-
Curvature in the very-high energy gamma-ray spectrum of M87
Authors:
H. E. S. S. Collaboration,
F. Aharonian,
F. Ait Benkhali,
J. Aschersleben,
H. Ashkar,
M. Backes,
V. Barbosa Martins,
R. Batzofin,
Y. Becherini,
D. Berge,
K. Bernlöhr,
M. Böttcher,
C. Boisson,
J. Bolmont,
M. de Bony de Lavergne,
F. Bradascio,
R. Brose,
F. Brun,
B. Bruno,
T. Bulik C. Burger-Scheidlin,
T. Bylund,
S. Casanova,
R. Cecil,
J. Celic,
M. Cerruti
, et al. (110 additional authors not shown)
Abstract:
The radio galaxy M87 is a variable very-high energy (VHE) gamma-ray source, exhibiting three major flares reported in 2005, 2008, and 2010. Despite extensive studies, the origin of the VHE gamma-ray emission is yet to be understood. In this study, we investigate the VHE gamma-ray spectrum of M87 during states of high gamma-ray activity, utilizing 20.2$\,$ hours the H.E.S.S. observations. Our findi…
▽ More
The radio galaxy M87 is a variable very-high energy (VHE) gamma-ray source, exhibiting three major flares reported in 2005, 2008, and 2010. Despite extensive studies, the origin of the VHE gamma-ray emission is yet to be understood. In this study, we investigate the VHE gamma-ray spectrum of M87 during states of high gamma-ray activity, utilizing 20.2$\,$ hours the H.E.S.S. observations. Our findings indicate a preference for a curved spectrum, characterized by a log-parabola model with extra-galactic background light (EBL) model above 0.3$\,$TeV at the 4$σ$ level, compared to a power-law spectrum with EBL. We investigate the degeneracy between the absorption feature and the EBL normalization and derive upper limits on EBL models mainly sensitive in the wavelength range 12.4$\,$$μ$m - 40$\,$$μ$m.
△ Less
Submitted 25 April, 2024; v1 submitted 20 February, 2024;
originally announced February 2024.
-
Effects of Li Do** on Superconducting Properties of Citrate Gel Prepared Y1-xLixBa2Cu3O7-d Compound
Authors:
Mahshid Amiri Moghadam,
Hassan Gashmard,
Seyed Sajjad Hosseini,
Hamideh Shakeripour,
Hadi Salamati
Abstract:
The Y1-xLixBa2Cu3O7-d polycrystalline bulk superconductors doped with Li substituting at the Y site at different concentrations (x = 0, 0.01, 0.02, 0.1) were prepared using the citrate-gel method to study the effects of do** on the superconducting temperature and critical current density. The question was whether Li addition characterized by a high Debye frequency would have any positive effects…
▽ More
The Y1-xLixBa2Cu3O7-d polycrystalline bulk superconductors doped with Li substituting at the Y site at different concentrations (x = 0, 0.01, 0.02, 0.1) were prepared using the citrate-gel method to study the effects of do** on the superconducting temperature and critical current density. The question was whether Li addition characterized by a high Debye frequency would have any positive effects on Tc. The optimum citrate-gel and heat treatment conditions were identified as those yielding samples with a maximum grain size on the order of 50 micro.m (up to the optimum Li-do** level, x=0.01). Li substitution at the Y site was verified by structural, electrical, and magnetic measurements of the produced samples, whereas X-ray diffraction (XRD) analysis revealed the formation of a pure phase with no visible impurity phases. Moreover, AC magnetic susceptibility measurements showed no increase in the superconducting transition temperature Tc, consistent with the predicted results obtained by machine learning method, although it was theoretically expected to increase owing to the high Debye frequency of Li. This observation is consistent with magnetic coupling models for pairing mechanism in cuprates. Finally, because of the optimum conditions of the preparation procedure, nearly identical values of the critical current density (Jc) were recorded for samples with different Li do** levels (up to the optimum Li do** level). It was found that improved compound preparation conditions would have a critical and extensive effect on Jc enhancement, with nearly no Tc suppression.
△ Less
Submitted 7 January, 2024;
originally announced January 2024.
-
Enabling Smart Retrofitting and Performance Anomaly Detection for a Sensorized Vessel: A Maritime Industry Experience
Authors:
Mahshid Helali Moghadam,
Mateusz Rzymowski,
Lukasz Kulas
Abstract:
The integration of sensorized vessels, enabling real-time data collection and machine learning-driven data analysis marks a pivotal advancement in the maritime industry. This transformative technology not only can enhance safety, efficiency, and sustainability but also usher in a new era of cost-effective and smart maritime transportation in our increasingly interconnected world. This study presen…
▽ More
The integration of sensorized vessels, enabling real-time data collection and machine learning-driven data analysis marks a pivotal advancement in the maritime industry. This transformative technology not only can enhance safety, efficiency, and sustainability but also usher in a new era of cost-effective and smart maritime transportation in our increasingly interconnected world. This study presents a deep learning-driven anomaly detection system augmented with interpretable machine learning models for identifying performance anomalies in an industrial sensorized vessel, called TUCANA. We Leverage a human-in-the-loop unsupervised process that involves utilizing standard and Long Short-Term Memory (LSTM) autoencoders augmented with interpretable surrogate models, i.e., random forest and decision tree, to add transparency and interpretability to the results provided by the deep learning models. The interpretable models also enable automated rule generation for translating the inference into human-readable rules. Additionally, the process also includes providing a projection of the results using t-distributed stochastic neighbor embedding (t-SNE), which helps with a better understanding of the structure and relationships within the data and assessment of the identified anomalies. We empirically evaluate the system using real data acquired from the vessel TUCANA and the results involve achieving over 80% precision and 90% recall with the LSTM model used in the process. The interpretable models also provide logical rules aligned with expert thinking, and the t-SNE-based projection enhances interpretability. Our system demonstrates that the proposed approach can be used effectively in real-world scenarios, offering transparency and precision in performance anomaly detection.
△ Less
Submitted 29 December, 2023;
originally announced January 2024.
-
Privacy-preserving transactive energy systems: Key topics and open research challenges
Authors:
Daniel Gerbi Duguma,
Juliana Zhang,
Meysam Aboutalebi,
Shiliang Zhang,
Catherine Banet,
Cato Bjørkli,
Chinmayi Baramashetru,
Frank Eliassen,
Hui Zhang,
Jonathan Muringani,
Josef Noll,
Knut Inge Fostervold,
Lars Böcker,
Lee Andrew Bygrave,
Matin Bagherpour,
Maunya Doroudi Moghadam,
Olaf Owe,
Poushali Sengupta,
Roman Vitenberg,
Sabita Maharjan,
Thiago Garrett,
Yushuai Li,
Zhengyu Shan
Abstract:
This manuscript aims to formalize and conclude the discussions initiated during the PriTEM workshop 22-23 March 2023. We present important ideas and discussion topics in the context of transactive energy systems. Moreover, the conclusions from the discussions articulate potential aspects to be explored in future studies on transactive energy management. Particularly, these conclusions cover resear…
▽ More
This manuscript aims to formalize and conclude the discussions initiated during the PriTEM workshop 22-23 March 2023. We present important ideas and discussion topics in the context of transactive energy systems. Moreover, the conclusions from the discussions articulate potential aspects to be explored in future studies on transactive energy management. Particularly, these conclusions cover research topics in energy technology and energy informatics, energy law, data law, energy market and socio-psychology that are relevant to the seamless integration of renewable energy resources and the transactive energy systems-in smart microgrids-focusing on distributed frameworks such as peer-to-peer (P2P) energy trading. We clarify issues, identify barriers, and suggest possible solutions to open questions in diversified topics, such as block-chain interoperability, consumer privacy and data sharing, and participation incentivization. Furthermore, we also elaborate challenges associated with cross-disciplinary collaboration and coordination for transactive energy systems, and enumerate the lessons learned from our work so far.
△ Less
Submitted 17 December, 2023;
originally announced December 2023.
-
uHD: Unary Processing for Lightweight and Dynamic Hyperdimensional Computing
Authors:
Sercan Aygun,
Mehran Shoushtari Moghadam,
M. Hassan Najafi
Abstract:
Hyperdimensional computing (HDC) is a novel computational paradigm that operates on long-dimensional vectors known as hypervectors. The hypervectors are constructed as long bit-streams and form the basic building blocks of HDC systems. In HDC, hypervectors are generated from scalar values without taking their bit significance into consideration. HDC has been shown to be efficient and robust in var…
▽ More
Hyperdimensional computing (HDC) is a novel computational paradigm that operates on long-dimensional vectors known as hypervectors. The hypervectors are constructed as long bit-streams and form the basic building blocks of HDC systems. In HDC, hypervectors are generated from scalar values without taking their bit significance into consideration. HDC has been shown to be efficient and robust in various data processing applications, including computer vision tasks. To construct HDC models for vision applications, the current state-of-the-art practice utilizes two parameters for data encoding: pixel intensity and pixel position. However, the intensity and position information embedded in high-dimensional vectors are generally not generated dynamically in the HDC models. Consequently, the optimal design of hypervectors with high model accuracy requires powerful computing platforms for training. A more efficient approach to generating hypervectors is to create them dynamically during the training phase, which results in accurate, low-cost, and highly performable vectors. To this aim, we use low-discrepancy sequences to generate intensity hypervectors only, while avoiding position hypervectors. By doing so, the multiplication step in vector encoding is eliminated, resulting in a power-efficient HDC system. For the first time in the literature, our proposed approach employs lightweight vector generators utilizing unary bit-streams for efficient encoding of data instead of using conventional comparator-based generators.
△ Less
Submitted 16 November, 2023;
originally announced November 2023.
