-
PROZE: Generating Parameterized Unit Tests Informed by Runtime Data
Authors:
Deepika Tiwari,
Yogya Gamage,
Martin Monperrus,
Benoit Baudry
Abstract:
Typically, a conventional unit test (CUT) verifies the expected behavior of the unit under test through one specific input / output pair. In contrast, a parameterized unit test (PUT) receives a set of inputs as arguments, and contains assertions that are expected to hold true for all these inputs. PUTs increase test quality, as they assess correctness on a broad scope of inputs and behaviors. Howe…
▽ More
Typically, a conventional unit test (CUT) verifies the expected behavior of the unit under test through one specific input / output pair. In contrast, a parameterized unit test (PUT) receives a set of inputs as arguments, and contains assertions that are expected to hold true for all these inputs. PUTs increase test quality, as they assess correctness on a broad scope of inputs and behaviors. However, defining assertions over a set of inputs is a hard task for developers, which limits the adoption of PUTs in practice.
In this paper, we address the problem of finding oracles for PUTs that hold over multiple inputs. We design a system called PROZE, that generates PUTs by identifying developer-written assertions that are valid for more than one test input. We implement our approach as a two-step methodology: first, at runtime, we collect inputs for a target method that is invoked within a CUT; next, we isolate the valid assertions of the CUT to be used within a PUT.
We evaluate our approach against 5 real-world Java modules, and collect valid inputs for 128 target methods from test and field executions. We generate 2,287 PUTs, which invoke the target methods with a significantly larger number of test inputs than the original CUTs. We execute the PUTs and find 217 that provably demonstrate that their oracles hold for a larger range of inputs than envisioned by the developers. From a testing theory perspective, our results show that developers express assertions within CUTs that are general enough to hold beyond one particular input.
△ Less
Submitted 30 June, 2024;
originally announced July 2024.
-
Fantastyc: Blockchain-based Federated Learning Made Secure and Practical
Authors:
William Boitier,
Antonella Del Pozzo,
Álvaro García-Pérez,
Stephane Gazut,
Pierre Jobic,
Alexis Lemaire,
Erwan Mahe,
Aurelien Mayoue,
Maxence Perion,
Deepika Singh,
Tuanir Franca Rezende,
Sara Tucci-Piergiovanni
Abstract:
Federated Learning is a decentralized framework that enables multiple clients to collaboratively train a machine learning model under the orchestration of a central server without sharing their local data. The centrality of this framework represents a point of failure which is addressed in literature by blockchain-based federated learning approaches. While ensuring a fully-decentralized solution w…
▽ More
Federated Learning is a decentralized framework that enables multiple clients to collaboratively train a machine learning model under the orchestration of a central server without sharing their local data. The centrality of this framework represents a point of failure which is addressed in literature by blockchain-based federated learning approaches. While ensuring a fully-decentralized solution with traceability, such approaches still face several challenges about integrity, confidentiality and scalability to be practically deployed. In this paper, we propose Fantastyc, a solution designed to address these challenges that have been never met together in the state of the art.
△ Less
Submitted 5 June, 2024;
originally announced June 2024.
-
An empirical study of bloated dependencies in CommonJS packages
Authors:
Yuxin Liu,
Deepika Tiwari,
Cristian Bogdan,
Benoit Baudry
Abstract:
JavaScript packages are notoriously prone to bloat, a factor that significantly impacts the performance and maintainability of web applications. While web bundlers and tree-shaking can mitigate this issue in client-side applications at the function level, they cannot effectively detect and remove bloat in server-side applications. In this paper, we conduct an empirical study to investigate the blo…
▽ More
JavaScript packages are notoriously prone to bloat, a factor that significantly impacts the performance and maintainability of web applications. While web bundlers and tree-shaking can mitigate this issue in client-side applications at the function level, they cannot effectively detect and remove bloat in server-side applications. In this paper, we conduct an empirical study to investigate the bloated dependencies that are entirely unused within server-side applications. Our study focuses on applications built with the widely used and highly dynamic CommonJS module system. We propose a trace-based dynamic analysis that monitors file access, to determine which dependencies are not accessed during runtime. To conduct our study, we curate an original dataset of 92 CommonJS packages with a median test coverage of 96.9% and a total of 50,661 dependencies. Our dynamic analysis identifies and successfully removes 50.7% of these dependencies while maintaining the correct build of all packages. Furthermore, we find that 14.9% of directly used dependencies and 51.3% of indirect dependencies are bloated. A key insight is that focusing on removing only the direct bloated dependencies by cleaning the package.json file, also removes a significant share of unnecessary bloated indirect dependencies. Compared to the state-of-the-art dynamic debloating technique, our analysis based on file accesses has fewer false positives, and demonstrates higher accuracy in detecting bloated dependencies. Our findings suggest that native support for dependency debloating in package managers could significantly alleviate the burden of maintaining dependencies.
△ Less
Submitted 28 May, 2024;
originally announced May 2024.
-
A generalised mid summability in Banach spaces
Authors:
Aleena Philip,
Deepika Baweja
Abstract:
In this paper, we study the notion of mid summability in a general setting using the duality theory of sequence spaces. We define the vector valued sequence space $λ^{mid}(X)$ corresponding to a Banach space $X$ and sequence space $λ$. We prove that $λ^{mid}(\cdot)$ can be placed in a chain with the vector valued sequence spaces $λ^{s}(\cdot)$ and $λ^{w}(\cdot)$. Consequently, we define mid $λ$-su…
▽ More
In this paper, we study the notion of mid summability in a general setting using the duality theory of sequence spaces. We define the vector valued sequence space $λ^{mid}(X)$ corresponding to a Banach space $X$ and sequence space $λ$. We prove that $λ^{mid}(\cdot)$ can be placed in a chain with the vector valued sequence spaces $λ^{s}(\cdot)$ and $λ^{w}(\cdot)$. Consequently, we define mid $λ$-summing operators and obtain the maximality of these operator ideals for a suitably restricted $λ$. Furthermore, we define a tensor norm using the vector valued sequence spaces $λ^{s}(\cdot)$ and $λ^{mid}(\cdot)$, and establish its correspondence with the operator ideal of absolutely mid $λ$-summing operators.
△ Less
Submitted 27 May, 2024;
originally announced May 2024.
-
UAV-assisted C-RAN for On-demand Cellular Coverage: Opportunities and Challenges
Authors:
Byomakesh Mahapatra,
Deepika Gupta,
Pankaj Kumar Sharma
Abstract:
The deployment of beyond fifth-generation (5G) infrastructure over disaster-affected regions, temporary hotspot situations (e.g., massive gatherings, etc.), complex terrains (e.g., sea, hills, marshes, etc.) poses numerous challenges for cellular service providers. Recently, unmanned aerial vehicles (UAVs) have emerged as potential candidates to overcome the aforementioned technical issues based o…
▽ More
The deployment of beyond fifth-generation (5G) infrastructure over disaster-affected regions, temporary hotspot situations (e.g., massive gatherings, etc.), complex terrains (e.g., sea, hills, marshes, etc.) poses numerous challenges for cellular service providers. Recently, unmanned aerial vehicles (UAVs) have emerged as potential candidates to overcome the aforementioned technical issues based on their multi-role capabilities to serve as aerial base stations, mobile relays, and flying wireless access points. As such, the UAVs can act as portable platforms that can be deployed immediately on demand without requiring massive ground infrastructure to support wireless services. This article introduces the integration of UAVs to cloud radio access networks (C-RAN) for beyond 5G applications. The article mainly focuses on the underlying opportunities and challenges to realize the UAV-assisted C-RAN (UC-RAN) architecture in view of three generic application scenarios, i.e., disaster management, hotspots, and complex terrains. A preliminary performance analysis via simulation is further provided for the proposed UC-RAN under hotspot application scenario based on the relevant metrics.
△ Less
Submitted 24 May, 2024;
originally announced May 2024.
-
Implicit-explicit Crank-Nicolson scheme for Oseen's equation at high Reynolds number
Authors:
Erik Burman,
Deepika Garg,
Johnny Guzman
Abstract:
In this paper we continue the work on implicit-explicit (IMEX) time discretizations for the incompressible Oseen equations that we started in \cite{BGG23} (E. Burman, D. Garg, J. Guzmàn, {\emph{Implicit-explicit time discretization for Oseen's equation at high Reynolds number with application to fractional step methods}}, SIAM J. Numer. Anal., 61, 2859--2886, 2023). The pressure velocity coupling…
▽ More
In this paper we continue the work on implicit-explicit (IMEX) time discretizations for the incompressible Oseen equations that we started in \cite{BGG23} (E. Burman, D. Garg, J. Guzmàn, {\emph{Implicit-explicit time discretization for Oseen's equation at high Reynolds number with application to fractional step methods}}, SIAM J. Numer. Anal., 61, 2859--2886, 2023). The pressure velocity coupling and the viscous terms are treated implicitly, while the convection term is treated explicitly using extrapolation. Herein we focus on the implicit-explicit Crank-Nicolson method for time discretization. For the discretization in space we consider finite element methods with stabilization on the gradient jumps. The stabilizing terms ensures inf-sup stability for equal order interpolation and robustness at high Reynolds number. Under suitable Courant conditions we prove stability of the implicit-explicit Crank-Nicolson scheme in this regime. The stabilization allows us to prove error estimates of order $O(h^{k+\frac12} + τ^2)$. Here $h$ is the mesh parameter, $k$ the polynomial order and $τ$ the time step. Finally we discuss some fractional step methods that are implied by the IMEX scheme. Numerical examples are reported comparing the different methods when applied to the Navier-Stokes' equations.
△ Less
Submitted 21 May, 2024;
originally announced May 2024.
