-
Adaptive Safe Reinforcement Learning-Enabled Optimization of Battery Fast-Charging Protocols
Authors:
Myisha A. Chowdhury,
Saif S. S. Al-Wahaibi,
Qiugang Lu
Abstract:
Optimizing charging protocols is critical for reducing battery charging time and decelerating battery degradation in applications such as electric vehicles. Recently, reinforcement learning (RL) methods have been adopted for such purposes. However, RL-based methods may not ensure system (safety) constraints, which can cause irreversible damages to batteries and reduce their lifetime. To this end,…
▽ More
Optimizing charging protocols is critical for reducing battery charging time and decelerating battery degradation in applications such as electric vehicles. Recently, reinforcement learning (RL) methods have been adopted for such purposes. However, RL-based methods may not ensure system (safety) constraints, which can cause irreversible damages to batteries and reduce their lifetime. To this end, this work proposes an adaptive and safe RL framework to optimize fast charging strategies while respecting safety constraints with a high probability. In our method, any unsafe action that the RL agent decides will be projected into a safety region by solving a constrained optimization problem. The safety region is constructed using adaptive Gaussian process (GP) models, consisting of static and dynamic GPs, that learn from online experience to adaptively account for any changes in battery dynamics. Simulation results show that our method can charge the batteries rapidly with constraint satisfaction under varying operating conditions.
△ Less
Submitted 18 June, 2024;
originally announced June 2024.
-
Advancements in Glitch Subtraction Systems for Enhancing Gravitational Wave Data Analysis: A Brief Review
Authors:
Mohammad Abu Thaher Chowdhury
Abstract:
Glitches are transitory noise artifacts that degrade the detection sensitivity and accuracy of interferometric observatories such as LIGO and Virgo in gravitational wave astronomy. Reliable glitch subtraction techniques are essential for separating genuine gravitational wave signals from background noise and improving the accuracy of astrophysical investigations. This review study summarizes the m…
▽ More
Glitches are transitory noise artifacts that degrade the detection sensitivity and accuracy of interferometric observatories such as LIGO and Virgo in gravitational wave astronomy. Reliable glitch subtraction techniques are essential for separating genuine gravitational wave signals from background noise and improving the accuracy of astrophysical investigations. This review study summarizes the main glitch subtraction methods used in the industry. We talk about the efficacy of classic time-domain techniques in real-time applications, like matched filtering and regression methods. The robustness of frequency-domain approaches, such as wavelet transformations and spectral analysis, in detecting and mitigating non-stationary glitches is assessed. We also investigate sophisticated machine learning methods, demonstrating great potential in automatically identifying and eliminating intricate glitch patterns. We hope to provide a thorough understanding of these approaches' uses, difficulties, and potential for future development in gravitational wave data analysis by contrasting their advantages and disadvantages. Researchers looking to enhance glitch subtraction procedures and raise the accuracy of gravitational wave detections will find great value in this paper.
△ Less
Submitted 3 June, 2024;
originally announced June 2024.
-
Automated Hardware Logic Obfuscation Framework Using GPT
Authors:
Banafsheh Saber Latibari,
Sujan Ghimire,
Muhtasim Alam Chowdhury,
Najmeh Nazari,
Kevin Immanuel Gubbi,
Houman Homayoun,
Avesta Sasan,
Soheil Salehi
Abstract:
Obfuscation stands as a promising solution for safeguarding hardware intellectual property (IP) against a spectrum of threats including reverse engineering, IP piracy, and tampering. In this paper, we introduce Obfus-chat, a novel framework leveraging Generative Pre-trained Transformer (GPT) models to automate the obfuscation process. The proposed framework accepts hardware design netlists and key…
▽ More
Obfuscation stands as a promising solution for safeguarding hardware intellectual property (IP) against a spectrum of threats including reverse engineering, IP piracy, and tampering. In this paper, we introduce Obfus-chat, a novel framework leveraging Generative Pre-trained Transformer (GPT) models to automate the obfuscation process. The proposed framework accepts hardware design netlists and key sizes as inputs, and autonomously generates obfuscated code tailored to enhance security. To evaluate the effectiveness of our approach, we employ the Trust-Hub Obfuscation Benchmark for comparative analysis. We employed SAT attacks to assess the security of the design, along with functional verification procedures to ensure that the obfuscated design remains consistent with the original. Our results demonstrate the efficacy and efficiency of the proposed framework in fortifying hardware IP against potential threats, thus providing a valuable contribution to the field of hardware security.
