-
SubLock: Sub-Circuit Replacement based Input Dependent Key-based Logic Locking for Robust IP Protection
Authors:
Vijaypal Singh Rathor,
Munesh Singh,
Kshira Sagar Sahoo,
Saraju P. Mohanty
Abstract:
Intellectual Property (IP) piracy, overbuilding, reverse engineering, and hardware Trojan are serious security concerns during integrated circuit (IC) development. Logic locking has proven to be a solid defence for mitigating these threats. The existing logic locking techniques are vulnerable to SAT-based attacks. However, several SAT-resistant logic locking methods are reported; they require sign…
▽ More
Intellectual Property (IP) piracy, overbuilding, reverse engineering, and hardware Trojan are serious security concerns during integrated circuit (IC) development. Logic locking has proven to be a solid defence for mitigating these threats. The existing logic locking techniques are vulnerable to SAT-based attacks. However, several SAT-resistant logic locking methods are reported; they require significant overhead. This paper proposes a novel input dependent key-based logic locking (IDKLL) that effectively prevents SAT-based attacks with low overhead. We first introduce a novel idea of IDKLL, where a design is locked such that it functions correctly for all input patterns only when their corresponding valid key sequences are applied. In contrast to conventional logic locking, the proposed IDKLL method uses multiple key sequences (instead of a single key sequence) as a valid key that provides correct functionality for all inputs. Further, we propose a sub-circuit replacement based IDKLL approach called SubLock that locks the design by replacing the original sub-circuitry with the corresponding IDKLL based locked circuit to prevent SAT attack with low overhead. The experimental evaluation on ISCAS benchmarks shows that the proposed SubLock mitigates the SAT attack with high security and reduced overhead over the well-known existing methods.
△ Less
Submitted 27 June, 2024;
originally announced June 2024.
-
The World of Generative AI: Deepfakes and Large Language Models
Authors:
Alakananda Mitra,
Saraju P. Mohanty,
Elias Kougianos
Abstract:
We live in the era of Generative Artificial Intelligence (GenAI). Deepfakes and Large Language Models (LLMs) are two examples of GenAI. Deepfakes, in particular, pose an alarming threat to society as they are capable of spreading misinformation and changing the truth. LLMs are powerful language models that generate general-purpose language. However due to its generative aspect, it can also be a ri…
▽ More
We live in the era of Generative Artificial Intelligence (GenAI). Deepfakes and Large Language Models (LLMs) are two examples of GenAI. Deepfakes, in particular, pose an alarming threat to society as they are capable of spreading misinformation and changing the truth. LLMs are powerful language models that generate general-purpose language. However due to its generative aspect, it can also be a risk for people if used with ill intentions. The ethical use of these technologies is a big concern. This short article tries to find out the interrelationship between them.
△ Less
Submitted 6 February, 2024;
originally announced February 2024.
-
Consensus Algorithms of Distributed Ledger Technology -- A Comprehensive Analysis
Authors:
Ahmad J. Alkhodair,
Saraju P. Mohanty,
Elias Kougianos
Abstract:
The most essential component of every Distributed Ledger Technology (DLT) is the Consensus Algorithm (CA), which enables users to reach a consensus in a decentralized and distributed manner. Numerous CA exist, but their viability for particular applications varies, making their trade-offs a crucial factor to consider when implementing DLT in a specific field. This article provided a comprehensive…
▽ More
The most essential component of every Distributed Ledger Technology (DLT) is the Consensus Algorithm (CA), which enables users to reach a consensus in a decentralized and distributed manner. Numerous CA exist, but their viability for particular applications varies, making their trade-offs a crucial factor to consider when implementing DLT in a specific field. This article provided a comprehensive analysis of the various consensus algorithms used in distributed ledger technologies (DLT) and blockchain networks. We cover an extensive array of thirty consensus algorithms. Eleven attributes including hardware requirements, pre-trust level, tolerance level, and more, were used to generate a series of comparison tables evaluating these consensus algorithms. In addition, we discuss DLT classifications, the categories of certain consensus algorithms, and provide examples of authentication-focused and data-storage-focused DLTs. In addition, we analyze the pros and cons of particular consensus algorithms, such as Nominated Proof of Stake (NPoS), Bonded Proof of Stake (BPoS), and Avalanche. In conclusion, we discuss the applicability of these consensus algorithms to various Cyber Physical System (CPS) use cases, including supply chain management, intelligent transportation systems, and smart healthcare.
