-
Integrating SystemC-AMS Power Modeling with a RISC-V ISS for Virtual Prototy** of Battery-operated Embedded Devices
Authors:
Mohamed Amine Hamdi,
Giovanni Pollo,
Matteo Risso,
Germain Haugou,
Alessio Burrello,
Enrico Macii,
Massimo Poncino,
Sara Vinco,
Daniele Jahier Pagliari
Abstract:
RISC-V cores have gained a lot of popularity over the last few years. However, being quite a recent and novel technology, there is still a gap in the availability of comprehensive simulation frameworks for RISC-V that cover both the functional and extra-functional aspects. This gap hinders progress in the field, as fast yet accurate system-level simulation is crucial for Design Space Exploration (…
▽ More
RISC-V cores have gained a lot of popularity over the last few years. However, being quite a recent and novel technology, there is still a gap in the availability of comprehensive simulation frameworks for RISC-V that cover both the functional and extra-functional aspects. This gap hinders progress in the field, as fast yet accurate system-level simulation is crucial for Design Space Exploration (DSE).
This work presents an open-source framework designed to tackle this challenge, integrating functional RISC-V simulation (achieved with GVSoC) with SystemC-AMS (used to model extra-functional aspects, in detail power storage and distribution). The combination of GVSoC and SystemC-AMS in a single simulation framework allows to perform a DSE that is dependent on the mutual impact between functional and extra-functional aspects. In our experiments, we validate the framework's effectiveness by creating a virtual prototype of a compact, battery-powered embedded system.
△ Less
Submitted 2 April, 2024;
originally announced April 2024.
-
Antiferromagnetic droplet soliton driven by spin current
Authors:
Roman V. Ovcharov,
Mohammad Hamdi,
Boris A. Ivanov,
Johan Åkerman,
Roman S. Khymyn
Abstract:
We demonstrate that a spin current flowing through a nano-contact into a uniaxial antiferromagnet with first- and second-order anisotropy can excite a self-localized dynamic magnetic soliton, known as a spin-wave droplet in ferromagnets. The droplet nucleates at a certain threshold current with the frequency of the Néel vector precession laying below the antiferromagnetic resonance. The frequency…
▽ More
We demonstrate that a spin current flowing through a nano-contact into a uniaxial antiferromagnet with first- and second-order anisotropy can excite a self-localized dynamic magnetic soliton, known as a spin-wave droplet in ferromagnets. The droplet nucleates at a certain threshold current with the frequency of the Néel vector precession laying below the antiferromagnetic resonance. The frequency exhibits nonlinear behavior with the increasing of applied current. At the high value of applied torque, the soliton mode transforms, and the oscillator emits spin waves propagating in the antiferromagnetic layer.
△ Less
Submitted 30 November, 2023;
originally announced November 2023.
-
All-antiferromagnetic electrically controlled memory on silicon featuring large tunneling magnetoresistance
Authors:
Jiacheng Shi,
Victor Lopez-Dominguez,
Sevdenur Arpaci,
Vinod K. Sangwan,
Farzad Mahfouzi,
**woong Kim,
Jordan G. Athas,
Mohammad Hamdi,
Can Aygen,
Charudatta Phatak,
Mario Carpentieri,
Jidong S. Jiang,
Matthew A. Grayson,
Nicholas Kioussis,
Giovanni Finocchio,
Mark C. Hersam,
Pedram Khalili Amiri
Abstract:
Antiferromagnetic (AFM) materials are a pathway to spintronic memory and computing devices with unprecedented speed, energy efficiency, and bit density. Realizing this potential requires AFM devices with simultaneous electrical writing and reading of information, which are also compatible with established silicon-based manufacturing. Recent experiments have shown tunneling magnetoresistance (TMR)…
▽ More
Antiferromagnetic (AFM) materials are a pathway to spintronic memory and computing devices with unprecedented speed, energy efficiency, and bit density. Realizing this potential requires AFM devices with simultaneous electrical writing and reading of information, which are also compatible with established silicon-based manufacturing. Recent experiments have shown tunneling magnetoresistance (TMR) readout in epitaxial AFM tunnel junctions. However, these TMR structures were not grown using a silicon-compatible deposition process, and controlling their AFM order required external magnetic fields. Here we show three-terminal AFM tunnel junctions based on the noncollinear antiferromagnet PtMn3, sputter-deposited on silicon. The devices simultaneously exhibit electrical switching using electric currents, and electrical readout by a large room-temperature TMR effect. First-principles calculations explain the TMR in terms of the momentum-resolved spin-dependent tunneling conduction in tunnel junctions with noncollinear AFM electrodes.
△ Less
Submitted 23 November, 2023;
originally announced November 2023.
-
Adaptive ResNet Architecture for Distributed Inference in Resource-Constrained IoT Systems
Authors:
Fazeela Mazhar Khan,
Emna Baccour,
Aiman Erbad,
Mounir Hamdi
Abstract:
As deep neural networks continue to expand and become more complex, most edge devices are unable to handle their extensive processing requirements. Therefore, the concept of distributed inference is essential to distribute the neural network among a cluster of nodes. However, distribution may lead to additional energy consumption and dependency among devices that suffer from unstable transmission…
▽ More
As deep neural networks continue to expand and become more complex, most edge devices are unable to handle their extensive processing requirements. Therefore, the concept of distributed inference is essential to distribute the neural network among a cluster of nodes. However, distribution may lead to additional energy consumption and dependency among devices that suffer from unstable transmission rates. Unstable transmission rates harm real-time performance of IoT devices causing low latency, high energy usage, and potential failures. Hence, for dynamic systems, it is necessary to have a resilient DNN with an adaptive architecture that can downsize as per the available resources. This paper presents an empirical study that identifies the connections in ResNet that can be dropped without significantly impacting the model's performance to enable distribution in case of resource shortage. Based on the results, a multi-objective optimization problem is formulated to minimize latency and maximize accuracy as per available resources. Our experiments demonstrate that an adaptive ResNet architecture can reduce shared data, energy consumption, and latency throughout the distribution while maintaining high accuracy.
△ Less
Submitted 21 July, 2023;
originally announced July 2023.
-
Zero-touch realization of Pervasive Artificial Intelligence-as-a-service in 6G networks
Authors:
Emna Baccour,
Mhd Saria Allahham,
Aiman Erbad,
Amr Mohamed,
Ahmed Refaey Hussein,
Mounir Hamdi
Abstract:
The vision of the upcoming 6G technologies, characterized by ultra-dense network, low latency, and fast data rate is to support Pervasive AI (PAI) using zero-touch solutions enabling self-X (e.g., self-configuration, self-monitoring, and self-healing) services. However, the research on 6G is still in its infancy, and only the first steps have been taken to conceptualize its design, investigate its…
▽ More
The vision of the upcoming 6G technologies, characterized by ultra-dense network, low latency, and fast data rate is to support Pervasive AI (PAI) using zero-touch solutions enabling self-X (e.g., self-configuration, self-monitoring, and self-healing) services. However, the research on 6G is still in its infancy, and only the first steps have been taken to conceptualize its design, investigate its implementation, and plan for use cases. Toward this end, academia and industry communities have gradually shifted from theoretical studies of AI distribution to real-world deployment and standardization. Still, designing an end-to-end framework that systematizes the AI distribution by allowing easier access to the service using a third-party application assisted by a zero-touch service provisioning has not been well explored. In this context, we introduce a novel platform architecture to deploy a zero-touch PAI-as-a-Service (PAIaaS) in 6G networks supported by a blockchain-based smart system. This platform aims to standardize the pervasive AI at all levels of the architecture and unify the interfaces in order to facilitate the service deployment across application and infrastructure domains, relieve the users worries about cost, security, and resource allocation, and at the same time, respect the 6G stringent performance requirements. As a proof of concept, we present a Federated Learning-as-a-service use case where we evaluate the ability of our proposed system to self-optimize and self-adapt to the dynamics of 6G networks in addition to minimizing the users' perceived costs.
△ Less
Submitted 21 July, 2023;
originally announced July 2023.
-
Optimal Resource Management for Hierarchical Federated Learning over HetNets with Wireless Energy Transfer
Authors:
Rami Hamdi,
Ahmed Ben Said,
Emna Baccour,
Aiman Erbad,
Amr Mohamed,
Mounir Hamdi,
Mohsen Guizani
Abstract:
Remote monitoring systems analyze the environment dynamics in different smart industrial applications, such as occupational health and safety, and environmental monitoring. Specifically, in industrial Internet of Things (IoT) systems, the huge number of devices and the expected performance put pressure on resources, such as computational, network, and device energy. Distributed training of Machine…
▽ More
Remote monitoring systems analyze the environment dynamics in different smart industrial applications, such as occupational health and safety, and environmental monitoring. Specifically, in industrial Internet of Things (IoT) systems, the huge number of devices and the expected performance put pressure on resources, such as computational, network, and device energy. Distributed training of Machine and Deep Learning (ML/DL) models for intelligent industrial IoT applications is very challenging for resource limited devices over heterogeneous wireless networks (HetNets). Hierarchical Federated Learning (HFL) performs training at multiple layers offloading the tasks to nearby Multi-Access Edge Computing (MEC) units. In this paper, we propose a novel energy-efficient HFL framework enabled by Wireless Energy Transfer (WET) and designed for heterogeneous networks with massive Multiple-Input Multiple-Output (MIMO) wireless backhaul. Our energy-efficiency approach is formulated as a Mixed-Integer Non-Linear Programming (MINLP) problem, where we optimize the HFL device association and manage the wireless transmitted energy. However due to its high complexity, we design a Heuristic Resource Management Algorithm, namely H2RMA, that respects energy, channel quality, and accuracy constraints, while presenting a low computational complexity. We also improve the energy consumption of the network using an efficient device scheduling scheme. Finally, we investigate device mobility and its impact on the HFL performance. Our extensive experiments confirm the high performance of the proposed resource management approach in HFL over HetNets, in terms of training loss and grid energy costs.
△ Less
Submitted 3 May, 2023;
originally announced May 2023.
