there will be no compression or memory saving at all. On the other hand, we can define Q = 1 n , which will minimize the compression cost of Q (since it is just n occurrences of the digit 1), then the similarity cost to P will be very high. In other words, there is a trade-off between these two costs or goals. For a proper lossy compression problem we thus need to define, in addition to the compression cost of the previous section, a similarity and overall cost functions as follows.
Similarity cost. Such a function scost ( · , · ) maps every pair of strings P and Q of the same length into a score (real number) scost ( P , Q ) that measures how much the strings are different; i.e., how much Q is a good approximation to p. In this paper, scost ( P , Q ) will be the number of indices i 1 , , n which has a different corresponding letter in P and Q, also known as the Hamming distance [26] between P and Q. For example, if P = a b a b c b and Q = a b a b a b , then scost ( P , Q ) = scost ( a b a b c b , a b a b a b ) = 1 since only the 5th letter is different: “c” for P and “a” for Q.
An overall cost function. This function cost ( · , · ) assigns an overall score for a pair of string that measures the trade-off between the similarity rate scost ( P , Q ) and the compression rate ccost ( Q ) . For simplicity, we use the natural goal of minimizing the sum of similarity cost and compression cost,
cost ( P , Q ) = scost ( P , Q ) + rcost ( Q ) .
For example, if P = a b a b c b and Q = a b a b a b , then the overall cost is
cost ( P , Q ) = scost ( P , Q ) + rcost ( Q ) = 1 + 3 = 4 ,
compared to the original cost
cost ( P , P ) = scost ( P , P ) + rcost ( Q ) = 0 + 6 = 6 .
The second problem statement is then: given S, how can one compute a lossy compression that is both small and decompressed to a similar string as the given one.
Problem 3.
Given a string P, compute a string Q that minimizes
cost ( P , Q ) = scost ( P , Q ) + rcost ( Q ) ,
over every string Q. Here rcost ( Q ) is the (optimal) RRLE compression cost of Q as in Definition 1, and scost ( P , Q ) is the similarity (Hamming) cost.

3. Algorithms for Exact and Lossy RRLE Compression

In this section, we define and provide algorithms for the exact and lossy RRLE compression Problems 2 and 3. In the exact version of the problem, the input is a string Q that represents the signal, and the output is rcost ( Q ) , which is the size of the smallest RRLE s of Q; see Definition 1. Hence, the similarity cost is scost ( Q , S ( s ) ) = 0 , and the overall cost is ccost ( Q , S ( s ) ) = rcost ( Q ) .
In the lossy version we aim to “clean” the noise from the input signal Q and extract the hidden repeated patterns by finding a similar string P which minimizes cost ( Q , P ) ; see Problem 3. The motivation for both of the problems is that the input signal is assumed to have periodic patterns (exactly or approximately). By finding these periods we can either compress the signal efficiently, or reverse engineer the hidden protocol that is generated as it is in our experimental results. From the partition of the input string into periodic substrings, we can conclude the format of the protocol, including constant bits and the substring that is responsible for each button. see Section 5.

3.1. Warm Up: Exact RRLE Compression

We now describe Algorithm 1 for computing the smallest RLE of an input string Q and proves its correctness. For simplicity, the algorithm only computes the length of the smallest RLE but the RLE itself can be easily extracted by following the chosen indices during the recursive calls. This solves Problem 2.
Algorithm 1: Exact(Q); see Theorem 4
Algorithms 12 00267 i001
Overview of Algorithm 1: Given a string Q of length n, the algorithm computes a matrix D [ 1 . . n ] [ 1 . . n ] , such that D [ i ] [ j ] = rcost ( Q [ i . . j ] ) . In particular, D [ 1 ] [ n ] = rcost ( Q ) . The matrix D is computed for substrings of increasing length; i.e., we first compute all substrings of length one, then all substrings of length two, and so on until the full string of length n is evaluated. We initialize the matrix on the main diagonal D [ i ] [ i ] = 2 for 1 i n . Then we compute rcost ( Q [ i . . j ] ) for all 1 i < j n using a recursive definition of D [ i ] [ j ] = rcost ( Q [ i . . j ] ) . This is the minimum between the following three values: (i) rcost ( Q [ i . . i + r 1 ] ) if Q [ i . . j ] is r-periodic, where r is as small as possible, (ii) leaving Q [ i . . j ] as a whole which takes 1 counter and j i + 1 letters, and (iii) the smallest rcost that can be obtained by partitioning Q [ i . . j ] into two consecutive substrings Q [ i . . k 1 ] and Q [ k . . j ] , over every integer k [ i + 1 , j i + 1 ] .
We now prove that the output of Algorithm 1 is indeed the optimal compression rcost ( Q ) of its input Q, which solves Problem 2.
Theorem 4.
Let Q be a string of length n. Let D [ 1 ] [ n ] be the output of a call to E x a c t ( Q ) ; see Algorithm 1. Then D [ 1 ] [ n ] = rcost ( Q ) is the size of the smallest RRLE of Q and can be computed in O ( n 3 ) time.
Proof. 
We prove a more general claim, that the theorem holds for any substring Q [ i . . j ] of Q. The proof is by induction on the length = j i + 1 of Q [ i . . j ] . For = 1 , we have D [ i ] [ i ] = rcost ( Q [ i ] ) = 2 , for storing the letter Q [ i ] and its length counter 1. For 2 , inductively assume that the theorem holds for any substring of Q [ i . . j ] . Let s = ( t 1 , s 1 , , t m , s m ) be the smallest RRLE of Q [ i . . j ] . The rest of the proof corresponds to the three possible evaluations of D [ i ] [ j ] in Algorithm 1.
If m = 1 and Q [ i . . j ] are r-periodic for r < | Q [ i . . j ] | = j i + 1 , then t 1 2 denotes the number of periodic runs. Hence, s 1 = Q [ i . . i + r 1 ] is the RRLE of each run and | s | = 1 + | Q [ i . . i + r 1 ] | = D [ i ] [ i + r 1 ] .
If m = 1 and t 1 = 1 , then s 1 = Q [ i . . j ] and Q [ i . . j ] are r = j i + 1 periodic (otherwise we could have better compression rate for t 1 > 1 and shorter string s 1 ). In this case, D [ i ] [ j ] = 1 + | Q [ i . . j ] | = 1 + ( j i + 1 ) = j i + 2 .
If m 2 , then we can split it into a pair of RRLEs Q [ i . . k 1 ] = S ( t 1 , s 1 , , t j , s j ) and Q [ k . . j ] = S ( t j + 1 , s j + 1 , , t m , s m ) . By the inductive assumption and the definition of the size | s | of s,
| s | = | ( t 1 , s 1 , , t j , s j ) | + | ( t j + 1 , s j + 1 , , t m , s m ) | = D [ i ] [ k 1 ] + D [ k ] [ j ] .
Time Complexity: the algorithm runs O ( n 2 ) iterations over the pair of “for” loops. For each such iteration, it computes the smallest period, if any, of a string of length O ( n ) , which takes linear time using the preprocessing of the Knuth–Morris–Pratt (KMP) algorithm [27]. Then, the corresponding entry in D is computed using the O ( n ) precomputed values. Hence, the total time complexity of the algorithm is O ( n 3 ) . □