-
Serializing Java Objects in Plain Code
Authors:
Julian Wachter,
Deepika Tiwari,
Martin Monperrus,
Benoit Baudry
Abstract:
In managed languages, serialization of objects is typically done in bespoke binary formats such as Protobuf, or markup languages such as XML or JSON. The major limitation of these formats is readability. Human developers cannot read binary code, and in most cases, suffer from the syntax of XML or JSON. This is a major issue when objects are meant to be embedded and read in source code, such as in…
▽ More
In managed languages, serialization of objects is typically done in bespoke binary formats such as Protobuf, or markup languages such as XML or JSON. The major limitation of these formats is readability. Human developers cannot read binary code, and in most cases, suffer from the syntax of XML or JSON. This is a major issue when objects are meant to be embedded and read in source code, such as in test cases. To address this problem, we propose plain-code serialization. Our core idea is to serialize objects observed at runtime in the native syntax of a programming language. We realize this vision in the context of Java, and demonstrate a prototype which serializes Java objects to Java source code. The resulting source faithfully reconstructs the objects seen at runtime. Our prototype is called ProDJ and is publicly available. We experiment with ProDJ to successfully plain-code serialize 174,699 objects observed during the execution of 4 open-source Java applications. Our performance measurement shows that the performance impact is not noticeable.
△ Less
Submitted 21 May, 2024; v1 submitted 18 May, 2024;
originally announced May 2024.
-
Automating REST API Postman Test Cases Using LLM
Authors:
S Deepika Sri,
Mohammed Aadil S,
Sanjjushri Varshini R,
Raja CSP Raman,
Gopinath Rajagopal,
S Taranath Chan
Abstract:
In the contemporary landscape of technological advancements, the automation of manual processes is crucial, compelling the demand for huge datasets to effectively train and test machines. This research paper is dedicated to the exploration and implementation of an automated approach to generate test cases specifically using Large Language Models. The methodology integrates the use of Open AI to en…
▽ More
In the contemporary landscape of technological advancements, the automation of manual processes is crucial, compelling the demand for huge datasets to effectively train and test machines. This research paper is dedicated to the exploration and implementation of an automated approach to generate test cases specifically using Large Language Models. The methodology integrates the use of Open AI to enhance the efficiency and effectiveness of test case generation for training and evaluating Large Language Models. This formalized approach with LLMs simplifies the testing process, making it more efficient and comprehensive. Leveraging natural language understanding, LLMs can intelligently formulate test cases that cover a broad range of REST API properties, ensuring comprehensive testing. The model that is developed during the research is trained using manually collected postman test cases or instances for various Rest APIs. LLMs enhance the creation of Postman test cases by automating the generation of varied and intricate test scenarios. Postman test cases offer streamlined automation, collaboration, and dynamic data handling, providing a user-friendly and efficient approach to API testing compared to traditional test cases. Thus, the model developed not only conforms to current technological standards but also holds the promise of evolving into an idea of substantial importance in future technological advancements.
△ Less
Submitted 16 April, 2024;
originally announced April 2024.
-
HCiM: ADC-Less Hybrid Analog-Digital Compute in Memory Accelerator for Deep Learning Workloads
Authors:
Shubham Negi,
Utkarsh Saxena,
Deepika Sharma,
Kaushik Roy
Abstract:
Analog Compute-in-Memory (CiM) accelerators are increasingly recognized for their efficiency in accelerating Deep Neural Networks (DNN). However, their dependence on Analog-to-Digital Converters (ADCs) for accumulating partial sums from crossbars leads to substantial power and area overhead. Moreover, the high area overhead of ADCs constrains the throughput due to the limited number of ADCs that c…
▽ More
Analog Compute-in-Memory (CiM) accelerators are increasingly recognized for their efficiency in accelerating Deep Neural Networks (DNN). However, their dependence on Analog-to-Digital Converters (ADCs) for accumulating partial sums from crossbars leads to substantial power and area overhead. Moreover, the high area overhead of ADCs constrains the throughput due to the limited number of ADCs that can be integrated per crossbar. An approach to mitigate this issue involves the adoption of extreme low-precision quantization (binary or ternary) for partial sums. Training based on such an approach eliminates the need for ADCs. While this strategy effectively reduces ADC costs, it introduces the challenge of managing numerous floating-point scale factors, which are trainable parameters like DNN weights. These scale factors must be multiplied with the binary or ternary outputs at the columns of the crossbar to ensure system accuracy. To that effect, we propose an algorithm-hardware co-design approach, where DNNs are first trained with quantization-aware training. Subsequently, we introduce HCiM, an ADC-Less Hybrid Analog-Digital CiM accelerator. HCiM uses analog CiM crossbars for performing Matrix-Vector Multiplication operations coupled with a digital CiM array dedicated to processing scale factors. This digital CiM array can execute both addition and subtraction operations within the memory array, thus enhancing processing speed. Additionally, it exploits the inherent sparsity in ternary quantization to achieve further energy savings. Compared to an analog CiM baseline architecture using 7 and 4-bit ADC, HCiM achieves energy reductions up to 28% and 12%, respectively
△ Less
Submitted 20 March, 2024;
originally announced March 2024.
-
Modern Code Reviews -- Survey of Literature and Practice
Authors:
Deepika Badampudi,
Michael Unterkalmsteiner,
Ricardo Britto
Abstract:
Background: Modern Code Review (MCR) is a lightweight alternative to traditional code inspections. While secondary studies on MCR exist, it is unknown whether the research community has targeted themes that practitioners consider important. Objectives: The objectives are to provide an overview of MCR research, analyze the practitioners' opinions on the importance of MCR research, investigate the a…
▽ More
Background: Modern Code Review (MCR) is a lightweight alternative to traditional code inspections. While secondary studies on MCR exist, it is unknown whether the research community has targeted themes that practitioners consider important. Objectives: The objectives are to provide an overview of MCR research, analyze the practitioners' opinions on the importance of MCR research, investigate the alignment between research and practice, and propose future MCR research avenues. Method: We conducted a systematic map** study to survey state of the art until and including 2021, employed the Q-Methodology to analyze the practitioners' perception of the relevance of MCR research, and analyzed the primary studies' research impact. Results: We analyzed 244 primary studies, resulting in five themes. As a result of the 1,300 survey data points, we found that the respondents are positive about research investigating the impact of MCR on product quality and MCR process properties. In contrast, they are negative about human factor- and support systems-related research. Conclusion: These results indicate a misalignment between the state of the art and the themes deemed important by most survey respondents. Researchers should focus on solutions that can improve the state of MCR practice. We provide an MCR research agenda that can potentially increase the impact of MCR research.
△ Less
Submitted 29 February, 2024;
originally announced March 2024.
-
Help Me to Understand this Commit! -- A Vision for Contextualized Code Reviews
Authors:
Michael Unterkalmsteiner,
Deepika Badampudi,
Ricardo Britto,
Nauman bin Ali
Abstract:
Background: Modern Code Review (MCR) is a key component for delivering high-quality software and sharing knowledge among developers. Effective reviews require an in-depth understanding of the code and demand from the reviewers to contextualize the change from different perspectives. Aim: While there is a plethora of research on solutions that support developers to understand changed code, we have…
▽ More
Background: Modern Code Review (MCR) is a key component for delivering high-quality software and sharing knowledge among developers. Effective reviews require an in-depth understanding of the code and demand from the reviewers to contextualize the change from different perspectives. Aim: While there is a plethora of research on solutions that support developers to understand changed code, we have observed that many provide only narrow, specialized insights and very few aggregate information in a meaningful manner. Therefore, we aim to provide a vision of improving code understanding in MCR. Method: We classified 53 research papers suggesting proposals to improve MCR code understanding. We use this classification, the needs expressed by code reviewers from previous research, and the information we have not found in the literature for extrapolation. Results: We identified four major types of support systems and suggest an environment for contextualized code reviews. Furthermore, we illustrate with a set of scenarios how such an environment would improve the effectiveness of code reviews. Conclusions: Current research focuses mostly on providing narrow support for developers. We outline a vision for how MCR can be improved by using context and reducing the cognitive load on developers. We hope our vision can foster future advancements in development environments.
△ Less
Submitted 14 February, 2024;
originally announced February 2024.
-
Long-form evaluation of model editing
Authors:
Domenic Rosati,
Robie Gonzales,
**kun Chen,
Xuemin Yu,
Melis Erkan,
Yahya Kayani,
Satya Deepika Chavatapalli,
Frank Rudzicz,
Hassan Sajjad
Abstract:
Evaluations of model editing currently only use the `next few token' completions after a prompt. As a result, the impact of these methods on longer natural language generation is largely unknown. We introduce long-form evaluation of model editing (LEME) a novel evaluation protocol that measures the efficacy and impact of model editing in long-form generative settings. Our protocol consists of a ma…
▽ More
Evaluations of model editing currently only use the `next few token' completions after a prompt. As a result, the impact of these methods on longer natural language generation is largely unknown. We introduce long-form evaluation of model editing (LEME) a novel evaluation protocol that measures the efficacy and impact of model editing in long-form generative settings. Our protocol consists of a machine-rated survey and a classifier which correlates well with human ratings. Importantly, we find that our protocol has very little relationship with previous short-form metrics (despite being designed to extend efficacy, generalization, locality, and portability into a long-form setting), indicating that our method introduces a novel set of dimensions for understanding model editing methods. Using this protocol, we benchmark a number of model editing techniques and present several findings including that, while some methods (ROME and MEMIT) perform well in making consistent edits within a limited scope, they suffer much more from factual drift than other methods. Finally, we present a qualitative analysis that illustrates common failure modes in long-form generative settings including internal consistency, lexical cohesion, and locality issues.
△ Less
Submitted 29 March, 2024; v1 submitted 14 February, 2024;
originally announced February 2024.