-
Spin wave dispersion of ultra-low dam** hematite ($α\text{-Fe}_2\text{O}_3$) at GHz frequencies
Authors:
Mohammad Hamdi,
Ferdinand Posva,
Dirk Grundler
Abstract:
Low magnetic dam** and high group velocity of spin waves (SWs) or magnons are two crucial parameters for functional magnonic devices. Magnonics research on signal processing and wave-based computation at GHz frequencies focussed on the artificial ferrimagnetic garnet Y$_3$Fe$_5$O$_{12}$ (YIG) so far. We report on spin-wave spectroscopy studies performed on the natural mineral hematite (…
▽ More
Low magnetic dam** and high group velocity of spin waves (SWs) or magnons are two crucial parameters for functional magnonic devices. Magnonics research on signal processing and wave-based computation at GHz frequencies focussed on the artificial ferrimagnetic garnet Y$_3$Fe$_5$O$_{12}$ (YIG) so far. We report on spin-wave spectroscopy studies performed on the natural mineral hematite ($α\text{-Fe}_2\text{O}_3$) which is a canted antiferromagnet. By means of broadband GHz spectroscopy and inelastic light scattering, we determine a dam** coefficient of $1.1\times10^{-5}$ and magnon group velocities of a few 10 km/s, respectively, at room temperature. Covering a large regime of wave vectors up to $k\approx 24~{\rm rad}/μ$m, we find the exchange stiffness length to be relatively short and only about 1 Å. In a small magnetic field of 30 mT, the decay length of SWs is estimated to be 1.1 cm similar to the best YIG. Still, inelastic light scattering provides surprisingly broad and partly asymmetric resonance peaks. Their characteristic shape is induced by the large group velocities, low dam** and distribution of incident angles inside the laser beam. Our results promote hematite as an alternative and sustainable basis for magnonic devices with fast speeds and low losses based on a stable natural mineral.
△ Less
Submitted 23 December, 2022; v1 submitted 22 December, 2022;
originally announced December 2022.
-
Deep Reinforcement Learning for Trajectory Path Planning and Distributed Inference in Resource-Constrained UAV Swarms
Authors:
Marwan Dhuheir,
Emna Baccour,
Aiman Erbad,
Sinan Sabeeh Al-Obaidi,
Mounir Hamdi
Abstract:
The deployment flexibility and maneuverability of Unmanned Aerial Vehicles (UAVs) increased their adoption in various applications, such as wildfire tracking, border monitoring, etc. In many critical applications, UAVs capture images and other sensory data and then send the captured data to remote servers for inference and data processing tasks. However, this approach is not always practical in re…
▽ More
The deployment flexibility and maneuverability of Unmanned Aerial Vehicles (UAVs) increased their adoption in various applications, such as wildfire tracking, border monitoring, etc. In many critical applications, UAVs capture images and other sensory data and then send the captured data to remote servers for inference and data processing tasks. However, this approach is not always practical in real-time applications due to the connection instability, limited bandwidth, and end-to-end latency. One promising solution is to divide the inference requests into multiple parts (layers or segments), with each part being executed in a different UAV based on the available resources.
Furthermore, some applications require the UAVs to traverse certain areas and capture incidents; thus, planning their paths becomes critical particularly, to reduce the latency of making the collaborative inference process. Specifically, planning the UAVs trajectory can reduce the data transmission latency by communicating with devices in the same proximity while mitigating the transmission interference.
This work aims to design a model for distributed collaborative inference requests and path planning in a UAV swarm while respecting the resource constraints due to the computational load and memory usage of the inference requests. The model is formulated as an optimization problem and aims to minimize latency. The formulated problem is NP-hard so finding the optimal solution is quite complex; thus, this paper introduces a real-time and dynamic solution for online applications using deep reinforcement learning. We conduct extensive simulations and compare our results to the-state-of-the-art studies demonstrating that our model outperforms the competing models.
△ Less
Submitted 21 December, 2022;
originally announced December 2022.
-
Motif-guided Time Series Counterfactual Explanations
Authors:
Peiyu Li,
Soukaina Filali Boubrahimi,
Shah Muhammad Hamdi
Abstract:
With the rising need of interpretable machine learning methods, there is a necessity for a rise in human effort to provide diverse explanations of the influencing factors of the model decisions. To improve the trust and transparency of AI-based systems, the EXplainable Artificial Intelligence (XAI) field has emerged. The XAI paradigm is bifurcated into two main categories: feature attribution and…
▽ More
With the rising need of interpretable machine learning methods, there is a necessity for a rise in human effort to provide diverse explanations of the influencing factors of the model decisions. To improve the trust and transparency of AI-based systems, the EXplainable Artificial Intelligence (XAI) field has emerged. The XAI paradigm is bifurcated into two main categories: feature attribution and counterfactual explanation methods. While feature attribution methods are based on explaining the reason behind a model decision, counterfactual explanation methods discover the smallest input changes that will result in a different decision. In this paper, we aim at building trust and transparency in time series models by using motifs to generate counterfactual explanations. We propose Motif-Guided Counterfactual Explanation (MG-CF), a novel model that generates intuitive post-hoc counterfactual explanations that make full use of important motifs to provide interpretive information in decision-making processes. To the best of our knowledge, this is the first effort that leverages motifs to guide the counterfactual explanation generation. We validated our model using five real-world time-series datasets from the UCR repository. Our experimental results show the superiority of MG-CF in balancing all the desirable counterfactual explanations properties in comparison with other competing state-of-the-art baselines.
△ Less
Submitted 1 February, 2024; v1 submitted 8 November, 2022;
originally announced November 2022.
-
A Survey on Mobile Edge Computing for Video Streaming: Opportunities and Challenges
Authors:
Muhammad Asif Khan,
Emna Baccour,
Zina Chkirbene,
Aiman Erbad,
Ridha Hamila,
Mounir Hamdi,
Moncef Gabbouj
Abstract:
5G communication brings substantial improvements in the quality of service provided to various applications by achieving higher throughput and lower latency. However, interactive multimedia applications (e.g., ultra high definition video conferencing, 3D and multiview video streaming, crowd-sourced video streaming, cloud gaming, virtual and augmented reality) are becoming more ambitious with high…
▽ More
5G communication brings substantial improvements in the quality of service provided to various applications by achieving higher throughput and lower latency. However, interactive multimedia applications (e.g., ultra high definition video conferencing, 3D and multiview video streaming, crowd-sourced video streaming, cloud gaming, virtual and augmented reality) are becoming more ambitious with high volume and low latency video streams putting strict demands on the already congested networks. Mobile Edge Computing (MEC) is an emerging paradigm that extends cloud computing capabilities to the edge of the network i.e., at the base station level. To meet the latency requirements and avoid the end-to-end communication with remote cloud data centers, MEC allows to store and process video content (e.g., caching, transcoding, pre-processing) at the base stations. Both video on demand and live video streaming can utilize MEC to improve existing services and develop novel use cases, such as video analytics, and targeted advertisements. MEC is expected to reshape the future of video streaming by providing ultra-reliable and low latency streaming (e.g., in augmented reality, virtual reality, and autonomous vehicles), pervasive computing (e.g., in real-time video analytics), and blockchain-enabled architecture for secure live streaming. This paper presents a comprehensive survey of recent developments in MEC-enabled video streaming bringing unprecedented improvement to enable novel use cases. A detailed review of the state-of-the-art is presented covering novel caching schemes, optimal computation offloading, cooperative caching and offloading and the use of artificial intelligence (i.e., machine learning, deep learning, and reinforcement learning) in MEC-assisted video streaming services.
△ Less
Submitted 13 September, 2022;
originally announced September 2022.
-
RL-DistPrivacy: Privacy-Aware Distributed Deep Inference for low latency IoT systems
Authors:
Emna Baccour,
Aiman Erbad,
Amr Mohamed,
Mounir Hamdi,
Mohsen Guizani
Abstract:
Although Deep Neural Networks (DNN) have become the backbone technology of several ubiquitous applications, their deployment in resource-constrained machines, e.g., Internet of Things (IoT) devices, is still challenging. To satisfy the resource requirements of such a paradigm, collaborative deep inference with IoT synergy was introduced. However, the distribution of DNN networks suffers from sever…
▽ More
Although Deep Neural Networks (DNN) have become the backbone technology of several ubiquitous applications, their deployment in resource-constrained machines, e.g., Internet of Things (IoT) devices, is still challenging. To satisfy the resource requirements of such a paradigm, collaborative deep inference with IoT synergy was introduced. However, the distribution of DNN networks suffers from severe data leakage. Various threats have been presented, including black-box attacks, where malicious participants can recover arbitrary inputs fed into their devices. Although many countermeasures were designed to achieve privacy-preserving DNN, most of them result in additional computation and lower accuracy. In this paper, we present an approach that targets the security of collaborative deep inference via re-thinking the distribution strategy, without sacrificing the model performance. Particularly, we examine different DNN partitions that make the model susceptible to black-box threats and we derive the amount of data that should be allocated per device to hide proprieties of the original input. We formulate this methodology, as an optimization, where we establish a trade-off between the latency of co-inference and the privacy-level of data. Next, to relax the optimal solution, we shape our approach as a Reinforcement Learning (RL) design that supports heterogeneous devices as well as multiple DNNs/datasets.
△ Less
Submitted 27 August, 2022;
originally announced August 2022.
-
Shapelet-Based Counterfactual Explanations for Multivariate Time Series
Authors:
Omar Bahri,
Soukaina Filali Boubrahimi,
Shah Muhammad Hamdi
Abstract:
As machine learning and deep learning models have become highly prevalent in a multitude of domains, the main reservation in their adoption for decision-making processes is their black-box nature. The Explainable Artificial Intelligence (XAI) paradigm has gained a lot of momentum lately due to its ability to reduce models opacity. XAI methods have not only increased stakeholders' trust in the deci…
▽ More
As machine learning and deep learning models have become highly prevalent in a multitude of domains, the main reservation in their adoption for decision-making processes is their black-box nature. The Explainable Artificial Intelligence (XAI) paradigm has gained a lot of momentum lately due to its ability to reduce models opacity. XAI methods have not only increased stakeholders' trust in the decision process but also helped developers ensure its fairness. Recent efforts have been invested in creating transparent models and post-hoc explanations. However, fewer methods have been developed for time series data, and even less when it comes to multivariate datasets. In this work, we take advantage of the inherent interpretability of shapelets to develop a model agnostic multivariate time series (MTS) counterfactual explanation algorithm. Counterfactuals can have a tremendous impact on making black-box models explainable by indicating what changes have to be performed on the input to change the final decision. We test our approach on a real-life solar flare prediction dataset and prove that our approach produces high-quality counterfactuals. Moreover, a comparison to the only MTS counterfactual generation algorithm shows that, in addition to being visually interpretable, our explanations are superior in terms of proximity, sparsity, and plausibility.
△ Less
Submitted 22 August, 2022;
originally announced August 2022.