3.2. Lossy RRLE Compression

In this section we solve Problem 3; i.e., compute a lossy good compression of an input string Q. Formally, given such a string Q of length n, the goal of our algorithm is to compute the minimum cost ( Q , P ) over every string P Σ n ; see Section 2.3 for the definition of cost . Of course, one can simply compute cost ( Q , P ) using rcost ( P ) = E x a c t ( P ) for all possible strings P and output the one whose cost ( Q , P ) is minimized. However, the time complexity of such a solution is O ( | Σ | n n 3 ) .
In order to reduce the time complexity, we propose a dynamic programming algorithm, which generalizes Algorithm 1 as follows. In Algorithm 1, if a substring Q [ i . . j ] is not periodic, we check two possible evaluations of D [ i ] [ j ] : partitioning Q [ i . . j ] or leaving it as is. Here, even if Q [ i . . j ] is not periodic, we may change it to be periodic by finding a periodic string Q of length i j + 1 , and “paying” the similarity cost scost between Q [ i . . j ] and Q for this change.
Hence, the final cost of Q [ i . . j ] is defined recursively as the minimum between the following three values:
  • The minimum cost of modifying Q to be r-periodic, over every possible period length r. Formally, this is the minimal cost ( Q , q n r ) +1, over every string q Σ r and factor r of n.
  • The minimum rcost over all possible partitioning options of Q.
  • The cost of representing Q as is, with no compression.
To efficiently implement the above algorithm, we define the r-Parikh Matrix of a given string and its factor r, which we use throughout the algorithm. Intuitively, we define the string Q i , 1 to be the same as the input string Q except that we change every rth letter of Q to Σ i . Hence, we changed at most n / r letters. More generally, in Q i , j we do the same where j denotes the offset or first letter we change (beginning of count). The r-Parikh Matrix of Q contains the corresponding mismatching cost (Hamming distance) scost ( Q i , j ) in its ( i , j ) entry. Examples will follow the definition.
Definition 5
(Parikh Matrix [28]). Let Q Σ n be a string over an alphabet Σ = Σ 1 , , Σ | Σ | . Let r 1 be a factor of n. For every i [ Σ ] and j [ r ] , let Q i , j Σ n denote the string whose letters in the entries k j , j + r , j + 2 r , are replaced by Σ i ; i.e., for every k [ n ] we have
Q i , j r [ k ] = Q i , j [ k ] = Σ i i f ( k mod r ) = j Q [ k ] o t h e r w i s e .
The r-Parikh Matrix M = M r ( Q ) 0 , 1 , , n / r | Σ | × r of Q is the matrix such that
M [ i ] [ j ] = scost ( Q i , j ) .
For example, let Q = ( a b a b a c ) be a string over Σ = a , b , c . If r = 1 , then j [ r ] = 1 , and therefore j = 1 . That is, the period of changing a letter is 1 and thus all the letters will be modified. Indeed, for every k [ n ] we have ( k mod r ) = ( k mod 1 ) = 0 = j 1 . Hence, Q i , j = Q i , 1 = Σ i n consists of n copies of the letter Σ i . We obtain Q 1 , 1 = ( a a a a a a ) , Q 2 , 1 = ( b b b b b b ) , and Q 3 , 1 = ( c c c c c c ) . There are 3 corresponding mismatches of Q 1 , 1 = ( a a a a a a ) compared to Q = ( a b a b a c ) , in indices k 2 , 4 , 6 . Hence, M [ 1 ] [ 1 ] = 3 . Similarly, M [ 2 ] [ 1 ] = 3 and M [ 3 ] [ 1 ] = 5 . The 1-Parikh matrix of Q is, thus, M ( Q , 1 ) = ( 3 , 3 , 5 ) T .
If r = 2 , then j 1 , 2 . That is, we start the count with the first letter j = 1 , which means in the above example that we change the letters in indices k 1 , 3 , 5 . We obtain Q 1 , 1 = ( a b a b a c ) , Q 2 , 1 = ( b b b b b c ) , and Q 3 , 1 = ( c b c b c c ) . Counting the corresponding mismatches compared to Q = ( a b a b a c ) , we get that M [ 1 ] [ 1 ] = 0 , M [ 2 ] [ 1 ] = 3 , and M [ 3 ] [ 1 ] = 3 . In a similar way, for j = 2 , we obtain Q 1 , 2 = ( a a a a a a ) , Q 2 , 2 = ( a b a b a b ) , and Q 3 , 2 = ( a c a c a c ) . Hence, M [ 1 ] [ 2 ] = 3 , M [ 2 ] [ 2 ] = 1 , and M [ 3 ] [ 2 ] = 2 . The 2-Parikh Matrix of Q is then 0 3 3 1 3 2 .
Finally, if r = n then M [ i ] [ j ] = 0 if the jth letter of Q equals Σ i , and M [ i ] [ j ] = 1 otherwise. Hence, the 6-Parikh Matrix of Q = ( a b a b a c ) is 0 1 0 1 0 1 1 0 1 0 1 1 1 1 1 1 1 0 .
For the r-Parikh matrix M r of a string Q, we it denote by M m i n r ( j ) = min i [ | Σ | ] M r [ i ] [ j ] , the smallest entry in the jth column of M r . Suppose that its row is i * ; i.e., M m i n r ( j ) = M r [ i * ] [ j ] . Therefore, if we wish to fix Q to be r-periodic with an offset j, by paying the smallest Hamming distance scost , then we should change the corresponding letters Q [ j ] , Q [ j + r ] , to the letter σ i * . This is also the motivation for using this matrix in Algorithm 2.
Algorithm 2: L OSSY ( M , ) ; see Theorem 6.
