-
Machine-Assisted Map Editing
Authors:
Favyen Bastani,
Songtao He,
Sofiane Abbar,
Mohammad Alizadeh,
Hari Balakrishnan,
Sanjay Chawla,
Sam Madden
Abstract:
Map** road networks today is labor-intensive. As a result, road maps have poor coverage outside urban centers in many countries. Systems to automatically infer road network graphs from aerial imagery and GPS trajectories have been proposed to improve coverage of road maps. However, because of high error rates, these systems have not been adopted by map** communities. We propose machine-assiste…
▽ More
Map** road networks today is labor-intensive. As a result, road maps have poor coverage outside urban centers in many countries. Systems to automatically infer road network graphs from aerial imagery and GPS trajectories have been proposed to improve coverage of road maps. However, because of high error rates, these systems have not been adopted by map** communities. We propose machine-assisted map editing, where automatic map inference is integrated into existing, human-centric map editing workflows. To realize this, we build Machine-Assisted iD (MAiD), where we extend the web-based OpenStreetMap editor, iD, with machine-assistance functionality. We complement MAiD with a novel approach for inferring road topology from aerial imagery that combines the speed of prior segmentation approaches with the accuracy of prior iterative graph construction methods. We design MAiD to tackle the addition of major, arterial roads in regions where existing maps have poor coverage, and the incremental improvement of coverage in regions where major roads are already mapped. We conduct two user studies and find that, when participants are given a fixed time to map roads, they are able to add as much as 3.5x more roads with MAiD.
△ Less
Submitted 17 June, 2019;
originally announced June 2019.
-
Adaptive Neural Signal Detection for Massive MIMO
Authors:
Mehrdad Khani,
Mohammad Alizadeh,
Jakob Hoydis,
Phil Fleming
Abstract:
Symbol detection for Massive Multiple-Input Multiple-Output (MIMO) is a challenging problem for which traditional algorithms are either impractical or suffer from performance limitations. Several recently proposed learning-based approaches achieve promising results on simple channel models (e.g., i.i.d. Gaussian). However, their performance degrades significantly on real-world channels with spatia…
▽ More
Symbol detection for Massive Multiple-Input Multiple-Output (MIMO) is a challenging problem for which traditional algorithms are either impractical or suffer from performance limitations. Several recently proposed learning-based approaches achieve promising results on simple channel models (e.g., i.i.d. Gaussian). However, their performance degrades significantly on real-world channels with spatial correlation. We propose MMNet, a deep learning MIMO detection scheme that significantly outperforms existing approaches on realistic channels with the same or lower computational complexity. MMNet's design builds on the theory of iterative soft-thresholding algorithms and uses a novel training algorithm that leverages temporal and spectral correlation to accelerate training. Together, these innovations allow MMNet to train online for every realization of the channel. On i.i.d. Gaussian channels, MMNet requires two orders of magnitude fewer operations than existing deep learning schemes but achieves near-optimal performance. On spatially-correlated channels, it achieves the same error rate as the next-best learning scheme (OAMPNet) at 2.5dB lower SNR and with at least 10x less computational complexity. MMNet is also 4--8dB better overall than a classic linear scheme like the minimum mean square error (MMSE) detector.
△ Less
Submitted 11 June, 2019;
originally announced June 2019.
-
A risk-security tradeoff in graphical coordination games
Authors:
Keith Paarporn,
Mahnoosh Alizadeh,
Jason R. Marden
Abstract:
A system relying on the collective behavior of decision-makers can be vulnerable to a variety of adversarial attacks. How well can a system operator protect performance in the face of these risks? We frame this question in the context of graphical coordination games, where the agents in a network choose among two conventions and derive benefits from coordinating neighbors, and system performance i…
▽ More
A system relying on the collective behavior of decision-makers can be vulnerable to a variety of adversarial attacks. How well can a system operator protect performance in the face of these risks? We frame this question in the context of graphical coordination games, where the agents in a network choose among two conventions and derive benefits from coordinating neighbors, and system performance is measured in terms of the agents' welfare. In this paper, we assess an operator's ability to mitigate two types of adversarial attacks - 1) broad attacks, where the adversary incentivizes all agents in the network and 2) focused attacks, where the adversary can force a selected subset of the agents to commit to a prescribed convention. As a mitigation strategy, the system operator can implement a class of distributed algorithms that govern the agents' decision-making process. Our main contribution characterizes the operator's fundamental trade-off between security against worst-case broad attacks and vulnerability from focused attacks. We show that this tradeoff significantly improves when the operator selects a decision-making process at random. Our work highlights the design challenges a system operator faces in maintaining resilience of networked distributed systems.
△ Less
Submitted 6 June, 2019; v1 submitted 3 June, 2019;
originally announced June 2019.
-
An Online Admission Control Mechanism for Electric Vehicles at Public Parking Infrastructures
Authors:
Nathaniel Tucker,
Mahnoosh Alizadeh
Abstract:
We study an online reservation system that allows electric vehicles (EVs) to park and charge at parking facilities equipped with electric vehicle supply equipment (EVSEs). We consider the case where EVs arrive in an online fashion and the facility coordinator must immediately make an admission or rejection decision as well as assign a specific irrevocable parking spot to each admitted EV. By means…
▽ More
We study an online reservation system that allows electric vehicles (EVs) to park and charge at parking facilities equipped with electric vehicle supply equipment (EVSEs). We consider the case where EVs arrive in an online fashion and the facility coordinator must immediately make an admission or rejection decision as well as assign a specific irrevocable parking spot to each admitted EV. By means of strategic user admittance and smart charging, the objective of the facility coordinator is to maximize total user utility minus the operational costs of the facilities. We discuss an online pricing mechanism based on primal-dual methods for combinatorial auctions that functions as both an admission controller and a distributor of the facilities' limited charging resources. We analyze the online pricing mechanism's performance compared to the optimal offline solution and provide numerical results that validate the mechanism's performance for various test cases.
△ Less
Submitted 15 May, 2019;
originally announced May 2019.
-
An Online Pricing Mechanism for Electric Vehicle Parking Assignment and Charge Scheduling
Authors:
Nathaniel Tucker,
Bryce Ferguson,
Mahnoosh Alizadeh
Abstract:
In this paper, we design a pricing framework for online electric vehicle (EV) parking assignment and charge scheduling. Here, users with electric vehicles want to park and charge at electric-vehicle-supply-equipment (EVSEs) at different locations and arrive/depart throughout the day. The goal is to assign and schedule users to the available EVSEs while maximizing user utility and minimizing operat…
▽ More
In this paper, we design a pricing framework for online electric vehicle (EV) parking assignment and charge scheduling. Here, users with electric vehicles want to park and charge at electric-vehicle-supply-equipment (EVSEs) at different locations and arrive/depart throughout the day. The goal is to assign and schedule users to the available EVSEs while maximizing user utility and minimizing operational costs. Our formulation can accommodate multiple locations, limited resources, operational costs, as well as variable arrival patterns. With this formulation, the parking facility management can optimize for behind-the-meter solar integration and reduce costs due to procuring electricity from the grid. We use an online pricing mechanism to approximate the EVSE reservation problem's solution and we analyze the performance compared to the offline solution. Our numerical simulation validates the performance of the EVSE reservation system in a downtown area with multiple parking locations equipped with EVSEs.
△ Less
Submitted 15 May, 2019;
originally announced May 2019.
-
ABC: A Simple Explicit Congestion Controller for Wireless Networks
Authors:
Prateesh Goyal,
Anup Agarwal,
Ravi Netravali,
Mohammad Alizadeh,
Hari Balakrishnan
Abstract:
We propose Accel-Brake Control (ABC), a simple and deployable explicit congestion control protocol for network paths with time-varying wireless links. ABC routers mark each packet with an "accelerate" or "brake", which causes senders to slightly increase or decrease their congestion windows. Routers use this feedback to quickly guide senders towards a desired target rate. ABC requires no changes t…
▽ More
We propose Accel-Brake Control (ABC), a simple and deployable explicit congestion control protocol for network paths with time-varying wireless links. ABC routers mark each packet with an "accelerate" or "brake", which causes senders to slightly increase or decrease their congestion windows. Routers use this feedback to quickly guide senders towards a desired target rate. ABC requires no changes to header formats or user devices, but achieves better performance than XCP. ABC is also incrementally deployable; it operates correctly when the bottleneck is a non-ABC router, and can coexist with non-ABC traffic sharing the same bottleneck link. We evaluate ABC using a Wi-Fi implementation and trace-driven emulation of cellular links. ABC achieves 30-40% higher throughput than Cubic+Codel for similar delays, and 2.2X lower delays than BBR on a Wi-Fi path. On cellular network paths, ABC achieves 50% higher throughput than Cubic+Codel.
△ Less
Submitted 17 March, 2021; v1 submitted 8 May, 2019;
originally announced May 2019.