-
Terahertz Slonczewski propagating spin waves and large output voltage in antiferromagnetic spin-Hall nano-oscillators
Authors:
Mohammad Hamdi,
Dirk Grundler
Abstract:
We study theoretically antiferromagnet (AFM) based spin-Hall nano-oscillators (SHNOs) consisting of a nano-constriction (NC) in a thin-film uniaxial AFM. By solving the derived SW equation we evidence radially propagating spin waves (SWs) at THz frequencies similar to the Slonczewski SWs known at GHz frequencies for a ferromagnet-based SHNO. We predict a minimum threshold current for a specific NC…
▽ More
We study theoretically antiferromagnet (AFM) based spin-Hall nano-oscillators (SHNOs) consisting of a nano-constriction (NC) in a thin-film uniaxial AFM. By solving the derived SW equation we evidence radially propagating spin waves (SWs) at THz frequencies similar to the Slonczewski SWs known at GHz frequencies for a ferromagnet-based SHNO. We predict a minimum threshold current for a specific NC radius accessible by the state-of-the-art nanotechnology. The exchange interaction enhanced spin pum** for AFMs leads to a strong thickness dependent threshold frequency. We show that the uniaxial AFMs generate ac electrical fields via spin pum** that are three orders of magnitude larger than reported for biaxial AFMs. Our work enhances the fundamental understanding of current-driven SWs in AFM-SHNOs and enables optimization of practical devices in terms of material choice, device geometry, and frequency tunability. The propagating SWs offer remote THz signal generation and an efficient means for synchronization of SHNOs when aiming at high power.
△ Less
Submitted 11 August, 2023; v1 submitted 15 June, 2022;
originally announced June 2022.
-
Synthetic PET via Domain Translation of 3D MRI
Authors:
Abhejit Rajagopal,
Yutaka Natsuaki,
Kristen Wangerin,
Mahdjoub Hamdi,
Hongyu An,
John J. Sunderland,
Richard Laforest,
Paul E. Kinahan,
Peder E. Z. Larson,
Thomas A. Hope
Abstract:
Historically, patient datasets have been used to develop and validate various reconstruction algorithms for PET/MRI and PET/CT. To enable such algorithm development, without the need for acquiring hundreds of patient exams, in this paper we demonstrate a deep learning technique to generate synthetic but realistic whole-body PET sinograms from abundantly-available whole-body MRI. Specifically, we u…
▽ More
Historically, patient datasets have been used to develop and validate various reconstruction algorithms for PET/MRI and PET/CT. To enable such algorithm development, without the need for acquiring hundreds of patient exams, in this paper we demonstrate a deep learning technique to generate synthetic but realistic whole-body PET sinograms from abundantly-available whole-body MRI. Specifically, we use a dataset of 56 $^{18}$F-FDG-PET/MRI exams to train a 3D residual UNet to predict physiologic PET uptake from whole-body T1-weighted MRI. In training we implemented a balanced loss function to generate realistic uptake across a large dynamic range and computed losses along tomographic lines of response to mimic the PET acquisition. The predicted PET images are forward projected to produce synthetic PET time-of-flight (ToF) sinograms that can be used with vendor-provided PET reconstruction algorithms, including using CT-based attenuation correction (CTAC) and MR-based attenuation correction (MRAC). The resulting synthetic data recapitulates physiologic $^{18}$F-FDG uptake, e.g. high uptake localized to the brain and bladder, as well as uptake in liver, kidneys, heart and muscle. To simulate abnormalities with high uptake, we also insert synthetic lesions. We demonstrate that this synthetic PET data can be used interchangeably with real PET data for the PET quantification task of comparing CT and MR-based attenuation correction methods, achieving $\leq 7.6\%$ error in mean-SUV compared to using real data. These results together show that the proposed synthetic PET data pipeline can be reasonably used for development, evaluation, and validation of PET/MRI reconstruction methods.
△ Less
Submitted 11 June, 2022;
originally announced June 2022.
-
Magnetochiral Properties of Spin Waves Existing in Nanotubes with Axial and Circumferential Magnetization
Authors:
Maria Carmen Giordano,
Mohammad Hamdi,
Andrea Mucchietto,
Dirk Grundler
Abstract:
We report experimental studies of spin-wave excitations in individual 22 nm thick Ni80Fe20 nanotubes with diameters of about 150 nm by means of Brillouin light-scattering (BLS) spectroscopy. Irradiated by microwaves we resolve sets of discrete resonances in the center of nanotubes ranging from 2.5 to 12.5 GHz. Comparing to a recent theoretical work and micromagnetic simulations, we identify differ…
▽ More
We report experimental studies of spin-wave excitations in individual 22 nm thick Ni80Fe20 nanotubes with diameters of about 150 nm by means of Brillouin light-scattering (BLS) spectroscopy. Irradiated by microwaves we resolve sets of discrete resonances in the center of nanotubes ranging from 2.5 to 12.5 GHz. Comparing to a recent theoretical work and micromagnetic simulations, we identify different characteristic eigenmodes depending on the axial, mixed or vortex configuration. The mixed and vortex states give rise to modes with helical phase profiles substantiating an unusual nature of modes attributed to non-reciprocal spin waves. Our findings provide microscopic insight into tubular spin-wave nanocavities and magnetochiral effects for 3D nanomagnonics.
△ Less
Submitted 27 April, 2022;
originally announced April 2022.
-
Hierarchical Multi-Agent DRL-Based Framework for Joint Multi-RAT Assignment and Dynamic Resource Allocation in Next-Generation HetNets
Authors:
Abdulmalik Alwarafy,
Bekir Sait Ciftler,
Mohamed Abdallah,
Mounir Hamdi,
Naofal Al-Dhahir
Abstract:
This paper considers the problem of cost-aware downlink sum-rate maximization via joint optimal radio access technologies (RATs) assignment and power allocation in next-generation heterogeneous wireless networks (HetNets). We consider a future HetNet comprised of multi-RATs and serving multi-connectivity edge devices (EDs), and we formulate the problem as mixed-integer non-linear programming (MINP…
▽ More
This paper considers the problem of cost-aware downlink sum-rate maximization via joint optimal radio access technologies (RATs) assignment and power allocation in next-generation heterogeneous wireless networks (HetNets). We consider a future HetNet comprised of multi-RATs and serving multi-connectivity edge devices (EDs), and we formulate the problem as mixed-integer non-linear programming (MINP) problem. Due to the high complexity and combinatorial nature of this problem and the difficulty to solve it using conventional methods, we propose a hierarchical multi-agent deep reinforcement learning (DRL)-based framework, called DeepRAT, to solve it efficiently and learn system dynamics. In particular, the DeepRAT framework decomposes the problem into two main stages; the RATs-EDs assignment stage, which implements a single-agent Deep Q Network (DQN) algorithm, and the power allocation stage, which utilizes a multi-agent Deep Deterministic Policy Gradient (DDPG) algorithm. Using simulations, we demonstrate how the various DRL agents efficiently interact to learn system dynamics and derive the global optimal policy. Furthermore, our simulation results show that the proposed DeepRAT algorithm outperforms existing state-of-the-art heuristic approaches in terms of network utility. Finally, we quantitatively show the ability of the DeepRAT model to quickly and dynamically adapt to abrupt changes in network dynamics, such as EDs mobility.
△ Less
Submitted 28 February, 2022;
originally announced February 2022.
-
Machine Learning Empowered Intelligent Data Center Networking: A Survey
Authors:
Bo Li,
Ting Wang,
Peng Yang,
Mingsong Chen,
Shui Yu,
Mounir Hamdi
Abstract:
To support the needs of ever-growing cloud-based services, the number of servers and network devices in data centers is increasing exponentially, which in turn results in high complexities and difficulties in network optimization. To address these challenges, both academia and industry turn to artificial intelligence technology to realize network intelligence. To this end, a considerable number of…
▽ More
To support the needs of ever-growing cloud-based services, the number of servers and network devices in data centers is increasing exponentially, which in turn results in high complexities and difficulties in network optimization. To address these challenges, both academia and industry turn to artificial intelligence technology to realize network intelligence. To this end, a considerable number of novel and creative machine learning-based (ML-based) research works have been put forward in recent few years. Nevertheless, there are still enormous challenges faced by the intelligent optimization of data center networks (DCNs), especially in the scenario of online real-time dynamic processing of massive heterogeneous services and traffic data. To best of our knowledge, there is a lack of systematic and original comprehensively investigations with in-depth analysis on intelligent DCN. To this end, in this paper, we comprehensively investigate the application of machine learning to data center networking, and provide a general overview and in-depth analysis of the recent works, covering flow prediction, flow classification, load balancing, resource management, routing optimization, and congestion control. In order to provide a multi-dimensional and multi-perspective comparison of various solutions, we design a quality assessment criteria called REBEL-3S to impartially measure the strengths and weaknesses of these research works. Moreover, we also present unique insights into the technology evolution of the fusion of data center network and machine learning, together with some challenges and potential future research opportunities.
△ Less
Submitted 28 February, 2022; v1 submitted 28 February, 2022;
originally announced February 2022.
-
LoRa-RL: Deep Reinforcement Learning for Resource Management in Hybrid Energy LoRa Wireless Networks
Authors:
Rami Hamdi,
Emna Baccour,
Aiman Erbad,
Marwa Qaraqe,
Mounir Hamdi
Abstract:
LoRa wireless networks are considered as a key enabling technology for next generation internet of things (IoT) systems. New IoT deployments (e.g., smart city scenarios) can have thousands of devices per square kilometer leading to huge amount of power consumption to provide connectivity. In this paper, we investigate green LoRa wireless networks powered by a hybrid of the grid and renewable energ…
▽ More
LoRa wireless networks are considered as a key enabling technology for next generation internet of things (IoT) systems. New IoT deployments (e.g., smart city scenarios) can have thousands of devices per square kilometer leading to huge amount of power consumption to provide connectivity. In this paper, we investigate green LoRa wireless networks powered by a hybrid of the grid and renewable energy sources, which can benefit from harvested energy while dealing with the intermittent supply. This paper proposes resource management schemes of the limited number of channels and spreading factors (SFs) with the objective of improving the LoRa gateway energy efficiency. First, the problem of grid power consumption minimization while satisfying the system's quality of service demands is formulated. Specifically, both scenarios the uncorrelated and time-correlated channels are investigated. The optimal resource management problem is solved by decoupling the formulated problem into two sub-problems: channel and SF assignment problem and energy management problem. Since the optimal solution is obtained with high complexity, online resource management heuristic algorithms that minimize the grid energy consumption are proposed. Finally, taking into account the channel and energy correlation, adaptable resource management schemes based on Reinforcement Learning (RL), are developed. Simulations results show that the proposed resource management schemes offer efficient use of renewable energy in LoRa wireless networks.
△ Less
Submitted 6 September, 2021;
originally announced September 2021.