Algorithms 12 00267 i002
Overview of Algorithm 2: The input to the algorithm is a n-Parikh matrix M of a string Q of size n over Σ , and an integer that denotes the maximum RRLE tree level of the compression, as explained below. Note that both Q and n can extracted from this Parikh matrix. We use dynamic programming to compute the matrix D [ 1 . . n ] [ 1 . . n ] , in which D [ i ] [ j ] = cost ( Q [ i . . j ] , P ) is the (optimal) compression cost of the sub string Q [ i . . j ] . The loops are over the length m of the substring (from 1 to n), and then from the starting index i. The last index is denoted by j = i + m 1 .
We first compute the optimal cost of modifying a substring of length 1 in the ith index. This is M m i n ( i ) by definition, so D [ i ] [ i ] = 1 + M m i n ( i ) for 1 i n . Next, we compute D [ i ] [ j ] = cost ( Q [ i . . j ] , P ) for every 1 i < j n using recursive exhaustive search over the following three options.
The first option is to modify the substring Q [ i . . j ] in order to get r-periodic substring for some factor r. This costs 1 for the number of reputations and the total compression of the first r letters of Q.
The second option is to partition the substring into a pair of substrings: the left and right side of the original string. The overall cost is then the sum of these two costs.
The last option is simply to keep the substring as is. This takes m letters which is the size of the substring.
Looking at the resulting RLE tree, the first case means we can compress the string by adding the node new single child which represents a period of length r. The edge to this new child is marked with n r . The second case means add k new children which represent the partition of the string. In this case, all k new edges are marked with 1. And the third case means the string itself is a leaf.
For computing the first value, we need to compute the r-Parikh matrix M r , for every possible period length r, and then recursively fill it. However, we bound this recursion by a constant number , which is the maximal levels in the RLE tree, by keeping for each call to Algorithm 2 its level in the recursion, and if we reach we only compute the third value. The algorithm also stops when the input Parikh matrix is of size | Σ | × 1 , and returns M m i n ( 1 ) .
The time complexity of computing D [ 1 . . n ] [ 1 . . n ] , is n 2 times (for each i , j ) the following:
  • Computing M r for every possible r takes O ( | Σ | n 2 ) + the time for computing D for M r .
  • Computing the second value in the equation takes O ( n ) .
  • Computing the third value in the equation takes O ( | Σ | n ) .
Each call takes O ( | Σ | n 4 ) -time, and since we bound the recursive calls to , the total time complexity is O ( | Σ | n 4 ) .
The pseudocode of the algorithm is presented in Algorithm 2. For simplicity, the algorithm output is cost ( Q , P ) ; however, it can be easily modified to include the string P as well.
Theorem 6.
Let Q be a string of length n over Σ, and let x be the output of a call to L OSSY ( M , ) , where M is the n-Parikh matrix of Q. Then x is the minimum cost ( Q , P ) over every string P Σ n whose recursive depth is ℓ.
Proof. 
To prove the correctness of the algorithm recall that there are two options for a string Q: it is either periodic or not. If Q is not periodic we can partition it to smaller consecutive substrings and compress them, or we can leave it as is. These options are covered by the algorithm in the second and third values, respective of the equation of computing D [ i ] [ j ] .
If Q is periodic, or modified to be periodic, the algorithm checks all possible period lengths r. For each such period length r it computes the r-Parikh matrix M r . The only thing we need to prove is that M r represents all possible substrings q Σ r , and the corresponding value of scost ( Q [ 1 . . r ] , q ) . If this is true, it means that the algorithm considers all possible solution strings.
Let us look at the string Q of size n, and its n-Parikh matrix M [ 1 . . | Σ | ] [ 1 . . n ] . By definition, the cell M [ σ ] [ j ] equals 0, if Q [ j ] = σ , and 1, otherwise. Hence, computing j = 1 n M m i n ( j ) gives us the minimum scost ( Q , P ) over all strings P Σ n .
The last thing left to prove is that computing the minimum scost ( Q , P ) is sufficient in order to get cost ( Q , P ) in the case of periodicity. If Q is periodic in r, then, by definition, cost ( Q , P ) = r + 1 + s c o s t ( Q , P ) . Hence, minimizing scost ( Q , P ) for a specific r is sufficient to compute the minimum cost ( Q , P ) for this r. Since the algorithm computes this value for every possible 1 r n 2 , it will find the correct solution string P. □