-
Neo: A Learned Query Optimizer
Authors:
Ryan Marcus,
Parimarjan Negi,
Hongzi Mao,
Chi Zhang,
Mohammad Alizadeh,
Tim Kraska,
Olga Papaemmanouil,
Nesime Tatbul
Abstract:
Query optimization is one of the most challenging problems in database systems. Despite the progress made over the past decades, query optimizers remain extremely complex components that require a great deal of hand-tuning for specific workloads and datasets. Motivated by this shortcoming and inspired by recent advances in applying machine learning to data management challenges, we introduce Neo (…
▽ More
Query optimization is one of the most challenging problems in database systems. Despite the progress made over the past decades, query optimizers remain extremely complex components that require a great deal of hand-tuning for specific workloads and datasets. Motivated by this shortcoming and inspired by recent advances in applying machine learning to data management challenges, we introduce Neo (Neural Optimizer), a novel learning-based query optimizer that relies on deep neural networks to generate query executions plans. Neo bootstraps its query optimization model from existing optimizers and continues to learn from incoming queries, building upon its successes and learning from its failures. Furthermore, Neo naturally adapts to underlying data patterns and is robust to estimation errors. Experimental results demonstrate that Neo, even when bootstrapped from a simple optimizer like PostgreSQL, can learn a model that offers similar performance to state-of-the-art commercial optimizers, and in some cases even surpass them.
△ Less
Submitted 7 April, 2019;
originally announced April 2019.
-
Resilient Distributed Optimization Algorithms for Resource Allocation
Authors:
Cesar A. Uribe,
Hoi-To Wai,
Mahnoosh Alizadeh
Abstract:
Distributed algorithms provide flexibility over centralized algorithms for resource allocation problems, e.g., cyber-physical systems. However, the distributed nature of these algorithms often makes the systems susceptible to man-in-the-middle attacks, especially when messages are transmitted between price-taking agents and a central coordinator. We propose a resilient strategy for distributed alg…
▽ More
Distributed algorithms provide flexibility over centralized algorithms for resource allocation problems, e.g., cyber-physical systems. However, the distributed nature of these algorithms often makes the systems susceptible to man-in-the-middle attacks, especially when messages are transmitted between price-taking agents and a central coordinator. We propose a resilient strategy for distributed algorithms under the framework of primal-dual distributed optimization. We formulate a robust optimization model that accounts for Byzantine attacks on the communication channels between agents and coordinator. We propose a resilient primal-dual algorithm using state-of-the-art robust statistics methods. The proposed algorithm is shown to converge to a neighborhood of the robust optimization model, where the neighborhood's radius is proportional to the fraction of attacked channels.
△ Less
Submitted 10 September, 2019; v1 submitted 4 April, 2019;
originally announced April 2019.
-
Pricing and Routing Mechanisms for Differentiated Services in an Electric Vehicle Public Charging Station Network
Authors:
Ahmadreza Moradipari,
Mahnoosh Alizadeh
Abstract:
We consider a Charging Network Operator (CNO) that owns a network of Electric Vehicle (EV) public charging stations and wishes to offer a menu of differentiated service options for access to its stations. This involves designing optimal pricing and routing schemes for the setting where users cannot directly choose which station they use. Instead, they choose their priority level and energy request…
▽ More
We consider a Charging Network Operator (CNO) that owns a network of Electric Vehicle (EV) public charging stations and wishes to offer a menu of differentiated service options for access to its stations. This involves designing optimal pricing and routing schemes for the setting where users cannot directly choose which station they use. Instead, they choose their priority level and energy request amount from the differentiated service menu, and then the CNO directly assigns them to a station on their path. This allows higher priority users to experience lower wait times at stations, and allows the CNO to directly manage demand, exerting a higher level of control that can be used to manage the effect of EV on the grid and control station wait times. We consider the scenarios where the CNO is a social welfare-maximizing or a profit-maximizing entity, and in both cases, design pricing-routing policies that ensure users reveal their true parameters to the CNO.
△ Less
Submitted 26 August, 2019; v1 submitted 15 March, 2019;
originally announced March 2019.
-
Electromagnetic Field Tapering in the High-Roughness Substrates Coated by a Thin Film of Manganese: A Lithography-Free Approach to Ultra-Broadband, Wide-Angle, UV to FIR Perfect Absorption
Authors:
Majid Aalizadeh,
Mohammad Reza Tavakol,
Amin Khavasi,
Mehmet Yilmaz,
Ekmel Ozbay
Abstract:
Metallic layers are known to be used for the suppression of wave transmission when their thickness is sufficiently higher than the skin depth of metal. If in addition to blocking the transmission, metallic layers have the feature of blocking the reflection, too, they would make perfect absorbers. In this work, we propose an experimental approach of using a single thin layer of Manganese (Mn) as bo…
▽ More
Metallic layers are known to be used for the suppression of wave transmission when their thickness is sufficiently higher than the skin depth of metal. If in addition to blocking the transmission, metallic layers have the feature of blocking the reflection, too, they would make perfect absorbers. In this work, we propose an experimental approach of using a single thin layer of Manganese (Mn) as both the transmission suppresser and the reflection suppresser. This approach leads to obtaining lithography-free ultra-broadband perfect absorption in an ultra-wide spectrum ranging from Ultraviolet (UV) to Far Infrared (FIR). The measured average absorption is approximately 99%. Such a promising result can be achieved by only coating a single Mn layer on high-roughness substrates that include random nano-pyramids on it. In other words, we do not need a stack of different materials and combinations of geometrical features. The high roughness is realized on a commercial Silicon wafer substrate by inductively coupled plasma (ICP) etching. The key to this ultra-wideband absorption is electromagnetic field tapering which exists due to the graded-index feature of the structure (known as moth-eye effect), along with the ideal optical properties of Mn which makes it an excellent metal for broadband absorption applications. A full experimental characterization of the fabricated samples is presented along with the physical analysis of the phenomena. The findings of this paper can be used for the realization of lithography-free, cost-effective and high-throughput mass production of broadband absorbers.
△ Less
Submitted 7 March, 2019; v1 submitted 5 December, 2018;
originally announced December 2018.
-
Mobility-Aware Electric Vehicle Fast Charging Load Models with Geographical Price Variations
Authors:
Ahmadreza Moradipari,
Nathaniel Tucker,
Mahnoosh Alizadeh
Abstract:
We study the traffic patterns as well as the charging patterns of a population of cost-minimizing EV owners traveling and charging within a transportation network equipped with fast charging stations (FCSs). Specifically, we study how the charging network operator (CNO) can influence where EV users charge in order to optimize the utilization of fast charging stations. These charging decisions of p…
▽ More
We study the traffic patterns as well as the charging patterns of a population of cost-minimizing EV owners traveling and charging within a transportation network equipped with fast charging stations (FCSs). Specifically, we study how the charging network operator (CNO) can influence where EV users charge in order to optimize the utilization of fast charging stations. These charging decisions of private EV owners affect aggregate congestion at stations (i.e., waiting time) as well as the aggregate EV charging load across the network. In this work, we capture the resulting equilibrium wait times and electricity load through a so-called \textit{traffic and charge assignment problem} (TCAP) in a fast charging station network. Our formulation allows us to: 1) Study the expected station wait times as well as the probability distribution of aggregate charging load of EVs in a FCS network in a mobility-aware fashion (an aspect unique to our work), while accounting for heterogeneities in users' travel patterns, energy demands, and geographically variant electricity prices. 2) Analytically characterize the special threshold-based structure that determines how EV owners choose where to charge their vehicle at equilibrium, in response to the FCS's charging price structure, users' energy demands, and users' mobility patterns. 3) Provide a convex optimization problem formulation to identify the network's unique equilibrium. Furthermore, we illustrate how to induce a socially optimal charging behavior by deriving the socially optimal plug-in fees and electricity prices at the charging stations.
△ Less
Submitted 16 September, 2020; v1 submitted 20 November, 2018;
originally announced November 2018.
-
A Route to Unusually Broadband Absorption Spanning from Visible to Mid-Infrared
Authors:
Majid Aalizadeh,
Amin Khavasi,
Andriy E. Serebryannikov,
Guy A. E. Vandenbosch,
Ekmel Ozbay
Abstract:
In this paper, a route to ultra-broadband absorption is suggested and demonstrated by a feasible design. The high absorption regime (absorption above 90%) for the suggested structure ranges from visible to mid-infrared (MIR), i.e. for the wavelength from 478 to 3,278 nm that yields an ultra-wide bandwidth of 2,800 nm. The structure consists of a top-layer-patterned metal-insulator-metal (MIM) conf…
▽ More
In this paper, a route to ultra-broadband absorption is suggested and demonstrated by a feasible design. The high absorption regime (absorption above 90%) for the suggested structure ranges from visible to mid-infrared (MIR), i.e. for the wavelength from 478 to 3,278 nm that yields an ultra-wide bandwidth of 2,800 nm. The structure consists of a top-layer-patterned metal-insulator-metal (MIM) configuration, into the insulator layer of which, an ultra-thin 5 nm layer of Manganese (Mn) is embedded. The MIM configuration represents a Ti-Al2O3-Ti tri-layer. It is shown that, without the ultra-thin layer of Mn, the absorption bandwidth is reduced to 274 nm. Therefore, adding only a 5 nm layer of Mn leads to a more than tenfold increase in the width of the absorption band. It is explained in detail that the physical mechanism contributing to this ultra-broadband result is a combination of plasmonic and non-plasmonic resonance modes, along with the appropriate optical properties of Mn. This structure has the relative bandwidth (RBW) of 149%, while only one step of lithography is required for its fabrication, so it is relatively simple to fabricate. This makes it rather promising for practical applications.