-
Next-Generation Teleophthalmology: AI-enabled Quality Assessment Aiding Remote Smartphone-based Consultation
Authors:
Dhruv Srikanth,
Jayang Gurung,
N Satya Deepika,
Vineet Joshi,
Pravin Vaddavalli,
Soumya Jana
Abstract:
Blindness and other eye diseases are a global health concern, particularly in low- and middle-income countries like India. In this regard, during the COVID-19 pandemic, teleophthalmology became a lifeline, and the Grabi attachment for smartphone-based eye imaging gained in use. However, quality of user-captured image often remained inadequate, requiring clinician vetting and delays. In this backdr…
▽ More
Blindness and other eye diseases are a global health concern, particularly in low- and middle-income countries like India. In this regard, during the COVID-19 pandemic, teleophthalmology became a lifeline, and the Grabi attachment for smartphone-based eye imaging gained in use. However, quality of user-captured image often remained inadequate, requiring clinician vetting and delays. In this backdrop, we propose an AI-based quality assessment system with instant feedback mimicking clinicians' judgments and tested on patient-captured images. Dividing the complex problem hierarchically, here we tackle a nontrivial part, and demonstrate a proof of the concept.
△ Less
Submitted 11 February, 2024;
originally announced February 2024.
-
mmID: High-Resolution mmWave Imaging for Human Identification
Authors:
Sakila S. Jayaweera,
Sai Deepika Regani,
Yuqian Hu,
Beibei Wang,
K. J. Ray Liu
Abstract:
Achieving accurate human identification through RF imaging has been a persistent challenge, primarily attributed to the limited aperture size and its consequent impact on imaging resolution. The existing imaging solution enables tasks such as pose estimation, activity recognition, and human tracking based on deep neural networks by estimating skeleton joints. In contrast to estimating joints, this…
▽ More
Achieving accurate human identification through RF imaging has been a persistent challenge, primarily attributed to the limited aperture size and its consequent impact on imaging resolution. The existing imaging solution enables tasks such as pose estimation, activity recognition, and human tracking based on deep neural networks by estimating skeleton joints. In contrast to estimating joints, this paper proposes to improve imaging resolution by estimating the human figure as a whole using conditional generative adversarial networks (cGAN). In order to reduce training complexity, we use an estimated spatial spectrum using the MUltiple SIgnal Classification (MUSIC) algorithm as input to the cGAN. Our system generates environmentally independent, high-resolution images that can extract unique physical features useful for human identification. We use a simple convolution layers-based classification network to obtain the final identification result. From the experimental results, we show that resolution of the image produced by our trained generator is high enough to enable human identification. Our finding indicates high-resolution accuracy with 5% mean silhouette difference to the Kinect device. Extensive experiments in different environments on multiple testers demonstrate that our system can achieve 93% overall test accuracy in unseen environments for static human target identification.
△ Less
Submitted 1 February, 2024;
originally announced February 2024.
-
Generative AI to Generate Test Data Generators
Authors:
Benoit Baudry,
Khashayar Etemadi,
Sen Fang,
Yogya Gamage,
Yi Liu,
Yuxin Liu,
Martin Monperrus,
Javier Ron,
André Silva,
Deepika Tiwari
Abstract:
Generating fake data is an essential dimension of modern software testing, as demonstrated by the number and significance of data faking libraries. Yet, developers of faking libraries cannot keep up with the wide range of data to be generated for different natural languages and domains. In this paper, we assess the ability of generative AI for generating test data in different domains. We design t…
▽ More
Generating fake data is an essential dimension of modern software testing, as demonstrated by the number and significance of data faking libraries. Yet, developers of faking libraries cannot keep up with the wide range of data to be generated for different natural languages and domains. In this paper, we assess the ability of generative AI for generating test data in different domains. We design three types of prompts for Large Language Models (LLMs), which perform test data generation tasks at different levels of integrability: 1) raw test data generation, 2) synthesizing programs in a specific language that generate useful test data, and 3) producing programs that use state-of-the-art faker libraries. We evaluate our approach by prompting LLMs to generate test data for 11 domains. The results show that LLMs can successfully generate realistic test data generators in a wide range of domains at all three levels of integrability.
△ Less
Submitted 14 June, 2024; v1 submitted 31 January, 2024;
originally announced January 2024.
-
Advancing Ante-Hoc Explainable Models through Generative Adversarial Networks
Authors:
Tanmay Garg,
Deepika Vemuri,
Vineeth N Balasubramanian
Abstract:
This paper presents a novel concept learning framework for enhancing model interpretability and performance in visual classification tasks. Our approach appends an unsupervised explanation generator to the primary classifier network and makes use of adversarial training. During training, the explanation module is optimized to extract visual concepts from the classifier's latent representations, wh…
▽ More
This paper presents a novel concept learning framework for enhancing model interpretability and performance in visual classification tasks. Our approach appends an unsupervised explanation generator to the primary classifier network and makes use of adversarial training. During training, the explanation module is optimized to extract visual concepts from the classifier's latent representations, while the GAN-based module aims to discriminate images generated from concepts, from true images. This joint training scheme enables the model to implicitly align its internally learned concepts with human-interpretable visual properties. Comprehensive experiments demonstrate the robustness of our approach, while producing coherent concept activations. We analyse the learned concepts, showing their semantic concordance with object parts and visual attributes. We also study how perturbations in the adversarial training protocol impact both classification and concept acquisition. In summary, this work presents a significant step towards building inherently interpretable deep vision models with task-aligned concept representations - a key enabler for develo** trustworthy AI for real-world perception tasks.
△ Less
Submitted 3 April, 2024; v1 submitted 9 January, 2024;
originally announced January 2024.
-
Truncated, Tilted Discs as a Possible Source of Quasi-Periodic Oscillations
Authors:
A. Deepika Bollimpalli,
P. Chris Fragile,
W. Janosz Dewberry,
Włodek Kluźniak
Abstract:
Many accreting black holes and neutron stars exhibit rapid variability in their X-ray light curves, termed quasi-periodic oscillations (QPOs). The most commonly observed type is the low-frequency ($\lesssim 10$ Hz), type-C QPO, while only a handful of sources exhibit high-frequency QPOs ($\gtrsim 60$ Hz). The leading model for the type-C QPO is Lense-Thirring precession of a hot, geometrically thi…
▽ More
Many accreting black holes and neutron stars exhibit rapid variability in their X-ray light curves, termed quasi-periodic oscillations (QPOs). The most commonly observed type is the low-frequency ($\lesssim 10$ Hz), type-C QPO, while only a handful of sources exhibit high-frequency QPOs ($\gtrsim 60$ Hz). The leading model for the type-C QPO is Lense-Thirring precession of a hot, geometrically thick accretion flow that is misaligned with the black hole's spin axis. However, existing versions of this model have not taken into account the effects of a surrounding, geometrically thin disc on the precessing, inner, geometrically thick flow. In Bollimpalli et. al 2023, using a set of GRMHD simulations of tilted, truncated accretion discs, we confirmed that the outer thin disc slows down the precession rate of the precessing torus, which has direct observational implications for type-C QPOs. In this paper, we provide a detailed analysis of those simulations and compare them with an aligned truncated disc simulation. We find that the misalignment of the disc excites additional variability in the inner hot flow, which is absent in the comparable aligned-disc simulations. This suggests that the misalignment may be a crucial requirement for producing QPOs. We attribute this variability to global vertical oscillations of the inner torus at epicyclic frequencies corresponding to the transition radius. This explanation is consistent with current observations of higher frequency QPOs in black hole X-ray binary systems.
△ Less
Submitted 22 December, 2023;
originally announced December 2023.
-
Multimodal Sentiment Analysis: Perceived vs Induced Sentiments
Authors:
Aditi Aggarwal,
Deepika Varshney,
Saurabh Patel
Abstract:
Social media has created a global network where people can easily access and exchange vast information. This information gives rise to a variety of opinions, reflecting both positive and negative viewpoints. GIFs stand out as a multimedia format offering a visually engaging way for users to communicate. In this research, we propose a multimodal framework that integrates visual and textual features…
▽ More
Social media has created a global network where people can easily access and exchange vast information. This information gives rise to a variety of opinions, reflecting both positive and negative viewpoints. GIFs stand out as a multimedia format offering a visually engaging way for users to communicate. In this research, we propose a multimodal framework that integrates visual and textual features to predict the GIF sentiment. It also incorporates attributes including face emotion detection and OCR generated captions to capture the semantic aspects of the GIF. The developed classifier achieves an accuracy of 82.7% on Twitter GIFs, which is an improvement over state-of-the-art models. Moreover, we have based our research on the ReactionGIF dataset, analysing the variance in sentiment perceived by the author and sentiment induced in the reader
△ Less
Submitted 12 December, 2023;
originally announced December 2023.
-
CLASS-M: Adaptive stain separation-based contrastive learning with pseudo-labeling for histopathological image classification
Authors:
Bodong Zhang,
Hamid Manoochehri,
Man Minh Ho,
Fahimeh Fooladgar,
Yosep Chong,
Beatrice S. Knudsen,
Deepika Sirohi,
Tolga Tasdizen
Abstract:
Histopathological image classification is an important task in medical image analysis. Recent approaches generally rely on weakly supervised learning due to the ease of acquiring case-level labels from pathology reports. However, patch-level classification is preferable in applications where only a limited number of cases are available or when local prediction accuracy is critical. On the other ha…
▽ More
Histopathological image classification is an important task in medical image analysis. Recent approaches generally rely on weakly supervised learning due to the ease of acquiring case-level labels from pathology reports. However, patch-level classification is preferable in applications where only a limited number of cases are available or when local prediction accuracy is critical. On the other hand, acquiring extensive datasets with localized labels for training is not feasible. In this paper, we propose a semi-supervised patch-level histopathological image classification model, named CLASS-M, that does not require extensively labeled datasets. CLASS-M is formed by two main parts: a contrastive learning module that uses separated Hematoxylin and Eosin images generated through an adaptive stain separation process, and a module with pseudo-labels using MixUp. We compare our model with other state-of-the-art models on two clear cell renal cell carcinoma datasets. We demonstrate that our CLASS-M model has the best performance on both datasets. Our code is available at github.com/BzhangURU/Paper_CLASS-M/tree/main
△ Less
Submitted 4 January, 2024; v1 submitted 11 December, 2023;
originally announced December 2023.