4. Linear-Time, Streaming, and Parallel Computation

The algorithms in the previous sections are optimal but take polynomial time in the input (length of string). However, their running time can be easily reduced to be linear in the input, by running them on core-sets for segmentation [29,30]. Roughly speaking, core-set is a problem-dependent reduction of the input, such that running the existing algorithm for solving the problem on the core-set, would yield a provable approximation compared to the result of running the algorithm on the complete data. In fact, using traditional merge-reduce trees, core-sets can be computed on streaming data, when we allow them to have only one pass over the input string, and use memory and update time per new letter, that are only poly-logarithmic in the input. Similarly, we can compute core-sets in parallel, either on few M threads, or on distributed data over M machines on the network (“cloud”), and reduce the running time by a factor of M.
More formally, for the problem in this paper, we use core-set construction for segmentation. This algorithm gets an ordered set of n points over time, and returns an ordered set C of constant size with appropriate weights in O ( n ) time. The sum of distances from the original set to every signal that consists of a constant number of k linear segments, is approximated by C, up to ( 1 + ε ) multiplicative factor, where ε ( 0 , 1 ) is constant. More generally, the core-set time has roughly quadratic dependency on k and 1 / ϵ ; see [29,30] for details. Unlike many solutions in machine or PAC-learning, in this and most core-sets there are no special assumptions on the size of input or its distribution (i.e., worse case input is assumed).
To apply Algorithms 1 and 2 on this core-set, we consider the input string to be a signal over integers that represent the letters. We also assume that the optimal RRLE has at most k leaves (more generally, has length of at most k), so that every relevant RRLE candidate will be approximated by the core-set C. This assumption is natural, e.g., in our system, since the number k of patterns in the protocol is significantly smaller than the length n of the highly sampled signal.

5. The Reverse Engineering System

5.1. Example of a Protocol: The SYMA G107 Helicopter

Example Protocol: The SYMA G107 helicopter supports a communication of three channels that represent the current state (level) of each button in the remote controller: throttle, pitch, and yaw of the helicopter. As in most of our RCs, the communication protocol is defined by a multi-layer language. For the special case of SYMA G107, the protocol is as follows.
Level I: A/B (switches). The IR signal is essentially a stream of binary numbers that corresponds to the IR light (on or off) that can be be changed every 13 microseconds. Light on for 13 microseconds represents in our notation the letter “A”; otherwise, the letter is “B”. The letters “A” and “B” are called switches.
Level II: 0/1/H/F (letters). The letter “0” is represented by the sequence of switches “0=ABABABABABBBBBBBBBBB”. That is, five pairs of “AB” followed by ten “B” letters. We encode the last sentence as a sequence of pairs “0” = ( 5 , A B , 10 , B ) , known as run-length-encoding (RLE); see Definition 3. Similarly, we define the letters “1” = ( 5 , A B , 23 , B ) , “H” = ( 75 , A B , 72 , B ) (called header, and “F” = S ( 10 , A B , 47 , B ) (called footer).
Level III: word. A word in the SYMA G107 protocol is defined by the followings sequence of letters:
word = ( 1 , H , 1 , 0 , 1 , y a w , 1 , 0 , 1 , p i t c h , 1 , 0 , 1 , s e r i a l , 1 , t h r o t t l e , 1 , 0 , 1 , t r i m , 1 , F ) ,
where: H and F were defined in Level II above, “serial” is the letter “0” or “1” (Helicopter 0 or 1) that allows the support of two helicopters by a single RC. Each term yaw/pitch/throttle/trim is an integer between 0 and 255. Each integer is represented by a binary word that consists of 8 bits, where a bit is represented by the letter “0” or “1” above. In real-time, a continuous stream of such words is sent from the transmitter (RC) to the receiver of the helicopter that decodes these words.

5.2. The System

Given a remote controller of a toy robot, such as the one of SYMA G107 described above, our goal is to learn its protocol. That is, to reveal from the long recorded stream of analog signals, what is the exact sequence of switches that define each letter in the protocol. Once this is known, we can imitate the remote controller using a mini-computer. This is where the stringology steps in. The algorithm we present below allows us to identify, in this long sequence of “AB” switches, the exact letters of a protocol.

5.3. After Learning the Protocol

After learning the desired protocol using our reverse engineering algorithm, we send the signals that are generated by the controller algorithm using a low-cost set of IR LEDs. The amplifier receives the binary commands from the Arduino code and turns them into on/off commands to the LEDs array. The algorithm that controls the robot runs on a laptop or a mini-computer and generates words according to the learned protocol. These commands are sent to the Arduino through the USB port.
The whole system works as follows:
  • Recording analog signals. In the case of IR signals, we use an IR decoder (sensor) that receives the signals from the remote controller. The IR decoder gets its power from the a micro-computer (Arduino), and is connected to a logic-analyzer.
  • Converting Analog signals to binary signals. The logic analyzer converts the analog voltage signal into a digital binary signal that has value “A” or “B” in each time unit.
  • Transmitting the binary stream to a laptop via a USB port.
  • Running reverse engineering algorithm to learn the protocol.
  • Producing commands to the robot using the mini-computer that is connected to a transmitter or a few IR (Infra-Red) LEDs.
See Figure 2 for steps 1–3. Note that since the logic analyzer is relatively expensive compared to the other parts of our system, we can use the Arduino board not only as a power provider, but also as a converter from the IR signal to the USB port. An Arduino code that implements this conversion is provided as part of the open source of our system.