△ Less
Submitted 20 May, 2024;
originally announced May 2024.
-
Analyzing Musical Characteristics of National Anthems in Relation to Global Indices
Authors:
S M Rakib Hasan,
Aakar Dhakal,
Ms. Ayesha Siddiqua,
Mohammad Mominur Rahman,
Md Maidul Islam,
Mohammed Arfat Raihan Chowdhury,
S M Masfequier Rahman Swapno,
SM Nuruzzaman Nobel
Abstract:
Music plays a huge part in sha** peoples' psychology and behavioral patterns. This paper investigates the connection between national anthems and different global indices with computational music analysis and statistical correlation analysis. We analyze national anthem musical data to determine whether certain musical characteristics are associated with peace, happiness, suicide rate, crime rate…
▽ More
Music plays a huge part in sha** peoples' psychology and behavioral patterns. This paper investigates the connection between national anthems and different global indices with computational music analysis and statistical correlation analysis. We analyze national anthem musical data to determine whether certain musical characteristics are associated with peace, happiness, suicide rate, crime rate, etc. To achieve this, we collect national anthems from 169 countries and use computational music analysis techniques to extract pitch, tempo, beat, and other pertinent audio features. We then compare these musical characteristics with data on different global indices to ascertain whether a significant correlation exists. Our findings indicate that there may be a correlation between the musical characteristics of national anthems and the indices we investigated. The implications of our findings for music psychology and policymakers interested in promoting social well-being are discussed. This paper emphasizes the potential of musical data analysis in social research and offers a novel perspective on the relationship between music and social indices. The source code and data are made open-access for reproducibility and future research endeavors. It can be accessed at http://bit.ly/na_code.
△ Less
Submitted 4 April, 2024;
originally announced April 2024.
-
HW-V2W-Map: Hardware Vulnerability to Weakness Map** Framework for Root Cause Analysis with GPT-assisted Mitigation Suggestion
Authors:
Yu-Zheng Lin,
Muntasir Mamun,
Muhtasim Alam Chowdhury,
Shuyu Cai,
Mingyu Zhu,
Banafsheh Saber Latibari,
Kevin Immanuel Gubbi,
Najmeh Nazari Bavarsad,
Arjun Caputo,
Avesta Sasan,
Houman Homayoun,
Setareh Rafatirad,
Pratik Satam,
Soheil Salehi
Abstract:
The escalating complexity of modern computing frameworks has resulted in a surge in the cybersecurity vulnerabilities reported to the National Vulnerability Database (NVD) by practitioners. Despite the fact that the stature of NVD is one of the most significant databases for the latest insights into vulnerabilities, extracting meaningful trends from such a large amount of unstructured data is stil…
▽ More
The escalating complexity of modern computing frameworks has resulted in a surge in the cybersecurity vulnerabilities reported to the National Vulnerability Database (NVD) by practitioners. Despite the fact that the stature of NVD is one of the most significant databases for the latest insights into vulnerabilities, extracting meaningful trends from such a large amount of unstructured data is still challenging without the application of suitable technological methodologies. Previous efforts have mostly concentrated on software vulnerabilities; however, a holistic strategy incorporates approaches for mitigating vulnerabilities, score prediction, and a knowledge-generating system that may extract relevant insights from the Common Weakness Enumeration (CWE) and Common Vulnerability Exchange (CVE) databases is notably absent. As the number of hardware attacks on Internet of Things (IoT) devices continues to rapidly increase, we present the Hardware Vulnerability to Weakness Map** (HW-V2W-Map) Framework, which is a Machine Learning (ML) framework focusing on hardware vulnerabilities and IoT security. The architecture that we have proposed incorporates an Ontology-driven Storytelling framework, which automates the process of updating the ontology in order to recognize patterns and evolution of vulnerabilities over time and provides approaches for mitigating the vulnerabilities. The repercussions of vulnerabilities can be mitigated as a result of this, and conversely, future exposures can be predicted and prevented. Furthermore, our proposed framework utilized Generative Pre-trained Transformer (GPT) Large Language Models (LLMs) to provide mitigation suggestions.