-
Magnetoelastic coupling enabled tunability of magnon spin current generation in 2D antiferromagnets
Authors:
Nasim Bazazzadeh,
Mohammad Hamdi,
Sungjoon Park,
Amin Khavasi,
S. Majid Mohseni,
Ali Sadeghi
Abstract:
We theoretically investigate the magnetoelastic coupling (MEC) and its effect on magnon transport in two-dimensional antiferromagnets with a honeycomb lattice. MEC coeffcient along with magnetic exchange parameters and spring constants are computed for monolayers of transition metal trichalcogenides with Néel order ($\text{MnPS}_3$ and $\text{VPS}_3$) and zigzag order ($\text{CrSiTe}_3$,…
▽ More
We theoretically investigate the magnetoelastic coupling (MEC) and its effect on magnon transport in two-dimensional antiferromagnets with a honeycomb lattice. MEC coeffcient along with magnetic exchange parameters and spring constants are computed for monolayers of transition metal trichalcogenides with Néel order ($\text{MnPS}_3$ and $\text{VPS}_3$) and zigzag order ($\text{CrSiTe}_3$, $\text{NiPS}_3$ and $\text{NiPSe}_3$) by $ab$ $initio$ calculations. Using these parameters, we predict that the spin-Nernst coefficient is significantly enhanced due to magnetoelastic coupling. Our study shows that although Dzyaloshinskii-Moriya interaction can produce spin Nernst effect in these materials, other mechanisms such as magnon-phonon coupling should be taken into account. We also demonstrate that the magnetic anisotropy is an important factor for control of magnon-phonon hybridization and enhancement of the Berry curvature and thus the spin-Nernst coefficient. Our results pave the way towards gate tunable spin current generation in 2D magnets by SNE via electric field modulation of MEC and anisotropy.
△ Less
Submitted 18 August, 2021;
originally announced August 2021.
-
Emotion Recognition for Healthcare Surveillance Systems Using Neural Networks: A Survey
Authors:
Marwan Dhuheir,
Abdullatif Albaseer,
Emna Baccour,
Aiman Erbad,
Mohamed Abdallah,
Mounir Hamdi
Abstract:
Recognizing the patient's emotions using deep learning techniques has attracted significant attention recently due to technological advancements. Automatically identifying the emotions can help build smart healthcare centers that can detect depression and stress among the patients in order to start the medication early. Using advanced technology to identify emotions is one of the most exciting top…
▽ More
Recognizing the patient's emotions using deep learning techniques has attracted significant attention recently due to technological advancements. Automatically identifying the emotions can help build smart healthcare centers that can detect depression and stress among the patients in order to start the medication early. Using advanced technology to identify emotions is one of the most exciting topics as it defines the relationships between humans and machines. Machines learned how to predict emotions by adopting various methods. In this survey, we present recent research in the field of using neural networks to recognize emotions. We focus on studying emotions' recognition from speech, facial expressions, and audio-visual input and show the different techniques of deploying these algorithms in the real world. These three emotion recognition techniques can be used as a surveillance system in healthcare centers to monitor patients. We conclude the survey with a presentation of the challenges and the related future work to provide an insight into the applications of using emotion recognition.
△ Less
Submitted 13 July, 2021;
originally announced July 2021.
-
Efficient Real-Time Image Recognition Using Collaborative Swarm of UAVs and Convolutional Networks
Authors:
Marwan Dhuheir,
Emna Baccour,
Aiman Erbad,
Sinan Sabeeh,
Mounir Hamdi
Abstract:
Unmanned Aerial Vehicles (UAVs) have recently attracted significant attention due to their outstanding ability to be used in different sectors and serve in difficult and dangerous areas. Moreover, the advancements in computer vision and artificial intelligence have increased the use of UAVs in various applications and solutions, such as forest fires detection and borders monitoring. However, using…
▽ More
Unmanned Aerial Vehicles (UAVs) have recently attracted significant attention due to their outstanding ability to be used in different sectors and serve in difficult and dangerous areas. Moreover, the advancements in computer vision and artificial intelligence have increased the use of UAVs in various applications and solutions, such as forest fires detection and borders monitoring. However, using deep neural networks (DNNs) with UAVs introduces several challenges of processing deeper networks and complex models, which restricts their on-board computation. In this work, we present a strategy aiming at distributing inference requests to a swarm of resource-constrained UAVs that classifies captured images on-board and finds the minimum decision-making latency. We formulate the model as an optimization problem that minimizes the latency between acquiring images and making the final decisions. The formulated optimization solution is an NP-hard problem. Hence it is not adequate for online resource allocation. Therefore, we introduce an online heuristic solution, namely DistInference, to find the layers placement strategy that gives the best latency among the available UAVs. The proposed approach is general enough to be used for different low decision-latency applications as well as for all CNN types organized into the pipeline of layers (e.g., VGG) or based on residual blocks (e.g., ResNet).
△ Less
Submitted 9 July, 2021;
originally announced July 2021.
-
An Intelligent Resource Reservation for Crowdsourced Live Video Streaming Applications in Geo-Distributed Cloud Environment
Authors:
Emna Baccour,
Fatima Haouari,
Aiman Erbad,
Amr Mohamed,
Kashif Bilal,
Mohsen Guizani,
Mounir Hamdi
Abstract:
Crowdsourced live video streaming (livecast) services such as Facebook Live, YouNow, Douyu and Twitch are gaining more momentum recently. Allocating the limited resources in a cost-effective manner while maximizing the Quality of Service (QoS) through real-time delivery and the provision of the appropriate representations for all viewers is a challenging problem. In our paper, we introduce a machi…
▽ More
Crowdsourced live video streaming (livecast) services such as Facebook Live, YouNow, Douyu and Twitch are gaining more momentum recently. Allocating the limited resources in a cost-effective manner while maximizing the Quality of Service (QoS) through real-time delivery and the provision of the appropriate representations for all viewers is a challenging problem. In our paper, we introduce a machine-learning based predictive resource allocation framework for geo-distributed cloud sites, considering the delay and quality constraints to guarantee the maximum QoS for viewers and the minimum cost for content providers. First, we present an offline optimization that decides the required transcoding resources in distributed regions near the viewers with a trade-off between the QoS and the overall cost. Second, we use machine learning to build forecasting models that proactively predict the approximate transcoding resources to be reserved at each cloud site ahead of time. Finally, we develop a Greedy Nearest and Cheapest algorithm (GNCA) to perform the resource allocation of real-time broadcasted videos on the rented resources. Extensive simulations have shown that GNCA outperforms the state-of-the art resource allocation approaches for crowdsourced live streaming by achieving more than 20% gain in terms of system cost while serving the viewers with relatively lower latency.
△ Less
Submitted 4 June, 2021;
originally announced June 2021.
-
Deep Reinforcement Learning for Radio Resource Allocation and Management in Next Generation Heterogeneous Wireless Networks: A Survey
Authors:
Abdulmalik Alwarafy,
Mohamed Abdallah,
Bekir Sait Ciftler,
Ala Al-Fuqaha,
Mounir Hamdi
Abstract:
Next generation wireless networks are expected to be extremely complex due to their massive heterogeneity in terms of the types of network architectures they incorporate, the types and numbers of smart IoT devices they serve, and the types of emerging applications they support. In such large-scale and heterogeneous networks (HetNets), radio resource allocation and management (RRAM) becomes one of…
▽ More
Next generation wireless networks are expected to be extremely complex due to their massive heterogeneity in terms of the types of network architectures they incorporate, the types and numbers of smart IoT devices they serve, and the types of emerging applications they support. In such large-scale and heterogeneous networks (HetNets), radio resource allocation and management (RRAM) becomes one of the major challenges encountered during system design and deployment. In this context, emerging Deep Reinforcement Learning (DRL) techniques are expected to be one of the main enabling technologies to address the RRAM in future wireless HetNets. In this paper, we conduct a systematic in-depth, and comprehensive survey of the applications of DRL techniques in RRAM for next generation wireless networks. Towards this, we first overview the existing traditional RRAM methods and identify their limitations that motivate the use of DRL techniques in RRAM. Then, we provide a comprehensive review of the most widely used DRL algorithms to address RRAM problems, including the value- and policy-based algorithms. The advantages, limitations, and use-cases for each algorithm are provided. We then conduct a comprehensive and in-depth literature review and classify existing related works based on both the radio resources they are addressing and the type of wireless networks they are investigating. To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. Finally, we highlight important open challenges and provide insights into several future research directions in the context of DRL-based RRAM. This survey is intentionally designed to guide and stimulate more research endeavors towards building efficient and fine-grained DRL-based RRAM schemes for future wireless networks.
△ Less
Submitted 25 May, 2021;
originally announced June 2021.
-
Distributed CNN Inference on Resource-Constrained UAVs for Surveillance Systems: Design and Optimization
Authors:
Mohammed Jouhari,
Abdulla Al-Ali,
Emna Baccour,
Amr Mohamed,
Aiman Erbad,
Mohsen Guizani,
Mounir Hamdi
Abstract:
Unmanned Aerial Vehicles (UAVs) have attracted great interest in the last few years owing to their ability to cover large areas and access difficult and hazardous target zones, which is not the case of traditional systems relying on direct observations obtained from fixed cameras and sensors. Furthermore, thanks to the advancements in computer vision and machine learning, UAVs are being adopted fo…
▽ More
Unmanned Aerial Vehicles (UAVs) have attracted great interest in the last few years owing to their ability to cover large areas and access difficult and hazardous target zones, which is not the case of traditional systems relying on direct observations obtained from fixed cameras and sensors. Furthermore, thanks to the advancements in computer vision and machine learning, UAVs are being adopted for a broad range of solutions and applications. However, Deep Neural Networks (DNNs) are progressing toward deeper and complex models that prevent them from being executed on-board. In this paper, we propose a DNN distribution methodology within UAVs to enable data classification in resource-constrained devices and avoid extra delays introduced by the server-based solutions due to data communication over air-to-ground links. The proposed method is formulated as an optimization problem that aims to minimize the latency between data collection and decision-making while considering the mobility model and the resource constraints of the UAVs as part of the air-to-air communication. We also introduce the mobility prediction to adapt our system to the dynamics of UAVs and the network variation. The simulation conducted to evaluate the performance and benchmark the proposed methods, namely Optimal UAV-based Layer Distribution (OULD) and OULD with Mobility Prediction (OULD-MP), were run in an HPC cluster. The obtained results show that our optimization solution outperforms the existing and heuristic-based approaches.
△ Less
Submitted 23 May, 2021;
originally announced May 2021.