6. Reverse Engineering Experiments

We ran experimental results on both synthetic and real data to test Algorithm 2.
We first ran the following experiment on synthetic data to measure the robustness of the recovery of Algorithm 2; i.e., to get some sense of the signal-to-noise (SNR) ratio. Intuitively, we assume that user Alice sends a periodic string over a known alphabet Σ [ 1 . . 4 ] to another user Bob, through a noisy channel. Bob then tries to recover the original string from the received noisy string over the alphabet of real numbers Σ = R .
The input data was a set M of 48 = 16 · 3 strings M i , k i [ 1 . . 16 ] , k [ 1 . . 3 ] in Σ . Each string M in this set was constructed as the sum “ M = M * + N ” of a fixed matrix M * with additional random noise N that were defined as follows. Let V = S ( 4 , 12 , 4 , 3 , 3 , 4 ) = 121212123333444 , and let M * = V 3 be a string from the alphabet Σ . For σ > 0 , let N σ denote a string in Σ of length | N | = | M * | , where N [ j ] N ( 0 , σ 2 ) is a random variable from a Gaussian distribution with zero mean and variance σ 2 for every j [ 1 . . | N | ] . To obtain a finite alphabet and Parikh Matrix, we scale and round each letter N [ j ] to its nearest integer. We then define σ i = 0.05 i and M i = M * + N σ i ; i.e., M i [ j ] = M * [ j ] + N 0.05 i [ j ] , for every i [ 0 . . 16 ] and j [ 1 . . | N | ] . We repeat this construction of M i three times to obtain the string M i , 1 , M i , 2 , M i , 3 , with different random noise N σ i from the same distribution. The result is then the input set M of matrices above in the real alphabet Σ .
The experiment is a list of 255 = 17 × 3 × 5 calls O i , j , k = L OSSY ( M i , k , j ) to Algorithm 2 with the string M i , k and j, over every variance level i [ 1 . . 17 ] , repetition (try) k [ 1 . . 3 ] , and j [ 1 . . 5 ] . The cost error for this call is the weighted number of mismatched letters (i.e., dissimilarity or distance) between the output recovered string O i , j , k and the original de-noised string M * ,
error ( i , j , k ) = z = 1 | M * | | M * [ z ] O i , j , k [ z ] | .
The results are shown in Figure 3. The x-axis represents the integer level i = σ i / 0.05 of the noise variance as defined above. The color of each of the five curves corresponds to different RRLE levels j [ 1 . . 5 ] that were used in Algorithm 2. The height y of the jth curve in the ith variance level is the mean error over the 3 errors error ( ( i , j , 1 ) + ( i , j , 2 ) + ( i , j , 3 ) ) / 3 , together with its variance.
Conclusion.Figure 3 shows that the algorithm is more robust to noise as the number of the levels in the tree increases.

6.1. Experiments on Toy Robots

In this section we show experimental results on real data strings. These strings were obtained by recording communication signals from the remote controllers (RC) of a pair of toy robots: (i) The IR-UFO helicopter, which communicates through a 3-channel IR signal (yaw, pitch, and throttle). Such a remote controller contains two sticks: a one that can be rotated to four directions (higher/lower pitch, and higher/lower yaw) and another stick that can be rotated (only left and right for higher/lower throttle). (ii) The Lutema Avatar Hovercraft that has similar RC, but different communication protocol than the IR-UFO.
The ground truth. After using our system, we verified the following protocol of IR-UFO which has a structure that is similar to the SYMA S107, as defined in Section 1, with the following changes. Level I: The IR light changes every 13 microseconds. Level II: 0 = ( 175 , A , 200 , B ) , 1 = ( 350 , A , 375 , B ) ,   and   H = ( 2 , ( 360 , A , 240 , B ) ) . Level III: A stream of binary words, each consists of 30 bits followed by a list of 4000 “A” bits. The format of a word is
package ( t h r o t t l e , y a w , p i t c h , c h a n n e l ) = ( 1 , H , 2 , 0 , 1 , t h r o t t l e , 1 , 1 , 1 , c h a n n e l O n e , 1 , y a w , 1 , c h a n n e l T w o , 1 , 0 , 1 , p i t c h , 1 , 0 , 1 , c h e c k s u m ) ,
where “throttle”, “yaw”, and “pitch” are integers in [ 0 , 127 ] that are represented using 7 bit words; “channelOne” and “channelTwo” are the left and right bit respectively that represents the integer c h a n n e l [ 0 , 3 ] ; “checksum”: 4 bits that represent a checksum of all the previous 24 bits of the message. These bits are partitioned into six binary strings S 1 , , S 6 , each of length four.
Checksum is
c h e c k s u m = 1111 S 1 S 6 ,
where x y is a bit-wise xor on the corresponding bits in x and y. Once the bits of the checksum field are recovered using our algorithm, it is easy to extract its generating formula, as in (2), by simply solving a system of linear equations over the F 2 field. See e.g., [31].

