-
MPCNN: A Novel Matrix Profile Approach for CNN-based Sleep Apnea Classification
Authors:
Hieu X. Nguyen,
Duong V. Nguyen,
Hieu H. Pham,
Cuong D. Do
Abstract:
Sleep apnea (SA) is a significant respiratory condition that poses a major global health challenge. Previous studies have investigated several machine and deep learning models for electrocardiogram (ECG)-based SA diagnoses. Despite these advancements, conventional feature extractions derived from ECG signals, such as R-peaks and RR intervals, may fail to capture crucial information encompassed wit…
▽ More
Sleep apnea (SA) is a significant respiratory condition that poses a major global health challenge. Previous studies have investigated several machine and deep learning models for electrocardiogram (ECG)-based SA diagnoses. Despite these advancements, conventional feature extractions derived from ECG signals, such as R-peaks and RR intervals, may fail to capture crucial information encompassed within the complete PQRST segments. In this study, we propose an innovative approach to address this diagnostic gap by delving deeper into the comprehensive segments of the ECG signal. The proposed methodology draws inspiration from Matrix Profile algorithms, which generate an Euclidean distance profile from fixed-length signal subsequences. From this, we derived the Min Distance Profile (MinDP), Max Distance Profile (MaxDP), and Mean Distance Profile (MeanDP) based on the minimum, maximum, and mean of the profile distances, respectively. To validate the effectiveness of our approach, we use the modified LeNet-5 architecture as the primary CNN model, along with two existing lightweight models, BAFNet and SE-MSCNN, for ECG classification tasks. Our extensive experimental results on the PhysioNet Apnea-ECG dataset revealed that with the new feature extraction method, we achieved a per-segment accuracy up to 92.11 \% and a per-recording accuracy of 100\%. Moreover, it yielded the highest correlation compared to state-of-the-art methods, with a correlation coefficient of 0.989. By introducing a new feature extraction method based on distance relationships, we enhanced the performance of certain lightweight models, showing potential for home sleep apnea test (HSAT) and SA detection in IoT devices. The source code for this work is made publicly available in GitHub: https://github.com/vinuni-vishc/MPCNN-Sleep-Apnea.
△ Less
Submitted 25 November, 2023;
originally announced November 2023.
-
Graph-PHPA: Graph-based Proactive Horizontal Pod Autoscaling for Microservices using LSTM-GNN
Authors:
Hoa X. Nguyen,
Shaoshu Zhu,
Mingming Liu
Abstract:
Microservice-based architecture has become prevalent for cloud-native applications. With an increasing number of applications being deployed on cloud platforms every day leveraging this architecture, more research efforts are required to understand how different strategies can be applied to effectively manage various cloud resources at scale. A large body of research has deployed automatic resourc…
▽ More
Microservice-based architecture has become prevalent for cloud-native applications. With an increasing number of applications being deployed on cloud platforms every day leveraging this architecture, more research efforts are required to understand how different strategies can be applied to effectively manage various cloud resources at scale. A large body of research has deployed automatic resource allocation algorithms using reactive and proactive autoscaling policies. However, there is still a gap in the efficiency of current algorithms in capturing the important features of microservices from their architecture and deployment environment, for example, lack of consideration of graphical dependency. To address this challenge, we propose Graph-PHPA, a graph-based proactive horizontal pod autoscaling strategy for allocating cloud resources to microservices leveraging long short-term memory (LSTM) and graph neural network (GNN) based prediction methods. We evaluate the performance of Graph-PHPA using the Bookinfo microservices deployed in a dedicated testing environment with real-time workloads generated based on realistic datasets. We demonstrate the efficacy of Graph-PHPA by comparing it with the rule-based resource allocation scheme in Kubernetes as our baseline. Extensive experiments have been implemented and our results illustrate the superiority of our proposed approach in resource savings over the reactive rule-based baseline algorithm in different testing scenarios.
△ Less
Submitted 6 September, 2022;
originally announced September 2022.