-
PID Optimization Using Lagrangian Mechanics
Authors:
Ethan Kou,
Majid Moghadam
Abstract:
Creating a simulation of a system enables the tuning of control systems without the need for a physical system. In this paper, we employ Lagrangian Mechanics to derive a set of equations to simulate an inverted pendulum on a cart. The system consists of a freely-rotating rod attached to a cart, with the rod's balance achieved through applying the correct forces to the cart. We manually tune the pr…
▽ More
Creating a simulation of a system enables the tuning of control systems without the need for a physical system. In this paper, we employ Lagrangian Mechanics to derive a set of equations to simulate an inverted pendulum on a cart. The system consists of a freely-rotating rod attached to a cart, with the rod's balance achieved through applying the correct forces to the cart. We manually tune the proportional, integral, and derivative gain coefficients of a Proportional Integral Derivative controller (PID) to balance a rod. To further improve PID performance, we can optimize an objective function to find better gain coefficients.
△ Less
Submitted 24 September, 2023;
originally announced October 2023.
-
P2LSG: Powers-of-2 Low-Discrepancy Sequence Generator for Stochastic Computing
Authors:
Mehran Shoushtari Moghadam,
Sercan Aygun,
Mohsen Riahi Alam,
M. Hassan Najafi
Abstract:
Stochastic Computing (SC) is an unconventional computing paradigm processing data in the form of random bit-streams. The accuracy and energy efficiency of SC systems highly depend on the stochastic number generator (SNG) unit that converts the data from conventional binary to stochastic bit-streams. Recent work has shown significant improvement in the efficiency of SC systems by employing low-disc…
▽ More
Stochastic Computing (SC) is an unconventional computing paradigm processing data in the form of random bit-streams. The accuracy and energy efficiency of SC systems highly depend on the stochastic number generator (SNG) unit that converts the data from conventional binary to stochastic bit-streams. Recent work has shown significant improvement in the efficiency of SC systems by employing low-discrepancy (LD) sequences such as Sobol and Halton sequences in the SNG unit. Still, the usage of many well-known random sequences for SC remains unexplored. This work studies some new random sequences for potential application in SC. Our design space exploration proposes a promising random number generator for accurate and energy-efficient SC. We propose P2LSG, a low-cost and energy-efficient Low-discrepancy Sequence Generator derived from Powers-of-2 VDC (Van der Corput) sequences. We evaluate the performance of our novel bit-stream generator for two SC image and video processing case studies: image scaling and scene merging. For the scene merging task, we propose a novel SC design for the first time. Our experimental results show higher accuracy and lower hardware cost and energy consumption compared to the state-of-the-art.
△ Less
Submitted 13 September, 2023; v1 submitted 11 September, 2023;
originally announced September 2023.
-
Learning from Hypervectors: A Survey on Hypervector Encoding
Authors:
Sercan Aygun,
Mehran Shoushtari Moghadam,
M. Hassan Najafi,
Mohsen Imani
Abstract:
Hyperdimensional computing (HDC) is an emerging computing paradigm that imitates the brain's structure to offer a powerful and efficient processing and learning model. In HDC, the data are encoded with long vectors, called hypervectors, typically with a length of 1K to 10K. The literature provides several encoding techniques to generate orthogonal or correlated hypervectors, depending on the inten…
▽ More
Hyperdimensional computing (HDC) is an emerging computing paradigm that imitates the brain's structure to offer a powerful and efficient processing and learning model. In HDC, the data are encoded with long vectors, called hypervectors, typically with a length of 1K to 10K. The literature provides several encoding techniques to generate orthogonal or correlated hypervectors, depending on the intended application. The existing surveys in the literature often focus on the overall aspects of HDC systems, including system inputs, primary computations, and final outputs. However, this study takes a more specific approach. It zeroes in on the HDC system input and the generation of hypervectors, directly influencing the hypervector encoding process. This survey brings together various methods for hypervector generation from different studies and explores the limitations, challenges, and potential benefits they entail. Through a comprehensive exploration of this survey, readers will acquire a profound understanding of various encoding types in HDC and gain insights into the intricate process of hypervector generation for diverse applications.
△ Less
Submitted 1 August, 2023;
originally announced August 2023.
-
Credit Card Fraud Detection Using Asexual Reproduction Optimization
Authors:
Anahita Farhang Ghahfarokhi,
Taha Mansouri,
Mohammad Reza Sadeghi Moghadam,
Nila Bahrambeik,
Ramin Yavari,
Mohammadreza Fani Sani
Abstract:
As the number of credit card users has increased, detecting fraud in this domain has become a vital issue. Previous literature has applied various supervised and unsupervised machine learning methods to find an effective fraud detection system. However, some of these methods require an enormous amount of time to achieve reasonable accuracy. In this paper, an Asexual Reproduction Optimization (ARO)…
▽ More
As the number of credit card users has increased, detecting fraud in this domain has become a vital issue. Previous literature has applied various supervised and unsupervised machine learning methods to find an effective fraud detection system. However, some of these methods require an enormous amount of time to achieve reasonable accuracy. In this paper, an Asexual Reproduction Optimization (ARO) approach was employed, which is a supervised method to detect credit card fraud. ARO refers to a kind of production in which one parent produces some offspring. By applying this method and sampling just from the majority class, the effectiveness of the classification is increased. A comparison to Artificial Immune Systems (AIS), which is one of the best methods implemented on current datasets, has shown that the proposed method is able to remarkably reduce the required training time and at the same time increase the recall that is important in fraud detection problems. The obtained results show that ARO achieves the best cost in a short time, and consequently, it can be considered a real-time fraud detection system.
△ Less
Submitted 31 May, 2023;
originally announced June 2023.
-
Anomaly Detection Dataset for Industrial Control Systems
Authors:
Alireza Dehlaghi-Ghadim,
Mahshid Helali Moghadam,
Ali Balador,
Hans Hansson
Abstract:
Over the past few decades, Industrial Control Systems (ICSs) have been targeted by cyberattacks and are becoming increasingly vulnerable as more ICSs are connected to the internet. Using Machine Learning (ML) for Intrusion Detection Systems (IDS) is a promising approach for ICS cyber protection, but the lack of suitable datasets for evaluating ML algorithms is a challenge. Although there are a few…
▽ More
Over the past few decades, Industrial Control Systems (ICSs) have been targeted by cyberattacks and are becoming increasingly vulnerable as more ICSs are connected to the internet. Using Machine Learning (ML) for Intrusion Detection Systems (IDS) is a promising approach for ICS cyber protection, but the lack of suitable datasets for evaluating ML algorithms is a challenge. Although there are a few commonly used datasets, they may not reflect realistic ICS network data, lack necessary features for effective anomaly detection, or be outdated. This paper presents the 'ICS-Flow' dataset, which offers network data and process state variables logs for supervised and unsupervised ML-based IDS assessment. The network data includes normal and anomalous network packets and flows captured from simulated ICS components and emulated networks. The anomalies were injected into the system through various attack techniques commonly used by hackers to modify network traffic and compromise ICSs. We also proposed open-source tools, `ICSFlowGenerator' for generating network flow parameters from Raw network packets. The final dataset comprises over 25,000,000 raw network packets, network flow records, and process variable logs. The paper describes the methodology used to collect and label the dataset and provides a detailed data analysis. Finally, we implement several ML models, including the decision tree, random forest, and artificial neural network to detect anomalies and attacks, demonstrating that our dataset can be used effectively for training intrusion detection ML models.
△ Less
Submitted 11 May, 2023;
originally announced May 2023.
-
Making Sense of Failure Logs in an Industrial DevOps Environment
Authors:
Muhammad Abbas,
Ali Hamayouni,
Mahshid Helali Moghadam,
Mehrdad Saadatmand,
Per Erik Strandberg
Abstract:
Processing and reviewing nightly test execution failure logs for large industrial systems is a tedious activity. Furthermore, multiple failures might share one root/common cause during test execution sessions, and the review might therefore require redundant efforts. This paper presents the LogGrouper approach for automated grou** of failure logs to aid root/common cause analysis and for enablin…
▽ More
Processing and reviewing nightly test execution failure logs for large industrial systems is a tedious activity. Furthermore, multiple failures might share one root/common cause during test execution sessions, and the review might therefore require redundant efforts. This paper presents the LogGrouper approach for automated grou** of failure logs to aid root/common cause analysis and for enabling the processing of each log group as a batch. LogGrouper uses state-of-art natural language processing and clustering approaches to achieve meaningful log grou**. The approach is evaluated in an industrial setting in both a qualitative and quantitative manner. Results show that LogGrouper produces good quality grou**s in terms of our two evaluation metrics (Silhouette Coefficient and Calinski-Harabasz Index) for clustering quality. The qualitative evaluation shows that experts perceive the groups as useful, and the groups are seen as an initial pointer for root cause analysis and failure assignment.
△ Less
Submitted 9 January, 2023;
originally announced January 2023.
-
ICSSIM-A Framework for Building Industrial Control Systems Security Simulation Testbeds
Authors:
Alireza Dehlaghi-Ghadim,
Ali Balador,
Mahshid Helali Moghadam,
Hans Hansson,
Mauro Conti
Abstract:
With the advent of smart industry, Industrial Control Systems (ICS) are increasingly using Cloud, IoT, and other services to meet Industry 4.0 targets. The connectivity inherent in these services exposes such systems to increased cybersecurity risks. To protect ICSs against cyberattacks, intrusion detection systems and intrusion prevention systems empowered by machine learning are used to detect a…
▽ More
With the advent of smart industry, Industrial Control Systems (ICS) are increasingly using Cloud, IoT, and other services to meet Industry 4.0 targets. The connectivity inherent in these services exposes such systems to increased cybersecurity risks. To protect ICSs against cyberattacks, intrusion detection systems and intrusion prevention systems empowered by machine learning are used to detect abnormal behavior of the systems. Operational ICSs are not safe environments to research intrusion detection systems due to the possibility of catastrophic risks. Therefore, realistic ICS testbeds enable researchers to analyze and validate their intrusion detection algorithms in a controlled environment. Although various ICS testbeds have been developed, researchers' access to a low-cost, adaptable, and customizable testbed that can accurately simulate industrial control systems and suits security research is still an important issue.