△ Less
Submitted 16 October, 2018;
originally announced October 2018.
-
Lithography-Free, Manganese-Based Ultra-Broadband Absorption Through Annealing-Based Deformation of Thin Layers into metal-air composites
Authors:
Majid Aalizadeh,
Amin Khavasi,
Bayram Butun,
Ekmel Ozbay
Abstract:
Fabrication, characterization, and analysis of an ultra-broadband lithography-free absorber is presented. An over 94% average absorption is experimentally achieved in the wavelength range of 450-1400 nm. This ultra-broadband absorption is obtained by a simple annealed tri-layer metal-insulator-metal (MIM) configuration. The metal used in the structure is Manganese (Mn), which also makes the struct…
▽ More
Fabrication, characterization, and analysis of an ultra-broadband lithography-free absorber is presented. An over 94% average absorption is experimentally achieved in the wavelength range of 450-1400 nm. This ultra-broadband absorption is obtained by a simple annealed tri-layer metal-insulator-metal (MIM) configuration. The metal used in the structure is Manganese (Mn), which also makes the structure cost-effective. It is shown that the structure retains its high absorption for TM polarization, up to 70 degrees, and, for TE polarization, up to 50 degrees. Moreover, the physical mechanism behind this broadband absorption is explained. Being both lithography-free and cost-effective, the structure is a perfect candidate for large-area and mass production purposes.
△ Less
Submitted 21 December, 2018; v1 submitted 16 October, 2018;
originally announced October 2018.
-
Learning Scheduling Algorithms for Data Processing Clusters
Authors:
Hongzi Mao,
Malte Schwarzkopf,
Shaileshh Bojja Venkatakrishnan,
Zili Meng,
Mohammad Alizadeh
Abstract:
Efficiently scheduling data processing jobs on distributed compute clusters requires complex algorithms. Current systems, however, use simple generalized heuristics and ignore workload characteristics, since develo** and tuning a scheduling policy for each workload is infeasible. In this paper, we show that modern machine learning techniques can generate highly-efficient policies automatically.…
▽ More
Efficiently scheduling data processing jobs on distributed compute clusters requires complex algorithms. Current systems, however, use simple generalized heuristics and ignore workload characteristics, since develo** and tuning a scheduling policy for each workload is infeasible. In this paper, we show that modern machine learning techniques can generate highly-efficient policies automatically. Decima uses reinforcement learning (RL) and neural networks to learn workload-specific scheduling algorithms without any human instruction beyond a high-level objective such as minimizing average job completion time. Off-the-shelf RL techniques, however, cannot handle the complexity and scale of the scheduling problem. To build Decima, we had to develop new representations for jobs' dependency graphs, design scalable RL models, and invent RL training methods for dealing with continuous stochastic job arrivals. Our prototype integration with Spark on a 25-node cluster shows that Decima improves the average job completion time over hand-tuned scheduling heuristics by at least 21%, achieving up to 2x improvement during periods of high cluster load.
△ Less
Submitted 21 August, 2019; v1 submitted 3 October, 2018;
originally announced October 2018.
-
High Throughput Cryptocurrency Routing in Payment Channel Networks
Authors:
Vibhaalakshmi Sivaraman,
Shaileshh Bojja Venkatakrishnan,
Kathy Ruan,
Parimarjan Negi,
Lei Yang,
Radhika Mittal,
Mohammad Alizadeh,
Giulia Fanti
Abstract:
Despite growing adoption of cryptocurrencies, making fast payments at scale remains a challenge. Payment channel networks (PCNs) such as the Lightning Network have emerged as a viable scaling solution. However, completing payments on PCNs is challenging: payments must be routed on paths with sufficient funds. As payments flow over a single channel (link) in the same direction, the channel eventual…
▽ More
Despite growing adoption of cryptocurrencies, making fast payments at scale remains a challenge. Payment channel networks (PCNs) such as the Lightning Network have emerged as a viable scaling solution. However, completing payments on PCNs is challenging: payments must be routed on paths with sufficient funds. As payments flow over a single channel (link) in the same direction, the channel eventually becomes depleted and cannot support further payments in that direction; hence, naive routing schemes like shortest-path routing can deplete key payment channels and paralyze the system. Today's PCNs also route payments atomically, worsening the problem. In this paper, we present Spider, a routing solution that "packetizes" transactions and uses a multi-path transport protocol to achieve high-throughput routing in PCNs. Packetization allows Spider to complete even large transactions on low-capacity payment channels over time, while the multi-path congestion control protocol ensures balanced utilization of channels and fairness across flows. Extensive simulations comparing Spider with state-of-the-art approaches shows that Spider requires less than 25% of the funds to successfully route over 95% of transactions on balanced traffic demands, and offloads 4x more transactions onto the PCN on imbalanced demands.
△ Less
Submitted 23 March, 2020; v1 submitted 13 September, 2018;
originally announced September 2018.
-
Secure Incentivization for Decentralized Content Delivery
Authors:
Prateesh Goyal,
Ravi Netravali,
Mohammad Alizadeh,
Hari Balakrishnan
Abstract:
Prior research has proposed technical solutions to use peer-to-peer (P2P) content delivery to serve Internet video, showing that it can reduce costs to content providers. Yet, such methods have not become widespread except for a few niche instances. An important challenge is incentivization: what tangible benefits does P2P content delivery offer users who bring resources to the table? In this pape…
▽ More
Prior research has proposed technical solutions to use peer-to-peer (P2P) content delivery to serve Internet video, showing that it can reduce costs to content providers. Yet, such methods have not become widespread except for a few niche instances. An important challenge is incentivization: what tangible benefits does P2P content delivery offer users who bring resources to the table? In this paper, we ask whether monetary incentives can help attract peers in P2P content delivery systems. We commissioned a professional survey of people around theUnited States to answer several relevant questions. We found that 51% of the 876 respondents--substantially larger than our expectations--answered "yes" to whether they would participate for suitable financial incentives. Encouraged by the results of the survey, we propose Gringotts, a system to structure incentives and securely incorporate P2P delivery into content delivery systems. Gringotts provides a novel Proof of Delivery mechanism that allows content providers to verify correct delivery of their files, and shows how to use cryptocurrency to pay peers while guarding against liars and Sybil attacks.
△ Less
Submitted 2 August, 2018;
originally announced August 2018.
-
Variance Reduction for Reinforcement Learning in Input-Driven Environments
Authors:
Hongzi Mao,
Shaileshh Bojja Venkatakrishnan,
Malte Schwarzkopf,
Mohammad Alizadeh
Abstract:
We consider reinforcement learning in input-driven environments, where an exogenous, stochastic input process affects the dynamics of the system. Input processes arise in many applications, including queuing systems, robotics control with disturbances, and object tracking. Since the state dynamics and rewards depend on the input process, the state alone provides limited information for the expecte…
▽ More
We consider reinforcement learning in input-driven environments, where an exogenous, stochastic input process affects the dynamics of the system. Input processes arise in many applications, including queuing systems, robotics control with disturbances, and object tracking. Since the state dynamics and rewards depend on the input process, the state alone provides limited information for the expected future returns. Therefore, policy gradient methods with standard state-dependent baselines suffer high variance during training. We derive a bias-free, input-dependent baseline to reduce this variance, and analytically show its benefits over state-dependent baselines. We then propose a meta-learning approach to overcome the complexity of learning a baseline that depends on a long sequence of inputs. Our experimental results show that across environments from queuing systems, computer networks, and MuJoCo robotic locomotion, input-dependent baselines consistently improve training stability and result in better eventual policies.
△ Less
Submitted 27 February, 2019; v1 submitted 6 July, 2018;
originally announced July 2018.
-
Homa: A Receiver-Driven Low-Latency Transport Protocol Using Network Priorities (Complete Version)
Authors:
Behnam Montazeri,
Yilong Li,
Mohammad Alizadeh,
John Ousterhout
Abstract:
Homa is a new transport protocol for datacenter networks. It provides exceptionally low latency, especially for workloads with a high volume of very short messages, and it also supports large messages and high network utilization. Homa uses in-network priority queues to ensure low latency for short messages; priority allocation is managed dynamically by each receiver and integrated with a receiver…
▽ More
Homa is a new transport protocol for datacenter networks. It provides exceptionally low latency, especially for workloads with a high volume of very short messages, and it also supports large messages and high network utilization. Homa uses in-network priority queues to ensure low latency for short messages; priority allocation is managed dynamically by each receiver and integrated with a receiver-driven flow control mechanism. Homa also uses controlled overcommitment of receiver downlinks to ensure efficient bandwidth utilization at high load. Our implementation of Homa delivers 99th percentile round-trip times less than 15μs for short messages on a 10 Gbps network running at 80% load. These latencies are almost 100x lower than the best published measurements of an implementation. In simulations, Homa's latency is roughly equal to pFabric and significantly better than pHost, PIAS, and NDP for almost all message sizes and workloads. Homa can also sustain higher network loads than pFabric, pHost, or PIAS.