-
Solar evolution models with a central black hole
Authors:
Earl P. Bellinger,
Matt E. Caplan,
Taeho Ryu,
Deepika Bollimpalli,
Warrick H. Ball,
Florian Kühnel,
R. Farmer,
S. E. de Mink,
Jørgen Christensen-Dalsgaard
Abstract:
Hawking (1971) proposed that the Sun may harbor a primordial black hole whose accretion supplies some of the solar luminosity. Such an object would have formed within the first 1 s after the Big Bang with the mass of a moon or an asteroid. These light black holes are a candidate solution to the dark matter problem, and could grow to become stellar-mass black holes (BHs) if captured by stars. Here…
▽ More
Hawking (1971) proposed that the Sun may harbor a primordial black hole whose accretion supplies some of the solar luminosity. Such an object would have formed within the first 1 s after the Big Bang with the mass of a moon or an asteroid. These light black holes are a candidate solution to the dark matter problem, and could grow to become stellar-mass black holes (BHs) if captured by stars. Here we compute the evolution of stars having such a BH at their center. We find that such objects can be surprisingly long-lived, with the lightest black holes having no influence over stellar evolution, while more massive ones consume the star over time to produce a range of observable consequences. Models of the Sun born about a BH whose mass has since grown to approximately $10^{-6}~\rm{M}_\odot$ are compatible with current observations. In this scenario, the Sun would first dim to half its current luminosity over a span of 100 Myr as the accretion starts to generate enough energy to quench nuclear reactions. The Sun would then expand into a fully-convective star, where it would shine luminously for potentially several Gyr with an enriched surface helium abundance, first as a sub-subgiant star, and later as a red straggler, before becoming a sub-solar-mass BH. We also present results for a range of stellar masses and metallicities. The unique internal structures of stars harboring BHs may make it possible for asteroseismology to discover them, should they exist. We conclude with a list of open problems and predictions.
△ Less
Submitted 11 December, 2023;
originally announced December 2023.
-
With Great Humor Comes Great Developer Engagement
Authors:
Deepika Tiwari,
Tim Toady,
Martin Monperrus,
Benoit Baudry
Abstract:
The worldwide collaborative effort for the creation of software is technically and socially demanding. The more engaged developers are, the more value they impart to the software they create. Engaged developers, such as Margaret Hamilton programming Apollo 11, can succeed in tackling the most difficult engineering tasks. In this paper, we dive deep into an original vector of engagement - humor - a…
▽ More
The worldwide collaborative effort for the creation of software is technically and socially demanding. The more engaged developers are, the more value they impart to the software they create. Engaged developers, such as Margaret Hamilton programming Apollo 11, can succeed in tackling the most difficult engineering tasks. In this paper, we dive deep into an original vector of engagement - humor - and study how it fuels developer engagement. First, we collect qualitative and quantitative data about the humorous elements present within three significant, real-world software projects: faker, which helps developers introduce humor within their tests; lolcommits, which captures a photograph after each contribution made by a developer; and volkswagen, an exercise in satire, which accidentally led to the invention of an impactful software tool. Second, through a developer survey, we receive unique insights from 125 developers, who share their real-life experiences with humor in software. Our analysis of the three case studies highlights the prevalence of humor in software, and unveils the worldwide community of developers who are enthusiastic about both software and humor. We also learn about the caveats of humor in software through the valuable insights shared by our survey respondents. We report clear evidence that, when practiced responsibly, humor increases developer engagement and supports them in addressing hard engineering and cognitive tasks. The most actionable highlight of our work is that software tests and documentation are the best locations in code to practice humor.
△ Less
Submitted 16 January, 2024; v1 submitted 4 December, 2023;
originally announced December 2023.
-
Introducing SSBD+ Dataset with a Convolutional Pipeline for detecting Self-Stimulatory Behaviours in Children using raw videos
Authors:
Vaibhavi Lokegaonkar,
Vijay Jaisankar,
Pon Deepika,
Madhav Rao,
T K Srikanth,
Sarbani Mallick,
Manjit Sodhi
Abstract:
Conventionally, evaluation for the diagnosis of Autism spectrum disorder is done by a trained specialist through questionnaire-based formal assessments and by observation of behavioral cues under various settings to capture the early warning signs of autism. These evaluation techniques are highly subjective and their accuracy relies on the experience of the specialist. In this regard, machine lear…
▽ More
Conventionally, evaluation for the diagnosis of Autism spectrum disorder is done by a trained specialist through questionnaire-based formal assessments and by observation of behavioral cues under various settings to capture the early warning signs of autism. These evaluation techniques are highly subjective and their accuracy relies on the experience of the specialist. In this regard, machine learning-based methods for automated capturing of early signs of autism from the recorded videos of the children is a promising alternative. In this paper, the authors propose a novel pipelined deep learning architecture to detect certain self-stimulatory behaviors that help in the diagnosis of autism spectrum disorder (ASD). The authors also supplement their tool with an augmented version of the Self Stimulatory Behavior Dataset (SSBD) and also propose a new label in SSBD Action detection: no-class. The deep learning model with the new dataset is made freely available for easy adoption to the researchers and developers community. An overall accuracy of around 81% was achieved from the proposed pipeline model that is targeted for real-time and hands-free automated diagnosis. All of the source code, data, licenses of use, and other relevant material is made freely available in https://github.com/sarl-iiitb/
△ Less
Submitted 25 November, 2023;
originally announced November 2023.
-
Modern code reviews -- Preliminary results of a systematic map** study
Authors:
Deepika Badampudi,
Ricardo Britto,
Michael Unterkalmsteiner
Abstract:
Reviewing source code is a common practice in a modern and collaborative coding environment. In the past few years, the research on modern code reviews has gained interest among practitioners and researchers. The objective of our investigation is to observe the evolution of research related to modern code reviews, identify research gaps and serve as a basis for future research. We use a systematic…
▽ More
Reviewing source code is a common practice in a modern and collaborative coding environment. In the past few years, the research on modern code reviews has gained interest among practitioners and researchers. The objective of our investigation is to observe the evolution of research related to modern code reviews, identify research gaps and serve as a basis for future research. We use a systematic map** approach to identify and classify 177 research papers. As preliminary result of our investigation, we present in this paper a classification scheme of the main contributions of modern code review research between 2005 and 2018.
△ Less
Submitted 2 October, 2023;
originally announced October 2023.
-
Large scale reuse of microservices using DevOps and InnerSource practices -- A longitudinal case study
Authors:
Deepika Badampudi,
Muhammad Usman,
Xingru Chen
Abstract:
Contemporary practices such as InnerSource and DevOps promote software reuse. This study investigates the implications of using contemporary practices on software reuse. In particular, we investigate the costs, benefits, challenges, and potential improvements in contemporary reuse at Ericsson. We performed the study in two phases: a) the initial data collection based on a combination of data colle…
▽ More
Contemporary practices such as InnerSource and DevOps promote software reuse. This study investigates the implications of using contemporary practices on software reuse. In particular, we investigate the costs, benefits, challenges, and potential improvements in contemporary reuse at Ericsson. We performed the study in two phases: a) the initial data collection based on a combination of data collection methods (e.g., interviews, discussions, company portals), and b) a follow-up group discussion after a year to understand the status of the challenges and improvements identified in the first phase. Our results indicate that develo** reusable assets resulted in upfront costs, such as additional effort in ensuring compliance. Furthermore, development with reuse also resulted in additional effort, for example, in integrating and understanding reusable assets. Ericsson perceived the additional effort as an investment resulting in long-term benefits such as improved quality, productivity, customer experience, and way of working. Ericsson's main challenge was increased pressure on the producers of reusable assets, which was mitigated by scaling the InnerSource adoption. InnerSource success is evident from the increase in the contributions to reusable assets. In addition, Ericsson implemented measures such as automating the compliance check, which enhanced the maturity of reusable assets and resulted in increased reuse.
△ Less
Submitted 26 September, 2023;
originally announced September 2023.
-
Large thermo-spin effects in Heusler alloy based spin-gapless semiconductor thin films
Authors:
Amit Chanda,
Deepika Rani,
Derick DeTellem,
Noha Alzahrani,
Dario A. Arena,
Sarath Witanachchi,
Ratnamala Chatterjee,
Manh-Huong Phan,
Hariharan Srikanth
Abstract:
Recently, Heusler alloys-based spin gapless semiconductors (SGSs) with high Curie temperature (TC) and sizeable spin polarization have emerged as potential candidates for tunable spintronic applications. We report comprehensive investigation of the temperature dependent ANE and intrinsic longitudinal spin Seebeck effect (LSSE) in CoFeCrGa thin films grown on MgO substrates. Our findings show the a…
▽ More
Recently, Heusler alloys-based spin gapless semiconductors (SGSs) with high Curie temperature (TC) and sizeable spin polarization have emerged as potential candidates for tunable spintronic applications. We report comprehensive investigation of the temperature dependent ANE and intrinsic longitudinal spin Seebeck effect (LSSE) in CoFeCrGa thin films grown on MgO substrates. Our findings show the anomalous Nernst coefficient for the MgO/CoFeCrGa (95 nm) film is $\cong 1.86$ micro V/K at room temperature which is nearly two orders of magnitude higher than that of the bulk polycrystalline sample of CoFeCrGa (= 0.018 micro V/K) but comparable to that of the magnetic Weyl semimetal Co2MnGa thin film (2-3 micro V/K). Furthermore, the LSSE coefficient for our MgO/CoFeCrGa(95nm)/Pt(5nm) heterostructure is $\cong 20.5$ $μ$V/K/$Ω$ at room temperature which is twice larger than that of the half-metallic ferromagnetic La$_{0.7}$Sr$_{0.3}$MnO$_3$ thin films ($\cong$ 20.5 $μ$V/K/$Ω$). We show that both ANE and LSSE coefficients follow identical temperature dependences and exhibit a maximum at $\cong$ 225 K which is understood as the combined effects of inelastic magnon scatterings and reduced magnon population at low temperatures. Our analyses not only indicate that the extrinsic skew scattering is the dominating mechanism for ANE in these films but also provide critical insights into the functional form of the observed temperature dependent LSSE at low temperatures. Furthermore, by employing radio frequency transverse susceptibility and broadband ferromagnetic resonance in combination with the LSSE measurements, we establish a correlation among the observed LSSE signal, magnetic anisotropy and Gilbert dam** of the CoFeCrGa thin films, which will be beneficial for fabricating tunable and highly efficient Heusler alloys based spincaloritronic nanodevices.