In this paper, we present ICSSIM, a framework for building customized virtual ICS security testbeds, in which various types of cyber threats and attacks can be effectively and efficiently investigated. This framework contains base classes to simulate control system components and communications. ICSSIM aims to produce extendable, versatile, reproducible, low-cost, and comprehensive ICS testbeds with realistic details and high fidelity. ICSSIM is built on top of the Docker container technology, which provides realistic network emulation and runs ICS components on isolated private operating system kernels. ICSSIM reduces the time for develo** ICS components and offers physical process modelling using software and hardware in the loop simulation. We demonstrated ICSSIM by creating a testbed and validating its functionality by showing how different cyberattacks can be applied.
△ Less
Submitted 25 November, 2022; v1 submitted 24 October, 2022;
originally announced October 2022.
-
Development of Sleep State Trend (SST), a bedside measure of neonatal sleep state fluctuations based on single EEG channels
Authors:
Saeed Montazeri Moghadam,
Päivi Nevalainen,
Nathan J. Stevenson,
Sampsa Vanhatalo
Abstract:
Objective: To develop and validate an automated method for bedside monitoring of sleep state fluctuations in neonatal intensive care units.
Methods: A deep learning -based algorithm was designed and trained using 53 EEG recordings from a long-term (a)EEG monitoring in 30 near-term neonates. The results were validated using an external dataset from 30 polysomnography recordings. In addition to tr…
▽ More
Objective: To develop and validate an automated method for bedside monitoring of sleep state fluctuations in neonatal intensive care units.
Methods: A deep learning -based algorithm was designed and trained using 53 EEG recordings from a long-term (a)EEG monitoring in 30 near-term neonates. The results were validated using an external dataset from 30 polysomnography recordings. In addition to training and validating a single EEG channel quiet sleep detector, we constructed Sleep State Trend (SST), a bedside-ready means for visualizing classifier outputs.
Results: The accuracy of quiet sleep detection in the training data was 90%, and the accuracy was comparable (85-86%) in all bipolar derivations available from the 4-electrode recordings. The algorithm generalized well to an external dataset, showing 81% overall accuracy despite different signal derivations. SST allowed an intuitive, clear visualization of the classifier output.
Conclusions: Fluctuations in sleep states can be detected at high fidelity from a single EEG channel, and the results can be visualized as a transparent and intuitive trend in the bedside monitors.
Significance: The Sleep State Trend (SST) may provide caregivers a real-time view of sleep state fluctuations and its cyclicity.
△ Less
Submitted 25 August, 2022;
originally announced August 2022.
-
Ergo, SMIRK is Safe: A Safety Case for a Machine Learning Component in a Pedestrian Automatic Emergency Brake System
Authors:
Markus Borg,
Jens Henriksson,
Kasper Socha,
Olof Lennartsson,
Elias Sonnsjö Lönegren,
Thanh Bui,
Piotr Tomaszewski,
Sankar Raman Sathyamoorthy,
Sebastian Brink,
Mahshid Helali Moghadam
Abstract:
Integration of Machine Learning (ML) components in critical applications introduces novel challenges for software certification and verification. New safety standards and technical guidelines are under development to support the safety of ML-based systems, e.g., ISO 21448 SOTIF for the automotive domain and the Assurance of Machine Learning for use in Autonomous Systems (AMLAS) framework. SOTIF an…
▽ More
Integration of Machine Learning (ML) components in critical applications introduces novel challenges for software certification and verification. New safety standards and technical guidelines are under development to support the safety of ML-based systems, e.g., ISO 21448 SOTIF for the automotive domain and the Assurance of Machine Learning for use in Autonomous Systems (AMLAS) framework. SOTIF and AMLAS provide high-level guidance but the details must be chiseled out for each specific case. We initiated a research project with the goal to demonstrate a complete safety case for an ML component in an open automotive system. This paper reports results from an industry-academia collaboration on safety assurance of SMIRK, an ML-based pedestrian automatic emergency braking demonstrator running in an industry-grade simulator. We demonstrate an application of AMLAS on SMIRK for a minimalistic operational design domain, i.e., we share a complete safety case for its integrated ML-based component. Finally, we report lessons learned and provide both SMIRK and the safety case under an open-source licence for the research community to reuse.
△ Less
Submitted 6 December, 2022; v1 submitted 16 April, 2022;
originally announced April 2022.
-
Ensemble learning using individual neonatal data for seizure detection
Authors:
Ana Borovac,
Steinn Gudmundsson,
Gardar Thorvardsson,
Saeed M. Moghadam,
Päivi Nevalainen,
Nathan Stevenson,
Sampsa Vanhatalo,
Thomas P. Runarsson
Abstract:
Sharing medical data between institutions is difficult in practice due to data protection laws and official procedures within institutions. Therefore, most existing algorithms are trained on relatively small electroencephalogram (EEG) data sets which is likely to be detrimental to prediction accuracy. In this work, we simulate a case when the data can not be shared by splitting the publicly availa…
▽ More
Sharing medical data between institutions is difficult in practice due to data protection laws and official procedures within institutions. Therefore, most existing algorithms are trained on relatively small electroencephalogram (EEG) data sets which is likely to be detrimental to prediction accuracy. In this work, we simulate a case when the data can not be shared by splitting the publicly available data set into disjoint sets representing data in individual institutions. We propose to train a (local) detector in each institution and aggregate their individual predictions into one final prediction. Four aggregation schemes are compared, namely, the majority vote, the mean, the weighted mean and the Dawid-Skene method. The method was validated on an independent data set using only a subset of EEG channels. The ensemble reaches accuracy comparable to a single detector trained on all the data when sufficient amount of data is available in each institution. The weighted mean aggregation scheme showed best performance, it was only marginally outperformed by the Dawid--Skene method when local detectors approach performance of a single detector trained on all available data.
△ Less
Submitted 18 August, 2022; v1 submitted 11 April, 2022;
originally announced April 2022.
-
Machine Learning Testing in an ADAS Case Study Using Simulation-Integrated Bio-Inspired Search-Based Testing
Authors:
Mahshid Helali Moghadam,
Markus Borg,
Mehrdad Saadatmand,
Seyed Jalaleddin Mousavirad,
Markus Bohlin,
Björn Lisper
Abstract:
This paper presents an extended version of Deeper, a search-based simulation-integrated test solution that generates failure-revealing test scenarios for testing a deep neural network-based lane-kee** system. In the newly proposed version, we utilize a new set of bio-inspired search algorithms, genetic algorithm (GA), $(μ+λ)$ and $(μ,λ)$ evolution strategies (ES), and particle swarm optimization…
▽ More
This paper presents an extended version of Deeper, a search-based simulation-integrated test solution that generates failure-revealing test scenarios for testing a deep neural network-based lane-kee** system. In the newly proposed version, we utilize a new set of bio-inspired search algorithms, genetic algorithm (GA), $(μ+λ)$ and $(μ,λ)$ evolution strategies (ES), and particle swarm optimization (PSO), that leverage a quality population seed and domain-specific cross-over and mutation operations tailored for the presentation model used for modeling the test scenarios. In order to demonstrate the capabilities of the new test generators within Deeper, we carry out an empirical evaluation and comparison with regard to the results of five participating tools in the cyber-physical systems testing competition at SBST 2021. Our evaluation shows the newly proposed test generators in Deeper not only represent a considerable improvement on the previous version but also prove to be effective and efficient in provoking a considerable number of diverse failure-revealing test scenarios for testing an ML-driven lane-kee** system. They can trigger several failures while promoting test scenario diversity, under a limited test time budget, high target failure severity, and strict speed limit constraints.
△ Less
Submitted 7 June, 2023; v1 submitted 22 March, 2022;
originally announced March 2022.
-
HMS-OS: Improving the Human Mental Search Optimisation Algorithm by Grou** in both Search and Objective Space
Authors:
Seyed Jalaleddin Mousavirad,
Gerald Schaefer,
Iakov Korovin,
Diego Oliva,
Mahshid Helali Moghadam,
Mehrdad Saadatmand
Abstract:
The human mental search (HMS) algorithm is a relatively recent population-based metaheuristic algorithm, which has shown competitive performance in solving complex optimisation problems. It is based on three main operators: mental search, grou**, and movement. In the original HMS algorithm, a clustering algorithm is used to group the current population in order to identify a promising region in…
▽ More
The human mental search (HMS) algorithm is a relatively recent population-based metaheuristic algorithm, which has shown competitive performance in solving complex optimisation problems. It is based on three main operators: mental search, grou**, and movement. In the original HMS algorithm, a clustering algorithm is used to group the current population in order to identify a promising region in search space, while candidate solutions then move towards the best candidate solution in the promising region. In this paper, we propose a novel HMS algorithm, HMS-OS, which is based on clustering in both objective and search space, where clustering in objective space finds a set of best candidate solutions whose centroid is then also used in updating the population. For further improvement, HMSOS benefits from an adaptive selection of the number of mental processes in the mental search operator. Experimental results on CEC-2017 benchmark functions with dimensionalities of 50 and 100, and in comparison to other optimisation algorithms, indicate that HMS-OS yields excellent performance, superior to those of other methods.