△ Less
Submitted 27 June, 2018; v1 submitted 26 March, 2018;
originally announced March 2018.
-
Elasticity Detection: A Building Block for Internet Congestion Control
Authors:
Prateesh Goyal,
Akshay Narayan,
Frank Cangialosi,
Srinivas Narayana,
Mohammad Alizadeh,
Hari Balakrishnan
Abstract:
This paper introduces Nimbus, a robust technique to detect whether the cross traffic competing with a flow is "elastic", and shows that this elasticity detector improves congestion control. If cross traffic is inelastic, then a sender can control queueing delays while achieving high throughput, but in the presence of elastic traffic, it may lose throughput if it attempts to control packet delay. T…
▽ More
This paper introduces Nimbus, a robust technique to detect whether the cross traffic competing with a flow is "elastic", and shows that this elasticity detector improves congestion control. If cross traffic is inelastic, then a sender can control queueing delays while achieving high throughput, but in the presence of elastic traffic, it may lose throughput if it attempts to control packet delay. To estimate elasticity, Nimbus modulates the flow's sending rate with sinusoidal pulses that create small traffic fluctuations at the bottleneck link, and measures the frequency response of the rate of the cross traffic. Our results on emulated and real-world paths show that congestion control using elasticity detection achieves throughput comparable to Cubic, but with delays that are 50-70 ms lower when cross traffic is inelastic. Nimbus detects the nature of the cross traffic more accurately than Copa, and is usable as a building block by other end-to-end algorithms.
△ Less
Submitted 15 February, 2020; v1 submitted 23 February, 2018;
originally announced February 2018.
-
Graph2Seq: Scalable Learning Dynamics for Graphs
Authors:
Shaileshh Bojja Venkatakrishnan,
Mohammad Alizadeh,
Pramod Viswanath
Abstract:
Neural networks have been shown to be an effective tool for learning algorithms over graph-structured data. However, graph representation techniques---that convert graphs to real-valued vectors for use with neural networks---are still in their infancy. Recent works have proposed several approaches (e.g., graph convolutional networks), but these methods have difficulty scaling and generalizing to g…
▽ More
Neural networks have been shown to be an effective tool for learning algorithms over graph-structured data. However, graph representation techniques---that convert graphs to real-valued vectors for use with neural networks---are still in their infancy. Recent works have proposed several approaches (e.g., graph convolutional networks), but these methods have difficulty scaling and generalizing to graphs with different sizes and shapes. We present Graph2Seq, a new technique that represents vertices of graphs as infinite time-series. By not limiting the representation to a fixed dimension, Graph2Seq scales naturally to graphs of arbitrary sizes and shapes. Graph2Seq is also reversible, allowing full recovery of the graph structure from the sequences. By analyzing a formal computational model for graph representation, we show that an unbounded sequence is necessary for scalability. Our experimental results with Graph2Seq show strong generalization and new state-of-the-art performance on a variety of graph combinatorial optimization problems.
△ Less
Submitted 9 October, 2018; v1 submitted 13 February, 2018;
originally announced February 2018.
-
RoadTracer: Automatic Extraction of Road Networks from Aerial Images
Authors:
Favyen Bastani,
Songtao He,
Sofiane Abbar,
Mohammad Alizadeh,
Hari Balakrishnan,
Sanjay Chawla,
Sam Madden,
David DeWitt
Abstract:
Map** road networks is currently both expensive and labor-intensive. High-resolution aerial imagery provides a promising avenue to automatically infer a road network. Prior work uses convolutional neural networks (CNNs) to detect which pixels belong to a road (segmentation), and then uses complex post-processing heuristics to infer graph connectivity. We show that these segmentation methods have…
▽ More
Map** road networks is currently both expensive and labor-intensive. High-resolution aerial imagery provides a promising avenue to automatically infer a road network. Prior work uses convolutional neural networks (CNNs) to detect which pixels belong to a road (segmentation), and then uses complex post-processing heuristics to infer graph connectivity. We show that these segmentation methods have high error rates because noisy CNN outputs are difficult to correct. We propose RoadTracer, a new method to automatically construct accurate road network maps from aerial images. RoadTracer uses an iterative search process guided by a CNN-based decision function to derive the road network graph directly from the output of the CNN. We compare our approach with a segmentation method on fifteen cities, and find that at a 5% error rate, RoadTracer correctly captures 45% more junctions across these cities.
△ Less
Submitted 26 April, 2018; v1 submitted 10 February, 2018;
originally announced February 2018.
-
Feature Based Framework to Detect Diseases, Tumor, and Bleeding in Wireless Capsule Endoscopy
Authors:
Omid Haji Maghsoudi,
Mahdi Alizadeh
Abstract:
Studying animal locomotion improves our understanding of motor control and aids in the treatment of motor impairment. Mice are a premier model of human disease and are the model system of choice for much of basic neuroscience. High frame rates (250 Hz) are needed to quantify the kinematics of these running rodents. Manual tracking, especially for multiple markers, becomes time-consuming and imposs…
▽ More
Studying animal locomotion improves our understanding of motor control and aids in the treatment of motor impairment. Mice are a premier model of human disease and are the model system of choice for much of basic neuroscience. High frame rates (250 Hz) are needed to quantify the kinematics of these running rodents. Manual tracking, especially for multiple markers, becomes time-consuming and impossible. Therefore, an automated method is necessary. We propose a method to track the paws of the animal in the following manner: first, segmenting all the possible paws based on color; second, classifying the segmented objects using a support vector machine (SVM) and neural network (NN); third, classifying the objects using the kinematic features of the running animal, coupled with texture features from earlier frames; and finally, detecting and handling collisions to assure the correctness of labelled paws. The proposed method is validated in sixty 1,000 frame video sequences (4 seconds) captured by four cameras from five mice. The total sensitivity for tracking of the front and hind paw is 99.70% using the SVM classifier and 99.76% using the NN classifier. In addition, we show the feasibility of 3D reconstruction using the four camera system.
△ Less
Submitted 27 January, 2018;
originally announced February 2018.
-
Linear maps preserve the covariance sets
Authors:
Mohammad Hossein Alizadeh
Abstract:
Let $\mathcal{A}$ and $\mathcal{B}$\ are $C^{\huge \ast}% $-algebras\textbf{.} A\textbf{ }linear map $φ:\mathcal{A\rightarrow B}$ is $C^{\ast}$-Jordan homomorphism if it is a Jordan homomorphism which preserves the adjoint operation. In this note we show that $C^{\ast}$-Jordan homomorphisms -- under mild assumptions -- preserving covariance set and covariance coset in $C^{\ast}$-algebras.
Let $\mathcal{A}$ and $\mathcal{B}$\ are $C^{\huge \ast}% $-algebras\textbf{.} A\textbf{ }linear map $φ:\mathcal{A\rightarrow B}$ is $C^{\ast}$-Jordan homomorphism if it is a Jordan homomorphism which preserves the adjoint operation. In this note we show that $C^{\ast}$-Jordan homomorphisms -- under mild assumptions -- preserving covariance set and covariance coset in $C^{\ast}$-algebras.
△ Less
Submitted 9 March, 2019; v1 submitted 14 January, 2018;
originally announced January 2018.
-
Recursive construction of primitive polynomials over finite fields
Authors:
Mahmood Alizadeh
Abstract:
In this paper, a computationally simple and explicit method of constructing recursive sequence of primitive polynomials of degree $n2^k (k = 1, 2, 3,\ldots)$ over $\mathbb{F}_{q}$ is given.
In this paper, a computationally simple and explicit method of constructing recursive sequence of primitive polynomials of degree $n2^k (k = 1, 2, 3,\ldots)$ over $\mathbb{F}_{q}$ is given.
△ Less
Submitted 24 July, 2019; v1 submitted 11 October, 2017;
originally announced October 2017.