△ Less
Submitted 18 August, 2023;
originally announced August 2023.
-
An AI-Driven VM Threat Prediction Model for Multi-Risks Analysis-Based Cloud Cybersecurity
Authors:
Deepika Saxena,
Ishu Gupta,
Rishabh Gupta,
Ashutosh Kumar Singh,
Xiaoqing Wen
Abstract:
Cloud virtualization technology, ingrained with physical resource sharing, prompts cybersecurity threats on users' virtual machines (VM)s due to the presence of inevitable vulnerabilities on the offsite servers. Contrary to the existing works which concentrated on reducing resource sharing and encryption and decryption of data before transfer for improving cybersecurity which raises computational…
▽ More
Cloud virtualization technology, ingrained with physical resource sharing, prompts cybersecurity threats on users' virtual machines (VM)s due to the presence of inevitable vulnerabilities on the offsite servers. Contrary to the existing works which concentrated on reducing resource sharing and encryption and decryption of data before transfer for improving cybersecurity which raises computational cost overhead, the proposed model operates diversely for efficiently serving the same purpose. This paper proposes a novel Multiple Risks Analysis based VM Threat Prediction Model (MR-TPM) to secure computational data and minimize adversary breaches by proactively estimating the VMs threats. It considers multiple cybersecurity risk factors associated with the configuration and management of VMs, along with analysis of users' behaviour. All these threat factors are quantified for the generation of respective risk score values and fed as input into a machine learning based classifier to estimate the probability of threat for each VM. The performance of MR-TPM is evaluated using benchmark Google Cluster and OpenNebula VM threat traces. The experimental results demonstrate that the proposed model efficiently computes the cybersecurity risks and learns the VM threat patterns from historical and live data samples. The deployment of MR-TPM with existing VM allocation policies reduces cybersecurity threats up to 88.9%.
△ Less
Submitted 18 August, 2023;
originally announced August 2023.
-
Quantifying Outlierness of Funds from their Categories using Supervised Similarity
Authors:
Dhruv Desai,
Ashmita Dhiman,
Tushar Sharma,
Deepika Sharma,
Dhagash Mehta,
Stefano Pasquali
Abstract:
Mutual fund categorization has become a standard tool for the investment management industry and is extensively used by allocators for portfolio construction and manager selection, as well as by fund managers for peer analysis and competitive positioning. As a result, a (unintended) miscategorization or lack of precision can significantly impact allocation decisions and investment fund managers. H…
▽ More
Mutual fund categorization has become a standard tool for the investment management industry and is extensively used by allocators for portfolio construction and manager selection, as well as by fund managers for peer analysis and competitive positioning. As a result, a (unintended) miscategorization or lack of precision can significantly impact allocation decisions and investment fund managers. Here, we aim to quantify the effect of miscategorization of funds utilizing a machine learning based approach. We formulate the problem of miscategorization of funds as a distance-based outlier detection problem, where the outliers are the data-points that are far from the rest of the data-points in the given feature space. We implement and employ a Random Forest (RF) based method of distance metric learning, and compute the so-called class-wise outlier measures for each data-point to identify outliers in the data. We test our implementation on various publicly available data sets, and then apply it to mutual fund data. We show that there is a strong relationship between the outlier measures of the funds and their future returns and discuss the implications of our findings.
△ Less
Submitted 13 August, 2023;
originally announced August 2023.
-
Sub-arcsecond resolution imaging of M 51 with the International LOFAR Telescope
Authors:
Deepika Venkattu,
Peter Lundqvist,
Miguel Pérez-Torres,
Leah Morabito,
Javier Moldón,
John Conway,
Poonam Chandra,
Cyril Tasse
Abstract:
We present an International LOFAR Telescope sub-arcsecond resolution image of the nearby galaxy M 51 with a beam size of 0.436" x 0.366" and rms of 46 $μ$Jy. We compare this image with an European VLBI Network study of M 51, and discuss the supernovae in this galaxy, which have not yet been probed at these low radio frequencies. We find a flux density of 0.97 mJy for SN 2011dh in the ILT image, wh…
▽ More
We present an International LOFAR Telescope sub-arcsecond resolution image of the nearby galaxy M 51 with a beam size of 0.436" x 0.366" and rms of 46 $μ$Jy. We compare this image with an European VLBI Network study of M 51, and discuss the supernovae in this galaxy, which have not yet been probed at these low radio frequencies. We find a flux density of 0.97 mJy for SN 2011dh in the ILT image, which is about five times smaller than the flux density reported by the LOFAR Twometre Sky Survey at 6" resolution using the same dataset without the international stations. This difference makes evident the need for LOFAR international baselines to reliably obtain flux density measurements of compact objects in nearby galaxies. Our LOFAR flux density measurement of SN 2011dh directly translates into fitting the radio light curves for the supernova and constraining massloss rates of progenitor star. We do not detect two other supernovae in the same galaxy, SN 1994I and SN 2005cs, and our observations place limits on the evolution of both supernovae at radio wavelengths. We also discuss the radio emission from the centre of M 51, in which we detect the Active Galactic Nucleus and other parts of the nuclear emission in the galaxy, and a possible detection of Component N. We discuss a few other sources, including the detection of a High mass X-ray Binary not detected by LoTSS, but with a flux density in the ILT image that matches well with higher frequency catalogues.
△ Less
Submitted 5 July, 2023;
originally announced July 2023.
-
Cryptography approach for Secure Outsourced Data Storage in Cloud Environment
Authors:
Rishabh Gupta,
Deepika Saxena,
Ashutosh Kumar Singh
Abstract:
A large amount of data and applications are migrated by researchers, stakeholders, academia, and business organizations to the cloud environment due to its large variety of services, which involve the least maintenance cost, maximum flexibility, and on-demand service for storage, computation, and data distribution intentions. Despite the various characteristics the cloud environment supports, it a…
▽ More
A large amount of data and applications are migrated by researchers, stakeholders, academia, and business organizations to the cloud environment due to its large variety of services, which involve the least maintenance cost, maximum flexibility, and on-demand service for storage, computation, and data distribution intentions. Despite the various characteristics the cloud environment supports, it also faces many challenges. However, data users may not completely trust a cloud environment that is engaged by a third party. Every cloud user always has a prime concern, i.e., security. Numerous methods have been designed to solve the issue of data security during data storage, calculation, and sharing across stakeholders and users. Nevertheless, there is a lack of existing methods that tackle the issue of the security of data when it is stored in a cloud environment. This article presents a precise security method that has handled the security of data while it is being shared and stored in the cloud. These methods have been utilized to lessen security assaults and prevent unauthorized parties from accessing the actual data. The article is concluded with some limitations and recommendations for the future in terms of secure data retention and distribution.
△ Less
Submitted 14 June, 2023;
originally announced June 2023.
-
Automating Microservices Test Failure Analysis using Kubernetes Cluster Logs
Authors:
Pawan Kumar Sarika,
Deepika Badampudi,
Sai Prashanth Josyula,
Muhammad Usman
Abstract:
Kubernetes is a free, open-source container orchestration system for deploying and managing Docker containers that host microservices. Kubernetes cluster logs help in determining the reason for the failure. However, as systems become more complex, identifying failure reasons manually becomes more difficult and time-consuming. This study aims to identify effective and efficient classification algor…
▽ More
Kubernetes is a free, open-source container orchestration system for deploying and managing Docker containers that host microservices. Kubernetes cluster logs help in determining the reason for the failure. However, as systems become more complex, identifying failure reasons manually becomes more difficult and time-consuming. This study aims to identify effective and efficient classification algorithms to automatically determine the failure reason. We compare five classification algorithms, Support Vector Machines, K-Nearest Neighbors, Random Forest, Gradient Boosting Classifier, and Multilayer Perceptron. Our results indicate that Random Forest produces good accuracy while requiring fewer computational resources than other algorithms.
△ Less
Submitted 13 June, 2023;
originally announced June 2023.
-
Best of Both Worlds: Hybrid SNN-ANN Architecture for Event-based Optical Flow Estimation
Authors:
Shubham Negi,
Deepika Sharma,
Adarsh Kumar Kosta,
Kaushik Roy
Abstract:
In the field of robotics, event-based cameras are emerging as a promising low-power alternative to traditional frame-based cameras for capturing high-speed motion and high dynamic range scenes. This is due to their sparse and asynchronous event outputs. Spiking Neural Networks (SNNs) with their asynchronous event-driven compute, show great potential for extracting the spatio-temporal features from…
▽ More
In the field of robotics, event-based cameras are emerging as a promising low-power alternative to traditional frame-based cameras for capturing high-speed motion and high dynamic range scenes. This is due to their sparse and asynchronous event outputs. Spiking Neural Networks (SNNs) with their asynchronous event-driven compute, show great potential for extracting the spatio-temporal features from these event streams. In contrast, the standard Analog Neural Networks (ANNs) fail to process event data effectively. However, training SNNs is difficult due to additional trainable parameters (thresholds and leaks), vanishing spikes at deeper layers, and a non-differentiable binary activation function. Furthermore, an additional data structure, membrane potential, responsible for kee** track of temporal information, must be fetched and updated at every timestep in SNNs. To overcome these challenges, we propose a novel SNN-ANN hybrid architecture that combines the strengths of both. Specifically, we leverage the asynchronous compute capabilities of SNN layers to effectively extract the input temporal information. Concurrently, the ANN layers facilitate training and efficient hardware deployment on traditional machine learning hardware such as GPUs. We provide extensive experimental analysis for assigning each layer to be spiking or analog, leading to a network configuration optimized for performance and ease of training. We evaluate our hybrid architecture for optical flow estimation on DSEC-flow and Multi-Vehicle Stereo Event-Camera (MVSEC) datasets. On the DSEC-flow dataset, the hybrid SNN-ANN architecture achieves a 40% reduction in average endpoint error (AEE) with 22% lower energy consumption compared to Full-SNN, and 48% lower AEE compared to Full-ANN, while maintaining comparable energy usage.