△ Less
Submitted 3 December, 2021; v1 submitted 19 November, 2021;
originally announced November 2021.
-
An LSTM-based Plagiarism Detection via Attention Mechanism and a Population-based Approach for Pre-Training Parameters with imbalanced Classes
Authors:
Seyed Vahid Moravvej,
Seyed Jalaleddin Mousavirad,
Mahshid Helali Moghadam,
Mehrdad Saadatmand
Abstract:
Plagiarism is one of the leading problems in academic and industrial environments, which its goal is to find the similar items in a typical document or source code. This paper proposes an architecture based on a Long Short-Term Memory (LSTM) and attention mechanism called LSTM-AM-ABC boosted by a population-based approach for parameter initialization. Gradient-based optimization algorithms such as…
▽ More
Plagiarism is one of the leading problems in academic and industrial environments, which its goal is to find the similar items in a typical document or source code. This paper proposes an architecture based on a Long Short-Term Memory (LSTM) and attention mechanism called LSTM-AM-ABC boosted by a population-based approach for parameter initialization. Gradient-based optimization algorithms such as back-propagation (BP) are widely used in the literature for learning process in LSTM, attention mechanism, and feed-forward neural network, while they suffer from some problems such as getting stuck in local optima. To tackle this problem, population-based metaheuristic (PBMH) algorithms can be used. To this end, this paper employs a PBMH algorithm, artificial bee colony (ABC), to moderate the problem. Our proposed algorithm can find the initial values for model learning in all LSTM, attention mechanism, and feed-forward neural network, simultaneously. In other words, ABC algorithm finds a promising point for starting BP algorithm. For evaluation, we compare our proposed algorithm with both conventional and population-based methods. The results clearly show that the proposed method can provide competitive performance.
△ Less
Submitted 17 October, 2021;
originally announced October 2021.
-
An Enhanced Differential Evolution Algorithm Using a Novel Clustering-based Mutation Operator
Authors:
Seyed Jalaleddin Mousavirad,
Gerald Schaefer,
Iakov Korovin,
Mahshid Helali Moghadam,
Mehrdad Saadatmand,
Mahdi Pedram
Abstract:
Differential evolution (DE) is an effective population-based metaheuristic algorithm for solving complex optimisation problems. However, the performance of DE is sensitive to the mutation operator. In this paper, we propose a novel DE algorithm, Clu-DE, that improves the efficacy of DE using a novel clustering-based mutation operator. First, we find, using a clustering algorithm, a winner cluster…
▽ More
Differential evolution (DE) is an effective population-based metaheuristic algorithm for solving complex optimisation problems. However, the performance of DE is sensitive to the mutation operator. In this paper, we propose a novel DE algorithm, Clu-DE, that improves the efficacy of DE using a novel clustering-based mutation operator. First, we find, using a clustering algorithm, a winner cluster in search space and select the best candidate solution in this cluster as the base vector in the mutation operator. Then, an updating scheme is introduced to include new candidate solutions in the current population. Experimental results on CEC-2017 benchmark functions with dimensionalities of 30, 50 and 100 confirm that Clu-DE yields improved performance compared to DE.
△ Less
Submitted 20 September, 2021;
originally announced September 2021.
-
Efficient and Effective Generation of Test Cases for Pedestrian Detection -- Search-based Software Testing of Baidu Apollo in SVL
Authors:
Hamid Ebadi,
Mahshid Helali Moghadam,
Markus Borg,
Gregory Gay,
Afonso Fontes,
Kasper Socha
Abstract:
With the growing capabilities of autonomous vehicles, there is a higher demand for sophisticated and pragmatic quality assurance approaches for machine learning-enabled systems in the automotive AI context. The use of simulation-based prototy** platforms provides the possibility for early-stage testing, enabling inexpensive testing and the ability to capture critical corner-case test scenarios.…
▽ More
With the growing capabilities of autonomous vehicles, there is a higher demand for sophisticated and pragmatic quality assurance approaches for machine learning-enabled systems in the automotive AI context. The use of simulation-based prototy** platforms provides the possibility for early-stage testing, enabling inexpensive testing and the ability to capture critical corner-case test scenarios. Simulation-based testing properly complements conventional on-road testing. However, due to the large space of test input parameters in these systems, the efficient generation of effective test scenarios leading to the unveiling of failures is a challenge. This paper presents a study on testing pedestrian detection and emergency braking system of the Baidu Apollo autonomous driving platform within the SVL simulator. We propose an evolutionary automated test generation technique that generates failure-revealing scenarios for Apollo in the SVL environment. Our approach models the input space using a generic and flexible data structure and benefits a multi-criteria safety-based heuristic for the objective function targeted for optimization. This paper presents the results of our proposed test generation technique in the 2021 IEEE Autonomous Driving AI Test Challenge. In order to demonstrate the efficiency and effectiveness of our approach, we also report the results from a baseline random generation technique. Our evaluation shows that the proposed evolutionary test case generator is more effective at generating failure-revealing test cases and provides higher diversity between the generated failures than the random baseline.
△ Less
Submitted 18 October, 2021; v1 submitted 16 September, 2021;
originally announced September 2021.
-
Game of GANs: Game-Theoretical Models for Generative Adversarial Networks
Authors:
Monireh Mohebbi Moghadam,
Bahar Boroomand,
Mohammad Jalali,
Arman Zareian,
Alireza DaeiJavad,
Mohammad Hossein Manshaei,
Marwan Krunz
Abstract:
Generative Adversarial Networks (GANs) have recently attracted considerable attention in the AI community due to its ability to generate high-quality data of significant statistical resemblance to real data. Fundamentally, GAN is a game between two neural networks trained in an adversarial manner to reach a zero-sum Nash equilibrium profile. Despite the improvement accomplished in GANs in the last…
▽ More
Generative Adversarial Networks (GANs) have recently attracted considerable attention in the AI community due to its ability to generate high-quality data of significant statistical resemblance to real data. Fundamentally, GAN is a game between two neural networks trained in an adversarial manner to reach a zero-sum Nash equilibrium profile. Despite the improvement accomplished in GANs in the last few years, several issues remain to be solved. This paper reviews the literature on the game theoretic aspects of GANs and addresses how game theory models can address specific challenges of generative model and improve the GAN's performance. We first present some preliminaries, including the basic GAN model and some game theory background. We then present taxonomy to classify state-of-the-art solutions into three main categories: modified game models, modified architectures, and modified learning methods. The classification is based on modifications made to the basic GAN model by proposed game-theoretic approaches in the literature. We then explore the objectives of each category and discuss recent works in each category. Finally, we discuss the remaining challenges in this field and present future research directions.
△ Less
Submitted 3 January, 2022; v1 submitted 13 June, 2021;
originally announced June 2021.
-
Performance Testing Using a Smart Reinforcement Learning-Driven Test Agent
Authors:
Mahshid Helali Moghadam,
Golrokh Hamidi,
Markus Borg,
Mehrdad Saadatmand,
Markus Bohlin,
Björn Lisper,
Pasqualina Potena
Abstract:
Performance testing with the aim of generating an efficient and effective workload to identify performance issues is challenging. Many of the automated approaches mainly rely on analyzing system models, source code, or extracting the usage pattern of the system during the execution. However, such information and artifacts are not always available. Moreover, all the transactions within a generated…
▽ More
Performance testing with the aim of generating an efficient and effective workload to identify performance issues is challenging. Many of the automated approaches mainly rely on analyzing system models, source code, or extracting the usage pattern of the system during the execution. However, such information and artifacts are not always available. Moreover, all the transactions within a generated workload do not impact the performance of the system the same way, a finely tuned workload could accomplish the test objective in an efficient way. Model-free reinforcement learning is widely used for finding the optimal behavior to accomplish an objective in many decision-making problems without relying on a model of the system. This paper proposes that if the optimal policy (way) for generating test workload to meet a test objective can be learned by a test agent, then efficient test automation would be possible without relying on system models or source code. We present a self-adaptive reinforcement learning-driven load testing agent, RELOAD, that learns the optimal policy for test workload generation and generates an effective workload efficiently to meet the test objective. Once the agent learns the optimal policy, it can reuse the learned policy in subsequent testing activities. Our experiments show that the proposed intelligent load test agent can accomplish the test objective with lower test cost compared to common load testing procedures, and results in higher test efficiency.
△ Less
Submitted 26 April, 2021;
originally announced April 2021.
-
Automated Performance Testing Based on Active Deep Learning
Authors:
Ali Sedaghatbaf,
Mahshid Helali Moghadam,
Mehrdad Saadatmand
Abstract:
Generating tests that can reveal performance issues in large and complex software systems within a reasonable amount of time is a challenging task. On one hand, there are numerous combinations of input data values to explore. On the other hand, we have a limited test budget to execute tests. What makes this task even more difficult is the lack of access to source code and the internal details of t…
▽ More
Generating tests that can reveal performance issues in large and complex software systems within a reasonable amount of time is a challenging task. On one hand, there are numerous combinations of input data values to explore. On the other hand, we have a limited test budget to execute tests. What makes this task even more difficult is the lack of access to source code and the internal details of these systems. In this paper, we present an automated test generation method called ACTA for black-box performance testing. ACTA is based on active learning, which means that it does not require a large set of historical test data to learn about the performance characteristics of the system under test. Instead, it dynamically chooses the tests to execute using uncertainty sampling. ACTA relies on a conditional variant of generative adversarial networks,and facilitates specifying performance requirements in terms of conditions and generating tests that address those conditions.We have evaluated ACTA on a benchmark web application, and the experimental results indicate that this method is comparable with random testing, and two other machine learning methods,i.e. PerfXRL and DN.