-
On the interaction between Autonomous Mobility-on-Demand systems and the power network: models and coordination algorithms
Authors:
Federico Rossi,
Ramon Iglesias,
Mahnoosh Alizadeh,
Marco Pavone
Abstract:
We study the interaction between a fleet of electric, self-driving vehicles servicing on-demand transportation requests (referred to as Autonomous Mobility-on-Demand, or AMoD, system) and the electric power network. We propose a model that captures the coupling between the two systems stemming from the vehicles' charging requirements and captures time-varying customer demand and power generation c…
▽ More
We study the interaction between a fleet of electric, self-driving vehicles servicing on-demand transportation requests (referred to as Autonomous Mobility-on-Demand, or AMoD, system) and the electric power network. We propose a model that captures the coupling between the two systems stemming from the vehicles' charging requirements and captures time-varying customer demand and power generation costs, road congestion, battery depreciation, and power transmission and distribution constraints. We then leverage the model to jointly optimize the operation of both systems. We devise an algorithmic procedure to losslessly reduce the problem size by bundling customer requests, allowing it to be efficiently solved by off-the-shelf linear programming solvers. Next, we show that the socially optimal solution to the joint problem can be enforced as a general equilibrium, and we provide a dual decomposition algorithm that allows self-interested agents to compute the market clearing prices without sharing private information. We assess the performance of the mode by studying a hypothetical AMoD system in Dallas-Fort Worth and its impact on the Texas power network. Lack of coordination between the AMoD system and the power network can cause a 4.4% increase in the price of electricity in Dallas-Fort Worth; conversely, coordination between the AMoD system and the power network could reduce electricity expenditure compared to the case where no cars are present (despite the increased demand for electricity) and yield savings of up $147M/year. Finally, we provide a receding-horizon implementation and assess its performance with agent-based simulations. Collectively, the results of this paper provide a first-of-a-kind characterization of the interaction between electric-powered AMoD systems and the power network, and shed additional light on the economic and societal value of AMoD.
△ Less
Submitted 8 June, 2019; v1 submitted 14 September, 2017;
originally announced September 2017.
-
Psychological and Personality Profiles of Political Extremists
Authors:
Meysam Alizadeh,
Ingmar Weber,
Claudio Cioffi-Revilla,
Santo Fortunato,
Michael Macy
Abstract:
Global recruitment into radical Islamic movements has spurred renewed interest in the appeal of political extremism. Is the appeal a rational response to material conditions or is it the expression of psychological and personality disorders associated with aggressive behavior, intolerance, conspiratorial imagination, and paranoia? Empirical answers using surveys have been limited by lack of access…
▽ More
Global recruitment into radical Islamic movements has spurred renewed interest in the appeal of political extremism. Is the appeal a rational response to material conditions or is it the expression of psychological and personality disorders associated with aggressive behavior, intolerance, conspiratorial imagination, and paranoia? Empirical answers using surveys have been limited by lack of access to extremist groups, while field studies have lacked psychological measures and failed to compare extremists with contrast groups. We revisit the debate over the appeal of extremism in the U.S. context by comparing publicly available Twitter messages written by over 355,000 political extremist followers with messages written by non-extremist U.S. users. Analysis of text-based psychological indicators supports the moral foundation theory which identifies emotion as a critical factor in determining political orientation of individuals. Extremist followers also differ from others in four of the Big Five personality traits.
△ Less
Submitted 1 April, 2017;
originally announced April 2017.
-
Flashield: a Key-value Cache that Minimizes Writes to Flash
Authors:
Assaf Eisenman,
Asaf Cidon,
Evgenya Pergament,
Or Haimovich,
Ryan Stutsman,
Mohammad Alizadeh,
Sachin Katti
Abstract:
As its price per bit drops, SSD is increasingly becoming the default storage medium for cloud application databases. However, it has not become the preferred storage medium for key-value caches, even though SSD offers more than 10x lower price per bit and sufficient performance compared to DRAM. This is because key-value caches need to frequently insert, update and evict small objects. This causes…
▽ More
As its price per bit drops, SSD is increasingly becoming the default storage medium for cloud application databases. However, it has not become the preferred storage medium for key-value caches, even though SSD offers more than 10x lower price per bit and sufficient performance compared to DRAM. This is because key-value caches need to frequently insert, update and evict small objects. This causes excessive writes and erasures on flash storage, since flash only supports writes and erasures of large chunks of data. These excessive writes and erasures significantly shorten the lifetime of flash, rendering it impractical to use for key-value caches. We present Flashield, a hybrid key-value cache that uses DRAM as a "filter" to minimize writes to SSD. Flashield performs light-weight machine learning profiling to predict which objects are likely to be read frequently before getting updated; these objects, which are prime candidates to be stored on SSD, are written to SSD in large chunks sequentially. In order to efficiently utilize the cache's available memory, we design a novel in-memory index for the variable-sized objects stored on flash that requires only 4 bytes per object in DRAM. We describe Flashield's design and implementation and, we evaluate it on a real-world cache trace. Compared to state-of-the-art systems that suffer a write amplification of 2.5x or more, Flashield maintains a median write amplification of 0.5x without any loss of hit rate or throughput.
△ Less
Submitted 8 February, 2017;
originally announced February 2017.
-
Recursive constructions of k-normal polynomials over finite fields
Authors:
Mahmood Alizadeh,
Saeid Mehrabi
Abstract:
The paper is devoted to produce infinite sequences of $k$-normal polynomials $F_{u}(x)\in \mathbb{F}_{q}[x]$ of degrees $np^{u} ~ (u\geq 0)$, for a suitably chosen initial $k$-normal polynomial $F_{0}(x)\in \mathbb{F}_{q}[x]$ of degree $n$ over $\mathbb{F}_{q}$ by iteratively applying the transformation $x\rightarrow \frac{x^p-x}{x^p-x+δ}$, where $δ\in \mathbb{F}_{q}$ and $0\leq k\leq n-1$.
The paper is devoted to produce infinite sequences of $k$-normal polynomials $F_{u}(x)\in \mathbb{F}_{q}[x]$ of degrees $np^{u} ~ (u\geq 0)$, for a suitably chosen initial $k$-normal polynomial $F_{0}(x)\in \mathbb{F}_{q}[x]$ of degree $n$ over $\mathbb{F}_{q}$ by iteratively applying the transformation $x\rightarrow \frac{x^p-x}{x^p-x+δ}$, where $δ\in \mathbb{F}_{q}$ and $0\leq k\leq n-1$.
△ Less
Submitted 15 October, 2016;
originally announced October 2016.
-
ParMAC: distributed optimisation of nested functions, with application to learning binary autoencoders
Authors:
Miguel Á. Carreira-Perpiñán,
Mehdi Alizadeh
Abstract:
Many powerful machine learning models are based on the composition of multiple processing layers, such as deep nets, which gives rise to nonconvex objective functions. A general, recent approach to optimise such "nested" functions is the method of auxiliary coordinates (MAC). MAC introduces an auxiliary coordinate for each data point in order to decouple the nested model into independent submodels…
▽ More
Many powerful machine learning models are based on the composition of multiple processing layers, such as deep nets, which gives rise to nonconvex objective functions. A general, recent approach to optimise such "nested" functions is the method of auxiliary coordinates (MAC). MAC introduces an auxiliary coordinate for each data point in order to decouple the nested model into independent submodels. This decomposes the optimisation into steps that alternate between training single layers and updating the coordinates. It has the advantage that it reuses existing single-layer algorithms, introduces parallelism, and does not need to use chain-rule gradients, so it works with nondifferentiable layers. With large-scale problems, or when distributing the computation is necessary for faster training, the dataset may not fit in a single machine. It is then essential to limit the amount of communication between machines so it does not obliterate the benefit of parallelism. We describe a general way to achieve this, ParMAC. ParMAC works on a cluster of processing machines with a circular topology and alternates two steps until convergence: one step trains the submodels in parallel using stochastic updates, and the other trains the coordinates in parallel. Only submodel parameters, no data or coordinates, are ever communicated between machines. ParMAC exhibits high parallelism, low communication overhead, and facilitates data shuffling, load balancing, fault tolerance and streaming data processing. We study the convergence of ParMAC and propose a theoretical model of its runtime and parallel speedup. We develop ParMAC to learn binary autoencoders for fast, approximate image retrieval. We implement it in MPI in a distributed system and demonstrate nearly perfect speedups in a 128-processor cluster with a training set of 100 million high-dimensional points.
△ Less
Submitted 30 May, 2016;
originally announced May 2016.
-
Dominant chiral optical forces in vicinity of optical nanofibers
Authors:
M. H. Alizadeh,
B. M. Reinhard
Abstract:
Transverse spin angular momentum (SAM) of light and associated transverse chiral optical forces have received tremendous attention recently as the latter may lead to an optical separation of chiral biomolecules. In this context, the relative magnitude of chiral and non-chiral forces represents a challenge for the implementation of chiral separation schemes. In this work we demonstrate that, by spa…
▽ More
Transverse spin angular momentum (SAM) of light and associated transverse chiral optical forces have received tremendous attention recently as the latter may lead to an optical separation of chiral biomolecules. In this context, the relative magnitude of chiral and non-chiral forces represents a challenge for the implementation of chiral separation schemes. In this work we demonstrate that, by spatially separating the maxima of transverse spin density from the gradient of field intensity, it is possible to dominate chiral-specific components of the force over non-chiral ones. To that end, we study optical nanofibers and nanowires as a candidate for such scheme and demonstrate that in their vicinity, chiral optical forces can emerge that are stronger than gradient and scattering forces. This finding may be of significance in the design of improved optical separation schemes for chiral biomolecules.