△ Less
Submitted 19 March, 2024; v1 submitted 5 June, 2023;
originally announced June 2023.
-
An AI-driven intelligent traffic management model for 6G cloud radio access networks
Authors:
Smruti Rekha Swain,
Deepika Saxena,
Jatinder Kumar,
Ashutosh Kumar Singh,
Chung-Nan Lee
Abstract:
This letter proposes a novel Cloud Radio Access Network (C-RAN) traffic analysis and management model that estimates probable RAN traffic congestion and mitigate its effect by adopting a suitable handling mechanism. A computation approach is introduced to classify heterogeneous RAN traffic into distinct traffic states based on bandwidth consumption and execution time of various job requests. Furth…
▽ More
This letter proposes a novel Cloud Radio Access Network (C-RAN) traffic analysis and management model that estimates probable RAN traffic congestion and mitigate its effect by adopting a suitable handling mechanism. A computation approach is introduced to classify heterogeneous RAN traffic into distinct traffic states based on bandwidth consumption and execution time of various job requests. Further, a cloud-based traffic management is employed to schedule and allocate resources among user job requests according to the associated traffic states to minimize latency and maximize bandwidth utilization. The experimental evaluation and comparison of the proposed model with state-of-the-art methods reveal that it is effective in minimizing the worse effect of traffic congestion and improves bandwidth utilization and reduces job execution latency up to 17.07% and 18%, respectively.
△ Less
Submitted 25 March, 2023;
originally announced March 2023.
-
SAFR-AV: Safety Analysis of Autonomous Vehicles using Real World Data -- An end-to-end solution for real world data driven scenario-based testing for pre-certification of AV stacks
Authors:
Sagar Pathrudkar,
Saadhana Venkataraman,
Deepika Kanade,
Aswin Ajayan,
Palash Gupta,
Shehzaman Khatib,
Vijaya Sarathi Indla,
Saikat Mukherjee
Abstract:
One of the major impediments in deployment of Autonomous Driving Systems (ADS) is their safety and reliability. The primary reason for the complexity of testing ADS is that it operates in an open world characterized by its non-deterministic, high-dimensional and non-stationary nature where the actions of other actors in the environment are uncontrollable from the ADS's perspective. This leads to a…
▽ More
One of the major impediments in deployment of Autonomous Driving Systems (ADS) is their safety and reliability. The primary reason for the complexity of testing ADS is that it operates in an open world characterized by its non-deterministic, high-dimensional and non-stationary nature where the actions of other actors in the environment are uncontrollable from the ADS's perspective. This leads to a state space explosion problem and one way of mitigating this problem is by concretizing the scope for the system under test (SUT) by testing for a set of behavioral competencies which an ADS must demonstrate. A popular approach to testing ADS is scenario-based testing where the ADS is presented with driving scenarios from real world (and synthetically generated) data and expected to meet defined safety criteria while navigating through the scenario. We present SAFR-AV, an end-to-end ADS testing platform to enable scenario-based ADS testing. Our work addresses key real-world challenges of building an efficient large scale data ingestion pipeline and search capability to identify scenarios of interest from real world data, creating digital twins of the real-world scenarios to enable Software-in-the-Loop (SIL) testing in ADS simulators and, identifying key scenario parameter distributions to enable optimization of scenario coverage. These along with other modules of SAFR-AV would allow the platform to provide ADS pre-certifications.
△ Less
Submitted 27 February, 2023;
originally announced February 2023.
-
Automatic Specialization of Third-Party Java Dependencies
Authors:
César Soto-Valero,
Deepika Tiwari,
Tim Toady,
Benoit Baudry
Abstract:
Large-scale code reuse significantly reduces both development costs and time. However, the massive share of third-party code in software projects poses new challenges, especially in terms of maintenance and security. In this paper, we propose a novel technique to specialize dependencies of Java projects, based on their actual usage. Given a project and its dependencies, we systematically identify…
▽ More
Large-scale code reuse significantly reduces both development costs and time. However, the massive share of third-party code in software projects poses new challenges, especially in terms of maintenance and security. In this paper, we propose a novel technique to specialize dependencies of Java projects, based on their actual usage. Given a project and its dependencies, we systematically identify the subset of each dependency that is necessary to build the project, and we remove the rest. As a result of this process, we package each specialized dependency in a JAR file. Then, we generate specialized dependency trees where the original dependencies are replaced by the specialized versions. This allows building the project with significantly less third-party code than the original. As a result, the specialized dependencies become a first-class concept in the software supply chain, rather than a transient artifact in an optimizing compiler toolchain. We implement our technique in a tool called DepTrim, which we evaluate with 30 notable open-source Java projects. DepTrim specializes a total of 343 (86.6%) dependencies across these projects, and successfully rebuilds each project with a specialized dependency tree. Moreover, through this specialization, DepTrim removes a total of 57,444 (42.2%) classes from the dependencies, reducing the ratio of dependency classes to project classes from 8.7x in the original projects to 5.0x after specialization. These novel results indicate that dependency specialization significantly reduces the share of third-party code in Java projects.
△ Less
Submitted 13 October, 2023; v1 submitted 16 February, 2023;
originally announced February 2023.
-
RICK: Generating Mocks from Production Data
Authors:
Deepika Tiwari,
Martin Monperrus,
Benoit Baudry
Abstract:
Test doubles, such as mocks and stubs, are nifty fixtures in unit tests. They allow developers to test individual components in isolation from others that lie within or outside of the system. However, implementing test doubles within tests is not straightforward. With this demonstration, we introduce RICK, a tool that observes executing applications in order to automatically generate tests with re…
▽ More
Test doubles, such as mocks and stubs, are nifty fixtures in unit tests. They allow developers to test individual components in isolation from others that lie within or outside of the system. However, implementing test doubles within tests is not straightforward. With this demonstration, we introduce RICK, a tool that observes executing applications in order to automatically generate tests with realistic mocks and stubs. RICK monitors the invocation of target methods and their interactions with external components. Based on the data collected from these observations, RICK produces unit tests with mocks, stubs, and mock-based oracles. We highlight the capabilities of RICK, and how it can be used with real-world Java applications, to generate tests with mocks.
△ Less
Submitted 9 February, 2023;
originally announced February 2023.
-
Performance Analysis of Machine Learning Centered Workload Prediction Models for Cloud
Authors:
Deepika Saxena,
Jitendra Kumar,
Ashutosh Kumar Singh,
Stefan Schmid
Abstract:
The precise estimation of resource usage is a complex and challenging issue due to the high variability and dimensionality of heterogeneous service types and dynamic workloads. Over the last few years, the prediction of resource usage and traffic has received ample attention from the research community. Many machine learning-based workload forecasting models have been developed by exploiting their…
▽ More
The precise estimation of resource usage is a complex and challenging issue due to the high variability and dimensionality of heterogeneous service types and dynamic workloads. Over the last few years, the prediction of resource usage and traffic has received ample attention from the research community. Many machine learning-based workload forecasting models have been developed by exploiting their computational power and learning capabilities. This paper presents the first systematic survey cum performance analysis-based comparative study of diversified machine learning-driven cloud workload prediction models. The discussion initiates with the significance of predictive resource management followed by a schematic description, operational design, motivation, and challenges concerning these workload prediction models. Classification and taxonomy of different prediction approaches into five distinct categories are presented focusing on the theoretical concepts and mathematical functioning of the existing state-of-the-art workload prediction methods. The most prominent prediction approaches belonging to a distinct class of machine learning models are thoroughly surveyed and compared. All five classified machine learning-based workload prediction models are implemented on a common platform for systematic investigation and comparison using three distinct benchmark cloud workload traces via experimental analysis. The essential key performance indicators of state-of-the-art approaches are evaluated for comparison and the paper is concluded by discussing the trade-offs and notable remarks.
△ Less
Submitted 5 February, 2023;
originally announced February 2023.
-
Efficient and Effective Methods for Mixed Precision Neural Network Quantization for Faster, Energy-efficient Inference
Authors:
Deepika Bablani,
Jeffrey L. Mckinstry,
Steven K. Esser,
Rathinakumar Appuswamy,
Dharmendra S. Modha
Abstract:
For efficient neural network inference, it is desirable to achieve state-of-the-art accuracy with the simplest networks requiring the least computation, memory, and power. Quantizing networks to lower precision is a powerful technique for simplifying networks. As each layer of a network may have different sensitivity to quantization, mixed precision quantization methods selectively tune the precis…
▽ More
For efficient neural network inference, it is desirable to achieve state-of-the-art accuracy with the simplest networks requiring the least computation, memory, and power. Quantizing networks to lower precision is a powerful technique for simplifying networks. As each layer of a network may have different sensitivity to quantization, mixed precision quantization methods selectively tune the precision of individual layers to achieve a minimum drop in task performance (e.g., accuracy). To estimate the impact of layer precision choice on task performance, two methods are introduced: i) Entropy Approximation Guided Layer selection (EAGL) is fast and uses the entropy of the weight distribution, and ii) Accuracy-aware Layer Precision Selection (ALPS) is straightforward and relies on single epoch fine-tuning after layer precision reduction. Using EAGL and ALPS for layer precision selection, full-precision accuracy is recovered with a mix of 4-bit and 2-bit layers for ResNet-50, ResNet-101 and BERT-base transformer networks, demonstrating enhanced performance across the entire accuracy-throughput frontier. The techniques demonstrate better performance than existing techniques in several commensurate comparisons. Notably, this is accomplished with significantly lesser computational time required to reach a solution.