△ Less
Submitted 20 December, 2023;
originally announced December 2023.
-
Glitch subtraction from gravitational wave data using adaptive spline fitting
Authors:
Soumya D. Mohanty,
Mohammad A. T. Chowdhury
Abstract:
Transient signals of instrumental and environmental origins ("glitches") in gravitational wave data elevate the false alarm rate of searches for astrophysical signals and reduce their sensitivity. Glitches that directly overlap astrophysical signals hinder their detection and worsen parameter estimation errors. As the fraction of data occupied by detectable astrophysical signals will be higher in…
▽ More
Transient signals of instrumental and environmental origins ("glitches") in gravitational wave data elevate the false alarm rate of searches for astrophysical signals and reduce their sensitivity. Glitches that directly overlap astrophysical signals hinder their detection and worsen parameter estimation errors. As the fraction of data occupied by detectable astrophysical signals will be higher in next generation detectors, such problematic overlaps could become more frequent. These adverse effects of glitches can be mitigated by estimating and subtracting them out from the data, but their unpredictable waveforms and large morphological diversity pose a challenge. Subtraction of glitches using data from auxiliary sensors as predictors works but not for the majority of cases. Thus, there is a need for nonparametric glitch mitigation methods that do not require auxiliary data, work for a large variety of glitches, and have minimal effect on astrophysical signals in the case of overlaps. In order to cope with the high rate of glitches, it is also desirable that such methods be computationally fast. We show that adaptive spline fitting, in which the placement of free knots is optimized to estimate both smooth and non-smooth curves in noisy data, offers a promising approach to satisfying these requirements for broadband short-duration glitches, the type that appear quite frequently. The method is demonstrated on glitches drawn from three distinct classes in the Gravity Spy database as well as on the glitch that overlapped the binary neutron star signal GW170817. The impact of glitch subtraction on the GW170817 signal, or those like it injected into the data, is seen to be negligible.
△ Less
Submitted 29 March, 2023; v1 submitted 6 January, 2023;
originally announced January 2023.
-
A Novel Entropy-Maximizing TD3-based Reinforcement Learning for Automatic PID Tuning
Authors:
Myisha A. Chowdhury,
Qiugang Lu
Abstract:
Proportional-integral-derivative (PID) controllers have been widely used in the process industry. However, the satisfactory control performance of a PID controller depends strongly on the tuning parameters. Conventional PID tuning methods require extensive knowledge of the system model, which is not always known especially in the case of complex dynamical systems. In contrast, reinforcement learni…
▽ More
Proportional-integral-derivative (PID) controllers have been widely used in the process industry. However, the satisfactory control performance of a PID controller depends strongly on the tuning parameters. Conventional PID tuning methods require extensive knowledge of the system model, which is not always known especially in the case of complex dynamical systems. In contrast, reinforcement learning-based PID tuning has gained popularity since it can treat PID tuning as a black-box problem and deliver the optimal PID parameters without requiring explicit process models. In this paper, we present a novel entropy-maximizing twin-delayed deep deterministic policy gradient (EMTD3) method for automating the PID tuning. In the proposed method, an entropy-maximizing stochastic actor is employed at the beginning to encourage the exploration of the action space. Then a deterministic actor is deployed to focus on local exploitation and discover the optimal solution. The incorporation of the entropy-maximizing term can significantly improve the sample efficiency and assist in fast convergence to the global solution. Our proposed method is applied to the PID tuning of a second-order system to verify its effectiveness in improving the sample efficiency and discovering the optimal PID parameters compared to traditional TD3.