△ Less
Submitted 10 August, 2016; v1 submitted 16 May, 2016;
originally announced May 2016.
-
Programmable Packet Scheduling
Authors:
Anirudh Sivaraman,
Suvinay Subramanian,
Anurag Agrawal,
Sharad Chole,
Shang-Tse Chuang,
Tom Edsall,
Mohammad Alizadeh,
Sachin Katti,
Nick McKeown,
Hari Balakrishnan
Abstract:
Switches today provide a small set of scheduling algorithms. While we can tweak scheduling parameters, we cannot modify algorithmic logic, or add a completely new algorithm, after the switch has been designed. This paper presents a design for a programmable packet scheduler, which allows scheduling algorithms---potentially algorithms that are unknown today---to be programmed into a switch without…
▽ More
Switches today provide a small set of scheduling algorithms. While we can tweak scheduling parameters, we cannot modify algorithmic logic, or add a completely new algorithm, after the switch has been designed. This paper presents a design for a programmable packet scheduler, which allows scheduling algorithms---potentially algorithms that are unknown today---to be programmed into a switch without requiring hardware redesign.
Our design builds on the observation that scheduling algorithms make two decisions: in what order to schedule packets and when to schedule them. Further, in many scheduling algorithms these decisions can be made when packets are enqueued. We leverage this observation to build a programmable scheduler using a single abstraction: the push-in first-out queue (PIFO), a priority queue that maintains the scheduling order and time for such algorithms.
We show that a programmable scheduler using PIFOs lets us program a wide variety of scheduling algorithms. We present a detailed hardware design for this scheduler for a 64-port 10 Gbit/s shared-memory switch with <4% chip area overhead on a 16-nm standard-cell library. Our design lets us program many sophisticated algorithms, such as a 5-level hierarchical scheduler with programmable scheduling algorithms at each level.
△ Less
Submitted 18 February, 2016;
originally announced February 2016.
-
Emergence of transverse spin in optical modes of semiconductor nanowires
Authors:
M. H. Alizadeh,
Bjorn M. Reinhard
Abstract:
The transverse spin angular momentum of light has recently received tremendous attention as it adds a new degree of freedom for controlling light-matter interactions. In this work we demonstrate the generation of transverse spin angular momentum by the weakly-guided mode of semiconductor nanowires. The evanescent field of these modes in combination with the transversality condition rigorously acco…
▽ More
The transverse spin angular momentum of light has recently received tremendous attention as it adds a new degree of freedom for controlling light-matter interactions. In this work we demonstrate the generation of transverse spin angular momentum by the weakly-guided mode of semiconductor nanowires. The evanescent field of these modes in combination with the transversality condition rigorously accounts for the occurrence of transverse spin angular momentum. The intriguing and nontrivial spin properties of optical modes in semiconductor nanowires are of high interest for a broad range of new applications including chiral optical trap**, quantum information processing, and nanophotonic circuitry.
△ Less
Submitted 21 February, 2016; v1 submitted 21 January, 2016;
originally announced February 2016.
-
Packet Transactions: High-level Programming for Line-Rate Switches
Authors:
Anirudh Sivaraman,
Mihai Budiu,
Alvin Cheung,
Changhoon Kim,
Steve Licking,
George Varghese,
Hari Balakrishnan,
Mohammad Alizadeh,
Nick McKeown
Abstract:
Many algorithms for congestion control, scheduling, network measurement, active queue management, security, and load balancing require custom processing of packets as they traverse the data plane of a network switch. To run at line rate, these data-plane algorithms must be in hardware. With today's switch hardware, algorithms cannot be changed, nor new algorithms installed, after a switch has been…
▽ More
Many algorithms for congestion control, scheduling, network measurement, active queue management, security, and load balancing require custom processing of packets as they traverse the data plane of a network switch. To run at line rate, these data-plane algorithms must be in hardware. With today's switch hardware, algorithms cannot be changed, nor new algorithms installed, after a switch has been built.
This paper shows how to program data-plane algorithms in a high-level language and compile those programs into low-level microcode that can run on emerging programmable line-rate switching chipsets. The key challenge is that these algorithms create and modify algorithmic state. The key idea to achieve line-rate programmability for stateful algorithms is the notion of a packet transaction : a sequential code block that is atomic and isolated from other such code blocks. We have developed this idea in Domino, a C-like imperative language to express data-plane algorithms. We show with many examples that Domino provides a convenient and natural way to express sophisticated data-plane algorithms, and show that these algorithms can be run at line rate with modest estimated die-area overhead.
△ Less
Submitted 29 January, 2016; v1 submitted 15 December, 2015;
originally announced December 2015.
-
Costly Circuits, Submodular Schedules: Hybrid Switch Scheduling for Data Centers
Authors:
Shaileshh Bojja Venkatakrishnan,
Mohammad Alizadeh,
Pramod Viswanath
Abstract:
Hybrid switching - in which a high bandwidth circuit switch (optical or wireless) is used in conjunction with a low bandwidth packet switch - is a promising alternative to interconnect servers in today's large scale data-centers. Circuit switches offer a very high link rate, but incur a non-trivial reconfiguration delay which makes their scheduling challenging. In this paper, we demonstrate a ligh…
▽ More
Hybrid switching - in which a high bandwidth circuit switch (optical or wireless) is used in conjunction with a low bandwidth packet switch - is a promising alternative to interconnect servers in today's large scale data-centers. Circuit switches offer a very high link rate, but incur a non-trivial reconfiguration delay which makes their scheduling challenging. In this paper, we demonstrate a lightweight, simple and nearly-optimal scheduling algorithm that trades-off configuration costs with the benefits of reconfiguration that match the traffic demands. The algorithm has strong connections to submodular optimization, has performance at least half that of the optimal schedule and strictly outperforms state of the art in a variety of traffic demand settings. These ideas naturally generalize: we see that indirect routing leads to exponential connectivity; this is another phenomenon of the power of multi hop routing, distinct from the well-known load balancing effects.
△ Less
Submitted 23 December, 2015; v1 submitted 3 December, 2015;
originally announced December 2015.
-
Optimal Pricing to Manage Electric Vehicles in Coupled Power and Transportation Networks
Authors:
Mahnoosh Alizadeh,
Hoi-To Wai,
Mainak Chowdhury,
Andrea Goldsmith,
Anna Scaglione,
Tara Javidi
Abstract:
We study the system-level effects of the introduction of large populations of Electric Vehicles on the power and transportation networks. We assume that each EV owner solves a decision problem to pick a cost-minimizing charge and travel plan. This individual decision takes into account traffic congestion in the transportation network, affecting travel times, as well as as congestion in the power g…
▽ More
We study the system-level effects of the introduction of large populations of Electric Vehicles on the power and transportation networks. We assume that each EV owner solves a decision problem to pick a cost-minimizing charge and travel plan. This individual decision takes into account traffic congestion in the transportation network, affecting travel times, as well as as congestion in the power grid, resulting in spatial variations in electricity prices for battery charging. We show that this decision problem is equivalent to finding the shortest path on an "extended" transportation graph, with virtual arcs that represent charging options. Using this extended graph, we study the collective effects of a large number of EV owners individually solving this path planning problem. We propose a scheme in which independent power and transportation system operators can collaborate to manage each network towards a socially optimum operating point while kee** the operational data of each system private. We further study the optimal reserve capacity requirements for pricing in the absence of such collaboration. We showcase numerically that a lack of attention to interdependencies between the two infrastructures can have adverse operational effects.
△ Less
Submitted 14 September, 2016; v1 submitted 11 November, 2015;
originally announced November 2015.
-
Transverse Chiral Optical Forces by Chiral Surface Plasmon Polaritons
Authors:
M. H. Alizadeh,
Bjorn M. Reinhard
Abstract:
Recently the new concepts of transverse spin angular momentum and Belinfante spin momentum of evanescent waves have drawn considerable attention. Here, we investigate these novel physical properties of electromagnetic fields in the context of locally excited surface plasmon polaritons. We demonstrate, both analytically and numerically, that locally excited surface plasmon polaritons possess transv…
▽ More
Recently the new concepts of transverse spin angular momentum and Belinfante spin momentum of evanescent waves have drawn considerable attention. Here, we investigate these novel physical properties of electromagnetic fields in the context of locally excited surface plasmon polaritons. We demonstrate, both analytically and numerically, that locally excited surface plasmon polaritons possess transverse spin angular momentum and Belinfante momentum with rich and non-trivial characteristics. We also show that the transverse spin angular momentum of locally excited surface plasmon polaritons leads to the emergence of transverse chiral forces in opposite directions for chiral objects of different handedness. The magnitude of such a transverse force is comparable to the optical gradient force and scattering forces. This finding may pave the way for realization of optical separation of chiral biomolecules.
△ Less
Submitted 26 October, 2015; v1 submitted 14 September, 2015;
originally announced September 2015.