△ Less
Submitted 10 January, 2024; v1 submitted 30 January, 2023;
originally announced January 2023.
-
Data assimilation finite element method for the linearized Navier-Stokes equations with higher order polynomial approximation
Authors:
Erik Burman,
Deepika Garg,
Janosch Preuss
Abstract:
In this article, we design and analyze an arbitrary-order stabilized finite element method to approximate the unique continuation problem for laminar steady flow described by the linearized incompressible Navier--Stokes equation. We derive quantitative local error estimates for the velocity, which account for noise level and polynomial degree, using the stability of the continuous problem in the f…
▽ More
In this article, we design and analyze an arbitrary-order stabilized finite element method to approximate the unique continuation problem for laminar steady flow described by the linearized incompressible Navier--Stokes equation. We derive quantitative local error estimates for the velocity, which account for noise level and polynomial degree, using the stability of the continuous problem in the form of a conditional stability estimate. Numerical examples illustrate the performances of the method with respect to the polynomial order and perturbations in the data. We observe that the higher order polynomials may be efficient for ill-posed problems, but are also more sensitive for problems with poor stability due to the ill-conditioning of the system.
△ Less
Submitted 13 January, 2023;
originally announced January 2023.
-
Theoretical evaluation of oxynitride, oxyfluoride and nitrofluoride perovskites with promising photon absorption properties for solar water splitting
Authors:
Manjari Jain,
Deepika Gill,
Sanchi Monga,
Saswata Bhattacharya
Abstract:
Photocatalytic water splitting represents a very promising but at the same time very challenging contribution to a clean and renewable route to produce hydrogen fuel. Develo** efficient and cost-effective photocatalysts for water splitting is a growing need. For this purpose, semiconductor photocatalysts have attracted much more attention due to their stability and low manufacturing cost. Here,…
▽ More
Photocatalytic water splitting represents a very promising but at the same time very challenging contribution to a clean and renewable route to produce hydrogen fuel. Develo** efficient and cost-effective photocatalysts for water splitting is a growing need. For this purpose, semiconductor photocatalysts have attracted much more attention due to their stability and low manufacturing cost. Here, we have systematically applied several state-of-the-art advanced first-principles-based methodologies, viz., hybrid density functional theory, many-body perturbation theory (G$_0$W$_0$) and density functional perturbation theory (DFPT), to understand the electronic structure properties of ABX$_2$Y perovskites. We have chosen the vast composition space of ABX$_2$Y type perovskites where A and B are cations and X and Y can be nitrogen, oxygen, or fluorine. These perovskites exhibit direct band gaps ranging from 1.6 to 3.3 eV. Further, to evaluate the feasibility of the visible light catalytic performance, we calculate the structural, electronic, and optical properties of ABX$_2$Y perovskites. In addition, from hydrogen evolution reaction (HER) and oxygen evolution reaction (OER) mechanism, BaInO$_2$F, InSnO$_2$N, CsPbO$_2$F and LaNbN$_2$O are found as probable photocatalysts.
△ Less
Submitted 11 January, 2023;
originally announced January 2023.
-
OSC-MC: Online Secure Communication Model for Cloud Environment
Authors:
Deepika Saxena,
Ashutosh Kumar Singh
Abstract:
A malicious cloud user may exploit outsourced data involved in online communication, co-residency, and hypervisor vulnerabilities to breach and hamper sensitive information, and inject malicious traffic-based congestion, rendering services to other benign users. To address this critical and challenging the problem, this letter proposes an Online Secure Communication Model for Cloud (OSC-MC) by ide…
▽ More
A malicious cloud user may exploit outsourced data involved in online communication, co-residency, and hypervisor vulnerabilities to breach and hamper sensitive information, and inject malicious traffic-based congestion, rendering services to other benign users. To address this critical and challenging the problem, this letter proposes an Online Secure Communication Model for Cloud (OSC-MC) by identifying and terminating malicious VMs and inter-VM links prior to the occurrence of security threats. The anomalous network traffic, bandwidth usage, and unauthorized inter-VM links are security breach indicators which guides secure cloud communication and resource allocation. The simulation and comparison of the proposed model with existing approaches reveal that it significantly improves authorised inter-communication links up to 34.5% with a reduction of network hogs, and power consumption by 66.46% and 39.31%, respectively.
△ Less
Submitted 11 December, 2022;
originally announced December 2022.
-
A Fault Tolerant Elastic Resource Management Framework Towards High Availability of Cloud Services
Authors:
Deepika Saxena,
Ishu Gupta,
Ashutosh Kumar Singh,
Chung-Nan Lee
Abstract:
Cloud computing has become inevitable for every digital service which has exponentially increased its usage. However, a tremendous surge in cloud resource demand stave off service availability resulting into outages, performance degradation, load imbalance, and excessive power-consumption. The existing approaches mainly attempt to address the problem by using multi-cloud and running multiple repli…
▽ More
Cloud computing has become inevitable for every digital service which has exponentially increased its usage. However, a tremendous surge in cloud resource demand stave off service availability resulting into outages, performance degradation, load imbalance, and excessive power-consumption. The existing approaches mainly attempt to address the problem by using multi-cloud and running multiple replicas of a virtual machine (VM) which accounts for high operational-cost. This paper proposes a Fault Tolerant Elastic Resource Management (FT-ERM) framework that addresses aforementioned problem from a different perspective by inducing high-availability in servers and VMs. Specifically, (1) an online failure predictor is developed to anticipate failure-prone VMs based on predicted resource contention; (2) the operational status of server is monitored with the help of power analyser, resource estimator and thermal analyser to identify any failure due to overloading and overheating of servers proactively; and (3) failure-prone VMs are assigned to proposed fault-tolerance unit composed of decision matrix and safe box to trigger VM migration and handle any outage beforehand while maintaining desired level of availability for cloud users. The proposed framework is evaluated and compared against state-of-the-arts by executing experiments using two real-world datasets. FT-ERM improved the availability of the services up to 34.47% and scales down VM-migration and power-consumption up to 88.6% and 62.4%, respectively over without FT-ERM approach.
△ Less
Submitted 7 December, 2022;
originally announced December 2022.
-
A proactive autoscaling and energy-efficient VM allocation framework using online multi-resource neural network for cloud data center
Authors:
Deepika Saxena,
Ashutosh Kumar Singh
Abstract:
This work proposes an energy-efficient resource provisioning and allocation framework to meet the dynamic demands of future applications. The frequent variations in a cloud user's resource demand lead 'to the problem of excess power consumption, resource wastage, performance, and Quality-of-Service degradation. The proposed framework addresses these challenges by matching the application's predict…
▽ More
This work proposes an energy-efficient resource provisioning and allocation framework to meet the dynamic demands of future applications. The frequent variations in a cloud user's resource demand lead 'to the problem of excess power consumption, resource wastage, performance, and Quality-of-Service degradation. The proposed framework addresses these challenges by matching the application's predicted resource requirement with the resource capacity of VMs precisely and thereby consolidating the entire load on the minimum number of energy-efficient physical machines. The three consecutive contributions of the proposed work are: Online Multi-Resource Feed-forward Neural Network to forecast the multiple resource demands concurrently for future applications; autoscaling of VMs based on the clustering of the predicted resource requirements; allocation of the scaled VMs on the energy-efficient PMs. The integrated approach successively optimizes resource utilization, saves energy and automatically adapts to the changes in future application resource demand. The proposed framework is evaluated by using real workload traces of the benchmark Google Cluster Dataset and compared against different scenarios including energy-efficient VM placement with resource prediction only, VMP without resource prediction and autoscaling, and optimal VMP with autoscaling based on actual resource utilization. The observed results demonstrate that the proposed integrated approach achieves near-optimal performance against optimal VMP and outperforms rest of the VMPs in terms of power saving and resource utilization up to 88.5% and 21.12% respectively. In addition, the OM-FNN predictor shows better accuracy, lesser time and space complexity over a traditional single-input and single-output feed-forward neural network predictor.
△ Less
Submitted 4 December, 2022;
originally announced December 2022.
-
Towards automated open source assessment -- An empirical study
Authors:
Sai Pranav Koyyada,
Denim Deshmukh Deepika Badampudi,
Vida Ahmadi,
Muhammad Usman
Abstract:
The open source software (OSS) assessment has become important given the increased adoption of OSS in commercial product development. Researchers proposed many OSS assessment models. However, little is known about the industrial relevance of the models. In this study, we proposed an automated tool based on the OSS assessment attributes identified together with a European cloud provider company. We…
▽ More
The open source software (OSS) assessment has become important given the increased adoption of OSS in commercial product development. Researchers proposed many OSS assessment models. However, little is known about the industrial relevance of the models. In this study, we proposed an automated tool based on the OSS assessment attributes identified together with a European cloud provider company. We analyzed 51 repositories to observe patterns in maintenance activities over their lifetime (from inception to the latest release). Based on the analysis, we propose a novel approach for evaluating the maturity of the OSS project. Finally, we assessed the usefulness of our automated solution in a pilot study.
△ Less
Submitted 30 November, 2022;
originally announced December 2022.