-
Double Intelligent Reflecting Surface-assisted Multi-User MIMO mmWave Systems with Hybrid Precoding
Authors:
Hehao Niu,
Zheng Chu,
Fuhui Zhou,
Cunhua Pan,
Derrick Wing Kwan Ng,
Huan X. Nguyen
Abstract:
This work investigates the effect of double intelligent reflecting surface (IRS) in improving the spectrum efficient of multi-user multiple-input multiple-output (MIMO) network operating in the millimeter wave (mmWave) band. Specifically, we aim to solve a weighted sum rate maximization problem by jointly optimizing the digital precoding at the transmitter and the analog phase shifters at the IRS,…
▽ More
This work investigates the effect of double intelligent reflecting surface (IRS) in improving the spectrum efficient of multi-user multiple-input multiple-output (MIMO) network operating in the millimeter wave (mmWave) band. Specifically, we aim to solve a weighted sum rate maximization problem by jointly optimizing the digital precoding at the transmitter and the analog phase shifters at the IRS, subject to the minimum achievable rate constraint. To facilitate the design of an efficient solution, we first reformulate the original problem into a tractable one by exploiting the majorization-minimization (MM) method. Then, a block coordinate descent (BCD) method is proposed to obtain a suboptimal solution, where the precoding matrices and the phase shifters are alternately optimized. Specifically, the digital precoding matrix design problem is solved by the quadratically constrained quadratic programming (QCQP), while the analog phase shift optimization is solved by the Riemannian manifold optimization (RMO). The convergence and computational complexity are analyzed. Finally, simulation results are provided to verify the performance of the proposed design, as well as the effectiveness of double-IRS in improving the spectral efficiency.
△ Less
Submitted 26 November, 2021;
originally announced November 2021.
-
Efficient Network Analysis Under Single Link Deletion
Authors:
Max Ward,
Amitava Datta,
Hung X. Nguyen,
Jason Eshraghian
Abstract:
The problem of worst case edge deletion from a network is considered. Suppose that you have a communication network and you can delete a single edge. Which edge deletion causes the largest disruption? More formally, given a graph, which edge after deletion disconnects the maximum number of pairs of vertices, where ties for number of pairs disconnected are broken by finding an edge that increases t…
▽ More
The problem of worst case edge deletion from a network is considered. Suppose that you have a communication network and you can delete a single edge. Which edge deletion causes the largest disruption? More formally, given a graph, which edge after deletion disconnects the maximum number of pairs of vertices, where ties for number of pairs disconnected are broken by finding an edge that increases the average shortest path length the maximum amount. This problem is interesting both practically and theoretically. We call it the \emph{single edge deletion problem}.
Our contributions include formally defining the single edge deletion problem and providing motivations from network analysis. Also, we give an algorithm that solves the problem much faster than a naive solution. The algorithm incorporates sophisticated and novel techniques, and generalises to the problem of computing the all-pairs shortest paths table after deleting each edge individually. This means the algorithm has deep theoretical interest as well as the potential for even wider applications than those we present here.
△ Less
Submitted 15 February, 2022; v1 submitted 16 August, 2021;
originally announced August 2021.
-
Secure Wireless Powered and Cooperative Jamming D2D Communications
Authors:
Zheng Chu,
Huan X. Nguyen,
Tuan Anh Le,
Mehmet Karamanoglu,
Enver Ever,
Adnan Yazici
Abstract:
This paper investigates a secure wireless-powered device-to-device (D2D) communication network in the presence of multiple eavesdroppers, where a hybrid base station (BS) in a cellular network not only provides power wirelessly for the D2D transmitter to guarantee power efficiency for the D2D network, but also serves as a cooperative jammer (CJ) to interfere with the eavesdroppers. The cellular an…
▽ More
This paper investigates a secure wireless-powered device-to-device (D2D) communication network in the presence of multiple eavesdroppers, where a hybrid base station (BS) in a cellular network not only provides power wirelessly for the D2D transmitter to guarantee power efficiency for the D2D network, but also serves as a cooperative jammer (CJ) to interfere with the eavesdroppers. The cellular and D2D networks can belong to different service providers, which means that the D2D transmitter would need to pay for the energy service released by the hybrid BS to guarantee secure D2D communication. In order to exploit the hierarchical interaction between the BS and the D2D transmitter, we first formulate a Stackelberg game based energy trading scheme, where the quadratic energy cost model is considered. Then, a non-energy trading based Stackelberg game is investigated to study the reversed roles of the BS and the D2D users. For comparison, we also formulate and resolve the social welfare optimization problem. We derive the closed-form Stackelberg equilibriums of the formulated games and the optimal solutions for the social welfare optimization problem. Simulation results are provided to validate our proposed schemes to highlight the importance of energy trading interaction between cellular and D2D networks.
△ Less
Submitted 13 March, 2018;
originally announced March 2018.
-
Resource Allocation Strategies for Secure WPCN Multiantenna Multicasting Systems
Authors:
Zheng Chu,
Huan X. Nguyen,
Giuseppe Caire
Abstract:
This paper investigates a secure wireless-powered multiantenna multicasting system, where multiple power beacons (PBs) supply power to a transmitter in order to establish a reliable communication link with multiple legitimate users in the presence of multiple eavesdroppers. The transmitter has to harvest radio frequency (RF) energy from multiple PBs due to the shortage of embedded power supply bef…
▽ More
This paper investigates a secure wireless-powered multiantenna multicasting system, where multiple power beacons (PBs) supply power to a transmitter in order to establish a reliable communication link with multiple legitimate users in the presence of multiple eavesdroppers. The transmitter has to harvest radio frequency (RF) energy from multiple PBs due to the shortage of embedded power supply before establishing its secure communication. We consider two different scenarios. In the first, the PBs and the transmitter belong to the same operator, where we formulate the resource allocation problem as the minimization of the total transmit power subject to the target secure rate constraint. The solution of this problem yields both the optimal power and energy transfer time allocation. Due to the non-convexity of this problem, we propose a two-level approach, where the inner level problem can be recast as a convex optimization framework via conic convex reformulation, while the outer level problem can be handled by using one-dimensional (1D) search. The second scenario considers the case where the transmitter and the PBs belong to different service suppliers. Hence, we formulate the resource allocation problem where we consider incentives for the PBs to assist the transmitter. This leads to the formulation of a Stackelberg game for the secure wireless-powered multiantenna multicasting system. The transmitter has to pay for the energy services from these multiple PBs in order to facilitate secure communications. In this game, the transmitter and the PB are modelled as leader and follower, respectively, in which both of them try to maximize their own utility function. The closed-form Stackelberg equilibrium of the formulated game is then derived. Finally, numerical results are provided to validate our proposed schemes.
△ Less
Submitted 6 June, 2017;
originally announced June 2017.
-
Robust Chance-Constrained Optimization for Power-Efficient and Secure SWIPT Systems
Authors:
Tuan Anh Le,
Quoc-Tuan Vien,
Huan X. Nguyen,
Derrick Wing Kwan Ng,
Robert Schober
Abstract:
In this paper, we propose beamforming schemes to simultaneously transmit data securely to multiple information receivers (IRs) while transferring power wirelessly to multiple energy-harvesting receivers (ERs). Taking into account the imperfection of the instantaneous channel state information (CSI), we introduce a chance-constrained optimization problem to minimize the total transmit power while g…
▽ More
In this paper, we propose beamforming schemes to simultaneously transmit data securely to multiple information receivers (IRs) while transferring power wirelessly to multiple energy-harvesting receivers (ERs). Taking into account the imperfection of the instantaneous channel state information (CSI), we introduce a chance-constrained optimization problem to minimize the total transmit power while guaranteeing data transmission reliability, data transmission security, and power transfer reliability. As the proposed optimization problem is non-convex due to the chance constraints, we propose two robust reformulations of the original problem based on safe-convex-approximation techniques. Subsequently, applying semidefinite programming relaxation (SDR), the derived robust reformulations can be effectively solved by standard convex optimization packages. We show that the adopted SDR is tight and thus the globally optimal solutions of the reformulated problems can be recovered. Simulation results confirm the superiority of the proposed methods in guaranteeing transmission security compared to a baseline scheme. Furthermore, the performance of proposed methods can closely follow that of a benchmark scheme where perfect CSI is available for resource allocation.
△ Less
Submitted 18 May, 2017;
originally announced May 2017.