-
Pervasive AI for IoT applications: A Survey on Resource-efficient Distributed Artificial Intelligence
Authors:
Emna Baccour,
Naram Mhaisen,
Alaa Awad Abdellatif,
Aiman Erbad,
Amr Mohamed,
Mounir Hamdi,
Mohsen Guizani
Abstract:
Artificial intelligence (AI) has witnessed a substantial breakthrough in a variety of Internet of Things (IoT) applications and services, spanning from recommendation systems to robotics control and military surveillance. This is driven by the easier access to sensory data and the enormous scale of pervasive/ubiquitous devices that generate zettabytes (ZB) of real-time data streams. Designing accu…
▽ More
Artificial intelligence (AI) has witnessed a substantial breakthrough in a variety of Internet of Things (IoT) applications and services, spanning from recommendation systems to robotics control and military surveillance. This is driven by the easier access to sensory data and the enormous scale of pervasive/ubiquitous devices that generate zettabytes (ZB) of real-time data streams. Designing accurate models using such data streams, to predict future insights and revolutionize the decision-taking process, inaugurates pervasive systems as a worthy paradigm for a better quality-of-life. The confluence of pervasive computing and artificial intelligence, Pervasive AI, expanded the role of ubiquitous IoT systems from mainly data collection to executing distributed computations with a promising alternative to centralized learning, presenting various challenges. In this context, a wise cooperation and resource scheduling should be envisaged among IoT devices (e.g., smartphones, smart vehicles) and infrastructure (e.g. edge nodes, and base stations) to avoid communication and computation overheads and ensure maximum performance. In this paper, we conduct a comprehensive survey of the recent techniques developed to overcome these resource challenges in pervasive AI systems. Specifically, we first present an overview of the pervasive computing, its architecture, and its intersection with artificial intelligence. We then review the background, applications and performance metrics of AI, particularly Deep Learning (DL) and online learning, running in a ubiquitous system. Next, we provide a deep literature review of communication-efficient techniques, from both algorithmic and system perspectives, of distributed inference, training and online learning tasks across the combination of IoT devices, edge devices and cloud servers. Finally, we discuss our future vision and research challenges.
△ Less
Submitted 27 August, 2022; v1 submitted 4 May, 2021;
originally announced May 2021.
-
DQN-Based Multi-User Power Allocation for Hybrid RF/VLC Networks
Authors:
Bekir Sait Ciftler,
Abdulmalik Alwarafy,
Mohamed Abdallah,
Mounir Hamdi
Abstract:
In this paper, a Deep Q-Network (DQN) based multi-agent multi-user power allocation algorithm is proposed for hybrid networks composed of radio frequency (RF) and visible light communication (VLC) access points (APs). The users are capable of multihoming, which can bridge RF and VLC links for accommodating their bandwidth requirements. By leveraging a non-cooperative multi-agent DQN algorithm, whe…
▽ More
In this paper, a Deep Q-Network (DQN) based multi-agent multi-user power allocation algorithm is proposed for hybrid networks composed of radio frequency (RF) and visible light communication (VLC) access points (APs). The users are capable of multihoming, which can bridge RF and VLC links for accommodating their bandwidth requirements. By leveraging a non-cooperative multi-agent DQN algorithm, where each AP is an agent, an online power allocation strategy is developed to optimize the transmit power for providing users' required data rate. Our simulation results demonstrate that DQN's median convergence time training is 90% shorter than the Q-Learning (QL) based algorithm. The DQN-based algorithm converges to the desired user rate in half duration on average while converging with the rate of 96.1% compared to the QL-based algorithm's convergence rate of 72.3% Additionally, thanks to its continuous state-space definition, the DQN-based power allocation algorithm provides average user data rates closer to the target rates than the QL-based algorithm when it converges.
△ Less
Submitted 3 February, 2021;
originally announced February 2021.
-
DistPrivacy: Privacy-Aware Distributed Deep Neural Networks in IoT surveillance systems
Authors:
Emna Baccour,
Aiman Erbad,
Amr Mohamed,
Mounir Hamdi,
Mohsen Guizani
Abstract:
With the emergence of smart cities, Internet of Things (IoT) devices as well as deep learning technologies have witnessed an increasing adoption. To support the requirements of such paradigm in terms of memory and computation, joint and real-time deep co-inference framework with IoT synergy was introduced. However, the distribution of Deep Neural Networks (DNN) has drawn attention to the privacy p…
▽ More
With the emergence of smart cities, Internet of Things (IoT) devices as well as deep learning technologies have witnessed an increasing adoption. To support the requirements of such paradigm in terms of memory and computation, joint and real-time deep co-inference framework with IoT synergy was introduced. However, the distribution of Deep Neural Networks (DNN) has drawn attention to the privacy protection of sensitive data. In this context, various threats have been presented, including black-box attacks, where a malicious participant can accurately recover an arbitrary input fed into his device. In this paper, we introduce a methodology aiming to secure the sensitive data through re-thinking the distribution strategy, without adding any computation overhead. First, we examine the characteristics of the model structure that make it susceptible to privacy threats. We found that the more we divide the model feature maps into a high number of devices, the better we hide proprieties of the original image. We formulate such a methodology, namely DistPrivacy, as an optimization problem, where we establish a trade-off between the latency of co-inference, the privacy level of the data, and the limited-resources of IoT participants. Due to the NP-hardness of the problem, we introduce an online heuristic that supports heterogeneous IoT devices as well as multiple DNNs and datasets, making the pervasive system a general-purpose platform for privacy-aware and low decision-latency applications.
△ Less
Submitted 25 October, 2020;
originally announced October 2020.
-
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet of Things
Authors:
Abdulmalik Alwarafy,
Khaled A. Al-Thelaya,
Mohamed Abdallah,
Jens Schneider,
Mounir Hamdi
Abstract:
Internet of Things (IoT) is an innovative paradigm envisioned to provide massive applications that are now part of our daily lives. Millions of smart devices are deployed within complex networks to provide vibrant functionalities including communications, monitoring, and controlling of critical infrastructures. However, this massive growth of IoT devices and the corresponding huge data traffic gen…
▽ More
Internet of Things (IoT) is an innovative paradigm envisioned to provide massive applications that are now part of our daily lives. Millions of smart devices are deployed within complex networks to provide vibrant functionalities including communications, monitoring, and controlling of critical infrastructures. However, this massive growth of IoT devices and the corresponding huge data traffic generated at the edge of the network created additional burdens on the state-of-the-art centralized cloud computing paradigm due to the bandwidth and resources scarcity. Hence, edge computing (EC) is emerging as an innovative strategy that brings data processing and storage near to the end users, leading to what is called EC-assisted IoT. Although this paradigm provides unique features and enhanced quality of service (QoS), it also introduces huge risks in data security and privacy aspects. This paper conducts a comprehensive survey on security and privacy issues in the context of EC-assisted IoT. In particular, we first present an overview of EC-assisted IoT including definitions, applications, architecture, advantages, and challenges. Second, we define security and privacy in the context of EC-assisted IoT. Then, we extensively discuss the major classifications of attacks in EC-assisted IoT and provide possible solutions and countermeasures along with the related research efforts. After that, we further classify some security and privacy issues as discussed in the literature based on security services and based on security objectives and functions. Finally, several open challenges and future research directions for secure EC-assisted IoT paradigm are also extensively provided.
△ Less
Submitted 5 August, 2020;
originally announced August 2020.
-
Performance Analysis of Dual-Hop Underwater Wireless Optical Communication Systems over Mixture Exponential-Generalized Gamma Turbulence Channels
Authors:
Emna Zedini,
Abla Kammoun,
Hamza Soury,
Mounir Hamdi,
Mohamed-Slim Alouini
Abstract:
In this work, we present a unified framework for the performance analysis of dual-hop underwater wireless optical communication (UWOC) systems with amplify-and-forward fixed gain relays in the presence of air bubbles and temperature gradients. Operating under either heterodyne detection or intensity modulation with direct detection, the UWOC is modeled by the unified mixture Exponential-Generalize…
▽ More
In this work, we present a unified framework for the performance analysis of dual-hop underwater wireless optical communication (UWOC) systems with amplify-and-forward fixed gain relays in the presence of air bubbles and temperature gradients. Operating under either heterodyne detection or intensity modulation with direct detection, the UWOC is modeled by the unified mixture Exponential-Generalized Gamma distribution that we have proposed based on an experiment conducted in an indoor laboratory setup and has been shown to provide an excellent fit with the measured data under the considered lab channel scenarios. More specifically, we derive the cumulative distribution function (CDF) and the probability density function of the end-to-end signal-to-noise ratio (SNR) in exact closed-form in terms of the bivariate Fox's H function. Based on this CDF expression, we present novel results for the fundamental performance metrics such as the outage probability, the average bit-error rate (BER) for various modulation schemes, and the ergodic capacity. Additionally, very tight asymptotic results for the outage probability and the average BER at high SNR are obtained in terms of simple functions. Furthermore, we demonstrate that the dual-hop UWOC system can effectively mitigate the short range and both temperature gradients and air bubbles induced turbulences, as compared to the single UWOC link. All the results are verified via computer-based Monte-Carlo simulations.
△ Less
Submitted 5 July, 2020;
originally announced July 2020.
-
FacebookVideoLive18: A Live Video Streaming Dataset for Streams Metadata and Online Viewers Locations
Authors:
Emna Baccour,
Aiman Erbad,
Kashif Bilal,
Amr Mohamed,
Mohsen Guizani,
Mounir Hamdi
Abstract:
With the advancement in personal smart devices and pervasive network connectivity, users are no longer passive content consumers, but also contributors in producing new contents. This expansion in live services requires a detailed analysis of broadcasters' and viewers' behavior to maximize users' Quality of Experience (QoE). In this paper, we present a dataset gathered from one of the popular live…
▽ More
With the advancement in personal smart devices and pervasive network connectivity, users are no longer passive content consumers, but also contributors in producing new contents. This expansion in live services requires a detailed analysis of broadcasters' and viewers' behavior to maximize users' Quality of Experience (QoE). In this paper, we present a dataset gathered from one of the popular live streaming platforms: Facebook. In this dataset, we stored more than 1,500,000 live stream records collected in June and July 2018. These data include public live videos from all over the world. However, Facebook live API does not offer the possibility to collect online videos with their fine grained data. The API allows to get the general data of a stream, only if we know its ID (identifier). Therefore, using the live map website provided by Facebook and showing the locations of online streams and locations of viewers, we extracted video IDs and different coordinates along with general metadata. Then, having these IDs and using the API, we can collect the fine grained metadata of public videos that might be useful for the research community. We also present several preliminary analyses to describe and identify the patterns of the streams and viewers. Such fine grained details will enable the multimedia community to recreate real-world scenarios particularly for resource allocation, caching, computation, and transcoding in edge networks. Existing datasets do not provide the locations of the viewers, which limits the efforts made to allocate the multimedia resources as close as possible to viewers and to offer better QoE.