-
Conservation of Optical Chirality in Superconductors as a measure for 5 dimensional Electromagnetism
Authors:
H. Lashkari-Ghouchani,
M. H. Alizadeh
Abstract:
Currently only three spatial and one temporal dimensions are considered to be "physical". Recently, solutions to a plethora of questions have used the notion of extra-dimensions. The experimental verification of the existence of such extra dimensions, however, remains elusive. Here by applying standard electromagnetism to five dimensional Minkowski space-time, we propose a novel test ground to sea…
▽ More
Currently only three spatial and one temporal dimensions are considered to be "physical". Recently, solutions to a plethora of questions have used the notion of extra-dimensions. The experimental verification of the existence of such extra dimensions, however, remains elusive. Here by applying standard electromagnetism to five dimensional Minkowski space-time, we propose a novel test ground to search for a new non-compactified lengthlike extra dimension. in this regard, we propose superconductors as a testbed for this hypothetical new extra dimension.
△ Less
Submitted 18 June, 2015;
originally announced July 2015.
-
Enhanced Electromagnetic Chirality by Locally Excited Surface Plasmon Polaritons
Authors:
M. H. Alizadeh,
B. M. Reinhard
Abstract:
The possibility to enhance chiral light-matter interactions through plasmonic nanostructures provides entirely new opportunities for greatly improving the detection limits of chiroptical spectroscopies down to the single molecule level. The most pronounced of these chiral interactions occur in the ultraviolet (UV) range of the electromagnetic spectrum, which is difficult to access with conventiona…
▽ More
The possibility to enhance chiral light-matter interactions through plasmonic nanostructures provides entirely new opportunities for greatly improving the detection limits of chiroptical spectroscopies down to the single molecule level. The most pronounced of these chiral interactions occur in the ultraviolet (UV) range of the electromagnetic spectrum, which is difficult to access with conventional localized plasmon resonance based sensors. Although Surface Plasmon Polaritons (SPPs) on noble metal films can sustain resonances in the desired spectral range, their transverse magnetic nature has been an obstacle for enhancing chiroptical effects. Here we demonstrate, both analytically and numerically, that SPPs excited by near-field sources can exhibit rich and non-trivial chiral characteristics. In particular, we show that the excitation of SPPs by a chiral source not only results in a locally enhanced optical chirality but also achieves manifold enhancement of net optical chirality. Our finding that SPPs facilitate a plasmonic enhancement of optical chirality in the UV part of the spectrum is of great interest in chiral bio-sensing.
△ Less
Submitted 9 May, 2015; v1 submitted 26 March, 2015;
originally announced March 2015.
-
Some notes on the $k$-normal elements and $k$-normal polynomials over finite fields
Authors:
Mahmood Alizadeh
Abstract:
Recently, the $k$-normal element over finite fields is defined and characterized by Huczynska et al.. In this paper, the characterization of $k$-normal elements, by using to give a generalization of Schwartz's theorem, which allows us to check if an element is a normal element, is obtained. In what follows, in respect of the problem of existence of a primitive 1-normal element in…
▽ More
Recently, the $k$-normal element over finite fields is defined and characterized by Huczynska et al.. In this paper, the characterization of $k$-normal elements, by using to give a generalization of Schwartz's theorem, which allows us to check if an element is a normal element, is obtained. In what follows, in respect of the problem of existence of a primitive 1-normal element in $\mathbb{F}_{q^n}$ over $\mathbb{F}_{q}$, for all $q$ and $n$, had been stated by Huczynska et al., it is shown that, in general, this problem is not satisfied. Finally, a recursive method for constructing $1$-normal polynomials of higher degree from a given $1$-normal polynomial over $\mathbb{F}_{2^m}$ is given.
△ Less
Submitted 29 January, 2015; v1 submitted 2 January, 2015;
originally announced January 2015.
-
Energy-momentum conservation and Lipkin's zilch
Authors:
H. Lashkari-Ghouchani,
M. H. Alizadeh
Abstract:
As Noether's theorem states any differentiable symmetry of the action of a physical system has a corresponding conservation law. Lipkin introduced the conservation laws of zilches. But the corresponding symmetries are yet to be determined. Here we find a method to determine those symmetries and by direct calculations express the zilch tensor's relation to current-density for $n$-dimensional Minkow…
▽ More
As Noether's theorem states any differentiable symmetry of the action of a physical system has a corresponding conservation law. Lipkin introduced the conservation laws of zilches. But the corresponding symmetries are yet to be determined. Here we find a method to determine those symmetries and by direct calculations express the zilch tensor's relation to current-density for $n$-dimensional Minkowski space-time. Also, we extend this method to calculate symmetries of conservation of energy-momentum. Finally we show that in the special case of n=4, our general equation governing optical chirality reduces to the continuity equation of optical chirality density and optical chirality flow.
△ Less
Submitted 13 August, 2014; v1 submitted 8 August, 2014;
originally announced August 2014.
-
The Beta-Gompertz Distribution
Authors:
Ali Akbar Jafari,
Saeid Tahmasebi,
Morad Alizadeh
Abstract:
In this paper, we introduce a new four-parameter generalized version of the Gompertz model which is called Beta-Gompertz (BG) distribution. It includes some well-known lifetime distributions such as beta-exponential and generalized Gompertz distributions as special sub-models. This new distribution is quite flexible and can be used effectively in modeling survival data and reliability problems. It…
▽ More
In this paper, we introduce a new four-parameter generalized version of the Gompertz model which is called Beta-Gompertz (BG) distribution. It includes some well-known lifetime distributions such as beta-exponential and generalized Gompertz distributions as special sub-models. This new distribution is quite flexible and can be used effectively in modeling survival data and reliability problems. It can have a decreasing, increasing, and bathtub-shaped failure rate function depending on its parameters. Some mathematical properties of the new distribution, such as closed-form expressions for the density, cumulative distribution, hazard rate function, the $k$th order moment, moment generating function, Shannon entropy, and the quantile measure are provided. We discuss maximum likelihood estimation of the BG parameters from one observed sample and derive the observed Fisher's information matrix. A simulation study is performed in order to investigate this proposed estimator for parameters. At the end, in order to show the BG distribution flexibility, an application using a real data set is presented.
△ Less
Submitted 2 July, 2014;
originally announced July 2014.
-
Millions of Little Minions: Using Packets for Low Latency Network Programming and Visibility (Extended Version)
Authors:
Vimalkumar Jeyakumar,
Mohammad Alizadeh,
Yilong Geng,
Changhoon Kim,
David Mazières
Abstract:
This paper presents a practical approach to rapidly introduce new dataplane functionality into networks: End-hosts embed tiny programs into packets to actively query and manipulate a network's internal state. We show how this "tiny packet program" (TPP) interface gives end-hosts unprecedented visibility into network behavior, enabling them to work with the network to achieve a common goal. Our des…
▽ More
This paper presents a practical approach to rapidly introduce new dataplane functionality into networks: End-hosts embed tiny programs into packets to actively query and manipulate a network's internal state. We show how this "tiny packet program" (TPP) interface gives end-hosts unprecedented visibility into network behavior, enabling them to work with the network to achieve a common goal. Our design leverages what each component does best: (a) switches forward and execute tiny packet programs (at most 5 instructions) at line rate, and (b) end-hosts perform arbitrary computation on network state, which are easy to evolve. Using a hardware prototype on a NetFPGA, we show our design is feasible, at a reasonable cost. By implementing three different research proposals, we show that TPPs are also useful. And finally, we present an architecture in which they can be made secure.
△ Less
Submitted 6 June, 2014; v1 submitted 28 May, 2014;
originally announced May 2014.
-
Scalable and Anonymous Modeling of Large Populations of Flexible Appliances
Authors:
Mahnoosh Alizadeh,
Anna Scaglione,
Andy Applebaum,
George Kesidis,
Karl Levitt
Abstract:
To respond to volatility and congestion in the power grid, demand response (DR) mechanisms allow for sha** the load compared to a base load profile. When tap** on a large population of heterogeneous appliances as a DR resource, the challenge is in modeling the dimensions available for control. Such models need to strike the right balance between accuracy of the model and tractability. The goal…
▽ More
To respond to volatility and congestion in the power grid, demand response (DR) mechanisms allow for sha** the load compared to a base load profile. When tap** on a large population of heterogeneous appliances as a DR resource, the challenge is in modeling the dimensions available for control. Such models need to strike the right balance between accuracy of the model and tractability. The goal of this paper is to provide a medium-grained stochastic hybrid model to represent a population of appliances that belong to two classes: deferrable or thermostatically controlled loads. We preserve quantized information regarding individual load constraints, while discarding information about the identity of appliance owners. The advantages of our proposed population model are 1) it allows us to model and control load in a scalable fashion, useful for ex-ante planning by an aggregator or for real-time load control; 2) it allows for the preservation of the privacy of end-use customers that own submetered or directly controlled appliances.
△ Less
Submitted 7 April, 2014;
originally announced April 2014.