△ Less
Submitted 23 September, 2023;
originally announced September 2023.
-
SimplyMime: A Control at Our Fingertips
Authors:
Sibi Chakkaravarthy Sethuraman,
Gaurav Reddy Tadkapally,
Athresh Kiran,
Saraju P. Mohanty,
Anitha Subramanian
Abstract:
The utilization of consumer electronics, such as televisions, set-top boxes, home theaters, and air conditioners, has become increasingly prevalent in modern society as technology continues to evolve. As new devices enter our homes each year, the accumulation of multiple infrared remote controls to operate them not only results in a waste of energy and resources, but also creates a cumbersome and…
▽ More
The utilization of consumer electronics, such as televisions, set-top boxes, home theaters, and air conditioners, has become increasingly prevalent in modern society as technology continues to evolve. As new devices enter our homes each year, the accumulation of multiple infrared remote controls to operate them not only results in a waste of energy and resources, but also creates a cumbersome and cluttered environment for the user. This paper presents a novel system, named SimplyMime, which aims to eliminate the need for multiple remote controls for consumer electronics and provide the user with intuitive control without the need for additional devices. SimplyMime leverages a dynamic hand gesture recognition architecture, incorporating Artificial Intelligence and Human-Computer Interaction, to create a sophisticated system that enables users to interact with a vast majority of consumer electronics with ease. Additionally, SimplyMime has a security aspect where it can verify and authenticate the user utilising the palmprint, which ensures that only authorized users can control the devices. The performance of the proposed method for detecting and recognizing gestures in a stream of motion was thoroughly tested and validated using multiple benchmark datasets, resulting in commendable accuracy levels. One of the distinct advantages of the proposed method is its minimal computational power requirements, making it highly adaptable and reliable in a wide range of circumstances. The paper proposes incorporating this technology into all consumer electronic devices that currently require a secondary remote for operation, thus promoting a more efficient and sustainable living environment.
△ Less
Submitted 22 April, 2023;
originally announced April 2023.
-
FlexiChain 2.0: NodeChain Assisting Integrated Decentralized Vault for Effective Data Authentication and Device Integrity in Complex Cyber-Physical Systems
Authors:
Ahmad J. Alkhodair,
Saraju P. Mohanty,
Elias Kougianos
Abstract:
Distributed Ledger Technology (DLT) has been introduced using the most common consensus algorithm either for an electronic cash system or a decentralized programmable assets platform which provides general services. Most established reliable networks are unsuitable for all applications such as smart cities applications, and, in particular, Internet of Things (IoT) and Cyber Physical Systems (CPS)…
▽ More
Distributed Ledger Technology (DLT) has been introduced using the most common consensus algorithm either for an electronic cash system or a decentralized programmable assets platform which provides general services. Most established reliable networks are unsuitable for all applications such as smart cities applications, and, in particular, Internet of Things (IoT) and Cyber Physical Systems (CPS) applications. The purpose of this paper is to provide a suitable DLT for IoT and CPS that could satisfy their requirements. The proposed work has been designed based on the requirements of Cyber Physical Systems. FlexiChain is proposed as a layer zero network that could be formed from independent blockchains. Also, NodeChain has been introduced to be a distributed (Unique ID) UID aggregation vault to secure all nodes' UIDs. Moreover, NodeChain is proposed to serve mainly FlexiChain for all node security requirements. NodeChain targets the security and integrity of each node. Also, the linked UIDs create a chain of narration that keeps track not merely for assets but also for who authenticated the assets. The security results present a higher resistance against four types of attacks. Furthermore, the strength of the network is presented from the early stages compared to blockchain and central authority. FlexiChain technology has been introduced to be a layer zero network for all CPS decentralized applications taking into accounts their requirements. FlexiChain relies on lightweight processing mechanisms and creates other methods to increase security.