△ Less
Submitted 24 March, 2020;
originally announced March 2020.
-
The Adversarial Machine Learning Conundrum: Can The Insecurity of ML Become The Achilles' Heel of Cognitive Networks?
Authors:
Muhammad Usama,
Junaid Qadir,
Ala Al-Fuqaha,
Mounir Hamdi
Abstract:
The holy grail of networking is to create \textit{cognitive networks} that organize, manage, and drive themselves. Such a vision now seems attainable thanks in large part to the progress in the field of machine learning (ML), which has now already disrupted a number of industries and revolutionized practically all fields of research. But are the ML models foolproof and robust to security attacks t…
▽ More
The holy grail of networking is to create \textit{cognitive networks} that organize, manage, and drive themselves. Such a vision now seems attainable thanks in large part to the progress in the field of machine learning (ML), which has now already disrupted a number of industries and revolutionized practically all fields of research. But are the ML models foolproof and robust to security attacks to be in charge of managing the network? Unfortunately, many modern ML models are easily misled by simple and easily-crafted adversarial perturbations, which does not bode well for the future of ML-based cognitive networks unless ML vulnerabilities for the cognitive networking environment are identified, addressed, and fixed. The purpose of this article is to highlight the problem of insecure ML and to sensitize the readers to the danger of adversarial ML by showing how an easily-crafted adversarial ML example can compromise the operations of the cognitive self-driving network. In this paper, we demonstrate adversarial attacks on two simple yet representative cognitive networking applications (namely, intrusion detection and network traffic classification). We also provide some guidelines to design secure ML models for cognitive networks that are robust to adversarial attacks on the ML pipeline of cognitive networks.
△ Less
Submitted 3 June, 2019;
originally announced June 2019.
-
Unified Statistical Channel Model for Turbulence-Induced Fading in Underwater Wireless Optical Communication Systems
Authors:
Emna Zedini,
Hassan M. Oubei,
Abla Kammoun,
Mounir Hamdi,
Boon S. Ooi,
Mohamed-Slim Alouini
Abstract:
A unified statistical model is proposed to characterize turbulence-induced fading in underwater wireless optical communication (UWOC) channels in the presence of air bubbles and temperature gradient for fresh and salty waters, based on experimental data. In this model, the channel irradiance fluctuations are characterized by the mixture Exponential-Generalized Gamma (EGG) distribution. We use the…
▽ More
A unified statistical model is proposed to characterize turbulence-induced fading in underwater wireless optical communication (UWOC) channels in the presence of air bubbles and temperature gradient for fresh and salty waters, based on experimental data. In this model, the channel irradiance fluctuations are characterized by the mixture Exponential-Generalized Gamma (EGG) distribution. We use the expectation maximization (EM) algorithm to obtain the maximum likelihood parameter estimation of the new model. Interestingly, the proposed model is shown to provide a perfect fit with the measured data under all channel conditions for both types of water. The major advantage of the new model is that it has a simple mathematical form making it attractive from a performance analysis point of view. Indeed, we show that the application of the EGG model leads to closed-form and analytically tractable expressions for key UWOC system performance metrics such as the outage probability, the average bit-error rate, and the ergodic capacity. To the best of our knowledge, this is the first-ever comprehensive channel model addressing the statistics of optical beam irradiance fluctuations in underwater wireless optical channels due to both air bubbles and temperature gradient.
△ Less
Submitted 15 October, 2018;
originally announced October 2018.
-
Electrical and optical properties of MoS$_{2}$,MoO$_{x=2,3}$(MoSO)/RGO heterostructure
Authors:
S. Erfanifam,
L. Jamilpanah,
P. Sangpour,
M. Hamdi,
F. Haddadi,
M. Erfanifam,
G. Chanda,
T. Herrmannsdörfer,
V. Sazgari,
A. Sadeghi,
M. Mohseni
Abstract:
We report on transport properties of the controllable large area MoSO/Reduced graphene oxide(RGO) heterostructures electrodeposited on FTO substrates and its comparision with theoretical calculations on MoSo/Gr. I-V characteristics of the heterostructure made by P or n-type MoSO, exhibit Schottkey behavior in the interface similar to the MoS$_{2}$/Gr ones. Theoretical calculations show significant…
▽ More
We report on transport properties of the controllable large area MoSO/Reduced graphene oxide(RGO) heterostructures electrodeposited on FTO substrates and its comparision with theoretical calculations on MoSo/Gr. I-V characteristics of the heterostructure made by P or n-type MoSO, exhibit Schottkey behavior in the interface similar to the MoS$_{2}$/Gr ones. Theoretical calculations show significant effects of lateral layer size as well as layer number in the electronic properties. In monolayer MoS$_{2}$/Gr by increasing the lateral size the energy gap disappears and the Fermi level shifts towards valence band. In the case of bilayer MoS$_{2}$ on bilayer Gr structure, the Fermi level shift is again towards valence band but, the gap is slightly higher than the monolayer structure. We found that the experimentally obtained results for n-type MoSO/RGO results are qualitatively in agreement with theoretical calculations of the MoS$_{2}$/Gr heterostructure. These results are beneficial to understand and design the high quality and low cost MoSO/RGO based electronic, optoelectronic and energy storage devices or cocatalysts.
△ Less
Submitted 16 October, 2018; v1 submitted 10 August, 2018;
originally announced August 2018.
-
Magnetic Droplet Soliton Nucleation in Oblique Fields
Authors:
Morteza Mohseni,
M. Hamdi,
H. F. Yazdi,
S. A. H. Banuazizi,
S. Chung,
S. R. Sani,
Johan Åkerman,
Majid Mohseni
Abstract:
We study the auto-oscillating magnetodynamics in orthogonal spin torque nano-oscillators (STNOs) as a function of the out-of-plane (OOP) magnetic field angle. In perpendicular fields and at OOP field angles down to approximately 50 degrees we observe the nucleation of a droplet. However, for field angles below 50 degrees, experiments indicate that the droplet gives way to propagating spin waves, i…
▽ More
We study the auto-oscillating magnetodynamics in orthogonal spin torque nano-oscillators (STNOs) as a function of the out-of-plane (OOP) magnetic field angle. In perpendicular fields and at OOP field angles down to approximately 50 degrees we observe the nucleation of a droplet. However, for field angles below 50 degrees, experiments indicate that the droplet gives way to propagating spin waves, in agreement with our micromagnetic simulations. Theoretical calculations show that the physical mechanism behind these observations is the sign changing of spin-wave nonlinearity (SWN) by angle. In addition, we show that the presence of a strong perpendicular magnetic anisotropy (PMA) free layer in the system reverses the angular dependence of the SWN and dynamics in STNOs with respect to the known behavior determined for the in-plane magnetic anisotropy free layer. Our results are of fundamental interest in understanding the rich dynamics of nanoscale solitons and spin-wave dynamics in STNOs.
△ Less
Submitted 23 April, 2018; v1 submitted 21 April, 2018;
originally announced April 2018.
-
Optimal Co-Optimizing of Distributed Generation and ESS Facilities Considering Voltage Stability
Authors:
Maichel Linotive,
Bruce Vargas,
Mohammd Hamdi
Abstract:
The paper deals with the optimal sizing and allocation of dispersed generation, and distributed storage systems. The optimization aims at minimizing the sum of the costs sustained by the distributor for the power losses, for network upgrading, for carrying out the reactive power service and the costs of storage and capacitor installation, over a planning period of several years. Also, analysis of…
▽ More
The paper deals with the optimal sizing and allocation of dispersed generation, and distributed storage systems. The optimization aims at minimizing the sum of the costs sustained by the distributor for the power losses, for network upgrading, for carrying out the reactive power service and the costs of storage and capacitor installation, over a planning period of several years. Also, analysis of the effect of distributed generation capacity and location on voltage stability enhancement of distribution networks are presented in this paper. The analysis is performed using a steady state voltage stability index which can be evaluated at each node of the distribution system. Different optimal capacities and locations are used to check this effect. The location of distributed generation has the main effect on the system voltage stability. Voltage stability should be taken into account as one of the objectives of distributed generation optimal allocation techniques. The analysis is conducted on a 69-node distribution system in order to show the feasibility of the proposed procedure.
△ Less
Submitted 12 February, 2018; v1 submitted 21 January, 2018;
originally announced January 2018.
-
Optimal Stochastic Management of Distributed Energy Storage Embedded with Wind Farms
Authors:
Xiao Yanchi,
Bruce Vargas,
Mohammd Hamdi
Abstract:
Increasing wind turbines (WT) penetration and low carbon demand can potentially lead to two different flow peaks, generation and load, within distribution networks. This will not only constrain WT penetration but also pose serious threats to network reliability. This paper proposes energy storage (ES) to reduce system congestion cost caused by the two peaks by sending cost-reflective economic sign…
▽ More
Increasing wind turbines (WT) penetration and low carbon demand can potentially lead to two different flow peaks, generation and load, within distribution networks. This will not only constrain WT penetration but also pose serious threats to network reliability. This paper proposes energy storage (ES) to reduce system congestion cost caused by the two peaks by sending cost-reflective economic signals to affect ES operation in responding to network conditions. Firstly, a new charging and discharging (C/D) strategy based on Binary Search Method is designed for ES, which responds to system congestion cost over time. Then, a novel pricing method, based on Location Marginal Pricing, is designed for ES. The pricing model is derived by evaluating ES impact on the network power flows and congestion from the loss and congestion components in Location Marginal Pricing. The impact is then converted into an hourly economic signal to reflect ES operation. The proposed ES C/D strategy and pricing methods are validated on a real local Grid Supply Point area. Results show that the proposed Location Marginal Pricing-based pricing is efficient to capture the feature of ES and provide signals for affecting its operation. This work can further increase network flexibility and the capability of networks to accommodate increasing WT penetration.
△ Less
Submitted 12 February, 2018; v1 submitted 1 January, 2018;
originally announced January 2018.