6.2. De-Noising Level I

The purpose of the first experiment is to recognize the repeated letters in the first level, e.g., “0” and “1”, using the raw light signal “A” and “B”.
The experiment. An IR signal was generated from the remote controller (RC). The “throttle” stick on the RC was pushed to its maximum level (100%) which produces repetitions of W = S ( package ( 127 , 50 , 50 , 0 ) ) ; see (1). Using the recording part of our system (see Figure 2), we recorded a signal of 6 seconds to obtain the Level I string
V = S ( t 1 , A , t 2 , B , t 3 , A , t 4 , B , ) ,
for some integers t 1 , t 2 , .
Recovery Error. We partitioned the recorded string V into separate packages P 1 , P 2 , . This was easy since each package was separated from the following package by a continuous sequence of thousands “A” letters. Hence, we simply removed from V any consecutive sequence of at least 500 “A” letters. The string between each resulting gap was defined to be a package, so we obtained the list of m packages W 1 , W 2 , , W m . We denote by V j = W 1 W 2 W j the string that consists of the first j packages, for every j [ 1 . . m ] .
The expected value of W i for every i [ 1 . . m ] , i.e., with no noise, W i = W * and there is no recovery error. In practice this never occurs, but the length of each package is the same, | W i | = | W * | , for every i [ 1 . . m ] . We thus define the error between the transmitted word W * to the received word W i by their Hamming distance hamm ( W i , W ) ; i.e., number of corresponding bits that are not the same. The average Hamming distance of the first j m packages is then
error ( j ) : = hamm ( W j , V j ) = 1 j i = 1 j hamm ( W , W j ) .
In practice, this error is proportional to the distance of the IR receiver sensor and the RC in Figure 2.
The error plots are shown in Figure 3. The green curve shows the average Hamming distance error ( j ) in the y-axis, over different number j of words (x-axis), together with its variance.
Recovery using Algorithm 2. We run Algorithm 2 m times using a call to L o s s y ( M j , levels ) , where M j is the Parikh matrix of V j and levels = 2 , and R j is the output RRLE for each j = [ 1 . . m ] . Without noise, V j = W j , and the output is R j = ( j , s * ( W * ) ) that corresponds to the string W j = V j = S ( j , s * ( W * ) ) . In practice, V j , unlike W j is not periodic, but R j (the recovered output signal) is expected to be j-periodic. The average error of the recovered string S ( R j ) is then
ourerror ( j ) : = hamm ( W j , S ( R j ) ) .
Results of Algorithm 2 are shown in Figure 3. The blue curve shows the average Hamming distance ourerror ( j ) in the y-axis, over different number j of words (x-axis). Since R j is always periodic, the variance error between the recovered packages is zero.
Conclusions: In Figure 3 we see, as expected by the analysis, that the recovery error decreases as Algorithm 2 is given more packages to learn from. On the contrary, the error of the “memory-less” thresholding approach does not reduce over time.

6.3. De-Noising Level II

After we identified 0 = ( 175 , A , 200 , B ) and 1 = ( 350 , A , 375 , B ) , we used it to recover Level II of the protocol from each package P. Identifying P as consecutive m sequences
P = S ( a 1 , A , b 1 , B , , a m , A , b m , B , ) . Without noise, either ( a 1 , b 1 ) = ( 175 , 200 ) , or ( a 1 , b 1 ) = ( 350 , 375 ) . Otherwise, we define semantic package L = L [ 1 ] L [ 2 ] of the package P to be
L [ i ] = 0 if | a i 175 | + | b i 200 | > | a i 350 | + | b i 375 | 1 Otherwise ,
for i [ 1 . . m ] . The error is defined to be the Hamming distance between L and the expected semantic package package ( 127 , 50 , 50 , 0 ) . We repeat this experiment for each package P.
The results were very similar to the results in Figure 3. By this and the fact that Algorithm 2 is not needed in this level, they were omitted and can be find in [4].

6.4. De-Noising Level III

In Level III, we are given the semantic package of “0” and “1” and need to split it into semantic words as in (1).
In the first experiment we repeated the experiment from the previous section, where in the package P we used different values of t h r o t t l e . That is, the “throttle” stick on the RC was pushed to random levels, from 1% to 100%, which ideally produces a repetitions of the semantic package L = S ( package ( t h r o t t l e , 50 , 50 , 0 ) ) where the value of t h r o t t l e is then a random integer in [ 0 . . 127 ] . The checksum field in L was also changed in each package. Let M = L 1 L 2 , denote the concatenation of these semantic packages.
Our goal was to identify the bits in M that correspond to the throttle field. To that end, we ran Algorithm 2 with the Parikh matrix for the string M with an additional row matrix that corresponded to a wildcard letter: “?”. Each entry in this row will have a (cost) value of 1 / 2 . The reason is that this wildcard will be used only on the variable “throttle” bits. The other bits are expected to be almost periodic and the cost of using wildcard on them will be too expensive.
Ideally, the algorithm will output the input string M where the “throttle” bits are replaced by wildcards. We repeat this experiment where “throttle” was replaced by “role” and “pitch”.
The results are shown in Table 1. The first 4 lines of Table 1 correspond to 4 semantic packages M = L 1 L 2 L 3 L 4 while the throttle is changed and the pitch/roll sticks remain unchanged. The fourth column of the ith row shows L i for i [ 1 . . 4 ] . The “throttle” bits were marked manually (by us) in bold. The first row in the fifth column contains the output of Algorithm 2 on M, where the throttle field, as well as the checksum, were indeed identified by wildcards.
To recover the complete protocol of IR-UFO, we scanned the two sticks over 20 positions, where each position was recorded for roughly a second. Our system plotted the desired Level III words as defined in (1) after a couple of hours. We expect that using core-sets the running time will reduce to minutes; see Section 4.
In the second experiment the goal was to see how Algorithm 2 is robust to noise that may occur in previous levels. To this end, we added synthetic noise to the input (column 4 from the left in Table 1) for the string M with the variable “throttle” field above. For each x [ 1 . . 250 ] we changed x bits in M to obtain M x and run Algorithm 2 with M x as described in the previous experiment. We then define y ( x ) to be the wrong letters in the output, compared to the desired string (rightmost column of first row in Table 1) over 100 experiments. Figure 3 describes the average error y in the output (y-axis) and its variance, for the values of x (in the x-axis).
Conclusions:Figure 3 shows that roughly 90 % of the noisy bits in the input were recovered. When the input string is completely noisy, the output string consists of only wild cards, which is correct for few bits but wrong for the other (approximately 20) bits.

7. Conclusions

Novel algorithms for lossy text compression with provable guarantees on running time and optimality were provided. We demonstrated them by providing an open-source, home-made system for automatic reverse-engineering of toy robots, with experimental results on synthetic data and real communication signals. Clearly, there are many other applications of our algorithms such as compressing and recovering XML/Http or other protocols that are made of repeated similar blocks, or finding similar scenes in video/GPS streams.
We focused on IR signals, but similar results were obtained from radio (PWM) signals that used similar protocols; see [1]. Further work includes turning our off-line system into a real-time system that can be used to get control over dangerous quadcopters, e.g., in airports, by learning their protocols. Core-sets seems like a promising way to do this, maybe using a network (“cloud”).