△ Less
Submitted 5 April, 2021;
originally announced April 2021.
-
IoT Data Quality Issues and Potential Solutions: A Literature Review
Authors:
Taha Mansouri,
Mohammad Reza Sadeghi Moghadam,
Fatemeh Monshizadeh,
Ahad Zareravasan
Abstract:
The Internet of Things (IoT) is a paradigm that connects everyday items to the Internet. In the recent decade, the IoT's spreading popularity is a promising opportunity for people and industries. IoT utilizes in a wide range of respects such as agriculture, healthcare, smart cities, and manufacturing sectors. IoT data quality is crucial in IoT real-life applications. IoT data quality dimensions an…
▽ More
The Internet of Things (IoT) is a paradigm that connects everyday items to the Internet. In the recent decade, the IoT's spreading popularity is a promising opportunity for people and industries. IoT utilizes in a wide range of respects such as agriculture, healthcare, smart cities, and manufacturing sectors. IoT data quality is crucial in IoT real-life applications. IoT data quality dimensions and issues should be considered because we require data to make accurate and timely decisions, produce commodities, and gain insights about events, people, and the environment. It is essential to point out that we cannot reach valuable results by using poor quality data. This paper aims to develop a new category for IoT data quality. Hence, we examine existing IoT data quality dimensions and IoT data quality issues in general and specific domains and IoT data quality dimensions' categories. It is worth considering that categories in the context of IoT are not many. We developed a new category in which IoT data quality dimensions and issues are separated. Concerning this category, we can get familiar with related dimensions and issues in each category. To enhance data quality dimensions and minimize data quality issues, we suggest potential solutions using Blockchain to overcome IoT's security issues.
△ Less
Submitted 22 January, 2021;
originally announced March 2021.
-
Markowitz-based cardinality constrained portfolio selection using Asexual Reproduction Optimization (ARO)
Authors:
Taha Mansouri,
Mohammad Reza Sadeghi Moghadam
Abstract:
The Markowitz-based portfolio selection turns to an NP-hard problem when considering cardinality constraints. In this case, existing exact solutions like quadratic programming may not be efficient to solve the problem. Many researchers, therefore, used heuristic and metaheuristic approaches in order to deal with the problem. This work presents Asexual Reproduction Optimization (ARO), a model free…
▽ More
The Markowitz-based portfolio selection turns to an NP-hard problem when considering cardinality constraints. In this case, existing exact solutions like quadratic programming may not be efficient to solve the problem. Many researchers, therefore, used heuristic and metaheuristic approaches in order to deal with the problem. This work presents Asexual Reproduction Optimization (ARO), a model free metaheuristic algorithm inspired by the asexual reproduction, in order to solve the portfolio optimization problem including cardinality constraint to ensure the investment in a given number of different assets and bounding constraint to limit the proportions of fund invested in each asset. This is the first time that this relatively new metaheuristic is in the field of portfolio optimization, and we show that ARO results in better quality solutions in comparison with some of the well-known metaheuristics stated in the literature. To validate our proposed algorithm, we measured the deviation of obtained results from the standard efficient frontier. We report our computational results on a set of publicly available benchmark test problems relating to five main market indices containing 31, 85, 89, 98, and 225 assets. These results are used in order to test the efficiency of our proposed method in comparison to other existing metaheuristic solutions. The experimental results indicate that ARO outperforms Genetic Algorithm(GA), Tabu Search (TS), Simulated Annealing (SA), and Particle Swarm Optimization (PSO) in most of test problems. In terms of the obtained error, by using ARO, the average error of the aforementioned test problems is reduced by approximately 20 percent of the minimum average error calculated for the above-mentioned algorithms.
△ Less
Submitted 14 January, 2021; v1 submitted 9 January, 2021;
originally announced January 2021.
-
An Autonomous Driving Framework for Long-term Decision-making and Short-term Trajectory Planning on Frenet Space
Authors:
Majid Moghadam,
Gabriel Hugh Elkaim
Abstract:
In this paper, we present a hierarchical framework for decision-making and planning on highway driving tasks. We utilized intelligent driving models (IDM and MOBIL) to generate long-term decisions based on the traffic situation flowing around the ego. The decisions both maximize ego performance while respecting other vehicles' objectives. Short-term trajectory optimization is performed on the Fren…
▽ More
In this paper, we present a hierarchical framework for decision-making and planning on highway driving tasks. We utilized intelligent driving models (IDM and MOBIL) to generate long-term decisions based on the traffic situation flowing around the ego. The decisions both maximize ego performance while respecting other vehicles' objectives. Short-term trajectory optimization is performed on the Frenet space to make the calculations invariant to the road's three-dimensional curvatures. A novel obstacle avoidance approach is introduced on the Frenet frame for the moving obstacles. The optimization explores the driving corridors to generate spatiotemporal polynomial trajectories to navigate through the traffic safely and obey the BP commands. The framework also introduces a heuristic supervisor that identifies unexpected situations and recalculates each module in case of a potential emergency. Experiments in CARLA simulation have shown the potential and the scalability of the framework in implementing various driving styles that match human behavior.
△ Less
Submitted 25 November, 2020;
originally announced November 2020.
-
An End-to-end Deep Reinforcement Learning Approach for the Long-term Short-term Planning on the Frenet Space
Authors:
Majid Moghadam,
Ali Alizadeh,
Engin Tekin,
Gabriel Hugh Elkaim
Abstract:
Tactical decision making and strategic motion planning for autonomous highway driving are challenging due to the complication of predicting other road users' behaviors, diversity of environments, and complexity of the traffic interactions. This paper presents a novel end-to-end continuous deep reinforcement learning approach towards autonomous cars' decision-making and motion planning. For the fir…
▽ More
Tactical decision making and strategic motion planning for autonomous highway driving are challenging due to the complication of predicting other road users' behaviors, diversity of environments, and complexity of the traffic interactions. This paper presents a novel end-to-end continuous deep reinforcement learning approach towards autonomous cars' decision-making and motion planning. For the first time, we define both states and action spaces on the Frenet space to make the driving behavior less variant to the road curvatures than the surrounding actors' dynamics and traffic interactions. The agent receives time-series data of past trajectories of the surrounding vehicles and applies convolutional neural networks along the time channels to extract features in the backbone. The algorithm generates continuous spatiotemporal trajectories on the Frenet frame for the feedback controller to track. Extensive high-fidelity highway simulations on CARLA show the superiority of the presented approach compared with commonly used baselines and discrete reinforcement learning on various traffic scenarios. Furthermore, the proposed method's advantage is confirmed with a more comprehensive performance evaluation against 1000 randomly generated test scenarios.
△ Less
Submitted 25 November, 2020;
originally announced November 2020.
-
ECG-Based Blood Pressure Estimation Using Mechano-Electric Coupling Concept
Authors:
Seyedeh Somayyeh Mousavi,
Mostafa Charmi,
Mohammad Firouzmand,
Mohammad Hemmati,
Maryam Moghadam,
Yadollah Ghorbani
Abstract:
The Electrocardiograph signal represents the heart's electrical activity while blood pressure results from the heart's mechanical activity. Previous studies have investigated how the heart's electrical and mechanical activities are related and have referred to their relationship as the Mechano-Electric Coupling term. A new method to estimate the blood pressure including is proposed which uses only…
▽ More
The Electrocardiograph signal represents the heart's electrical activity while blood pressure results from the heart's mechanical activity. Previous studies have investigated how the heart's electrical and mechanical activities are related and have referred to their relationship as the Mechano-Electric Coupling term. A new method to estimate the blood pressure including is proposed which uses only the Electrocardiograph signal. In spite of studies performed on feature extraction based on the signals' physiological parameters (Parameter-based), in this work, the feature vectors are formed with samples of the Electrocardiograph signal in a particular time frame (Whole-based) and these vectors are input into Adaptive Boosting Regression to estimate blood pressure. The nonlinear relationship which correlates blood pressure with the Electrocardiograph signal is concluded by the results of this study. According to the results, the used algorithms, for estimating both diastolic blood pressures and mean arterial pressure, are in compliance with the standards of the Association for the Advancement of Medical Instrumentation. Also, according to the British Hypertension Society standard, estimating diastolic blood pressures and mean arterial pressure with the proposed method attain an A grade while it achieves B for systolic blood pressure. The results indicate that using the introduced method, blood pressure can be estimated continuously, noninvasively, without cuff, calibration-free and by using only the Electrocardiograph signal.
△ Less
Submitted 23 August, 2020;
originally announced August 2020.
-
Time-Division Energy Beamforming for Multiuser Wireless Power Transfer with Non-Linear Energy Harvesting
Authors:
Ganggang Ma,
Jie Xu,
Ya-Feng Liu,
Mohammad R. Vedady Moghadam
Abstract:
Energy beamforming has emerged as a promising technique for enhancing the energy transfer efficiency of wireless power transfer (WPT). However, the performance of conventional energy beamforming may seriously degrade due to the non-linear radio frequency (RF) to direct current (DC) conversion at energy receivers (ERs). To tackle this issue, this letter proposes a new time-division energy beamformi…
▽ More
Energy beamforming has emerged as a promising technique for enhancing the energy transfer efficiency of wireless power transfer (WPT). However, the performance of conventional energy beamforming may seriously degrade due to the non-linear radio frequency (RF) to direct current (DC) conversion at energy receivers (ERs). To tackle this issue, this letter proposes a new time-division energy beamforming, in which different energy beamforming matrices (of high ranks in general) are time shared to exploit the "convex-concave" shape of the RF-DC power relation at ERs. By considering a particular time duration for WPT, we maximize the minimum harvested DC energy among all ERs, by jointly optimizing the energy beamforming matrices and the corresponding time allocation. In order to solve the non-convex min-DC-energy maximization problem, we propose an efficient solution by using the techniques of alternating optimization and successive convex approximation (SCA). Numerical results show that the proposed time-division energy beamforming design indeed outperforms the conventional multi-beam and time-division-multiple-access (TDMA)-based energy transmissions.