△ Less
Submitted 17 April, 2023;
originally announced April 2023.
-
MagicEye: An Intelligent Wearable Towards Independent Living of Visually Impaired
Authors:
Sibi C. Sethuraman,
Gaurav R. Tadkapally,
Saraju P. Mohanty,
Gautam Galada,
Anitha Subramanian
Abstract:
Individuals with visual impairments often face a multitude of challenging obstacles in their daily lives. Vision impairment can severely impair a person's ability to work, navigate, and retain independence. This can result in educational limits, a higher risk of accidents, and a plethora of other issues. To address these challenges, we present MagicEye, a state-of-the-art intelligent wearable devi…
▽ More
Individuals with visual impairments often face a multitude of challenging obstacles in their daily lives. Vision impairment can severely impair a person's ability to work, navigate, and retain independence. This can result in educational limits, a higher risk of accidents, and a plethora of other issues. To address these challenges, we present MagicEye, a state-of-the-art intelligent wearable device designed to assist visually impaired individuals. MagicEye employs a custom-trained CNN-based object detection model, capable of recognizing a wide range of indoor and outdoor objects frequently encountered in daily life. With a total of 35 classes, the neural network employed by MagicEye has been specifically designed to achieve high levels of efficiency and precision in object detection. The device is also equipped with facial recognition and currency identification modules, providing invaluable assistance to the visually impaired. In addition, MagicEye features a GPS sensor for navigation, allowing users to move about with ease, as well as a proximity sensor for detecting nearby objects without physical contact. In summary, MagicEye is an innovative and highly advanced wearable device that has been designed to address the many challenges faced by individuals with visual impairments. It is equipped with state-of-the-art object detection and navigation capabilities that are tailored to the needs of the visually impaired, making it one of the most promising solutions to assist those who are struggling with visual impairments.
△ Less
Submitted 24 March, 2023;
originally announced March 2023.
-
iPAL: A Machine Learning Based Smart Healthcare Framework For Automatic Diagnosis Of Attention Deficit/Hyperactivity Disorder (ADHD)
Authors:
Abhishek Sharma,
Arpit Jain,
Shubhangi Sharma,
Ashutosh Gupta,
Prateek Jain,
Saraju P. Mohanty
Abstract:
ADHD is a prevalent disorder among the younger population. Standard evaluation techniques currently use evaluation forms, interviews with the patient, and more. However, its symptoms are similar to those of many other disorders like depression, conduct disorder, and oppositional defiant disorder, and these current diagnosis techniques are not very effective. Thus, a sophisticated computing model h…
▽ More
ADHD is a prevalent disorder among the younger population. Standard evaluation techniques currently use evaluation forms, interviews with the patient, and more. However, its symptoms are similar to those of many other disorders like depression, conduct disorder, and oppositional defiant disorder, and these current diagnosis techniques are not very effective. Thus, a sophisticated computing model holds the potential to provide a promising diagnosis solution to this problem. This work attempts to explore methods to diagnose ADHD using combinations of multiple established machine learning techniques like neural networks and SVM models on the ADHD200 dataset and explore the field of neuroscience. In this work, multiclass classification is performed on phenotypic data using an SVM model. The better results have been analyzed on the phenotypic data compared to other supervised learning techniques like Logistic regression, KNN, AdaBoost, etc. In addition, neural networks have been implemented on functional connectivity from the MRI data of a sample of 40 subjects provided to achieve high accuracy without prior knowledge of neuroscience. It is combined with the phenotypic classifier using the ensemble technique to get a binary classifier. It is further trained and tested on 400 out of 824 subjects from the ADHD200 data set and achieved an accuracy of 92.5% for binary classification The training and testing accuracy has been achieved upto 99% using ensemble classifier.
△ Less
Submitted 1 February, 2023;
originally announced February 2023.