-
A High Availability Management Model based on VM Significance Ranking and Resource Estimation for Cloud Applications
Authors:
Deepika Saxena,
Ashutosh Kumar Singh
Abstract:
Massive upsurge in cloud resource usage stave off service availability resulting into outages, resource contention, and excessive power-consumption. The existing approaches have addressed this challenge by providing multi-cloud, VM migration, and running multiple replicas of each VM which accounts for high expenses of cloud data centre (CDC). In this context, a novel VM Significance Ranking and Re…
▽ More
Massive upsurge in cloud resource usage stave off service availability resulting into outages, resource contention, and excessive power-consumption. The existing approaches have addressed this challenge by providing multi-cloud, VM migration, and running multiple replicas of each VM which accounts for high expenses of cloud data centre (CDC). In this context, a novel VM Significance Ranking and Resource Estimation based High Availability Management (SRE-HM) Model is proposed to enhance service availability for users with optimized cost for CDC. The model estimates resource contention based server failure and organises needed resources beforehand for maintaining desired level of service availability. A significance ranking parameter is introduced and computed for each VM, executing critical or non-critical tasks followed by the selection of an admissible High Availability (HA) strategy respective to its significance and user specified constraints. It enables cost optimization for CDC by rendering failure tolerance strategies for significant VMs only instead of all the VMs. The proposed model is evaluated and compared against state-of-the-arts by executing experiments using Google Cluster dataset. SRE-HM improved the services availability up to 19.56% and scales down the number of active servers and power-consumption up to 26.67% and 19.1%, respectively over HA without SRE-HM.
△ Less
Submitted 29 November, 2022;
originally announced November 2022.
-
A Quantum Approach Towards the Adaptive Prediction of Cloud Workloads
Authors:
Ashutosh Kumar Singh,
Deepika Saxena,
Jitendra Kumar,
Vrinda Gupta
Abstract:
This work presents a novel Evolutionary Quantum Neural Network (EQNN) based workload prediction model for Cloud datacenter. It exploits the computational efficiency of quantum computing by encoding workload information into qubits and propagating this information through the network to estimate the workload or resource demands with enhanced accuracy proactively. The rotation and reverse rotation e…
▽ More
This work presents a novel Evolutionary Quantum Neural Network (EQNN) based workload prediction model for Cloud datacenter. It exploits the computational efficiency of quantum computing by encoding workload information into qubits and propagating this information through the network to estimate the workload or resource demands with enhanced accuracy proactively. The rotation and reverse rotation effects of the Controlled-NOT (C-NOT) gate serve activation function at the hidden and output layers to adjust the qubit weights. In addition, a Self Balanced Adaptive Differential Evolution (SB-ADE) algorithm is developed to optimize qubit network weights. The accuracy of the EQNN prediction model is extensively evaluated and compared with seven state-of-the-art methods using eight real world benchmark datasets of three different categories. Experimental results reveal that the use of the quantum approach to evolutionary neural network substantially improves the prediction accuracy up to 91.6% over the existing approaches.
△ Less
Submitted 26 November, 2022;
originally announced November 2022.
-
On possible values of the interior angle between intermediate subalgebras
Authors:
Ved Prakash Gupta,
Deepika Sharma
Abstract:
We show that all values in the interval $[0,\fracπ{2}]$ can be attained as the interior angle between intermediate subalgebras (as introduced in [3]) of a certain inclusion of simple unital C*-algebras. We also calculate the interior angle between intermediate crossed product subalgebras of any inclusion of crossed product algebras corresponding to any action of a countable discrete group and its…
▽ More
We show that all values in the interval $[0,\fracπ{2}]$ can be attained as the interior angle between intermediate subalgebras (as introduced in [3]) of a certain inclusion of simple unital C*-algebras. We also calculate the interior angle between intermediate crossed product subalgebras of any inclusion of crossed product algebras corresponding to any action of a countable discrete group and its subgroups on a unital C*-algebra.
△ Less
Submitted 14 November, 2022;
originally announced November 2022.
-
Multimodal Optical Techniques in Pre-Clinical Evaluation of Oral Cancer: Fluorescence Imaging and Spectroscopic Devices
Authors:
Pramila Thapa,
Veena Singh,
Virendra Kumar,
Sunil Bhatt,
Kiran Maurya,
Vivek Nayyar,
Kiran Jot,
Deepika Mishra,
Anurag Shrivastava,
Dalip Singh Mehta
Abstract:
Objective: Survival rate of oral squamous cell carcinoma (OSCC) patients is very poor and can be improved using highly sensitive, specific and accurate techniques. Autofluorescence and fluorescence techniques are very sensitive and useful in cancer screening. Furthermore, fluorescence spectroscopy is directly linked with molecular levels of human tissue and can be used as quantitative tool for can…
▽ More
Objective: Survival rate of oral squamous cell carcinoma (OSCC) patients is very poor and can be improved using highly sensitive, specific and accurate techniques. Autofluorescence and fluorescence techniques are very sensitive and useful in cancer screening. Furthermore, fluorescence spectroscopy is directly linked with molecular levels of human tissue and can be used as quantitative tool for cancer detection. Materials and Methods: Here, we report development of multi-modal autofluorescence and fluorescence imaging and spectroscopic (MAF-IS) smartphone-based systems for fast and real time oral cancer screening. Fluorescence-autofluorescence images and spectroscopic datasets shows significant change in oral cancer and normal tissue in terms of fluorescence-intensity, spectral-shape, and red-shift respectively. Results: In this study, total 68 samples (33 cancerous and 35 normal) of 18 OSCC patients and 13 patients of precancerous tissues (dysplasia and fibrosis) are screened. Main remarkable finding of the study is presence of three peaks viz ~636 nm, ~680 nm and ~705 nm with decrease in intensity around 450 nm ~ 520 nm in OSCC in case of autofluorescence. Another finding is red shift in fluorescence spectroscopy of OSCC, dysplasia and fibrosis from normal which is 6.59+-4.54 nm, 3+-4.78 nm and 1.5+-0.5 nm respectively and can be used as cancer marker in real-time screening. Finally, support vector machine (SVM) based classifier is applied for classification of OSCC tissue from normal tissue. The average sensitivity, specificity and accuracy are found as 88.89% ,100 %, and 95%, respectively. Conclusion: Autofluorescence and fluorescence-based imaging and spectroscopy is used for pre-clinical screening of different oral lesions.
△ Less
Submitted 3 November, 2022;
originally announced November 2022.
-
an intelligent security centered resource-efficient resource management model for cloud computing environments
Authors:
Deepika Saxena,
Ashutosh Kumar Singh
Abstract:
This paper proposes a conceptual model for a secure and performance-efficient workload management model in cloud environments. In this model, a resource management unit is employed for energy and performance proficient allocation of virtual machines while ensuring the secure processing of users' applications by defending against data breaches due to unauthorized access to virtual machines in real-…
▽ More
This paper proposes a conceptual model for a secure and performance-efficient workload management model in cloud environments. In this model, a resource management unit is employed for energy and performance proficient allocation of virtual machines while ensuring the secure processing of users' applications by defending against data breaches due to unauthorized access to virtual machines in real-time. The resource management unit is guided by a secure virtual machine management unit which is designed to generate information regarding unauthorized access or inter-communication links among active virtual machines. Also, a workload analyzer unit operates concurrently to estimate resource utilization information to assist the resource management unit in the performance-efficient allocation of virtual machines. Contrary to prior works which engage access control mechanisms, encryption, and decryption of data before the transfer and the use of tunneling for prevention of unauthorized access to virtual machines which raises excess computational cost overhead, the proposed model operates diversely for efficiently serving the same purpose.
△ Less
Submitted 29 October, 2022;
originally announced October 2022.
-
Effect of geometrically thin discs on precessing, thick flows: Relevance to type-C QPOs
Authors:
D. A. Bollimpalli,
P. C. Fragile,
W. Kluźniak
Abstract:
Type-C quasi-periodic oscillations (QPOs) are the low-frequency QPOs most commonly observed during the hard spectral state of X-ray binary systems. The leading model for these QPOs is the Lense-Thirring precession of a hot, geometrically thick accretion flow that is misaligned with respect to the black hole spin axis. However, none of the work done to date has accounted for the effects of a surrou…
▽ More
Type-C quasi-periodic oscillations (QPOs) are the low-frequency QPOs most commonly observed during the hard spectral state of X-ray binary systems. The leading model for these QPOs is the Lense-Thirring precession of a hot, geometrically thick accretion flow that is misaligned with respect to the black hole spin axis. However, none of the work done to date has accounted for the effects of a surrounding, geometrically thin disc on this precession, as would be the case in the truncated disc picture of the hard state. To address this, we perform a set of GRMHD simulations of truncated discs misaligned with the spin axes of their central black holes. Our results confirm that the inner-hot flow still undergoes precession, though at a rate that is only 5 percent of what is predicted for an isolated, precessing torus. We find that the exchange of angular momentum between the outer, thin and the inner, thick disc causes this slow-down in the precession rate and discuss its relevance to type-C QPOs.
△ Less
Submitted 6 October, 2022;
originally announced October 2022.
-
A Pathologist-Informed Workflow for Classification of Prostate Glands in Histopathology
Authors:
Alessandro Ferrero,
Beatrice Knudsen,
Deepika Sirohi,
Ross Whitaker
Abstract:
Pathologists diagnose and grade prostate cancer by examining tissue from needle biopsies on glass slides. The cancer's severity and risk of metastasis are determined by the Gleason grade, a score based on the organization and morphology of prostate cancer glands. For diagnostic work-up, pathologists first locate glands in the whole biopsy core, and -- if they detect cancer -- they assign a Gleason…
▽ More
Pathologists diagnose and grade prostate cancer by examining tissue from needle biopsies on glass slides. The cancer's severity and risk of metastasis are determined by the Gleason grade, a score based on the organization and morphology of prostate cancer glands. For diagnostic work-up, pathologists first locate glands in the whole biopsy core, and -- if they detect cancer -- they assign a Gleason grade. This time-consuming process is subject to errors and significant inter-observer variability, despite strict diagnostic criteria. This paper proposes an automated workflow that follows pathologists' \textit{modus operandi}, isolating and classifying multi-scale patches of individual glands in whole slide images (WSI) of biopsy tissues using distinct steps: (1) two fully convolutional networks segment epithelium versus stroma and gland boundaries, respectively; (2) a classifier network separates benign from cancer glands at high magnification; and (3) an additional classifier predicts the grade of each cancer gland at low magnification. Altogether, this process provides a gland-specific approach for prostate cancer grading that we compare against other machine-learning-based grading methods.
△ Less
Submitted 27 September, 2022;
originally announced September 2022.