-
Capturing Aggregate Flexibility in Demand Response
Authors:
Mahnoosh Alizadeh,
Anna Scaglione,
Andrea Goldsmith,
George Kesidis
Abstract:
Flexibility in electric power consumption can be leveraged by Demand Response (DR) programs. The goal of this paper is to systematically capture the inherent aggregate flexibility of a population of appliances. We do so by clustering individual loads based on their characteristics and service constraints. We highlight the challenges associated with learning the customer response to economic incent…
▽ More
Flexibility in electric power consumption can be leveraged by Demand Response (DR) programs. The goal of this paper is to systematically capture the inherent aggregate flexibility of a population of appliances. We do so by clustering individual loads based on their characteristics and service constraints. We highlight the challenges associated with learning the customer response to economic incentives while applying demand side management to heterogeneous appliances. We also develop a framework to quantify customer privacy in direct load scheduling programs.
△ Less
Submitted 7 April, 2014;
originally announced April 2014.
-
Identifying Benefits and risks associated with utilizing cloud computing
Authors:
Jafar Shayan,
Ahmad Azarnik,
Suriayati Chuprat,
Sasan Karamizadeh,
Mojtaba Alizadeh
Abstract:
Cloud computing is an emerging computing model where IT and computing operations are delivered as services in highly scalable and cost effective manner. Recently, embarking this new model in business has become popular. Companies in diverse sectors intend to leverage cloud computing architecture, platforms and applications in order to gain higher competitive advantages. Likewise other models, clou…
▽ More
Cloud computing is an emerging computing model where IT and computing operations are delivered as services in highly scalable and cost effective manner. Recently, embarking this new model in business has become popular. Companies in diverse sectors intend to leverage cloud computing architecture, platforms and applications in order to gain higher competitive advantages. Likewise other models, cloud computing brought advantages to attract business but meanwhile fostering cloud has led to some risks, which can cause major impacts if business does not plan for mitigation. This paper surveys the advantages of cloud computing and in contrast the risks associated using them. Finally we conclude that a well-defined risk management program that focused on cloud computing is an essential part of gaining value from benefits of cloud computing.
△ Less
Submitted 20 January, 2014;
originally announced January 2014.
-
Incentive Design for Direct Load Control Programs
Authors:
Mahnoosh Alizadeh,
Yuanzhang Xiao,
Anna Scaglione,
Mihaela van der Schaar
Abstract:
We study the problem of optimal incentive design for voluntary participation of electricity customers in a Direct Load Scheduling (DLS) program, a new form of Direct Load Control (DLC) based on a three way communication protocol between customers, embedded controls in flexible appliances, and the central entity in charge of the program. Participation decisions are made in real-time on an event-bas…
▽ More
We study the problem of optimal incentive design for voluntary participation of electricity customers in a Direct Load Scheduling (DLS) program, a new form of Direct Load Control (DLC) based on a three way communication protocol between customers, embedded controls in flexible appliances, and the central entity in charge of the program. Participation decisions are made in real-time on an event-based basis, with every customer that needs to use a flexible appliance considering whether to join the program given current incentives. Customers have different interpretations of the level of risk associated with committing to pass over the control over the consumption schedule of their devices to an operator, and these risk levels are only privately known. The operator maximizes his expected profit of operating the DLS program by posting the right participation incentives for different appliance types, in a publicly available and dynamically updated table. Customers are then faced with the dynamic decision making problem of whether to take the incentives and participate or not. We define an optimization framework to determine the profit-maximizing incentives for the operator. In doing so, we also investigate the utility that the operator expects to gain from recruiting different types of devices. These utilities also provide an upper-bound on the benefits that can be attained from any type of demand response program.
△ Less
Submitted 1 October, 2013;
originally announced October 2013.
-
Dynamic Sliding Mode Control based on Fractional calculus subject to uncertain delay based chaotic pneumatic robot
Authors:
Sara Gholipour P.,
Heydar Toosian Shandiz,
Mobin Alizadeh,
Sara Minagar,
Seyed Javad Kazemitabar
Abstract:
This paper considers the chattering problem of sliding mode control while delay in robot manipulator caused chaos in such electromechanical systems. Fractional calculus as a powerful theorem to produce a novel sliding mode; which has a dynamic essence is used for chattering elimination. To realize the control of a class of chaotic systems in master-slave configuration this novel fractional dynamic…
▽ More
This paper considers the chattering problem of sliding mode control while delay in robot manipulator caused chaos in such electromechanical systems. Fractional calculus as a powerful theorem to produce a novel sliding mode; which has a dynamic essence is used for chattering elimination. To realize the control of a class of chaotic systems in master-slave configuration this novel fractional dynamic sliding mode control scheme is presented and examined on delay based chaotic robot in joint and work space. Also the stability of the closed-loop system is guaranteed by Lyapunov stability theory. Beside these, delayed robot motions are sorted out for qualitative and quantification study. Finally, numerical simulation example illustrates the feasibility of proposed control method.
△ Less
Submitted 15 January, 2019; v1 submitted 29 September, 2013;
originally announced September 2013.
-
Clustering Consumption in Queues: A Scalable Model for Electric Vehicle Scheduling
Authors:
Mahnoosh Alizadeh,
George Kesidis,
Anna Scaglione
Abstract:
In this paper, we introduce a scalable model for the aggregate electricity demand of a fleet of electric vehicles, which can provide the right balance between model simplicity and accuracy. The model is based on classification of tasks with similar energy consumption characteristics into a finite number of clusters. The aggregator responsible for scheduling the charge of the vehicles has two goals…
▽ More
In this paper, we introduce a scalable model for the aggregate electricity demand of a fleet of electric vehicles, which can provide the right balance between model simplicity and accuracy. The model is based on classification of tasks with similar energy consumption characteristics into a finite number of clusters. The aggregator responsible for scheduling the charge of the vehicles has two goals: 1) to provide a hard QoS guarantee to the vehicles at the lowest possible cost; 2) to offer load or generation following services to the wholesale market. In order to achieve these goals, we combine the scalable demand model we propose with two scheduling mechanisms, a near-optimal and a heuristic technique. The performance of the two mechanisms is compared under a realistic setting in our numerical experiments.
△ Less
Submitted 2 May, 2013; v1 submitted 24 April, 2013;
originally announced April 2013.
-
Real-Time Power Balancing via Decentralized Coordinated Home Energy Scheduling
Authors:
Tsung-Hui Chang,
Mahnoosh Alizadeh,
Anna Scaglione
Abstract:
It is anticipated that an uncoordinated operation of individual home energy management (HEM) systems in a neighborhood would have a rebound effect on the aggregate demand profile. To address this issue, this paper proposes a coordinated home energy management (CoHEM) architecture in which distributed HEM units collaborate with each other in order to keep the demand and supply balanced in their nei…
▽ More
It is anticipated that an uncoordinated operation of individual home energy management (HEM) systems in a neighborhood would have a rebound effect on the aggregate demand profile. To address this issue, this paper proposes a coordinated home energy management (CoHEM) architecture in which distributed HEM units collaborate with each other in order to keep the demand and supply balanced in their neighborhood. Assuming the energy requests by customers are random in time, we formulate the proposed CoHEM design as a multi-stage stochastic optimization problem. We propose novel models to describe the deferrable appliance load (e.g., Plug-in (Hybrid) Electric Vehicles (PHEV)), and apply approximation and decomposition techniques to handle the considered design problem in a decentralized fashion. The developed decentralized CoHEM algorithm allow the customers to locally compute their scheduling solutions using domestic user information and with message exchange between their neighbors only. Extensive simulation results demonstrate that the proposed CoHEM architecture can effectively improve real-time power balancing. Extensions to joint power procurement and real-time CoHEM scheduling are also presented.
△ Less
Submitted 16 February, 2013;
originally announced February 2013.
-
Coordinated Home Energy Management for Real-Time Power Balancing
Authors:
Tsung-Hui Chang,
Mahnoosh Alizadeh,
Anna Scaglione
Abstract:
This paper proposes a coordinated home energy management system (HEMS) architecture where the distributed residential units cooperate with each other to achieve real-time power balancing. The economic benefits for the retailer and incentives for the customers to participate in the proposed coordinated HEMS program are given. We formulate the coordinated HEMS design problem as a dynamic programming…
▽ More
This paper proposes a coordinated home energy management system (HEMS) architecture where the distributed residential units cooperate with each other to achieve real-time power balancing. The economic benefits for the retailer and incentives for the customers to participate in the proposed coordinated HEMS program are given. We formulate the coordinated HEMS design problem as a dynamic programming (DP) and use approximate DP approaches to efficiently handle the design problem. A distributed implementation algorithm based on the convex optimization based dual decomposition technique is also presented. Our focus in the current paper is on the deferrable appliances, such as Plug-in (Hybrid) Electric Vehicles (PHEV), in view of their higher impact on the grid stability. Simulation results shows that the proposed coordinated HEMS architecture can efficiently improve the real-time power balancing.
△ Less
Submitted 10 April, 2012;
originally announced April 2012.