△ Less
Submitted 5 October, 2022;
originally announced October 2022.
-
A Machine Learning Approach to Determine the Semantic Versioning Type of npm Packages Releases
Authors:
Rabe Abdalkareem,
Md Atique Reza Chowdhury,
Emad Shihab
Abstract:
Semantic versioning policy is widely used to indicate the level of changes in a package release. Unfortunately, there are many cases where developers do not respect the semantic versioning policy, leading to the breakage of dependent applications. To reduce such cases, we proposed using machine learning (ML) techniques to effectively predict the new release type, i.e., patch, minor, major, in orde…
▽ More
Semantic versioning policy is widely used to indicate the level of changes in a package release. Unfortunately, there are many cases where developers do not respect the semantic versioning policy, leading to the breakage of dependent applications. To reduce such cases, we proposed using machine learning (ML) techniques to effectively predict the new release type, i.e., patch, minor, major, in order to properly determine the semantic versioning type. To perform our prediction, we mined and used a number of features about a release, such as the complexity of the changed code, change types, and development activities. We then used four ML classifiers. To evaluate the performance of the proposed ML classifiers, we conducted an empirical study on 31 JavaScript packages containing a total of approximately 6,260 releases. We started by extracting 41 release level features from historical data of packages' source code and repositories. Then, we used four machine learning classifiers, namely XGBoost, Random Forest, Decision Tree, and Logistic Regression. We found that the XGBoost classifiers performed the best, achieving median ROC AUC values of 0.78, 0.69, and 0.74 for major, minor, and patch releases, respectively. We also found that features related to the change types in a release are the best predictors group of features in determining the semantic versioning type. Finally, we studied the generalizability of determining the semantic versioning type by applying cross-package validation. Our results showed that the general classifier achieved median ROC AUC values of 0.76, 0.69, and 0.75 for major, minor, and patch releases.
△ Less
Submitted 12 April, 2022;
originally announced April 2022.
-
Stability-Preserving Automatic Tuning of PID Control with Reinforcement Learning
Authors:
Ayub I. Lakhani,
Myisha A. Chowdhury,
Qiugang Lu
Abstract:
PID control has been the dominant control strategy in the process industry due to its simplicity in design and effectiveness in controlling a wide range of processes. However, traditional methods on PID tuning often require extensive domain knowledge and field experience. To address the issue, this work proposes an automatic PID tuning framework based on reinforcement learning (RL), particularly t…
▽ More
PID control has been the dominant control strategy in the process industry due to its simplicity in design and effectiveness in controlling a wide range of processes. However, traditional methods on PID tuning often require extensive domain knowledge and field experience. To address the issue, this work proposes an automatic PID tuning framework based on reinforcement learning (RL), particularly the deterministic policy gradient (DPG) method. Different from existing studies on using RL for PID tuning, in this work, we consider the closed-loop stability throughout the RL-based tuning process. In particular, we propose a novel episodic tuning framework that allows for an episodic closed-loop operation under selected PID parameters where the actor and critic networks are updated once at the end of each episode. To ensure the closed-loop stability during the tuning, we initialize the training with a conservative but stable baseline PID controller and the resultant reward is used as a benchmark score. A supervisor mechanism is used to monitor the running reward (e.g., tracking error) at each step in the episode. As soon as the running reward exceeds the benchmark score, the underlying controller is replaced by the baseline controller as an early correction to prevent instability. Moreover, we use layer normalization to standardize the input to each layer in actor and critic networks to overcome the issue of policy saturation at action bounds, to ensure the convergence to the optimum. The developed methods are validated through setpoint tracking experiments on a second-order plus dead-time system. Simulation results show that with our scheme, the closed-loop stability can be maintained throughout RL explorations and the explored PID parameters by the RL agent converge quickly to the optimum.
△ Less
Submitted 11 February, 2022; v1 submitted 30 December, 2021;
originally announced December 2021.