△ Less
Submitted 5 June, 2020;
originally announced June 2020.
-
Automated Lane Change Decision Making using Deep Reinforcement Learning in Dynamic and Uncertain Highway Environment
Authors:
Ali Alizadeh,
Majid Moghadam,
Yunus Bicer,
Nazim Kemal Ure,
Ugur Yavas,
Can Kurtulus
Abstract:
Autonomous lane changing is a critical feature for advanced autonomous driving systems, that involves several challenges such as uncertainty in other driver's behaviors and the trade-off between safety and agility. In this work, we develop a novel simulation environment that emulates these challenges and train a deep reinforcement learning agent that yields consistent performance in a variety of d…
▽ More
Autonomous lane changing is a critical feature for advanced autonomous driving systems, that involves several challenges such as uncertainty in other driver's behaviors and the trade-off between safety and agility. In this work, we develop a novel simulation environment that emulates these challenges and train a deep reinforcement learning agent that yields consistent performance in a variety of dynamic and uncertain traffic scenarios. Results show that the proposed data-driven approach performs significantly better in noisy environments compared to methods that rely solely on heuristics.
△ Less
Submitted 17 September, 2019;
originally announced September 2019.
-
An Autonomous Performance Testing Framework using Self-Adaptive Fuzzy Reinforcement Learning
Authors:
Mahshid Helali Moghadam,
Mehrdad Saadatmand,
Markus Borg,
Markus Bohlin,
Björn Lisper
Abstract:
Test automation brings the potential to reduce costs and human effort, but several aspects of software testing remain challenging to automate. One such example is automated performance testing to find performance breaking points. Current approaches to tackle automated generation of performance test cases mainly involve using source code or system model analysis or use-case based techniques. Howeve…
▽ More
Test automation brings the potential to reduce costs and human effort, but several aspects of software testing remain challenging to automate. One such example is automated performance testing to find performance breaking points. Current approaches to tackle automated generation of performance test cases mainly involve using source code or system model analysis or use-case based techniques. However, source code and system models might not always be available at testing time. On the other hand, if the optimal performance testing policy for the intended objective in a testing process instead could be learned by the testing system, then test automation without advanced performance models could be possible. Furthermore, the learned policy could later be reused for similar software systems under test, thus leading to higher test efficiency. We propose SaFReL, a self-adaptive fuzzy reinforcement learning-based performance testing framework. SaFReL learns the optimal policy to generate performance test cases through an initial learning phase, then reuses it during a transfer learning phase, while kee** the learning running and updating the policy in the long term. Through multiple experiments on a simulated environment, we demonstrate that our approach generates the target performance test cases for different programs more efficiently than a typical testing process, and performs adaptively without access to source code and performance models.
△ Less
Submitted 30 July, 2020; v1 submitted 19 August, 2019;
originally announced August 2019.
-
A Hierarchical Architecture for Sequential Decision-Making in Autonomous Driving using Deep Reinforcement Learning
Authors:
Majid Moghadam,
Gabriel Hugh Elkaim
Abstract:
Tactical decision making is a critical feature for advanced driving systems, that incorporates several challenges such as complexity of the uncertain environment and reliability of the autonomous system. In this work, we develop a multi-modal architecture that includes the environmental modeling of ego surrounding and train a deep reinforcement learning (DRL) agent that yields consistent performan…
▽ More
Tactical decision making is a critical feature for advanced driving systems, that incorporates several challenges such as complexity of the uncertain environment and reliability of the autonomous system. In this work, we develop a multi-modal architecture that includes the environmental modeling of ego surrounding and train a deep reinforcement learning (DRL) agent that yields consistent performance in stochastic highway driving scenarios. To this end, we feed the occupancy grid of the ego surrounding into the DRL agent and obtain the high-level sequential commands (i.e. lane change) to send them to lower-level controllers. We will show that dividing the autonomous driving problem into a multi-layer control architecture enables us to leverage the AI power to solve each layer separately and achieve an admissible reliability score. Comparing with end-to-end approaches, this architecture enables us to end up with a more reliable system which can be implemented in actual self-driving cars.
△ Less
Submitted 20 June, 2019;
originally announced June 2019.
-
An Introduction to a New Text Classification and Visualization for Natural Language Processing Using Topological Data Analysis
Authors:
Naiereh Elyasi,
Mehdi Hosseini Moghadam
Abstract:
Topological Data Analysis (TDA) is a novel new and fast growing field of data science providing a set of new topological and geometric tools to derive relevant features out of complex high-dimensional data. In this paper we apply two of best methods in topological data analysis, "Persistent Homology" and "Mapper", in order to classify persian poems which has been composed by two of the best Irania…
▽ More
Topological Data Analysis (TDA) is a novel new and fast growing field of data science providing a set of new topological and geometric tools to derive relevant features out of complex high-dimensional data. In this paper we apply two of best methods in topological data analysis, "Persistent Homology" and "Mapper", in order to classify persian poems which has been composed by two of the best Iranian poets namely "Ferdowsi" and "Hafez". This article has two main parts, in the first part we explain the mathematics behind these two methods which is easy to understand for general audience and in the second part we describe our models and the results of applying TDA tools to NLP.
△ Less
Submitted 3 June, 2019;
originally announced June 2019.
-
A Generic Receiver Architecture for MIMO Wireless Power Transfer with Non-Linear Energy Harvesting
Authors:
Ganggang Ma,
Jie Xu,
Yong Zeng,
Mohammad R. Vedady Moghadam
Abstract:
This letter investigates a multiple-input multiple-output (MIMO) wireless power transfer (WPT) system under practical non-liner energy harvesting (EH) models. We propose a new generic energy receiver (ER) architecture consisting of $N$ receive antennas and $L$ rectifiers, for which one power splitter is inserted after each antenna to adaptively split the received radio frequency (RF) signals among…
▽ More
This letter investigates a multiple-input multiple-output (MIMO) wireless power transfer (WPT) system under practical non-liner energy harvesting (EH) models. We propose a new generic energy receiver (ER) architecture consisting of $N$ receive antennas and $L$ rectifiers, for which one power splitter is inserted after each antenna to adaptively split the received radio frequency (RF) signals among the $L$ rectifiers for efficient non-linear RF-to-direct current (DC) conversion. With the proposed architecture, we maximize the total harvested DC power at the ER, by jointly optimizing the transmit energy beamforming at the energy transmitter (ET) and the power splitting ratios at the ER. Numerical results show that our proposed design by exploiting the nonlinearity of EH significantly improves the harvested DC power at the ER, as compared to two conventional designs.
△ Less
Submitted 17 December, 2018; v1 submitted 17 December, 2018;
originally announced December 2018.
-
Creating a New Persian Poet Based on Machine Learning
Authors:
Mehdi Hosseini Moghadam,
Bardia Panahbehagh
Abstract:
In this article we describe an application of Machine Learning (ML) and Linguistic Modeling to generate persian poems. In fact we teach machine by reading and learning persian poems to generate fake poems in the same style of the original poems. As two well known poets we used Hafez (1310-1390) and Saadi (1210-1292) poems. First we feed the machine with Hafez poems to generate fake poems with the…
▽ More
In this article we describe an application of Machine Learning (ML) and Linguistic Modeling to generate persian poems. In fact we teach machine by reading and learning persian poems to generate fake poems in the same style of the original poems. As two well known poets we used Hafez (1310-1390) and Saadi (1210-1292) poems. First we feed the machine with Hafez poems to generate fake poems with the same style and then we feed the machine with the both Hafez and Saadi poems to generate a new style poems which is combination of these two poets styles with emotional (Hafez) and rational (Saadi) elements. This idea of combination of different styles with ML opens new gates for extending the treasure of past literature of different cultures. Results show with enough memory, processing power and time it is possible to generate reasonable good poems.
△ Less
Submitted 16 October, 2018;
originally announced October 2018.
-
Superconducting epitaxial YBa2Cu3O7-δ on SrTiO3 buffered Si (001)
Authors:
K. Ahmadi-Majlan,
H. Zhang,
X. Shen,
M. J. Moghadam,
M. Chrysler,
P. Conlin,
R. Hensley,
D. Su,
J. Y. T. Wei,
J. H. Ngai
Abstract:
Thin films of optimally-doped (001)-oriented YBa2Cu3O7-δ are epitaxially integrated on silicon (001) through growth on a single crystalline SrTiO3 buffer. The former is grown using pulsed-laser deposition and the latter is grown on Si using oxide molecular beam epitaxy. The single crystal nature of the SrTiO3 buffer enables high quality YBa2Cu3O7-δ films exhibiting high transition temperatures to…
▽ More
Thin films of optimally-doped (001)-oriented YBa2Cu3O7-δ are epitaxially integrated on silicon (001) through growth on a single crystalline SrTiO3 buffer. The former is grown using pulsed-laser deposition and the latter is grown on Si using oxide molecular beam epitaxy. The single crystal nature of the SrTiO3 buffer enables high quality YBa2Cu3O7-δ films exhibiting high transition temperatures to be integrated on Si. For a 30 nm thick SrTiO3 buffer, 50 nm thick YBa2Cu3O7-δ films that exhibit a transition temperature of ~ 93 K, and a narrow transition width (< 5 K) are achieved. The integration of single crystalline YBa2Cu3O7-δ on Si (001) paves the way for the potential exploration of cuprate materials in a variety of applications.
△ Less
Submitted 24 October, 2017;
originally announced October 2017.