-
CeMon: A Cost-effective Flow Monitoring System in Software Defined Networks
Authors:
Zhiyang Su,
Ting Wang,
Yu Xia,
Mounir Hamdi
Abstract:
Network monitoring and measurement are crucial in network management to facilitate quality of service routing and performance evaluation. Software Defined Networking (SDN) makes network management easier by separating the control plane and data plane. Network monitoring in SDN is relatively light-weight since operators only need to install a monitoring module into the controller. Active monitoring…
▽ More
Network monitoring and measurement are crucial in network management to facilitate quality of service routing and performance evaluation. Software Defined Networking (SDN) makes network management easier by separating the control plane and data plane. Network monitoring in SDN is relatively light-weight since operators only need to install a monitoring module into the controller. Active monitoring techniques usually introduce extra overhead into the network. The state-of-the-art approaches utilize sampling, aggregation and passive measurement techniques to reduce measurement overhead. However, little work has focused on reducing the communication cost of network monitoring. Moreover, most of the existing approaches select polling switch nodes by sub-optimal local heuristics.Inspired by the visibility and central control of SDN, we propose CeMon, a generic low-cost high-accuracy monitoring system that supports various network management tasks. We first propose a Maximum Coverage Polling Scheme (MCPS) to optimize the polling cost for all active flows. The problem is formulated as a weighted set cover problem which is proved to be NP-hard. Heuristics are presented to obtain the polling scheme efficiently and handle traffic dynamics practically. In order to balance the cost and flexibility, an Adaptive Fine-grained Polling Scheme (AFPS) is proposed as a complementary method to implement flow level measurement tasks. Three sampling algorithms are further proposed to eliminate measurement overhead while maintain high accuracy. Both emulation and simulation results show that MCPS reduces more than 50% of the communication cost with negligible loss of accuracy for different topologies and traffics. We also use real traces to demonstrate that AFPS reduces the cost by up to 20% with only 1.5% loss in accuracy.
△ Less
Submitted 16 October, 2017;
originally announced October 2017.
-
FlowCover: Low-cost Flow Monitoring Scheme in Software Defined Networks
Authors:
Zhiyang Su,
Ting Wang,
Yu Xia,
Mounir Hamdi
Abstract:
Network monitoring and measurement are crucial in network management to facilitate quality of service routing and performance evaluation. Software Defined Networking (SDN) makes network management easier by separating the control plane and data plane. Network monitoring in SDN is lightweight as operators only need to install a monitoring module into the controller. Active monitoring techniques usu…
▽ More
Network monitoring and measurement are crucial in network management to facilitate quality of service routing and performance evaluation. Software Defined Networking (SDN) makes network management easier by separating the control plane and data plane. Network monitoring in SDN is lightweight as operators only need to install a monitoring module into the controller. Active monitoring techniques usually introduce too many overheads into the network. The state-of-the-art approaches utilize sampling method, aggregation flow statistics and passive measurement techniques to reduce overheads. However, little work in literature has focus on reducing the communication cost of network monitoring. Moreover, most of the existing approaches select the polling switch nodes by sub-optimal local heuristics. Inspired by the visibility and central control of SDN, we propose FlowCover, a low-cost high-accuracy monitoring scheme to support various network management tasks. We leverage the global view of the network topology and active flows to minimize the communication cost by formulating the problem as a weighted set cover, which is proved to be NP-hard. Heuristics are presented to obtain the polling scheme efficiently and handle flow changes practically. We build a simulator to evaluate the performance of FlowCover. Extensive experiment results show that FlowCover reduces roughly 50% communication cost without loss of accuracy in most cases.
△ Less
Submitted 16 October, 2017;
originally announced October 2017.
-
Multi-Period Coordinated Management of Electric Vehicles in Zonal Power Markets: A Convex Relaxation Approach
Authors:
Shanxuei Chen,
Elizabeth Olivioufski,
Braian Dods,
Mohammd Hamdi
Abstract:
In recent years, developments in plug in hybrid electric vehicles have provided various environmental and economic advantages. In the future smart grids, electric vehicles are seen as an important means of transportation to reduce greenhouse gas emissions. One of the main issues regarding to this sort of vehicles is managing their charging time to prevent high peak loads over time. Deploying advan…
▽ More
In recent years, developments in plug in hybrid electric vehicles have provided various environmental and economic advantages. In the future smart grids, electric vehicles are seen as an important means of transportation to reduce greenhouse gas emissions. One of the main issues regarding to this sort of vehicles is managing their charging time to prevent high peak loads over time. Deploying advanced metering and automatic chargers can be a practical way not only for the vehicle owners to manage their energy consumption, but also for the utilities to manage the electricity load during the day by shifting the charging loads to the off-peak periods. Additionally, an efficient charging schedule can reduce the user's electricity bill cost. In this paper we propose a new coordinated multi-period management model for electric vehicles charging scheduling based on multi-objective approach, aiming at optimizing customers charging cost. In the proposed method, a stochastic model is given for starting time of charging, which makes the method a practical tool for simulating the vehicle owners charging behavior effectively. In order to verify the effectiveness of the proposed method, two market policies are used as case studies. The computation results can be used to evaluate the impact of electric vehicles scheduling on economic performance of smart grid.
△ Less
Submitted 12 February, 2018; v1 submitted 3 October, 2017;
originally announced October 2017.
-
Reserve Requirements in Ancillary Markets Using Consensus-Based Cooperative Model Considering Renewable Resources
Authors:
Yan Xiu,
Subior Magounder,
Stefanous Barose,
Mohammd Hamdi
Abstract:
From an economic point of view, a common criterion for assessing the merits of a reserve investment is its impacts on social welfare. The underlying assumption in using this criterion is that side payments may be used to distribute the social gains among all market players. In reality, however, since the impacts of an electricity reserve project on different players may vary, such side payments ar…
▽ More
From an economic point of view, a common criterion for assessing the merits of a reserve investment is its impacts on social welfare. The underlying assumption in using this criterion is that side payments may be used to distribute the social gains among all market players. In reality, however, since the impacts of an electricity reserve project on different players may vary, such side payments are rather difficult to implement. We present a three-stage scenario-based programming model for committing reserves in power markets with large amounts of wind power. We describe wind power generation in terms of a representative set of appropriately weighted scenarios, and we present a dual decomposition algorithm for solving the resulting stochastic program. We test our scenario generation methodology on a model of 118 bus system, and we show that the stochastic programming unit commitment policy outperforms common reserve rules.
△ Less
Submitted 12 February, 2018; v1 submitted 18 September, 2017;
originally announced September 2017.
-
Congestion-Driven Transmission Expansion Planning Considering Wind Power Generation in Spot Markets
Authors:
Mohammd Hamdi
Abstract:
The integration of a massive number of large-scale wind turbines brought about urgent technical challenge to power transmission network operators in terms of secure power supply and energy dispatching optimization. In this paper, an optimal framework is proposed for transmission expansion planning in a deregulated power market environment. The level of congestion in the network is utilized as the…
▽ More
The integration of a massive number of large-scale wind turbines brought about urgent technical challenge to power transmission network operators in terms of secure power supply and energy dispatching optimization. In this paper, an optimal framework is proposed for transmission expansion planning in a deregulated power market environment. The level of congestion in the network is utilized as the driving signal for the need of network expansion. A compromise between the congestion cost and the investment cost is used to determine the optimal expansion scheme. The long-term network expansion problem is formed as the decoupled combination of: 1) the master problem (minimization of investment costs subject to investment constraints and the Benders cuts generated by the operational problem (power pool) and 2) the operational problem, whose solution provides congestion details and associated multipliers. A proper power-pool model is developed and solved for congestion cost, congestion revenue, and transmission shadow prices. Also, we proposed to use a set of metrics to rate the effect of the expansion on the generators, demands, and the system as a whole. The proposed model is applied to the Garver six-bus system and to the IEEE 24-bus Reliability Test System.
△ Less
Submitted 12 February, 2018; v1 submitted 28 August, 2017;
originally announced August 2017.
-
Probabilistic Tri-level Market Models for Demand Side Management in Power Distribution Systems
Authors:
Mohammd Hamdi
Abstract:
The emerging interest in deployment of renewable energy resources (RESs) in smart system represents a great challenge to both system planners and owners of Microgrids (MGs) operators. In this regard, we propose a Tri-level power market models for designing demand side management systems to match power supply and shape renewable power generations. We characterize the resulting equilibria in competi…
▽ More
The emerging interest in deployment of renewable energy resources (RESs) in smart system represents a great challenge to both system planners and owners of Microgrids (MGs) operators. In this regard, we propose a Tri-level power market models for designing demand side management systems to match power supply and shape renewable power generations. We characterize the resulting equilibria in competitive as well as oligopolistic market, and propose distributed demand response algorithms to achieve the equilibria. The models serve as a starting point to include the appliance-level details and constraints for designing practical demand response schemes for smart power grids. In order to show the usefulness of proposed model, two various case studies are considered in this paper: uncoordinated and coordinated load demand. A novel mathematical model is further developed whereby the behavior of RES, in response to different electricity prices owing to demand response programs, is considered in generating the energy consumption of MGs.
△ Less
Submitted 12 February, 2018; v1 submitted 22 August, 2017;
originally announced August 2017.
-
Current induced multi-mode propagating spin waves in a spin transfer torque nano-contact with strong perpendicular magnetic anisotropy
Authors:
S. Morteza Mohseni,
H. F. Yazdi,
M. Hamdi,
T. Bracher,
S. Majid Mohseni
Abstract:
Current induced spin wave excitations in spin transfer torque nano-contacts are known as a promising way to generate exchange-dominated spin waves at the nano-scale. It has been shown that when these systems are magnetized in the film plane, broken spatial symmetry of the field around the nano-contact induced by the Oersted field opens the possibility for spin wave mode co-existence including a no…
▽ More
Current induced spin wave excitations in spin transfer torque nano-contacts are known as a promising way to generate exchange-dominated spin waves at the nano-scale. It has been shown that when these systems are magnetized in the film plane, broken spatial symmetry of the field around the nano-contact induced by the Oersted field opens the possibility for spin wave mode co-existence including a non-linear self-localized spin-wave bullet and a propagating mode. By means of micromagnetic simulations, here we show that in systems with strong perpendicular magnetic anisotropy (PMA) in the free layer, two propagating spin wave modes with different frequency and spatial distribution can be excited simultaneously. Our results indicate that in-plane magnetized spin transfer nano-contacts in PMA materials do not host a solitonic self-localized spin-wave bullet, which is different from previous studies for systems with in plane magnetic anisotropy. This feature renders them interesting for nano-scale magnonic waveguides and crystals since magnon transport can be configured by tuning the applied current.
△ Less
Submitted 19 August, 2017;
originally announced August 2017.