Author Contributions

Conceptualization, L.R. and D.F; Investigation, L.R., S.L. and D.F; Software, S.L.; Supervision, D.F.; Writing—original draft, L.R., S.L. and D.F.; Writing—review and editing, L.R. and D.F.

Funding

This research received no external funding.

Acknowledgments

The authors thank the anonymous reviewers whose comments have greatly improved this paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Nasser, S.; Barry, A.; Doniec, M.; Peled, G.; Rosman, G.; Rus, D.; Volkov, M.; Feldman, D. Fleye on the car: big data meets the internet of things. In Proceedings of the 14th International Conference on Information Processing in Sensor Networks, Washington, DC, USA, 14–16 April 2015; pp. 382–383. [Google Scholar]
  2. D’Ausilio, A. Arduino: A low-cost multipurpose lab equipment. Behav. Res. Methods 2012, 44, 305–313. [Google Scholar] [CrossRef] [PubMed]
  3. Pi, R. Raspberry pi. Raspberry Pi 2012, 1, 1. [Google Scholar]
  4. Robotics and Big Data Laboratory, University of Haifa. Available online: https://sites.hevra.haifa.ac.il/rbd/about/ (accessed on 9 December 2019).
  5. Iliopoulos, C.S.; Moore, D.; Smyth, W.F. A Characterization of the Squares in a Fibonacci String. Theor. Comput. Sci. 1997, 172, 281–291. [Google Scholar] [CrossRef] [Green Version]
  6. Kolpakov, R.M.; Kucherov, G. Finding Maximal Repetitions in a Word in Linear Time. In Proceedings of the 40th Annual Symposium on Foundations of Computer Science, New York, NY, USA, 17–19 October 1999; pp. 596–604. [Google Scholar]
  7. Crochemore, M.; Hancart, C.; Lecroq, T. Algorithms on Strings; Cambridge University Press: Cambridge, UK, 2007; 392p. [Google Scholar]
  8. Main, M.G. Detecting Leftmost Maximal Periodicities. Discret. Appl. Math. 1989, 25, 145–153. [Google Scholar] [CrossRef] [Green Version]
  9. Crochemore, M. Recherche linéaire d’un carré dans un mot. CR Acad. Sci. Paris Sér. I Math. 1983, 296, 781–784. [Google Scholar]
  10. Crochemore, M. An Optimal Algorithm for Computing the Repetitions in a Word. Inf. Process. Lett. 1981, 12, 244–250. [Google Scholar] [CrossRef]
  11. Apostolico, A.; Preparata, F.P. Optimal Off-Line Detection of Repetitions in a String. Theor. Comput. Sci. 1983, 22, 297–315. [Google Scholar] [CrossRef] [Green Version]
  12. Main, M.G.; Lorentz, R.J. An O(n log n) Algorithm for Finding All Repetitions in a String. J. Algorithms 1984, 5, 422–432. [Google Scholar] [CrossRef]
  13. Kosaraju, S.R. Computation of Squares in a String. In Annual Symposium on Combinatorial Pattern Matching (CPM); Springer: Berlin, Germany, 1994; pp. 146–150. [Google Scholar]
  14. Gusfield, D.; Stoye, J. Linear Time Algorithms for Finding and Representing All the Tandem Repeats in a String. J. Comput. Syst. Sci. 2004, 69, 525–546. [Google Scholar] [CrossRef] [Green Version]
  15. Crochemore, M.; Ilie, L. Computing Longest Previous Factors in Linear Time and Applications. Inf. Process. Lett. 2008, 106, 75–80. [Google Scholar] [CrossRef] [Green Version]
  16. Amit, M.; Crochemore, M.; Landau, G.M. Locating All Maximal Approximate Runs in a String. In Annual Symposium on Combinatorial Pattern Matching (CPM); Springer: Berlin, Germany, 2013; pp. 13–27. [Google Scholar]
  17. Landau, G.M.; Schmidt, J.P.; Sokol, D. An Algorithm for Approximate Tandem Repeats. J. Comput. Biol. 2001, 8, 1–18. [Google Scholar] [CrossRef] [PubMed]
  18. Sim, J.S.; Iliopoulos, C.S.; Park, K.; Smyth, W.F. Approximate Periods of Strings. Lect. Notes Comput. Sci. 1999, 1645, 123–133. [Google Scholar]
  19. Kolpakov, R.M.; Kucherov, G. Finding Approximate Repetitions under Hamming Distance. Theor. Comput. Sci. 2003, 1, 135–156. [Google Scholar] [CrossRef] [Green Version]
  20. Amir, A.; Eisenberg, E.; Levy, A. Approximate Periodicity. In Proceedings of the 21st International Symposium on Algorithms and Computation (ISAAC), Jeju Island, Korea, 15–17 December 2010; Volume 6506, pp. 25–36. [Google Scholar]
  21. Nishimoto, T.; Inenaga, S.; Bannai, H.; Takeda, M. Fully dynamic data structure for LCE queries in compressed space. arXiv 2016, arXiv:1605.01488. [Google Scholar]
  22. Bille, P.; Gagie, T.; Gørtz, I.L.; Prezza, N. A separation between run-length SLPs and LZ77. arXiv 2017, arXiv:1711.07270. [Google Scholar]
  23. Babai, L.; Szemerédi, E. On the complexity of matrix group problems I. In Proceedings of the 25th Annual Symposium onFoundations of Computer Science, West Palm Beach, FL, USA, 24–26 October 1984; pp. 229–240. [Google Scholar]
  24. Storer, J.A.; Szymanski, T.G. Data compression via textual substitution. J. ACM 1982, 29, 928–951. [Google Scholar] [CrossRef]
  25. Lempel, A.; Ziv, J. On the complexity of finite sequences. IEEE Trans. Inf. Theory 1976, 22, 75–81. [Google Scholar] [CrossRef]
  26. Hamming, R.W. Error detecting and error correcting codes. Bell Syst. Tech. J. 1950, 29, 147–160. [Google Scholar] [CrossRef]
  27. Knuth, D.E.; Morris, J.H., Jr.; Pratt, V.R. Fast pattern matching in strings. SIAM J. Comput. 1977, 6, 323–350. [Google Scholar] [CrossRef] [Green Version]
  28. Parikh, R.J. On Context-Free Languages. J. ACM 1966, 13, 570–581. [Google Scholar] [CrossRef]
  29. Feldman, D.; Sung, C.; Sugaya, A.; Rus, D. idiary: From gps signals to a text-searchable diary. ACM Trans. Sens. Netw. 2015, 11, 60. [Google Scholar] [CrossRef]