-
iCardo: A Machine Learning Based Smart Healthcare Framework for Cardiovascular Disease Prediction
Authors:
Nidhi Sinha,
Teena Jangid,
Amit M. Joshi,
Saraju P. Mohanty
Abstract:
The point of care services and medication have become simpler with efficient consumer electronics devices in a smart healthcare system. Cardiovascular disease is a critical illness which causes heart failure, and early and prompt identification can lessen damage and prevent premature mortality. Machine learning has been used to predict cardiovascular disease (CVD) in the literature. The article ex…
▽ More
The point of care services and medication have become simpler with efficient consumer electronics devices in a smart healthcare system. Cardiovascular disease is a critical illness which causes heart failure, and early and prompt identification can lessen damage and prevent premature mortality. Machine learning has been used to predict cardiovascular disease (CVD) in the literature. The article explains choosing the best classifier model for the selected feature sets and the distinct feature sets selected using four feature selection models. The paper compares seven classifiers using each of the sixteen feature sets. Originally, the data had 56 attributes and 303 occurrences, of which 87 were in good health, and the remainder had cardiovascular disease (CVD). Demographic data with several features make up the four groups of overall features. Lasso, Tree-based algorithms, Chi-Square and RFE have all been used to choose the four distinct feature sets, each containing five, ten, fifteen, and twenty features, respectively. Seven distinct classifiers have been trained and evaluated for each of the sixteen feature sets. To determine the most effective blend of feature set and model, a total of 112 models have been trained, tested, and their performance has been compared. SVM classifier with fifteen chosen features is shown to be the best in terms of overall accuracy. The healthcare data has been maintained in the cloud and would be accessible to patients, caretakers, and healthcare providers through integration with the Internet of Medical Things (IoMT) enabled smart healthcare. Subsequently, the feature selection model chooses the most appropriate feature for CVD prediction to calibrate the system, and the proposed framework can be utilised to anticipate CVD.
△ Less
Submitted 7 December, 2022;
originally announced December 2022.
-
Accu-Help: A Machine Learning based Smart Healthcare Framework for Accurate Detection of Obsessive Compulsive Disorder
Authors:
Kabita Patel,
Ajaya Kumar Tripathy,
Laxmi Narayan Padhy,
Sujita Kumar Kar,
Susanta Kumar Padhy,
Saraju Prasad Mohanty
Abstract:
In recent years the importance of Smart Healthcare cannot be overstated. The current work proposed to expand the state-of-art of smart healthcare in integrating solutions for Obsessive Compulsive Disorder (OCD). Identification of OCD from oxidative stress biomarkers (OSBs) using machine learning is an important development in the study of OCD. However, this process involves the collection of OCD c…
▽ More
In recent years the importance of Smart Healthcare cannot be overstated. The current work proposed to expand the state-of-art of smart healthcare in integrating solutions for Obsessive Compulsive Disorder (OCD). Identification of OCD from oxidative stress biomarkers (OSBs) using machine learning is an important development in the study of OCD. However, this process involves the collection of OCD class labels from hospitals, collection of corresponding OSBs from biochemical laboratories, integrated and labeled dataset creation, use of suitable machine learning algorithm for designing OCD prediction model, and making these prediction models available for different biochemical laboratories for OCD prediction for unlabeled OSBs. Further, from time to time, with significant growth in the volume of the dataset with labeled samples, redesigning the prediction model is required for further use. The whole process requires distributed data collection, data integration, coordination between the hospital and biochemical laboratory, dynamic machine learning OCD prediction mode design using a suitable machine learning algorithm, and making the machine learning model available for the biochemical laboratories. Kee** all these things in mind, Accu-Help a fully automated, smart, and accurate OCD detection conceptual model is proposed to help the biochemical laboratories for efficient detection of OCD from OSBs. OSBs are classified into three classes: Healthy Individual (HI), OCD Affected Individual (OAI), and Genetically Affected Individual (GAI). The main component of this proposed framework is the machine learning OCD prediction model design. In this Accu-Help, a neural network-based approach is presented with an OCD prediction accuracy of 86 percent.
△ Less
Submitted 5 December, 2022;
originally announced December 2022.