-
Existence results to a nonlinear p(k)-Laplacian difference equation
Authors:
Mohsen Khaleghi Moghadam,
Mustafa Avci
Abstract:
In the present paper, by using variational method, the existence of non-trivial solutions to an anisotropic discrete non-linear problem involving p(k)-Laplacian operator with Dirichlet boundary condition is investigated. The main technical tools applied here are the two local minimum theorems for differentiable functionals given by Bonanno.
In the present paper, by using variational method, the existence of non-trivial solutions to an anisotropic discrete non-linear problem involving p(k)-Laplacian operator with Dirichlet boundary condition is investigated. The main technical tools applied here are the two local minimum theorems for differentiable functionals given by Bonanno.
△ Less
Submitted 5 July, 2017;
originally announced July 2017.
-
Real-time Shared Energy Storage Management for Renewable Energy Integration in Smart Grid
Authors:
Katayoun Rahbar,
Mohammad R. Vedady Moghadam,
Sanjib Kumar Panda
Abstract:
Energy storage systems (ESSs) are essential components of the future smart grids with high penetration of renewable energy sources. However, deploying individual ESSs for all energy consumers, especially in large systems, may not be practically feasible mainly due to high upfront cost of purchasing many ESSs and space limitation. As a result, the concept of shared ESS enabling all users charge/dis…
▽ More
Energy storage systems (ESSs) are essential components of the future smart grids with high penetration of renewable energy sources. However, deploying individual ESSs for all energy consumers, especially in large systems, may not be practically feasible mainly due to high upfront cost of purchasing many ESSs and space limitation. As a result, the concept of shared ESS enabling all users charge/discharge to/from a common ESS has become appealing. In this paper, we study the energy management problem of a group of users with renewable energy sources and controllable (i.e., demand responsive) loads that all share a common ESS so as to minimize their sum weighted energy cost. Specifically, we propose a distributed algorithm to solve the formulated problem, which iteratively derives the optimal values of charging/discharging to/from the shared ESS, while only limited information is exchanged between users and a central controller; hence, the privacy of users is preserved. With the optimal charging and discharging values obtained, each user needs to independently solve a simple linear programming (LP) problem to derive the optimal energy consumption of its controllable loads over time as well as that of purchased from the grid. Using simulations, we show that the shared ESS can achieve lower energy cost compared to the case of distributed ESSs, where each user owns its ESS and does not share it with others. Next, we propose online algorithms for the real-time energy management, under non-zero prediction errors of load and renewable energy. The proposed algorithms differ in complexity and the information required to be shared between the users and central controller, where their performance is also compared via simulations.
△ Less
Submitted 2 June, 2017;
originally announced June 2017.
-
Waveform Optimization for Radio-Frequency Wireless Power Transfer
Authors:
Mohammad R. Vedady Moghadam,
Yong Zeng,
Rui Zhang
Abstract:
In this paper, we study the waveform design problem for a single-input single-output (SISO) radio-frequency (RF) wireless power transfer (WPT) system in frequency-selective channels. First, based on the actual non-linear current-voltage model of the diode at the energy receiver, we derive a semi-closed-form expression for the deliverable DC voltage in terms of the incident RF signal and hence obta…
▽ More
In this paper, we study the waveform design problem for a single-input single-output (SISO) radio-frequency (RF) wireless power transfer (WPT) system in frequency-selective channels. First, based on the actual non-linear current-voltage model of the diode at the energy receiver, we derive a semi-closed-form expression for the deliverable DC voltage in terms of the incident RF signal and hence obtain the average harvested power. Next, by adopting a multisine waveform structure for the transmit signal of the energy transmitter, we jointly design the multisine signal amplitudes and phases overall frequency tones according to the channel state information (CSI) to maximize the deliverable DC voltage or harvested power. Although our formulated problem is non-convex and difficult to solve, we propose two suboptimal solutions to it, based on the frequency-domain maximal ratio transmission (MRT) principle and the sequential convex optimization (SCP) technique, respectively. Using various simulations, the performance gain of our solutions over the existing waveform designs is shown.
△ Less
Submitted 26 March, 2017; v1 submitted 11 March, 2017;
originally announced March 2017.
-
Ferroelectric metal-oxide-semiconductor capacitors using ultrathin single crystalline SrZrxTi1-xO3
Authors:
Reza M. Moghadam,
Zhiyong Xiao,
Kamyar Ahmadi-Majlan,
Everett D. Grimley,
Mark Bowden,
Phuong-Vu Ong,
Scott A. Chambers,
James M. Lebeau,
Xia Hong,
Peter V. Sushko,
Joseph H. Ngai
Abstract:
The epitaxial growth of multifunctional oxides on semiconductors has opened a pathway to introduce new functionalities to semiconductor device technologies. In particular, ferroelectric materials integrated on semiconductors could lead to low-power field-effect devices that can be used for logic and memory. Essential to realizing such field-effect devices is the development of ferroelectric metal-…
▽ More
The epitaxial growth of multifunctional oxides on semiconductors has opened a pathway to introduce new functionalities to semiconductor device technologies. In particular, ferroelectric materials integrated on semiconductors could lead to low-power field-effect devices that can be used for logic and memory. Essential to realizing such field-effect devices is the development of ferroelectric metal-oxide-semiconductor (MOS) capacitors, in which the polarization of a ferroelectric gate is coupled to the surface potential of a semiconducting channel. Here we demonstrate that ferroelectric MOS capacitors can be realized using single crystalline SrZrxTi1-xO3 (x = 0.7) that has been epitaxially grown on Ge. We find that the ferroelectric properties of SrZrxTi1-xO3 are exceptionally robust, as gate layers as thin as 5 nm corresponding to an equivalent-oxide-thickness of just 1.0 nm exhibit a ~ 2 V hysteretic window in the capacitance-voltage characteristics. The development of ferroelectric MOS capacitors with nanoscale gate thicknesses opens new vistas for nanoelectronic devices.
△ Less
Submitted 28 February, 2017;
originally announced March 2017.
-
Magnetic MIMO Signal Processing and Optimization for Wireless Power Transfer
Authors:
Gang Yang,
Mohammad R. Vedady Moghadam,
Rui Zhang
Abstract:
In magnetic resonant coupling (MRC) enabled multiple-input multiple-output (MIMO) wireless power transfer (WPT) systems, multiple transmitters (TXs) each with one single coil are used to enhance the efficiency of simultaneous power transfer to multiple single-coil receivers (RXs) by constructively combining their induced magnetic fields at the RXs, a technique termed "magnetic beamforming". In thi…
▽ More
In magnetic resonant coupling (MRC) enabled multiple-input multiple-output (MIMO) wireless power transfer (WPT) systems, multiple transmitters (TXs) each with one single coil are used to enhance the efficiency of simultaneous power transfer to multiple single-coil receivers (RXs) by constructively combining their induced magnetic fields at the RXs, a technique termed "magnetic beamforming". In this paper, we study the optimal magnetic beamforming design in a multi-user MIMO MRC-WPT system. We introduce the multi-user power region that constitutes all the achievable power tuples for all RXs, subject to the given total power constraint over all TXs as well as their individual peak voltage and current constraints. We characterize each boundary point of the power region by maximizing the sum-power deliverable to all RXs subject to their minimum harvested power constraints. For the special case without the TX peak voltage and current constraints, we derive the optimal TX current allocation for the single-RX setup in closed-form as well as that for the multi-RX setup. In general, the problem is a non-convex quadratically constrained quadratic programming (QCQP), which is difficult to solve. For the case of one single RX, we show that the semidefinite relaxation (SDR) of the problem is tight. For the general case with multiple RXs, based on SDR we obtain two approximate solutions by applying time-sharing and randomization, respectively. Moreover, for practical implementation of magnetic beamforming, we propose a novel signal processing method to estimate the magnetic MIMO channel due to the mutual inductances between TXs and RXs. Numerical results show that our proposed magnetic channel estimation and adaptive beamforming schemes are practically effective, and can significantly improve the power transfer efficiency and multi-user performance trade-off in MIMO MRC-WPT systems.
△ Less
Submitted 17 February, 2017;
originally announced February 2017.
-
Energy Management for Demand Responsive Users with Shared Energy Storage System
Authors:
Katayoun Rahbar,
Mohammad R. Vedady Moghadam,
Sanjib Kumar Panda,
Thomas Reindl
Abstract:
This paper investigates the energy management problem for multiple self-interested users, each with renewable energy generation as well as both the fixed and controllable loads, that all share a common energy storage system (ESS). The self-interested users are willing to sell/buy energy to/from the shared ESS if they can achieve lower energy costs compared to the case of no energy trading while pr…
▽ More
This paper investigates the energy management problem for multiple self-interested users, each with renewable energy generation as well as both the fixed and controllable loads, that all share a common energy storage system (ESS). The self-interested users are willing to sell/buy energy to/from the shared ESS if they can achieve lower energy costs compared to the case of no energy trading while preserving their privacy e.g. sharing only limited information with a central controller. Under this setup, we propose an iterative algorithm by which the central controller coordinates the charging/discharging values to/from the shared ESS by all users such that their individual energy costs reduce at the same time. For performance benchmark, the case of cooperative users that all belong to the same entity is considered, where they share all the required information with the central controller so as to minimize their total energy cost. Finally, the effectiveness of our proposed algorithm in simultaneously reducing users' energy costs is shown via simulations based on realistic system data of California, US.
△ Less
Submitted 13 August, 2016;
originally announced August 2016.