  30. Rosman, G.; Volkov, M.; Feldman, D.; Fisher, J.W., III; Rus, D. Coresets for k-segmentation of streaming data. In Advances in Neural Information Processing Systems; Neural Information Processing Systems Foundation, Inc.: Montreal, QC, Canada, 2014; pp. 559–567. [Google Scholar]
  31. Stackovervflow. How to Solve an Xord System of Linear Equations. 2016. Available online: https://stackoverflow.com/questions/11558694/how-to-solve-an-xord-system-of-linear-equations (accessed on 15 September 2016).
Figure 1. The recursive run-length encoding (RRLE) tree of the string ( a b c c c a b c c c g g h h e k m l f f f c c c d c c c d ) , which is compressed from 29 letters to 22 (12 letters and 10 counters).
Figure 1. The recursive run-length encoding (RRLE) tree of the string ( a b c c c a b c c c g g h h e k m l f f f c c c d c c c d ) , which is compressed from 29 letters to 22 (12 letters and 10 counters).
Algorithms 12 00267 g001
Figure 2. The recording part of our system: Moving a stick of the RC generates an IR (Infra-Red) signal. This signal is received by an IR sensor, which in turn transmits it to the logic analyzer (by Selae LTD). The logic analyzer translates this analog voltage signal into a binary signal. Its frequency is 5 Mhz. The binary signal is then transmitted to the USB port of the laptop and recorded to the hard drive using our software. In the above setting, the micro-processor Arduino is used only as a power supply for the sensor. In a different setup, the expensive logic analyzer was replaced by the Arduino. In this case the thresholds were computed by a software on the laptop.
Figure 2. The recording part of our system: Moving a stick of the RC generates an IR (Infra-Red) signal. This signal is received by an IR sensor, which in turn transmits it to the logic analyzer (by Selae LTD). The logic analyzer translates this analog voltage signal into a binary signal. Its frequency is 5 Mhz. The binary signal is then transmitted to the USB port of the laptop and recorded to the hard drive using our software. In the above setting, the micro-processor Arduino is used only as a power supply for the sensor. In a different setup, the expensive logic analyzer was replaced by the Arduino. In this case the thresholds were computed by a software on the laptop.
Algorithms 12 00267 g002
Figure 3. Results of Algorithm 2. (a) distance in the y-axis, over different number j of words (x-axis). (b) average error in the output (y-axis) and its variance, for the values in the x-axis. (c) The average Hamming distance compared to the original string.
Figure 3. Results of Algorithm 2. (a) distance in the y-axis, over different number j of words (x-axis). (b) average error in the output (y-axis) and its variance, for the values in the x-axis. (c) The average Hamming distance compared to the original string.
Algorithms 12 00267 g003
Table 1. Example experimental results on a toy helicopter. The three leftmost columns tells which RC button was pressed. The input is the recorded communication bits from the RC for a long repeated signal. The output on the rightmost column is the output of our algorithm. It is the common “intersection” of input signals. Wildcards represent unstable character due to the different throttle, role or pitch values (in bold). From the output we can conclude the format of the message, including constant bits and the sub-string that is responsible for each button. See Section 6.4 for details.
Table 1. Example experimental results on a toy helicopter. The three leftmost columns tells which RC button was pressed. The input is the recorded communication bits from the RC for a long repeated signal. The output on the rightmost column is the output of our algorithm. It is the common “intersection” of input signals. Wildcards represent unstable character due to the different throttle, role or pitch values (in bold). From the output we can conclude the format of the message, including constant bits and the sub-string that is responsible for each button. See Section 6.4 for details.
ThrottleRolePitchInput to Algorithm 2 (Semantic Package)Output (RRLE)
25%0%0%01100100100010000001101010011111
50%0%0%01001111100010000001101010011001
75%0%0%001000111000100000011010100110100???????10001000000110101001????
100%0%0%00100011100010000001101010011010
100%−100%0%01100100111110000001101010010110
100%−50%0%01100100000110000001101010011000
100%50%0%0110010011011000000110101001010001100100????1000000110101001????
100%100%0%01100100001010000001101010011001
100%0%−100%01100100100000010001101010010111
100%0%100%01100100100011110001101010010110011001001000????000110101001????

Share and Cite

MDPI and ACS Style

Rozenberg, L.; Lotan, S.; Feldman, D. Finding Patterns in Signals Using Lossy Text Compression. Algorithms 2019, 12, 267. https://0-doi-org.brum.beds.ac.uk/10.3390/a12120267

AMA Style

Rozenberg L, Lotan S, Feldman D. Finding Patterns in Signals Using Lossy Text Compression. Algorithms. 2019; 12(12):267. https://0-doi-org.brum.beds.ac.uk/10.3390/a12120267

Chicago/Turabian Style

Rozenberg, Liat, Sagi Lotan, and Dan Feldman. 2019. "Finding Patterns in Signals Using Lossy Text Compression" Algorithms 12, no. 12: 267. https://0-doi-org.brum.beds.ac.uk/10.3390/a12120267

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop