-
Learning Decentralized Multi-Biped Control for Payload Transport
Authors:
Bikram Pandit,
Ashutosh Gupta,
Mohitvishnu S. Gadde,
Addison Johnson,
Aayam Kumar Shrestha,
Helei Duan,
Jeremy Dao,
Alan Fern
Abstract:
Payload transport over flat terrain via multi-wheel robot carriers is well-understood, highly effective, and configurable. In this paper, our goal is to provide similar effectiveness and configurability for transport over rough terrain that is more suitable for legs rather than wheels. For this purpose, we consider multi-biped robot carriers, where wheels are replaced by multiple bipedal robots at…
▽ More
Payload transport over flat terrain via multi-wheel robot carriers is well-understood, highly effective, and configurable. In this paper, our goal is to provide similar effectiveness and configurability for transport over rough terrain that is more suitable for legs rather than wheels. For this purpose, we consider multi-biped robot carriers, where wheels are replaced by multiple bipedal robots attached to the carrier. Our main contribution is to design a decentralized controller for such systems that can be effectively applied to varying numbers and configurations of rigidly attached bipedal robots without retraining. We present a reinforcement learning approach for training the controller in simulation that supports transfer to the real world. Our experiments in simulation provide quantitative metrics showing the effectiveness of the approach over a wide variety of simulated transport scenarios. In addition, we demonstrate the controller in the real-world for systems composed of two and three Cassie robots. To our knowledge, this is the first example of a scalable multi-biped payload transport system.
△ Less
Submitted 25 June, 2024;
originally announced June 2024.
-
Emergent Dynamics in Heterogeneous Life-Like Cellular Automata
Authors:
Aarati Shrestha,
Felix Reimers,
Sanyam Jain,
Paolo Baldini,
Michele Braccini,
Andrea Roli,
Stefano Nichele
Abstract:
The Game of Life (GoL), one well known 2D cellular automaton, does not typically ensure interesting long-term phenotypic dynamics. Therefore, while being Turing complete, GoL cannot be said to be open-ended. In this work, we extend GoL with the opportunity for local mutations, thus enabling a heterogeneous life-like cellular automaton guided by an evolutionary inner loop. Additionally, we introduc…
▽ More
The Game of Life (GoL), one well known 2D cellular automaton, does not typically ensure interesting long-term phenotypic dynamics. Therefore, while being Turing complete, GoL cannot be said to be open-ended. In this work, we extend GoL with the opportunity for local mutations, thus enabling a heterogeneous life-like cellular automaton guided by an evolutionary inner loop. Additionally, we introduce the concept of cell ageing to ensure that cell aliveness (activated by inheritance with variation, and controlled by ageing) and actual cell computation (governed by life-like rules on local neighborhoods) are kept conceptually separated. We conduct an experimental campaign to identify suitable parameters that produce long-term phenotypic dynamics and favor genotypic innovations.
△ Less
Submitted 19 June, 2024;
originally announced June 2024.
-
Properties that allow or prohibit transferability of adversarial attacks among quantized networks
Authors:
Abhishek Shrestha,
Jürgen Großmann
Abstract:
Deep Neural Networks (DNNs) are known to be vulnerable to adversarial examples. Further, these adversarial examples are found to be transferable from the source network in which they are crafted to a black-box target network. As the trend of using deep learning on embedded devices grows, it becomes relevant to study the transferability properties of adversarial examples among compressed networks.…
▽ More
Deep Neural Networks (DNNs) are known to be vulnerable to adversarial examples. Further, these adversarial examples are found to be transferable from the source network in which they are crafted to a black-box target network. As the trend of using deep learning on embedded devices grows, it becomes relevant to study the transferability properties of adversarial examples among compressed networks. In this paper, we consider quantization as a network compression technique and evaluate the performance of transfer-based attacks when the source and target networks are quantized at different bitwidths. We explore how algorithm specific properties affect transferability by considering various adversarial example generation algorithms. Furthermore, we examine transferability in a more realistic scenario where the source and target networks may differ in bitwidth and other model-related properties like capacity and architecture. We find that although quantization reduces transferability, certain attack types demonstrate an ability to enhance it. Additionally, the average transferability of adversarial examples among quantized versions of a network can be used to estimate the transferability to quantized target networks with varying capacity and architecture.
△ Less
Submitted 15 May, 2024;
originally announced May 2024.
-
Revisiting Reward Design and Evaluation for Robust Humanoid Standing and Walking
Authors:
Bart van Marum,
Aayam Shrestha,
Helei Duan,
Pranay Dugar,
Jeremy Dao,
Alan Fern
Abstract:
A necessary capability for humanoid robots is the ability to stand and walk while rejecting natural disturbances. Recent progress has been made using sim-to-real reinforcement learning (RL) to train such locomotion controllers, with approaches differing mainly in their reward functions. However, prior works lack a clear method to systematically test new reward functions and compare controller perf…
▽ More
A necessary capability for humanoid robots is the ability to stand and walk while rejecting natural disturbances. Recent progress has been made using sim-to-real reinforcement learning (RL) to train such locomotion controllers, with approaches differing mainly in their reward functions. However, prior works lack a clear method to systematically test new reward functions and compare controller performance through repeatable experiments. This limits our understanding of the trade-offs between approaches and hinders progress. To address this, we propose a low-cost, quantitative benchmarking method to evaluate and compare the real-world performance of standing and walking (SaW) controllers on metrics like command following, disturbance recovery, and energy efficiency. We also revisit reward function design and construct a minimally constraining reward function to train SaW controllers. We experimentally verify that our benchmarking framework can identify areas for improvement, which can be systematically addressed to enhance the policies. We also compare our new controller to state-of-the-art controllers on the Digit humanoid robot. The results provide clear quantitative trade-offs among the controllers and suggest directions for future improvements to the reward functions and expansion of the benchmarks.
△ Less
Submitted 29 April, 2024;
originally announced April 2024.
-
Comparative Analysis on Snowmelt-Driven Streamflow Forecasting Using Machine Learning Techniques
Authors:
Ukesh Thapa,
Bipun Man Pati,
Samit Thapa,
Dhiraj Pyakurel,
Anup Shrestha
Abstract:
The rapid advancement of machine learning techniques has led to their widespread application in various domains including water resources. However, snowmelt modeling remains an area that has not been extensively explored. In this study, we propose a state-of-the-art (SOTA) deep learning sequential model, leveraging the Temporal Convolutional Network (TCN), for snowmelt-driven discharge modeling in…
▽ More
The rapid advancement of machine learning techniques has led to their widespread application in various domains including water resources. However, snowmelt modeling remains an area that has not been extensively explored. In this study, we propose a state-of-the-art (SOTA) deep learning sequential model, leveraging the Temporal Convolutional Network (TCN), for snowmelt-driven discharge modeling in the Himalayan basin of the Hindu Kush Himalayan Region. To evaluate the performance of our proposed model, we conducted a comparative analysis with other popular models including Support Vector Regression (SVR), Long Short Term Memory (LSTM), and Transformer. Furthermore, Nested cross-validation (CV) is used with five outer folds and three inner folds, and hyper-parameter tuning is performed on the inner folds. To evaluate the performance of the model mean absolute error (MAE), root mean square error (RMSE), R square ($R^{2}$), Kling-Gupta Efficiency (KGE), and Nash-Sutcliffe Efficiency (NSE) are computed for each outer fold. The average metrics revealed that TCN outperformed the other models, with an average MAE of 0.011, RMSE of 0.023, $R^{2}$ of 0.991, KGE of 0.992, and NSE of 0.991. The findings of this study demonstrate the effectiveness of the deep learning model as compared to traditional machine learning approaches for snowmelt-driven streamflow forecasting. Moreover, the superior performance of TCN highlights its potential as a promising deep learning model for similar hydrological applications.
△ Less
Submitted 23 April, 2024; v1 submitted 20 April, 2024;
originally announced April 2024.
-
AI-Assisted Cervical Cancer Screening
Authors:
Kanchan Poudel,
Lisasha Poudel,
Prabin Raj Shakya,
Atit Poudel,
Archana Shrestha,
Bishesh Khanal
Abstract:
Visual Inspection with Acetic Acid (VIA) remains the most feasible cervical cancer screening test in resource-constrained settings of low- and middle-income countries (LMICs), which are often performed screening camps or primary/community health centers by nurses instead of the preferred but unavailable expert Gynecologist. To address the highly subjective nature of the test, various handheld devi…
▽ More
Visual Inspection with Acetic Acid (VIA) remains the most feasible cervical cancer screening test in resource-constrained settings of low- and middle-income countries (LMICs), which are often performed screening camps or primary/community health centers by nurses instead of the preferred but unavailable expert Gynecologist. To address the highly subjective nature of the test, various handheld devices integrating cameras or smartphones have been recently explored to capture cervical images during VIA and aid decision-making via telemedicine or AI models. Most studies proposing AI models retrospectively use a relatively small number of already collected images from specific devices, digital cameras, or smartphones; the challenges and protocol for quality image acquisition during VIA in resource-constrained camp settings, challenges in getting gold standard, data imbalance, etc. are often overlooked. We present a novel approach and describe the end-to-end design process to build a robust smartphone-based AI-assisted system that does not require buying a separate integrated device: the proposed protocol for quality image acquisition in resource-constrained settings, dataset collected from 1,430 women during VIA performed by nurses in screening camps, preprocessing pipeline, and training and evaluation of a deep-learning-based classification model aimed to identify (pre)cancerous lesions. Our work shows that the readily available smartphones and a suitable protocol can capture the cervix images with the required details for the VIA test well; the deep-learning-based classification model provides promising results to assist nurses in VIA screening; and provides a direction for large-scale data collection and validation in resource-constrained settings.
△ Less
Submitted 18 March, 2024;
originally announced March 2024.
-
EU COST Action on future generation optical wireless communication technologies, 2nd White paper
Authors:
Z. Ghassemlooy,
M. A. Khalighi,
S. Zvanovec,
A. Shrestha,
B. Ortega,
M. Petkovic,
X. Pang,
C. Sirtori,
D. Orsucci,
A. Shrestha,
F. Moll,
G. Cossu,
V. Spirito,
M. P. Ninos,
E. Ciaramella,
J. Bas,
M. Amay,
S. Huang,
M. Safari,
T. Gutema,
W. Popoola,
Vicente Matus,
Jose Rabadan,
Rafael Perez-Jimenez,
E. Panayirci
, et al. (3 additional authors not shown)
Abstract:
NEWFOCUS is an EU COST Action targeted at exploring radical solutions that could influence the design of future wireless networks. The project aims to address some of the challenges associated with optical wireless communication (OWC) and to establish it as a complementary technology to the radio frequency (RF)-based wireless systems in order to meet the demanding requirements of the fifth generat…
▽ More
NEWFOCUS is an EU COST Action targeted at exploring radical solutions that could influence the design of future wireless networks. The project aims to address some of the challenges associated with optical wireless communication (OWC) and to establish it as a complementary technology to the radio frequency (RF)-based wireless systems in order to meet the demanding requirements of the fifth generation (5G) and the future sixth generation (6G) backhaul and access networks. Only 6G will be able to widely serve the exponential growth in connected devices (i.e., more than 500 billion) in 2030, real-time holographic communication, future virtual reality, etc. Space is emerging as the new frontier in 5 and 6G and beyond communication networks, where it offers high-speed wireless coverage to remote areas both in lands and sees. This activity is supported by the recent development of low-altitude Earth orbit satellite mega-constellations. The focus of this 2nd White Paper is on the use of OWC as an enabling technology for medium- and long-range links for deployment in (i) smart-cities and intelligent transportation systems; (ii) first- and last-mile access and backhaul/fronthaul wireless networks; (iii) hybrid free-space optics/RF adaptive wireless connections; (iv) space-to-ground, inter-satellite, ground-to-air, and air-to-air communications; and (v) underwater communications.
△ Less
Submitted 14 June, 2023;
originally announced November 2023.
-
Student Certificate Sharing System Using Blockchain and NFTs
Authors:
Prakhyat Khati,
Ajay Kumar Shrestha,
Julita Vassileva
Abstract:
In this paper, we propose a certificate sharing system based on blockchain that gives students authority and control over their academic certificates. Our strategy involves developing blockchain-based NFT certifications that can be shared with institutions or employers using blockchain addresses. Students may access the data created by each individual institute in a single platform, filter the vie…
▽ More
In this paper, we propose a certificate sharing system based on blockchain that gives students authority and control over their academic certificates. Our strategy involves developing blockchain-based NFT certifications that can be shared with institutions or employers using blockchain addresses. Students may access the data created by each individual institute in a single platform, filter the view of the relevant courses according to their requirements, and mint their certificate metadata as NFTs. This method provides accountability of access, comprehensive records that are permanently maintained in IPFS, and verifiable provenance for creating, distributing, and accessing certificates. It also makes it possible to share certificates more safely and efficiently. By incorporating trust factors through data provenance, our system provides a countermeasure against issues such as fake and duplicate certificates. It addresses the challenge of the traditional certificate verification processes, which are lengthy manual process. With this system, students can manage and validate their academic credentials from multiple institutions in one location while ensuring authenticity and confidentiality using digital signatures and hashing for data protection against unauthorized access. Overall, our suggested system ensures data safety, accountability, and confidentiality while offering a novel approach to certificate distribution.
△ Less
Submitted 30 October, 2023;
originally announced October 2023.
-
Enhancing Scalability and Reliability in Semi-Decentralized Federated Learning With Blockchain: Trust Penalization and Asynchronous Functionality
Authors:
Ajay Kumar Shrestha,
Faijan Ahamad Khan,
Mohammed Afaan Shaikh,
Amir Jaberzadeh,
Jason Geng
Abstract:
The paper presents an innovative approach to address the challenges of scalability and reliability in Distributed Federated Learning by leveraging the integration of blockchain technology. The paper focuses on enhancing the trustworthiness of participating nodes through a trust penalization mechanism while also enabling asynchronous functionality for efficient and robust model updates. By combinin…
▽ More
The paper presents an innovative approach to address the challenges of scalability and reliability in Distributed Federated Learning by leveraging the integration of blockchain technology. The paper focuses on enhancing the trustworthiness of participating nodes through a trust penalization mechanism while also enabling asynchronous functionality for efficient and robust model updates. By combining Semi-Decentralized Federated Learning with Blockchain (SDFL-B), the proposed system aims to create a fair, secure and transparent environment for collaborative machine learning without compromising data privacy. The research presents a comprehensive system architecture, methodologies, experimental results, and discussions that demonstrate the advantages of this novel approach in fostering scalable and reliable SDFL-B systems.
△ Less
Submitted 30 October, 2023;
originally announced October 2023.
-
VTON-IT: Virtual Try-On using Image Translation
Authors:
Santosh Adhikari,
Bishnu Bhusal,
Prashant Ghimire,
Anil Shrestha
Abstract:
Virtual Try-On (trying clothes virtually) is a promising application of the Generative Adversarial Network (GAN). However, it is an arduous task to transfer the desired clothing item onto the corresponding regions of a human body because of varying body size, pose, and occlusions like hair and overlapped clothes. In this paper, we try to produce photo-realistic translated images through semantic s…
▽ More
Virtual Try-On (trying clothes virtually) is a promising application of the Generative Adversarial Network (GAN). However, it is an arduous task to transfer the desired clothing item onto the corresponding regions of a human body because of varying body size, pose, and occlusions like hair and overlapped clothes. In this paper, we try to produce photo-realistic translated images through semantic segmentation and a generative adversarial architecture-based image translation network. We present a novel image-based Virtual Try-On application VTON-IT that takes an RGB image, segments desired body part, and overlays target cloth over the segmented body region. Most state-of-the-art GAN-based Virtual Try-On applications produce unaligned pixelated synthesis images on real-life test images. However, our approach generates high-resolution natural images with detailed textures on such variant images.
△ Less
Submitted 6 May, 2024; v1 submitted 6 October, 2023;
originally announced October 2023.
-
Blockchain-Based Federated Learning: Incentivizing Data Sharing and Penalizing Dishonest Behavior
Authors:
Amir Jaberzadeh,
Ajay Kumar Shrestha,
Faijan Ahamad Khan,
Mohammed Afaan Shaikh,
Bhargav Dave,
Jason Geng
Abstract:
With the increasing importance of data sharing for collaboration and innovation, it is becoming more important to ensure that data is managed and shared in a secure and trustworthy manner. Data governance is a common approach to managing data, but it faces many challenges such as data silos, data consistency, privacy, security, and access control. To address these challenges, this paper proposes a…
▽ More
With the increasing importance of data sharing for collaboration and innovation, it is becoming more important to ensure that data is managed and shared in a secure and trustworthy manner. Data governance is a common approach to managing data, but it faces many challenges such as data silos, data consistency, privacy, security, and access control. To address these challenges, this paper proposes a comprehensive framework that integrates data trust in federated learning with InterPlanetary File System, blockchain, and smart contracts to facilitate secure and mutually beneficial data sharing while providing incentives, access control mechanisms, and penalizing any dishonest behavior. The experimental results demonstrate that the proposed model is effective in improving the accuracy of federated learning models while ensuring the security and fairness of the data-sharing process. The research paper also presents a decentralized federated learning platform that successfully trained a CNN model on the MNIST dataset using blockchain technology. The platform enables multiple workers to train the model simultaneously while maintaining data privacy and security. The decentralized architecture and use of blockchain technology allow for efficient communication and coordination between workers. This platform has the potential to facilitate decentralized machine learning and support privacy-preserving collaboration in various domains.
△ Less
Submitted 19 July, 2023;
originally announced July 2023.
-
Capturing Emerging Complexity in Lenia
Authors:
Sanyam Jain,
Aarati Shrestha,
Stefano Nichele
Abstract:
This research project investigates Lenia, an artificial life platform that simulates ecosystems of digital creatures. Lenia's ecosystem consists of simple, artificial organisms that can move, consume, grow, and reproduce. The platform is important as a tool for studying artificial life and evolution, as it provides a scalable and flexible environment for creating a diverse range of organisms with…
▽ More
This research project investigates Lenia, an artificial life platform that simulates ecosystems of digital creatures. Lenia's ecosystem consists of simple, artificial organisms that can move, consume, grow, and reproduce. The platform is important as a tool for studying artificial life and evolution, as it provides a scalable and flexible environment for creating a diverse range of organisms with varying abilities and behaviors. Measuring complexity in Lenia is a key aspect of the study, which identifies the metrics for measuring long-term complex emerging behavior of rules, with the aim of evolving better Lenia behaviors which are yet not discovered. The Genetic Algorithm uses neighborhoods or kernels as genotype while keeping the rest of the parameters of Lenia as fixed, for example growth function, to produce different behaviors respective to the population and then measures fitness value to decide the complexity of the resulting behavior. First, we use Variation over Time as a fitness function where higher variance between the frames are rewarded. Second, we use Auto-encoder based fitness where variation of the list of reconstruction loss for the frames is rewarded. Third, we perform combined fitness where higher variation of the pixel density of reconstructed frames is rewarded. All three experiments are tweaked with pixel alive threshold and frames used. Finally, after performing nine experiments of each fitness for 500 generations, we pick configurations from all experiments such that there is a scope of further evolution, and run it for 2500 generations. Results show that the kernel's center of mass increases with a specific set of pixels and together with borders the kernel try to achieve a Gaussian distribution. Results are available at https://s4nyam.github.io/evolenia/
△ Less
Submitted 9 August, 2023; v1 submitted 16 May, 2023;
originally announced May 2023.
-
Color-based classification of EEG Signals for people with the severe locomotive disorder
Authors:
Ankit Shrestha,
Bikram Adhikari
Abstract:
The neurons in the brain produces electric signals and a collective firing of these electric signals gives rise to brainwaves. These brainwave signals are captured using EEG (Electroencephalogram) devices as micro voltages. These sequence of signals captured by EEG sensors have embedded features in them that can be used for classification. The signals can be used as an alternative input for people…
▽ More
The neurons in the brain produces electric signals and a collective firing of these electric signals gives rise to brainwaves. These brainwave signals are captured using EEG (Electroencephalogram) devices as micro voltages. These sequence of signals captured by EEG sensors have embedded features in them that can be used for classification. The signals can be used as an alternative input for people suffering from severe locomotive disorder.Classification of different colors can be mapped for many functions like directional movement. In this paper, raw EEG signals from NeuroSky Mindwave headset (a single electrode EEG sensor) have been classified with an attention based Deep Learning Network. Attention based LSTM Networks have been implemented for classification of two different colors and four different colors. An accuracy of 93.5\% was obtained for classification of two colors and an accuracy of 65.75\% was obtained for classifcation of four signals using the mentioned attention based LSTM network.
△ Less
Submitted 12 April, 2023;
originally announced April 2023.
-
Task Ambiguity in Humans and Language Models
Authors:
Alex Tamkin,
Kunal Handa,
Avash Shrestha,
Noah Goodman
Abstract:
Language models have recently achieved strong performance across a wide range of NLP benchmarks. However, unlike benchmarks, real world tasks are often poorly specified, and agents must deduce the user's intended behavior from a combination of context, instructions, and examples. We investigate how both humans and models behave in the face of such task ambiguity by proposing AmbiBench, a new bench…
▽ More
Language models have recently achieved strong performance across a wide range of NLP benchmarks. However, unlike benchmarks, real world tasks are often poorly specified, and agents must deduce the user's intended behavior from a combination of context, instructions, and examples. We investigate how both humans and models behave in the face of such task ambiguity by proposing AmbiBench, a new benchmark of six ambiguously-specified classification tasks. We evaluate humans and models on AmbiBench by seeing how well they identify the intended task using 1) instructions with varying degrees of ambiguity, and 2) different numbers of labeled examples. We find that the combination of model scaling (to 175B parameters) and training with human feedback data enables models to approach or exceed the accuracy of human participants across tasks, but that either one alone is not sufficient. In addition, we show how to dramatically improve the accuracy of language models trained without large-scale human feedback training by finetuning on a small number of ambiguous in-context examples, providing a promising direction for teaching models to generalize well in the face of ambiguity.
△ Less
Submitted 20 December, 2022;
originally announced December 2022.
-
EU cost action on future generation optical wireless communication technologies -- newfocus ca19111, a white paper
Authors:
M A Khalighi,
Z Ghassemlooy,
S Zvanovec,
N Stevens,
L N Alves,
A Shrestha,
M Uysal,
A M Vegni,
P D Diamantoulakis,
V K Papanikolaou,
G K Karagiannidis,
B Ortega,
V Almenar,
O Bouchet,
L Ladid
Abstract:
The EU COST Action NEWFOCUS is focused on investigating radical solutions with the potential to impact the design of future wireless networks. It aims to address some of the challenges in OWC and establish it as an efficient technology that can satisfy the demanding requirements of backhaul and access network levels in 5G networks. This also includes the use of hybrid links that associate OWC with…
▽ More
The EU COST Action NEWFOCUS is focused on investigating radical solutions with the potential to impact the design of future wireless networks. It aims to address some of the challenges in OWC and establish it as an efficient technology that can satisfy the demanding requirements of backhaul and access network levels in 5G networks. This also includes the use of hybrid links that associate OWC with radiofrequency or wired/fiber-based technologies. The focus of this White Paper is on the use of optical wireless communication (OWC) as enabling technology in a range of areas outlined in HE's Pillar II including Health, Manufacturing, Intelligent Transportation Systems (ITS), Unmanned Aerial Vehicles and Network and Protocol.
△ Less
Submitted 18 July, 2022;
originally announced October 2022.
-
Knowledge Management for Cloud Computing Field
Authors:
Mahdi Fahmideh,
Jun Yan,
Jun Shen,
Aakash Ahmad,
Davoud Mougouei,
Anup Shrestha
Abstract:
Migration legacy systems to cloud platforms is a knowledge intensive process. There is an ever increasing body of knowledge reporting empirical scenarios of successful and problematic cloud migration. Reusing this body of knowledge, dispersed and fragmented over the academic/multi-vocal literature, has practical values to mitigate costly risks and pitfalls in further projects of legacy to-cloud an…
▽ More
Migration legacy systems to cloud platforms is a knowledge intensive process. There is an ever increasing body of knowledge reporting empirical scenarios of successful and problematic cloud migration. Reusing this body of knowledge, dispersed and fragmented over the academic/multi-vocal literature, has practical values to mitigate costly risks and pitfalls in further projects of legacy to-cloud and cloud-to-cloud migration. In line with this, knowledge management systems/platforms pertinent to cloud migration are a prime prerequisite and a strategic imperative for an organization. We have conducted a qualitative exploratory study to understand the benefits and challenges of developing Knowledge Management Systems (KMS) for cloud migration in real trials. Whilst our prototype system demonstration supported the importance and bene-fits of developing Cloud Migration KMS (CM-KMS), our semi-structured industry interview study with 11 participants highlighted challenging impediments against developing this class of KMS. As a result, this study proposes nine significant challenges that cause the abandon of the design and maintenance of CM-KMS, including continuous changes and updates, integration of knowledge, knowledge granularity, preservation of context, automation, deconstruction of traditional knowledge, dependency on experts, hybrid knowledge of both vendor-specific and vendor-neutral cloud platforms, and parsimony. Our results inform cloud architects to pay attention to adopt CM-KMS for the legacy-to-cloud migration in their organizations.
△ Less
Submitted 16 February, 2022;
originally announced February 2022.
-
In-Hardware Learning of Multilayer Spiking Neural Networks on a Neuromorphic Processor
Authors:
Amar Shrestha,
Haowen Fang,
Daniel Patrick Rider,
Zaidao Mei,
Qinru Qiu
Abstract:
Although widely used in machine learning, backpropagation cannot directly be applied to SNN training and is not feasible on a neuromorphic processor that emulates biological neuron and synapses. This work presents a spike-based backpropagation algorithm with biological plausible local update rules and adapts it to fit the constraint in a neuromorphic hardware. The algorithm is implemented on Intel…
▽ More
Although widely used in machine learning, backpropagation cannot directly be applied to SNN training and is not feasible on a neuromorphic processor that emulates biological neuron and synapses. This work presents a spike-based backpropagation algorithm with biological plausible local update rules and adapts it to fit the constraint in a neuromorphic hardware. The algorithm is implemented on Intel Loihi chip enabling low power in-hardware supervised online learning of multilayered SNNs for mobile applications. We test this implementation on MNIST, Fashion-MNIST, CIFAR-10 and MSTAR datasets with promising performance and energy-efficiency, and demonstrate a possibility of incremental online learning with the implementation.
△ Less
Submitted 8 May, 2021;
originally announced May 2021.
-
DeepAveragers: Offline Reinforcement Learning by Solving Derived Non-Parametric MDPs
Authors:
Aayam Shrestha,
Stefan Lee,
Prasad Tadepalli,
Alan Fern
Abstract:
We study an approach to offline reinforcement learning (RL) based on optimally solving finitely-represented MDPs derived from a static dataset of experience. This approach can be applied on top of any learned representation and has the potential to easily support multiple solution objectives as well as zero-shot adjustment to changing environments and goals. Our main contribution is to introduce t…
▽ More
We study an approach to offline reinforcement learning (RL) based on optimally solving finitely-represented MDPs derived from a static dataset of experience. This approach can be applied on top of any learned representation and has the potential to easily support multiple solution objectives as well as zero-shot adjustment to changing environments and goals. Our main contribution is to introduce the Deep Averagers with Costs MDP (DAC-MDP) and to investigate its solutions for offline RL. DAC-MDPs are a non-parametric model that can leverage deep representations and account for limited data by introducing costs for exploiting under-represented parts of the model. In theory, we show conditions that allow for lower-bounding the performance of DAC-MDP solutions. We also investigate the empirical behavior in a number of environments, including those with image-based observations. Overall, the experiments demonstrate that the framework can work in practice and scale to large complex offline RL problems.
△ Less
Submitted 17 October, 2020;
originally announced October 2020.
-
Multivariate Time Series Classification Using Spiking Neural Networks
Authors:
Haowen Fang,
Amar Shrestha,
Qinru Qiu
Abstract:
There is an increasing demand to process streams of temporal data in energy-limited scenarios such as embedded devices, driven by the advancement and expansion of Internet of Things (IoT) and Cyber-Physical Systems (CPS). Spiking neural network has drawn attention as it enables low power consumption by encoding and processing information as sparse spike events, which can be exploited for event-dri…
▽ More
There is an increasing demand to process streams of temporal data in energy-limited scenarios such as embedded devices, driven by the advancement and expansion of Internet of Things (IoT) and Cyber-Physical Systems (CPS). Spiking neural network has drawn attention as it enables low power consumption by encoding and processing information as sparse spike events, which can be exploited for event-driven computation. Recent works also show SNNs' capability to process spatial temporal information. Such advantages can be exploited by power-limited devices to process real-time sensor data. However, most existing SNN training algorithms focus on vision tasks and temporal credit assignment is not addressed. Furthermore, widely adopted rate encoding ignores temporal information, hence it's not suitable for representing time series. In this work, we present an encoding scheme to convert time series into sparse spatial temporal spike patterns. A training algorithm to classify spatial temporal patterns is also proposed. Proposed approach is evaluated on multiple time series datasets in the UCR repository and achieved performance comparable to deep neural networks.
△ Less
Submitted 7 July, 2020;
originally announced July 2020.
-
MAGNet: Multi-Region Attention-Assisted Grounding of Natural Language Queries at Phrase Level
Authors:
Amar Shrestha,
Krittaphat Pugdeethosapol,
Haowen Fang,
Qinru Qiu
Abstract:
Grounding free-form textual queries necessitates an understanding of these textual phrases and its relation to the visual cues to reliably reason about the described locations. Spatial attention networks are known to learn this relationship and focus its gaze on salient objects in the image. Thus, we propose to utilize spatial attention networks for image-level visual-textual fusion preserving loc…
▽ More
Grounding free-form textual queries necessitates an understanding of these textual phrases and its relation to the visual cues to reliably reason about the described locations. Spatial attention networks are known to learn this relationship and focus its gaze on salient objects in the image. Thus, we propose to utilize spatial attention networks for image-level visual-textual fusion preserving local (word) and global (phrase) information to refine region proposals with an in-network Region Proposal Network (RPN) and detect single or multiple regions for a phrase query. We focus only on the phrase query - ground truth pair (referring expression) for a model independent of the constraints of the datasets i.e. additional attributes, context etc. For such referring expression dataset ReferIt game, our Multi-region Attention-assisted Grounding network (MAGNet) achieves over 12\% improvement over the state-of-the-art. Without the context from image captions and attribute information in Flickr30k Entities, we still achieve competitive results compared to the state-of-the-art.
△ Less
Submitted 6 June, 2020;
originally announced June 2020.
-
Customer Data Sharing Platform: A Blockchain-Based Shopping Cart
Authors:
Ajay Kumar Shrestha,
Sandhya Joshi,
Julita Vassileva
Abstract:
We propose a new free eCommerce platform with blockchains that allows customers to connect to the seller directly, share personal data without losing control and ownership of it and apply it to the domain of shopping cart. Our new platform provides a solution to four important problems: private payment, ensuring privacy and user control, and incentives for sharing. It allows the trade to be open,…
▽ More
We propose a new free eCommerce platform with blockchains that allows customers to connect to the seller directly, share personal data without losing control and ownership of it and apply it to the domain of shopping cart. Our new platform provides a solution to four important problems: private payment, ensuring privacy and user control, and incentives for sharing. It allows the trade to be open, transparent with immutable transactions that can be used for settling any disputes. The paper presents a case study of applying the framework for a shopping cart as one of the enterprise nodes of MultiChain which provides trading in ethers controlled by smart contracts and also collects user profile data and allows them to receive rewards for sharing their data with other business enterprises. It tracks who shared what, with whom, when, by what means and for what purposes in a verifiable fashion. The user data from the repository is converted into an open data format and shared via stream in the blockchain so that other nodes can efficiently process and use the data. The smart contract verifies and executes the agreed terms of use of the data and transfers digital tokens as a reward to the customer. The smart contract imposes double deposit collateral to ensure that all participants act honestly.
△ Less
Submitted 28 April, 2020;
originally announced April 2020.
-
Exploiting Neuron and Synapse Filter Dynamics in Spatial Temporal Learning of Deep Spiking Neural Network
Authors:
Haowen Fang,
Amar Shrestha,
Ziyi Zhao,
Qinru Qiu
Abstract:
The recent discovered spatial-temporal information processing capability of bio-inspired Spiking neural networks (SNN) has enabled some interesting models and applications. However designing large-scale and high-performance model is yet a challenge due to the lack of robust training algorithms. A bio-plausible SNN model with spatial-temporal property is a complex dynamic system. Each synapse and n…
▽ More
The recent discovered spatial-temporal information processing capability of bio-inspired Spiking neural networks (SNN) has enabled some interesting models and applications. However designing large-scale and high-performance model is yet a challenge due to the lack of robust training algorithms. A bio-plausible SNN model with spatial-temporal property is a complex dynamic system. Each synapse and neuron behave as filters capable of preserving temporal information. As such neuron dynamics and filter effects are ignored in existing training algorithms, the SNN downgrades into a memoryless system and loses the ability of temporal signal processing. Furthermore, spike timing plays an important role in information representation, but conventional rate-based spike coding models only consider spike trains statistically, and discard information carried by its temporal structures. To address the above issues, and exploit the temporal dynamics of SNNs, we formulate SNN as a network of infinite impulse response (IIR) filters with neuron nonlinearity. We proposed a training algorithm that is capable to learn spatial-temporal patterns by searching for the optimal synapse filter kernels and weights. The proposed model and training algorithm are applied to construct associative memories and classifiers for synthetic and public datasets including MNIST, NMNIST, DVS 128 etc.; and their accuracy outperforms state-of-art approaches.
△ Less
Submitted 25 July, 2020; v1 submitted 18 February, 2020;
originally announced March 2020.
-
High-Level Plan for Behavioral Robot Navigation with Natural Language Directions and R-NET
Authors:
Amar Shrestha,
Krittaphat Pugdeethosapol,
Haowen Fang,
Qinru Qiu
Abstract:
When the navigational environment is known, it can be represented as a graph where landmarks are nodes, the robot behaviors that move from node to node are edges, and the route is a set of behavioral instructions. The route path from source to destination can be viewed as a class of combinatorial optimization problems where the path is a sequential subset from a set of discrete items. The pointer…
▽ More
When the navigational environment is known, it can be represented as a graph where landmarks are nodes, the robot behaviors that move from node to node are edges, and the route is a set of behavioral instructions. The route path from source to destination can be viewed as a class of combinatorial optimization problems where the path is a sequential subset from a set of discrete items. The pointer network is an attention-based recurrent network that is suitable for such a task. In this paper, we utilize a modified R-NET with gated attention and self-matching attention translating natural language instructions to a high-level plan for behavioral robot navigation by developing an understanding of the behavioral navigational graph to enable the pointer network to produce a sequence of behaviors representing the path. Tests on the navigation graph dataset show that our model outperforms the state-of-the-art approach for both known and unknown environments.
△ Less
Submitted 7 January, 2020;
originally announced January 2020.
-
User Acceptance of Usable Blockchain-Based Research Data Sharing System: An Extended TAM Based Study
Authors:
Ajay Kumar Shrestha,
Julita Vassileva
Abstract:
Blockchain technology has evolved as a promising means to transform data management models in many domains including healthcare, agricultural research, tourism domains etc. In the research community, a usable blockchain-based system can allow users to create a proof of ownership and provenance of the research work, share research data without losing control and ownership of it, provide incentives…
▽ More
Blockchain technology has evolved as a promising means to transform data management models in many domains including healthcare, agricultural research, tourism domains etc. In the research community, a usable blockchain-based system can allow users to create a proof of ownership and provenance of the research work, share research data without losing control and ownership of it, provide incentives for sharing and give users full transparency and control over who access their data, when and for what purpose. The initial adoption of such blockchain-based systems is necessary for continued use of the services, but their user acceptance behavioral model has not been well investigated in the literature. In this paper, we take the Technology Acceptance Model (TAM) as a foundation and extend the external constructs to uncover how the perceived ease of use, perceived usability, quality of the system and perceived enjoyment influence the intention to use the blockchain-based system. We based our study on user evaluation of a prototype of a blockchain-based research data sharing framework using a TAM validated questionnaire. Our results show that, overall, all the individual constructs of the behavior model significantly influence the intention to use the system while their collective effect is found to be insignificant. The quality of the system and the perceived enjoyment have stronger influence on the perceived usefulness. However, the effect of perceived ease of use on the perceived usefulness is not supported. Finally, we discuss the implications of our findings.
△ Less
Submitted 14 December, 2019;
originally announced January 2020.
-
User Data Sharing Frameworks: A Blockchain-Based Incentive Solution
Authors:
Ajay Kumar Shrestha,
Julita Vassileva
Abstract:
Currently, there is no universal method to track who shared what, with whom, when and for what purposes in a verifiable way to create an individual incentive for data owners. A platform that allows data owners to control, delete, and get rewards from sharing their data would be an important enabler of user data-sharing. We propose a usable blockchain- and smart contracts-based framework that allow…
▽ More
Currently, there is no universal method to track who shared what, with whom, when and for what purposes in a verifiable way to create an individual incentive for data owners. A platform that allows data owners to control, delete, and get rewards from sharing their data would be an important enabler of user data-sharing. We propose a usable blockchain- and smart contracts-based framework that allows users to store research data locally and share without losing control and ownership of it. We have created smart contracts for building automatic verification of the conditions for data access that also naturally supports building up a verifiable record of the provenance, incentives for users to share their data and accountability of access. The paper presents a review of the existing work of research data sharing, the proposed blockchain-based framework and an evaluation of the framework by measuring the transaction cost for smart contracts deployment. The results show that nodes responded quickly in all tested cases with a befitting transaction cost.
△ Less
Submitted 25 October, 2019;
originally announced October 2019.
-
Fine-grained Sentiment Classification using BERT
Authors:
Manish Munikar,
Sushil Shakya,
Aakash Shrestha
Abstract:
Sentiment classification is an important process in understanding people's perception towards a product, service, or topic. Many natural language processing models have been proposed to solve the sentiment classification problem. However, most of them have focused on binary sentiment classification. In this paper, we use a promising deep learning model called BERT to solve the fine-grained sentime…
▽ More
Sentiment classification is an important process in understanding people's perception towards a product, service, or topic. Many natural language processing models have been proposed to solve the sentiment classification problem. However, most of them have focused on binary sentiment classification. In this paper, we use a promising deep learning model called BERT to solve the fine-grained sentiment classification task. Experiments show that our model outperforms other popular models for this task without sophisticated architecture. We also demonstrate the effectiveness of transfer learning in natural language processing in the process.
△ Less
Submitted 4 October, 2019;
originally announced October 2019.
-
Performance Analysis of Spatial and Transform Filters for Efficient Image Noise Reduction
Authors:
Santosh Paudel,
Ajay Kumar Shrestha,
Pradip Singh Maharjan,
Rameshwar Rijal
Abstract:
During the acquisition of an image from its source, noise always becomes an integral part of it. Various algorithms have been used in past to denoise the images. Image denoising still has scope for improvement. Visual information transmitted in the form of digital images has become a considerable method of communication in the modern age, but the image obtained after the transmission is often corr…
▽ More
During the acquisition of an image from its source, noise always becomes an integral part of it. Various algorithms have been used in past to denoise the images. Image denoising still has scope for improvement. Visual information transmitted in the form of digital images has become a considerable method of communication in the modern age, but the image obtained after the transmission is often corrupted due to noise. In this paper, we review the existing denoising algorithms such as filtering approach and wavelets based approach and then perform their comparative study with bilateral filters. We use different noise models to describe additive and multiplicative noise in an image. Based on the samples of degraded pixel neighbourhoods as inputs, the output of an efficient filtering approach has shown a better image denoising performance. This yields promising qualitative and quantitative results of the degraded noisy images in terms of Peak Signal to Noise Ratio, Mean Square Error and Universal Quality Identifier.
△ Less
Submitted 13 September, 2019;
originally announced September 2019.
-
User-Controlled Privacy-Preserving User Profile Data Sharing based on Blockchain
Authors:
Ajay Kumar Shrestha,
Ralph Deters,
Julita Vassileva
Abstract:
The tremendous technological advancement in the last few decades has brought many enterprises to collaborate in a better way while making intelligent decisions. The use of Information Technology tools in obtaining data of people's everyday life from various autonomous data sources allowing unrestricted access to user data has emerged as an important practical issue and has given rise to legal impl…
▽ More
The tremendous technological advancement in the last few decades has brought many enterprises to collaborate in a better way while making intelligent decisions. The use of Information Technology tools in obtaining data of people's everyday life from various autonomous data sources allowing unrestricted access to user data has emerged as an important practical issue and has given rise to legal implications. Various innovative models for data sharing and management have privacy and centrality issues. To alleviate these limitations, we have incorporated blockchain in user modeling. In this paper, we constructed a decentralized data sharing architecture with MultiChain blockchain in the travel domain, which is also applicable to other similar domains including education, health, and sports. Businesses that operate in the tourism industries including travel and tour agencies, hotels and resorts, shopping malls are connected to the MultiChain and they share their user profile data via stream in the MultiChain. The paper presents the hotel booking service for an imaginary hotel as one of the enterprise nodes, which collects user profile data with proper validation and will allow users to decide which of their data to be shared thus ensuring user control over their data and the preservation of privacy. The data from the repository is converted into an open data format while sharing via stream in the blockchain so that other enterprise nodes, after receiving the data, can easily convert them and store into their own repositories. The paper presents an evaluation of the performance of the model by measuring the latency and memory consumption with three test scenarios that mostly affect the user experience. The node responded quickly in all of these cases.
△ Less
Submitted 10 September, 2019;
originally announced September 2019.
-
Image Steganography: Protection of Digital Properties against Eavesdropping
Authors:
Ramita Maharjan,
Ajay Kumar Shrestha,
Rejina Basnet
Abstract:
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Different types of carrier file formats can be used, but digital images are the most popular ones because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques. Some are more complex than others a…
▽ More
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Different types of carrier file formats can be used, but digital images are the most popular ones because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques. Some are more complex than others and all of them have respective strong and weak points. Many applications may require absolute invisibility of the secret information. This paper intends to give an overview of image steganography, it's usage and techniques, basically, to store the confidential information within images such as details of working strategy, secret missions, criminal and confidential information in various organizations that work for the national security such as army, police, FBI, secret service etc. We develop a desktop application that incorporates Advanced Encryption Standard for encryption of the original message, and Spatially Desynchronized Steganography Algorithm for hiding the text file inside the image.
△ Less
Submitted 10 September, 2019;
originally announced September 2019.
-
Towards Realizing the Smart Product Traceability System
Authors:
Dharmendra Kumar Mishra,
Aicha Sekhari,
Sébastien Henry,
Dharmendra Mishra,
Yacine Ouzrout,
Ajay Shrestha,
Abdelaziz Bouras
Abstract:
The rapid technological enhancement and innovations in current days have changed people's thought. The use of Information Technology tools in people's daily life has changed their life style completely. The advent of various innovative smart products in the market has tremendous impact on people's lifestyle. They want to know their heart beat while they run, they need a smart car which makes them…
▽ More
The rapid technological enhancement and innovations in current days have changed people's thought. The use of Information Technology tools in people's daily life has changed their life style completely. The advent of various innovative smart products in the market has tremendous impact on people's lifestyle. They want to know their heart beat while they run, they need a smart car which makes them alert when they become sleepy while driving, and they need an IT tool which can make their home safer when they are out. These quests of people to the very extent have been fulfilled by development of many Meta products like wearables, smart phones, smart car etc. The concept of Meta product is based on the fact that they need to offer intelligent services to the users. In present day's Meta products market, the manufacturers have their own cloud based platform which is used by the products for which it is developed. The other products cannot use the common platform. In this paper, we propose a common cloud based platform that will be used by any Meta product's user to get different services.
△ Less
Submitted 7 November, 2018;
originally announced November 2018.
-
Scalable NoC-based Neuromorphic Hardware Learning and Inference
Authors:
Haowem Fang,
Amar Shrestha,
De Ma,
Qinru Qiu
Abstract:
Bio-inspired neuromorphic hardware is a research direction to approach brain's computational power and energy efficiency. Spiking neural networks (SNN) encode information as sparsely distributed spike trains and employ spike-timing-dependent plasticity (STDP) mechanism for learning. Existing hardware implementations of SNN are limited in scale or do not have in-hardware learning capability. In thi…
▽ More
Bio-inspired neuromorphic hardware is a research direction to approach brain's computational power and energy efficiency. Spiking neural networks (SNN) encode information as sparsely distributed spike trains and employ spike-timing-dependent plasticity (STDP) mechanism for learning. Existing hardware implementations of SNN are limited in scale or do not have in-hardware learning capability. In this work, we propose a low-cost scalable Network-on-Chip (NoC) based SNN hardware architecture with fully distributed in-hardware STDP learning capability. All hardware neurons work in parallel and communicate through the NoC. This enables chip-level interconnection, scalability and reconfigurability necessary for deploying different applications. The hardware is applied to learn MNIST digits as an evaluation of its learning capability. We explore the design space to study the trade-offs between speed, area and energy. How to use this procedure to find optimal architecture configuration is also discussed.
△ Less
Submitted 18 September, 2018;
originally announced October 2018.
-
Who is Really Affected by Fraudulent Reviews? An analysis of shilling attacks on recommender systems in real-world scenarios
Authors:
Anu Shrestha,
Francesca Spezzano,
Maria Soledad Pera
Abstract:
We present the results of an initial analysis conducted on a real-life setting to quantify the effect of shilling attacks on recommender systems. We focus on both algorithm performance as well as the types of users who are most affected by these attacks.
We present the results of an initial analysis conducted on a real-life setting to quantify the effect of shilling attacks on recommender systems. We focus on both algorithm performance as well as the types of users who are most affected by these attacks.
△ Less
Submitted 21 August, 2018;
originally announced August 2018.
-
DeepWalking: Enabling Smartphone-based Walking Speed Estimation Using Deep Learning
Authors:
Aawesh Shrestha,
Myounggyu Won
Abstract:
Walking speed estimation is an essential component of mobile apps in various fields such as fitness, transportation, navigation, and health-care. Most existing solutions are focused on specialized medical applications that utilize body-worn motion sensors. These approaches do not serve effectively the general use case of numerous apps where the user holding a smartphone tries to find his or her wa…
▽ More
Walking speed estimation is an essential component of mobile apps in various fields such as fitness, transportation, navigation, and health-care. Most existing solutions are focused on specialized medical applications that utilize body-worn motion sensors. These approaches do not serve effectively the general use case of numerous apps where the user holding a smartphone tries to find his or her walking speed solely based on smartphone sensors. However, existing smartphone-based approaches fail to provide acceptable precision for walking speed estimation. This leads to a question: is it possible to achieve comparable speed estimation accuracy using a smartphone over wearable sensor based obtrusive solutions?
We find the answer from advanced neural networks. In this paper, we present DeepWalking, the first deep learning-based walking speed estimation scheme for smartphone. A deep convolutional neural network (DCNN) is applied to automatically identify and extract the most effective features from the accelerometer and gyroscope data of smartphone and to train the network model for accurate speed estimation. Experiments are performed with 10 participants using a treadmill. The average root-mean-squared-error (RMSE) of estimated walking speed is 0.16m/s which is comparable to the results obtained by state-of-the-art approaches based on a number of body-worn sensors (i.e., RMSE of 0.11m/s). The results indicate that a smartphone can be a strong tool for walking speed estimation if the sensor data are effectively calibrated and supported by advanced deep learning techniques.
△ Less
Submitted 5 March, 2019; v1 submitted 9 May, 2018;
originally announced May 2018.
-
Decoupling GPU Programming Models from Resource Management for Enhanced Programming Ease, Portability, and Performance
Authors:
Nandita Vijaykumar,
Kevin Hsieh,
Gennady Pekhimenko,
Samira Khan,
Ashish Shrestha,
Saugata Ghose,
Adwait Jog,
Phillip B. Gibbons,
Onur Mutlu
Abstract:
The application resource specification--a static specification of several parameters such as the number of threads and the scratchpad memory usage per thread block--forms a critical component of modern GPU programming models. This specification determines the parallelism, and hence performance, of the application during execution because the corresponding on-chip hardware resources are allocated a…
▽ More
The application resource specification--a static specification of several parameters such as the number of threads and the scratchpad memory usage per thread block--forms a critical component of modern GPU programming models. This specification determines the parallelism, and hence performance, of the application during execution because the corresponding on-chip hardware resources are allocated and managed based on this specification. This tight-coupling between the software-provided resource specification and resource management in hardware leads to significant challenges in programming ease, portability, and performance. Zorua is a new resource virtualization framework, that decouples the programmer-specified resource usage of a GPU application from the actual allocation in the on-chip hardware resources. Zorua enables this decoupling by virtualizing each resource transparently to the programmer.
We demonstrate that by providing the illusion of more resources than physically available via controlled and coordinated virtualization, Zorua offers several important benefits: (i) Programming Ease. Zorua eases the burden on the programmer to provide code that is tuned to efficiently utilize the physically available on-chip resources. (ii) Portability. Zorua alleviates the necessity of re-tuning an application's resource usage when porting the application across GPU generations. (iii) Performance. By dynamically allocating resources and carefully oversubscribing them when necessary, Zorua improves or retains the performance of applications that are already highly tuned to best utilize the resources.
△ Less
Submitted 2 May, 2018;
originally announced May 2018.
-
SaferCross: Enhancing Pedestrian Safety Using Embedded Sensors of Smartphone
Authors:
Myounggyu Won,
Aawesh Shrestha,
Kyung-Joon Park,
Yongsoon Eun
Abstract:
The number of pedestrian accidents continues to keep climbing. Distraction from smartphone is one of the biggest causes for pedestrian fatalities. In this paper, we develop SaferCross, a mobile system based on the embedded sensors of smartphone to improve pedestrian safety by preventing distraction from smartphone. SaferCross adopts a holistic approach by identifying and developing essential syste…
▽ More
The number of pedestrian accidents continues to keep climbing. Distraction from smartphone is one of the biggest causes for pedestrian fatalities. In this paper, we develop SaferCross, a mobile system based on the embedded sensors of smartphone to improve pedestrian safety by preventing distraction from smartphone. SaferCross adopts a holistic approach by identifying and developing essential system components that are missing in existing systems and integrating the system components into a "fully-functioning" mobile system for pedestrian safety. Specifically, we create algorithms for improving the accuracy and energy efficiency of pedestrian positioning, effectiveness of phone activity detection, and real-time risk assessment. We demonstrate that SaferCross, through systematic integration of the developed algorithms, performs situation awareness effectively and provides a timely warning to the pedestrian based on the information obtained from smartphone sensors and Direct Wi-Fi-based peer-to-peer communication with approaching cars. Extensive experiments are conducted in a department parking lot for both component-level and integrated testing. The results demonstrate that the energy efficiency and positioning accuracy of SaferCross are improved by 52% and 72% on average compared with existing solutions with missing support for positioning accuracy and energy efficiency, and the phone-viewing event detection accuracy is over 90%. The integrated test results show that SaferCross alerts the pedestrian timely with an average error of 1.6sec in comparison with the ground truth data, which can be easily compensated by configuring the system to fire an alert message a couple of seconds early.
△ Less
Submitted 26 April, 2020; v1 submitted 20 April, 2018;
originally announced May 2018.
-
Zorua: Enhancing Programming Ease, Portability, and Performance in GPUs by Decoupling Programming Models from Resource Management
Authors:
Nandita Vijaykumar,
Kevin Hsieh,
Gennady Pekhimenko,
Samira Khan,
Ashish Shrestha,
Saugata Ghose,
Phillip B. Gibbons,
Onur Mutlu
Abstract:
The application resource specification--a static specification of several parameters such as the number of threads and the scratchpad memory usage per thread block--forms a critical component of the existing GPU programming models. This specification determines the performance of the application during execution because the corresponding on-chip hardware resources are allocated and managed purely…
▽ More
The application resource specification--a static specification of several parameters such as the number of threads and the scratchpad memory usage per thread block--forms a critical component of the existing GPU programming models. This specification determines the performance of the application during execution because the corresponding on-chip hardware resources are allocated and managed purely based on this specification. This tight coupling between the software-provided resource specification and resource management in hardware leads to significant challenges in programming ease, portability, and performance, as we demonstrate in this work.
Our goal in this work is to reduce the dependence of performance on the software-provided resource specification to simultaneously alleviate the above challenges. To this end, we introduce Zorua, a new resource virtualization framework, that decouples the programmer-specified resource usage of a GPU application from the actual allocation in the on-chip hardware resources. Zorua enables this decoupling by virtualizing each resource transparently to the programmer.
We demonstrate that by providing the illusion of more resources than physically available, Zorua offers several important benefits: (i) Programming Ease: Zorua eases the burden on the programmer to provide code that is tuned to efficiently utilize the physically available on-chip resources. (ii) Portability: Zorua alleviates the necessity of re-tuning an application's resource usage when porting the application across GPU generations. (iii) Performance: By dynamically allocating resources and carefully oversubscribing them when necessary, Zorua improves or retains the performance of applications that are already highly tuned to best utilize the resources. The holistic virtualization provided by Zorua has many other potential uses which we describe in this paper.
△ Less
Submitted 7 February, 2018;
originally announced February 2018.
-
Virtualising Process Assessments to Facilitate Continual Service Improvement in IT Service Management
Authors:
Anup Shrestha,
Aileen Cater-Steel,
Mark Toleman
Abstract:
The IT Service Management (ITSM) industry has defined processes as best practices in the widely-accepted IT Infrastructure Library (ITIL) framework. However, studies on the measurement of ITSM process improvement are scant. Our research addressed the dual problems of the lack of transparency and the need for efficiency in ITSM process assessment. Using the Design Science Research methodology, we d…
▽ More
The IT Service Management (ITSM) industry has defined processes as best practices in the widely-accepted IT Infrastructure Library (ITIL) framework. However, studies on the measurement of ITSM process improvement are scant. Our research addressed the dual problems of the lack of transparency and the need for efficiency in ITSM process assessment. Using the Design Science Research methodology, we developed a Software-mediated Process Assessment (SMPA) approach that enables assessment of ITSM processes. The SMPA approach includes process selection; online survey to collect assessment data; measurement of process capability; and reporting of process improvement recommendations. We implemented a decision support system (DSS) to automate the SMPA approach and evaluated it at two IT service providers. The evaluations indicated that the SMPA approach supports decision-making on process improvements. The findings provided design knowledge of virtualisation in ITSM process assessment and how this may facilitate continual service improvement.
△ Less
Submitted 8 June, 2016;
originally announced June 2016.
-
Secure Ad-hoc Routing Scheme
Authors:
Anish Prasad Shrestha,
Kyung Sup Kwak
Abstract:
This paper investigates on the problem of combining routing scheme and physical layer security in multihop wireless networks with cooperative diversity. We propose an ad-hoc natured hop-by-hop best secure relay selection in a multihop network with several relays and an eavesdropper at each hop which provides a safe routing scheme to transmit confidential message from transmitter to legitimate rece…
▽ More
This paper investigates on the problem of combining routing scheme and physical layer security in multihop wireless networks with cooperative diversity. We propose an ad-hoc natured hop-by-hop best secure relay selection in a multihop network with several relays and an eavesdropper at each hop which provides a safe routing scheme to transmit confidential message from transmitter to legitimate receiver. The selection is based on the instantaneous channel conditions of relay and eavesdropper at each hop. A theoretical analysis is performed to derive new closed form expressions for probability of non-zero secrecy capacity along with the exact end to end secrecy outage probability at a normalized secrecy rate. Furthermore, we provide the asymptotic expression to gain insights on the diversity gain.
△ Less
Submitted 19 July, 2018; v1 submitted 8 June, 2015;
originally announced June 2015.
-
On Maximal Ratio Diversity with Weighting Errors for Physical Layer Security
Authors:
Anish Prasad Shrestha,
Kyung Sup Kwak
Abstract:
In this letter, we introduce the performance of maximal ratio combining (MRC) with weighting errors for physical layer security. We assume both legitimate user and eavesdropper each equipped with multiple antennas employ non ideal MRC. The non ideal MRC is designed in terms of power correlation between the estimated and actual fadings. We derive new closedform and generalized expressions for secre…
▽ More
In this letter, we introduce the performance of maximal ratio combining (MRC) with weighting errors for physical layer security. We assume both legitimate user and eavesdropper each equipped with multiple antennas employ non ideal MRC. The non ideal MRC is designed in terms of power correlation between the estimated and actual fadings. We derive new closedform and generalized expressions for secrecy outage probability. Next, we investigate the asymptotic behavior of secrecy outage probability for high signal-to-noise ratio in the main channel between legitimate user and transmitter. The asymptotic analysis provides the insights about actual diversity provided by MRC with weighting errors. We substantiate our claims with the analytic results and numerical evaluations.
△ Less
Submitted 9 November, 2013; v1 submitted 6 November, 2013;
originally announced November 2013.