-
Easy-Sec: PUF-Based Rapid and Robust Authentication Framework for the Internet of Vehicles
Authors:
Pintu Kumar Sadhu,
Venkata P. Yanambaka,
Saraju P. Mohanty,
Elias Kougianos
Abstract:
With the rapid growth of new technological paradigms such as the Internet of Things (IoT), it opens new doors for many applications in the modern era for the betterment of human life. One of the recent applications of the IoT is the Internet of Vehicles (IoV) which helps to see unprecedented growth of connected vehicles on the roads. The IoV is gaining attention due to enhancing traffic safety and…
▽ More
With the rapid growth of new technological paradigms such as the Internet of Things (IoT), it opens new doors for many applications in the modern era for the betterment of human life. One of the recent applications of the IoT is the Internet of Vehicles (IoV) which helps to see unprecedented growth of connected vehicles on the roads. The IoV is gaining attention due to enhancing traffic safety and providing low route information. One of the most important and major requirements of the IoV is preserving security and privacy under strict latency. Moreover, vehicles are required to be authenticated frequently and fast considering limited bandwidth, high mobility, and density of the vehicles. To address the security vulnerabilities and data integrity, an ultralight authentication scheme has been proposed in this article. Physical Unclonable Function (PUF) and XOR function are used to authenticate both server and vehicle in two message flow which makes the proposed scheme ultralight, and less computation is required. The proposed Easy-Sec can authenticate vehicles maintaining low latency and resisting known security threats. Furthermore, the proposed Easy-Sec needs low overhead so that it does not increase the burden of the IoV network. Computational ( around 4 ms) and Communication (32 bytes) overhead shows the feasibility, efficiency, and also security features are depicted using formal analysis, Burrows, Abadi, and Needham (BAN) logic, and informal analysis to show the robustness of the proposed mechanisms against security threats.
△ Less
Submitted 15 April, 2022;
originally announced April 2022.
-
PharmaChain: A Blockchain to Ensure Counterfeit Free Pharmaceutical Supply Chain
Authors:
Anand K. Bapatla,
Saraju P. Mohanty,
Elias Kougianos
Abstract:
Access to essential medication is a primary right of every individual in all developed, develo** and underdeveloped countries. This can be fulfilled by pharmaceutical supply chains (PSC) in place which will eliminate the boundaries between different organizations and will equip them to work collectively to make medicines reach even the remote corners of the globe. Due to multiple entities, which…
▽ More
Access to essential medication is a primary right of every individual in all developed, develo** and underdeveloped countries. This can be fulfilled by pharmaceutical supply chains (PSC) in place which will eliminate the boundaries between different organizations and will equip them to work collectively to make medicines reach even the remote corners of the globe. Due to multiple entities, which are geographically widespread, being involved and very complex goods and economic flows, PSC is very difficult to audit and resolve any issues involved. This has given rise to many issues, including increased threats of counterfeiting, inaccurate information propagation throughout the network because of data fragmentation, lack of customer confidence and delays in distribution of medication to the place in need. Hence, there is a strong need for robust PSC which is transparent to all parties involved and in which the whole journey of medicine from manufacturer to consumer can be tracked and traced easily. This will not only build safety for the consumers, but will also help manufacturers to build confidence among consumers and increase sales. In this article, a novel Distributed Ledger Technology (DLT) based transparent supply chain architecture is proposed and a proof-of-concept is implemented. Efficiency and scalability of the proposed architecture is evaluated and compared with existing solutions.
△ Less
Submitted 5 February, 2022;
originally announced February 2022.