-
A Multiobjective Mathematical Model of Reverse Logistics for Inventory Management with Environmental Impacts: An Application in Industry
Authors:
M. Forkan. M. M. Rizvi,
M. A. M. Chowdhury
Abstract:
We propose new mathematical models of inventory management in a reverse logistics system. The proposed models extend the model introduced by Nahmias and Rivera with the assumption that the demand for newly produced and repaired (remanufacturing) items are not the same. We derive two mathematical models and formulate unconstrained and constrained optimization problems to optimize the holding cost.…
▽ More
We propose new mathematical models of inventory management in a reverse logistics system. The proposed models extend the model introduced by Nahmias and Rivera with the assumption that the demand for newly produced and repaired (remanufacturing) items are not the same. We derive two mathematical models and formulate unconstrained and constrained optimization problems to optimize the holding cost. We also introduce the solution procedures of the proposed problems. The exactness of the proposed solutions has been tested by numerical experiments. Nowadays, it is an essential commitment for industries to reduce greenhouse gas (GHG) emissions as well as energy consumption during the production and remanufacturing processes. This paper also extends along this line of research, and therewith develops a three-objective mathematical model and provides an algorithm to obtain the Pareto solution.
△ Less
Submitted 23 January, 2021;
originally announced January 2021.
-
Centralities for Networks with Consumable Resources
Authors:
Hayato Ushijima-Mwesigwa,
Zadid Khan,
Mashrur A. Chowdhury,
Ilya Safro
Abstract:
Identification of influential nodes is an important step in understanding and controlling the dynamics of information, traffic and spreading processes in networks. As a result, a number of centrality measures have been proposed and used across different application domains. At the heart of many of these measures, lies an assumption describing the manner in which traffic (of information, social act…
▽ More
Identification of influential nodes is an important step in understanding and controlling the dynamics of information, traffic and spreading processes in networks. As a result, a number of centrality measures have been proposed and used across different application domains. At the heart of many of these measures, lies an assumption describing the manner in which traffic (of information, social actors, particles, etc.) flows through the network. For example, some measures only count shortest paths while others consider random walks.
This paper considers a spreading process in which a resource necessary for transit is partially consumed along the way while being refilled at special nodes on the network. Examples include fuel consumption of vehicles together with refueling stations, information loss during dissemination with error correcting nodes, and consumption of ammunition of military troops while moving.
We propose generalizations of the well-known measures of betweenness, random walk betweenness, and Katz centralities to take such a spreading process with consumable resources into account. In order to validate the results, experiments on real-world networks are carried out by develo** simulations based on well-known models such as Susceptible-Infected-Recovered and congestion with respect to particle hop** from vehicular flow theory. The simulation-based models are shown to be highly correlated to the proposed centrality measures.
△ Less
Submitted 2 March, 2019;
originally announced March 2019.
-
Optimal Installation for Electric Vehicle Wireless Charging Lanes
Authors:
Hayato Ushijima-Mwesigwa,
MD Zadid Khan,
Mashrur A Chowdhury,
Ilya Safro
Abstract:
Range anxiety, the persistent worry about not having enough battery power to complete a trip, remains one of the major obstacles to widespread electric-vehicle adoption. As cities look to attract more users to adopt electric vehicles, the emergence of wireless in-motion car charging technology presents itself as a solution to range anxiety. For a limited budget, cities could face the decision prob…
▽ More
Range anxiety, the persistent worry about not having enough battery power to complete a trip, remains one of the major obstacles to widespread electric-vehicle adoption. As cities look to attract more users to adopt electric vehicles, the emergence of wireless in-motion car charging technology presents itself as a solution to range anxiety. For a limited budget, cities could face the decision problem of where to install these wireless charging units. With a heavy price tag, an installation without a careful study can lead to inefficient use of limited resources. In this work, we model the installation of wireless charging units as an integer programming problem. We use our basic formulation as a building block for different realistic scenarios, carry out experiments using real geospatial data, and compare our results to different heuristics.
△ Less
Submitted 12 August, 2018; v1 submitted 2 April, 2017;
originally announced April 2017.