-
Node Placement and Distributed Magnetic Beamforming Optimization for Wireless Power Transfer
Authors:
Mohammad R. Vedady Moghadam,
Rui Zhang
Abstract:
In multiple-input single-output (MISO) wireless power transfer (WPT) via magnetic resonant coupling (MRC), multiple transmitters are deployed to enhance the efficiency of power transfer to the electric load at a single receiver by jointly optimizing their source currents/voltages to constructively combine the induced magnetic fields at the receiver, known as magnetic beamforming. In practice, sinc…
▽ More
In multiple-input single-output (MISO) wireless power transfer (WPT) via magnetic resonant coupling (MRC), multiple transmitters are deployed to enhance the efficiency of power transfer to the electric load at a single receiver by jointly optimizing their source currents/voltages to constructively combine the induced magnetic fields at the receiver, known as magnetic beamforming. In practice, since the transmitters (power chargers) are usually at fixed locations and the receiver (e.g. mobile phone) is desired to be freely located in a target region for wireless charging, its received power can fluctuate significantly over locations even with adaptive magnetic beamforming applied. To achieve uniform coverage, the transmitters need to be optimally placed in the region, which motivates this paper. First, we derive the optimal magnetic beamforming solution in closed-form for a distributed MISO WPT system with given locations of the transmitters and receiver to maximize the deliverable power to the receiver load subject to a given sum-power constraint at all transmitters. With the optimal magnetic beamforming solution, we then jointly optimize the locations of all transmitters to maximize the minimum power deliverable to the receiver when it is being moved over a given one-dimensional (1D) region, i.e., a line of finite length. Although the formulated node placement problem is non-convex, we propose an iterative algorithm for solving it efficiently. Extensive simulation results are provided which show the significant performance gains by the proposed design with optimized transmitter locations and magnetic beamforming as compared to other benchmark schemes with non-adaptive or heuristic currents allocation and transmitters placement. Last, we extend the node placement problem to the more general case of two-dimensional (2D) region, and draw the key insights.
△ Less
Submitted 26 March, 2017; v1 submitted 31 July, 2016;
originally announced August 2016.
-
Shared Energy Storage Management for Renewable Energy Integration in Smart Grid
Authors:
Katayoun Rahbar,
Mohammad R. Vedady Moghadam,
Sanjib Kumar Panda,
Thomas Reindl
Abstract:
Energy storage systems (ESSs) are essential components of the future smart grid to smooth out the fluctuating output of renewable energy generators. However, installing large number of ESSs for individual energy consumers may not be practically implementable, due to both the space limitation and high investment cost. As a result, in this paper, we study the energy management problem of multiple us…
▽ More
Energy storage systems (ESSs) are essential components of the future smart grid to smooth out the fluctuating output of renewable energy generators. However, installing large number of ESSs for individual energy consumers may not be practically implementable, due to both the space limitation and high investment cost. As a result, in this paper, we study the energy management problem of multiple users with renewable energy sources and a single shared ESS. To solve this problem, we propose an algorithm that jointly optimizes the energy charged/discharged to/from the shared ESS given a profit coefficient set that specifies the desired proportion of the total profit allocated to each user, subject to practical constraints of the system. We conduct simulations based on the real data from California, US, and show that the shared ESS can potentially increase the total profit of all users by 10% over the case that users own individual small-scale ESSs with no energy sharing.
△ Less
Submitted 22 July, 2016;
originally announced July 2016.
-
Magnetic Beamforming for Wireless Power Transfer
Authors:
Gang Yang,
Mohammad R. Vedady Moghadam,
Rui Zhang
Abstract:
Magnetic resonant coupling (MRC) is an efficient method for realizing the near-field wireless power transfer (WPT). The use of multiple transmitters (TXs) each with one coil can be applied to enhance the WPT performance by focusing the magnetic fields from all TX coils in a beam toward the receiver (RX) coil, termed as "magnetic beamforming". In this paper, we study the optimal magnetic beamformin…
▽ More
Magnetic resonant coupling (MRC) is an efficient method for realizing the near-field wireless power transfer (WPT). The use of multiple transmitters (TXs) each with one coil can be applied to enhance the WPT performance by focusing the magnetic fields from all TX coils in a beam toward the receiver (RX) coil, termed as "magnetic beamforming". In this paper, we study the optimal magnetic beamforming for an MRC-WPT system with multiple TXs and a single RX. We formulate an optimization problem to jointly design the currents flowing through different TXs so as to minimize the total power drawn from their voltage sources, subject to the minimum power required by the RX load as well as the TXs' constraints on the peak voltage and current. For the special case of identical TX resistances and neglecting all TXs' constraints on the peak voltage and current, we show that the optimal current magnitude of each TX is proportional to the mutual inductance between its TX coil and the RX coil. In general, the problem is a non-convex quadratically constrained quadratic programming (QCQP) problem, which is reformulated as a semidefinite programming (SDP) problem. We show that its semidefinite relaxation (SDR) is tight. Numerical results show that magnetic beamforming significantly enhances the deliverable power as well as the WPT efficiency over the uncoordinated benchmark scheme of equal current allocation.
△ Less
Submitted 23 September, 2015; v1 submitted 22 September, 2015;
originally announced September 2015.
-
Multiuser Wireless Power Transfer via Magnetic Resonant Coupling: Performance Analysis, Charging Control, and Power Region Characterization
Authors:
Mohammad R. Vedady Moghadam,
Rui Zhang
Abstract:
Magnetic resonant coupling (MRC) is an efficient method for realizing the near-field wireless power transfer (WPT). Although the MRC enabled WPT (MRC-WPT) with a single pair of transmitter and receiver has been thoroughly studied in the literature, there is limited work on the general setup with multiple transmitters and/or receivers. In this paper, we consider a point-to-multipoint MRC-WPT system…
▽ More
Magnetic resonant coupling (MRC) is an efficient method for realizing the near-field wireless power transfer (WPT). Although the MRC enabled WPT (MRC-WPT) with a single pair of transmitter and receiver has been thoroughly studied in the literature, there is limited work on the general setup with multiple transmitters and/or receivers. In this paper, we consider a point-to-multipoint MRC-WPT system with one transmitter delivering wireless power to a set of distributed receivers. We aim to introduce new applications of signal processing and optimization techniques to the performance characterization and optimization in multiuser WPT via MRC. We first derive closed-form expressions for the power drawn from the energy source at the transmitter and that delivered to the load at each receiver. We identify a "near-far" fairness issue in multiuser power transmission due to receivers' distance-dependent mutual inductance with the transmitter. To tackle this issue, we propose a centralized charging control algorithm to jointly optimize the receivers' load resistance to minimize the total transmitter power drawn while meeting the given power requirement of each individual load. For ease of practical implementation, we also devise a distributed algorithm for the receivers to adjust their load resistance independently in an iterative manner. Last, we characterize the power region that constitutes all the achievable power-tuples of the loads via controlling their adjustable resistance. In particular, we compare the power regions without versus with the time sharing of users' power transmission, where it is shown that time sharing yields a larger power region in general. Extensive simulation results are provided to validate our analysis and corroborate our study on the multiuser MRC-WPT system.
△ Less
Submitted 9 March, 2016; v1 submitted 30 April, 2015;
originally announced April 2015.
-
Multiuser Charging Control in Wireless Power Transfer via Magnetic Resonant Coupling
Authors:
Mohammad R. Vedady Moghadam,
Rui Zhang
Abstract:
Magnetic resonant coupling (MRC) is a practically appealing method for realizing the near-field wireless power transfer (WPT). The MRC-WPT system with a single pair of transmitter and receiver has been extensively studied in the literature, while there is limited work on the general setup with multiple transmitters and/or receivers. In this paper, we consider a point-to-multipoint MRC-WPT system w…
▽ More
Magnetic resonant coupling (MRC) is a practically appealing method for realizing the near-field wireless power transfer (WPT). The MRC-WPT system with a single pair of transmitter and receiver has been extensively studied in the literature, while there is limited work on the general setup with multiple transmitters and/or receivers. In this paper, we consider a point-to-multipoint MRC-WPT system with one transmitter sending power wirelessly to a set of distributed receivers simultaneously. We derive the power delivered to the load of each receiver in closed-form expression, and reveal a "near-far" fairness issue in multiuser power transmission due to users' distance-dependent mutual inductances with the transmitter. We also show that by designing the receivers' load resistances, the near-far issue can be optimally solved. Specifically, we propose a centralized algorithm to jointly optimize the load resistances to minimize the power drawn from the energy source at the transmitter under given power requirements for the loads. We also devise a distributed algorithm for the receivers to adjust their load resistances iteratively, for ease of practical implementation.
△ Less
Submitted 9 February, 2015;
originally announced February 2015.
-
Towards Python-based Domain-specific Languages for Self-reconfigurable Modular Robotics Research
Authors:
Mikael Moghadam,
David Johan Christensen,
David Brandt,
Ulrik Pagh Schultz
Abstract:
This paper explores the role of operating system and high-level languages in the development of software and domain-specific languages (DSLs) for self-reconfigurable robotics. We review some of the current trends in self-reconfigurable robotics and describe the development of a software system for ATRON II which utilizes Linux and Python to significantly improve software abstraction and portabilit…
▽ More
This paper explores the role of operating system and high-level languages in the development of software and domain-specific languages (DSLs) for self-reconfigurable robotics. We review some of the current trends in self-reconfigurable robotics and describe the development of a software system for ATRON II which utilizes Linux and Python to significantly improve software abstraction and portability while providing some basic features which could prove useful when using Python, either stand-alone or via a DSL, on a self-reconfigurable robot system. These features include transparent socket communication, module identification, easy software transfer and reliable module-to-module communication. The end result is a software platform for modular robots that where appropriate builds on existing work in operating systems, virtual machines, middleware and high-level languages.
△ Less
Submitted 22 February, 2013;
originally announced February 2013.