-
Robust Sum Secrecy Rate Optimization for MIMO Two-way Full Duplex Systems
Authors:
Zheng Chu,
Tuan Anh Le,
Huan X. Nguyen,
Arumugam Nallanathan,
Mehmet Karamanoglu
Abstract:
This paper considers multiple-input multiple-output (MIMO) full-duplex (FD) two-way secrecy systems. Specifically, both multi-antenna FD legitimate nodes exchange their own confidential message in the presence of an eavesdropper. Taking into account the imperfect channel state information (CSI) of the eavesdropper, we formulate a robust sum secrecy rate maximization (RSSRM) problem subject to the…
▽ More
This paper considers multiple-input multiple-output (MIMO) full-duplex (FD) two-way secrecy systems. Specifically, both multi-antenna FD legitimate nodes exchange their own confidential message in the presence of an eavesdropper. Taking into account the imperfect channel state information (CSI) of the eavesdropper, we formulate a robust sum secrecy rate maximization (RSSRM) problem subject to the outage probability constraint of the achievable sum secrecy rate and the transmit power constraint. Unlike other existing channel uncertainty models, e.g., norm-bounded and Gaussian-distribution, we exploit a moment-based random distributed CSI channel uncertainty model to recast our formulate RSSRM problem into the convex optimization frameworks based on a Markov's inequality and robust conic reformulation, i.e., semidefinite programming (SDP). In addition, difference-of-concave (DC) approximation is employed to iteratively tackle the transmit covariance matrices of these legitimate nodes. Simulation results are provided to validate our proposed FD approaches.
△ Less
Submitted 17 May, 2017;
originally announced May 2017.
-
Isogeometric analysis for functionally graded microplates based on modified couple stress theory
Authors:
Hoang X. Nguyen,
Tuan N. Nguyen,
M. Abdel-Wahab,
S. P. A. Bordas,
H. Nguyen-Xuan,
Thuc P. Vo
Abstract:
Analysis of static bending, free vibration and buckling behaviours of functionally graded microplates is investigated in this study. The main idea is to use the isogeometric analysis in associated with novel four-variable refined plate theory and quasi-3D theory. More importantly, the modified couple stress theory with only one material length scale parameter is employed to effectively capture the…
▽ More
Analysis of static bending, free vibration and buckling behaviours of functionally graded microplates is investigated in this study. The main idea is to use the isogeometric analysis in associated with novel four-variable refined plate theory and quasi-3D theory. More importantly, the modified couple stress theory with only one material length scale parameter is employed to effectively capture the size-dependent effects within the microplates. Meanwhile, the quasi-3D theory which is constructed from a novel seventh-order shear deformation refined plate theory with four unknowns is able to consider both shear deformations and thickness stretching effect without requiring shear correction factors. The NURBS-based isogeometric analysis is integrated to exactly describe the geometry and approximately calculate the unknown fields with higher-order derivative and continuity requirements. The convergence and verification show the validity and efficiency of this proposed computational approach in comparison with those existing in the literature. It is further applied to study the static bending, free vibration and buckling responses of rectangular and circular functionally graded microplates with various types of boundary conditions. A number of investigations are also conducted to illustrate the effects of the material length scale, material index, and length-to-thickness ratios on the responses of the microplates.
△ Less
Submitted 2 April, 2016;
originally announced April 2016.
-
Hidden Markov Model Identifiability via Tensors
Authors:
Paul Tune,
Hung X. Nguyen,
Matthew Roughan
Abstract:
The prevalence of hidden Markov models (HMMs) in various applications of statistical signal processing and communications is a testament to the power and flexibility of the model. In this paper, we link the identifiability problem with tensor decomposition, in particular, the Canonical Polyadic decomposition. Using recent results in deriving uniqueness conditions for tensor decomposition, we are a…
▽ More
The prevalence of hidden Markov models (HMMs) in various applications of statistical signal processing and communications is a testament to the power and flexibility of the model. In this paper, we link the identifiability problem with tensor decomposition, in particular, the Canonical Polyadic decomposition. Using recent results in deriving uniqueness conditions for tensor decomposition, we are able to provide a necessary and sufficient condition for the identification of the parameters of discrete time finite alphabet HMMs. This result resolves a long standing open problem regarding the derivation of a necessary and sufficient condition for uniquely identifying an HMM. We then further extend recent preliminary work on the identification of HMMs with multiple observers by deriving necessary and sufficient conditions for identifiability in this setting.
△ Less
Submitted 1 May, 2013;
originally announced May 2013.