-
Spin-orbit-torque driven magnetoimpedance in Pt-layer/magnetic-ribbon heterostructures
Authors:
M. R. Hajiali,
S. Morteza Mohseni,
L. Jamilpanah,
M. Hamdi,
S. E. Roozmeh,
S. Majid. Mohseni
Abstract:
When a flow of electron passes through a paramagnetic layer with strong spin-orbit-coupling such as platinum (Pt), a net spin current is produced via spin Hall effect (SHE). This spin current can exert a torque on the magnetization of an adjacent ferromagnetic layer which can be probed via magnetization dynamic response, e.g. spin-torque ferromagnetic resonance (ST-FMR). Nevertheless, that effect…
▽ More
When a flow of electron passes through a paramagnetic layer with strong spin-orbit-coupling such as platinum (Pt), a net spin current is produced via spin Hall effect (SHE). This spin current can exert a torque on the magnetization of an adjacent ferromagnetic layer which can be probed via magnetization dynamic response, e.g. spin-torque ferromagnetic resonance (ST-FMR). Nevertheless, that effect in lower frequency magnetization dynamic regime (MHz) where skin effect occurs in high permeability ferromagnetic conductors namely the magneto-impedance (MI) effect can be fundamentally important which has not been studied so far. Here, by utilizing the MI effect in magnetic-ribbon/Pt heterostructure with high magnetic permeability that allows the ac current effectively confined at the skin depth of ~100 nm thickness, the effect of spin-orbit-torque (SOT) induced by the SHE probed via MI measurement is investigated. We observed a systematic MI frequency shift that increases by increasing the applied current amplitude and thickness of the Pt layer (varying from 0 nm to 20 nm). In addition, the role of Pt layer in ribbon/Pt heterostructure is evaluated with ferromagnetic resonance (FMR) effect representing standard Gilbert dam** increase as the result of presence of the SHE. Our results unveil the role of SOT in dynamic control of the transverse magnetic permeability probed with impedance spectroscopy as useful and valuable technique for detection of future SHE devices.
△ Less
Submitted 14 October, 2017; v1 submitted 8 August, 2017;
originally announced August 2017.
-
Current driven second harmonic domain wall resonance in ferromagnetic metal/ nonmagnetic metal bilayer: a field-free method for spin Hall angle measurements
Authors:
M. R. Hajiali,
M. Hamdi,
S. E. Roozmeh,
S. M. Mohseni
Abstract:
We study the ac current-driven domain wall motion in bilayer ferromagnetic metal (FM)/nonmagnetic metal (NM) nanowire. The solution of the modified Landau-Lifshitz-Gilbert equation including all the spin transfer torques is used to describe motion of the domain wall in presence of the spin Hall effect. We show that the domain wall center has second harmonic frequency response in addition to the kn…
▽ More
We study the ac current-driven domain wall motion in bilayer ferromagnetic metal (FM)/nonmagnetic metal (NM) nanowire. The solution of the modified Landau-Lifshitz-Gilbert equation including all the spin transfer torques is used to describe motion of the domain wall in presence of the spin Hall effect. We show that the domain wall center has second harmonic frequency response in addition to the known first harmonic excitation. In contrast to the experimentally observed second harmonic response in harmonic Hall measurements of spin-orbit torque in magnetic thin films, this second harmonic response directly originates from spin-orbit torque driven domain wall dynamics. Based on the spin current generated by domain wall dynamics, the longitudinal spin motive force generated voltage across the length of the nanowire is determined. The second harmonic response introduces additionally a new practical field-free and all-electrical method to probe the effective spin Hall angle for FM/NM bilayer structures that could be applied in experiments. Our results also demonstrate the capability of utilizing FM/NM bilayer structure in domain wall based spin torque signal generators and resonators.
△ Less
Submitted 11 October, 2017; v1 submitted 3 May, 2017;
originally announced May 2017.
-
A Prudent-Precedence Concurrency Control Protocol for High Data Contention Database Enviornments
Authors:
Weidong Xiong,
Feng Yu,
Mohammed Hamdi,
Wen-Chi Hou
Abstract:
In this paper, we propose a concurrency control protocol, called the Prudent-Precedence Concurrency Control (PPCC) protocol, for high data contention database environments. PPCC is prudently more aggressive in permitting more serializable schedules than two-phase locking. It maintains a restricted precedence among conflicting transactions and commits the transactions according to the serialization…
▽ More
In this paper, we propose a concurrency control protocol, called the Prudent-Precedence Concurrency Control (PPCC) protocol, for high data contention database environments. PPCC is prudently more aggressive in permitting more serializable schedules than two-phase locking. It maintains a restricted precedence among conflicting transactions and commits the transactions according to the serialization order established in the executions. A detailed simulation model has been constructed and extensive experiments have been conducted to evaluate the performance of the proposed approach. The results demonstrate that the proposed algorithm outperforms the two-phase locking and optimistic concurrency control in all ranges of system workload.
△ Less
Submitted 16 November, 2016;
originally announced November 2016.
-
RSSI-Based Distributed Self-Localization for Wireless Sensor Networks used in Precision Agriculture
Authors:
Pooyan Abouzar,
David G. Michelson,
Maziyar Hamdi
Abstract:
Node localization algorithms that can be easily integrated into deployed wireless sensor networks (WSNs) and which run seamlessly with proprietary lower layer communication protocols running on off-the-shelf modules can help operators of large farms and orchards avoid the difficulty, cost and/or time involved with manual or satellite-based node localization techniques. Even though the state-of-the…
▽ More
Node localization algorithms that can be easily integrated into deployed wireless sensor networks (WSNs) and which run seamlessly with proprietary lower layer communication protocols running on off-the-shelf modules can help operators of large farms and orchards avoid the difficulty, cost and/or time involved with manual or satellite-based node localization techniques. Even though the state-of-the-art node localization algorithms can achieve low error rates using distributed techniques such as belief propagation (BP), they are not well suited to WSNs deployed for precision agriculture applications with large number of nodes, few number of landmarks and lack real time update capability. The algorithm proposed here is designed for applications such as pest control and irrigation in large farms and orchards where greater power efficiency and scalability are required but location accuracy requirements are less demanding. Our algorithm uses received signal strength indicator (RSSI) values to estimate the distribution of distance between nodes then updates the location probability mass function (pmf) of nodes in a distributed manner. At every time step, the most recently communicated path loss samples and location prior pmf received from neighbouring nodes is sufficient for nodes with unknown location to update their location pmf. This renders the algorithm recursive, hence results in lower computational complexity at each time step. We propose a particular realization of the method in which only one node multicasts at each time step and neighbouring nodes update their location pmf conditioned on all communicated samples over previous time steps. This is highly compatible with realistic WSN deployments, e.g., ZigBee which are based upon the ad hoc on-demand distance vector (AODV) where nodes flood route request (RREQ) and route reply (RREP) packets in the network.
△ Less
Submitted 21 August, 2015;
originally announced September 2015.
-
Social Learning in a Human Society: An Experimental Study
Authors:
Maziyar Hamdi,
Grayden Solman,
Alan Kingstone,
Vikram Krishnamurthy
Abstract:
This paper presents an experimental study to investigate the learning and decision making behavior of individuals in a human society. Social learning is used as the mathematical basis for modelling interaction of individuals that aim to perform a perceptual task interactively. A psychology experiment was conducted on a group of undergraduate students at the University of British Columbia to examin…
▽ More
This paper presents an experimental study to investigate the learning and decision making behavior of individuals in a human society. Social learning is used as the mathematical basis for modelling interaction of individuals that aim to perform a perceptual task interactively. A psychology experiment was conducted on a group of undergraduate students at the University of British Columbia to examine whether the decision (action) of one individual affects the decision of the subsequent individuals. The major experimental observation that stands out here is that the participants of the experiment (agents) were affected by decisions of their partners in a relatively large fraction (60%) of trials. We fit a social learning model that mimics the interactions between participants of the psychology experiment. Misinformation propagation (also known as data incest) within the society under study is further investigated in this paper.
△ Less
Submitted 19 August, 2014;
originally announced August 2014.
-
Boundary value problems in consensus networks
Authors:
Amir Leshem,
Maziyar Hamdi,
Vikram Krishnamurthy
Abstract:
This paper studies the effect of boundary value conditions on consensus networks. Consider a network where some nodes keep their estimates constant while other nodes average their estimates with that of their neighbors. We analyze such networks and show that in contrast to standard consensus networks, the network estimate converges to a general harmonic function on the graph. Furthermore, the fina…
▽ More
This paper studies the effect of boundary value conditions on consensus networks. Consider a network where some nodes keep their estimates constant while other nodes average their estimates with that of their neighbors. We analyze such networks and show that in contrast to standard consensus networks, the network estimate converges to a general harmonic function on the graph. Furthermore, the final value depends only on the value at the boundary nodes. This has important implications in consensus networks -- for example, we show that consensus networks are extremely sensitive to the existence of a single malicious node or consistent errors in a single node. We also discuss applications of this result in social and sensor networks. We investigate the existence of boundary nodes in human social networks via an experimental study involving human subjects. Finally, the paper is concluded with the numerical studies of the boundary value problems in consensus networks.
△ Less
Submitted 26 July, 2014;
originally announced July 2014.
-
Towards the Formal Reliability Analysis of Oil and Gas Pipelines
Authors:
Waqar Ahmed,
Osman Hasan,
Sofiene Tahar,
Mohammad Salah Hamdi
Abstract:
It is customary to assess the reliability of underground oil and gas pipelines in the presence of excessive loading and corrosion effects to ensure a leak-free transport of hazardous materials. The main idea behind this reliability analysis is to model the given pipeline system as a Reliability Block Diagram (RBD) of segments such that the reliability of an individual pipeline segment can be repre…
▽ More
It is customary to assess the reliability of underground oil and gas pipelines in the presence of excessive loading and corrosion effects to ensure a leak-free transport of hazardous materials. The main idea behind this reliability analysis is to model the given pipeline system as a Reliability Block Diagram (RBD) of segments such that the reliability of an individual pipeline segment can be represented by a random variable. Traditionally, computer simulation is used to perform this reliability analysis but it provides approximate results and requires an enormous amount of CPU time for attaining reasonable estimates. Due to its approximate nature, simulation is not very suitable for analyzing safety-critical systems like oil and gas pipelines, where even minor analysis flaws may result in catastrophic consequences. As an accurate alternative, we propose to use a higher-order-logic theorem prover (HOL) for the reliability analysis of pipelines. As a first step towards this idea, this paper provides a higher-order-logic formalization of reliability and the series RBD using the HOL theorem prover. For illustration, we present the formal analysis of a simple pipeline that can be modeled as a series RBD of segments with exponentially distributed failure times.
△ Less
Submitted 26 May, 2014;
originally announced May 2014.