-
Everything You wanted to Know about Smart Agriculture
Authors:
Alakananda Mitra,
Sukrutha L. T. Vangipuram,
Anand K. Bapatla,
Venkata K. V. V. Bathalapalli,
Saraju P. Mohanty,
Elias Kougianos,
Chittaranjan Ray
Abstract:
The world population is anticipated to increase by close to 2 billion by 2050 causing a rapid escalation of food demand. A recent projection shows that the world is lagging behind accomplishing the "Zero Hunger" goal, in spite of some advancements. Socio-economic and well being fallout will affect the food security. Vulnerable groups of people will suffer malnutrition. To cater to the needs of the…
▽ More
The world population is anticipated to increase by close to 2 billion by 2050 causing a rapid escalation of food demand. A recent projection shows that the world is lagging behind accomplishing the "Zero Hunger" goal, in spite of some advancements. Socio-economic and well being fallout will affect the food security. Vulnerable groups of people will suffer malnutrition. To cater to the needs of the increasing population, the agricultural industry needs to be modernized, become smart, and automated. Traditional agriculture can be remade to efficient, sustainable, eco-friendly smart agriculture by adopting existing technologies. In this survey paper the authors present the applications, technological trends, available datasets, networking options, and challenges in smart agriculture. How Agro Cyber Physical Systems are built upon the Internet-of-Agro-Things is discussed through various application fields. Agriculture 4.0 is also discussed as a whole. We focus on the technologies, such as Artificial Intelligence (AI) and Machine Learning (ML) which support the automation, along with the Distributed Ledger Technology (DLT) which provides data integrity and security. After an in-depth study of different architectures, we also present a smart agriculture framework which relies on the location of data processing. We have divided open research problems of smart agriculture as future research work in two groups - from a technological perspective and from a networking perspective. AI, ML, the blockchain as a DLT, and Physical Unclonable Functions (PUF) based hardware security fall under the technology group, whereas any network related attacks, fake data injection and similar threats fall under the network research problem group.
△ Less
Submitted 12 January, 2022;
originally announced January 2022.
-
The Food Recognition Benchmark: Using DeepLearning to Recognize Food on Images
Authors:
Sharada Prasanna Mohanty,
Gaurav Singhal,
Eric Antoine Scuccimarra,
Djilani Kebaili,
Harris Héritier,
Victor Boulanger,
Marcel Salathé
Abstract:
The automatic recognition of food on images has numerous interesting applications, including nutritional tracking in medical cohorts. The problem has received significant research attention, but an ongoing public benchmark to develop open and reproducible algorithms has been missing. Here, we report on the setup of such a benchmark using publicly available food images sourced through the mobile My…
▽ More
The automatic recognition of food on images has numerous interesting applications, including nutritional tracking in medical cohorts. The problem has received significant research attention, but an ongoing public benchmark to develop open and reproducible algorithms has been missing. Here, we report on the setup of such a benchmark using publicly available food images sourced through the mobile MyFoodRepo app. Through four rounds, the benchmark released the MyFoodRepo-273 dataset constituting 24,119 images and a total of 39,325 segmented polygons categorized in 273 different classes. Models were evaluated on private tests sets from the same platform with 5,000 images and 7,865 annotations in the final round. Top-performing models on the 273 food categories reached a mean average precision of 0.568 (round 4) and a mean average recall of 0.885 (round 3). We present experimental validation of round 4 results, and discuss implications of the benchmark setup designed to increase the size and diversity of the dataset for future rounds.
△ Less
Submitted 30 June, 2021; v1 submitted 28 June, 2021;
originally announced June 2021.
-
iThing: Designing Next-Generation Things with Battery Health Self-Monitoring Capabilities for Sustainable IoT in Smart Cities
Authors:
Aparna Sinha,
Debanjan Das,
Venkanna Udutalapally,
Mukil Kumar Selvarajan,
Saraju P. Mohanty
Abstract:
An accurate and reliable technique for predicting Remaining Useful Life (RUL) for battery cells proves helpful in battery-operated IoT devices, especially in remotely operated sensor nodes. Data-driven methods have proved to be the most effective methods until now. These IoT devices have low computational capabilities to save costs, but Data-Driven battery health techniques often require a compara…
▽ More
An accurate and reliable technique for predicting Remaining Useful Life (RUL) for battery cells proves helpful in battery-operated IoT devices, especially in remotely operated sensor nodes. Data-driven methods have proved to be the most effective methods until now. These IoT devices have low computational capabilities to save costs, but Data-Driven battery health techniques often require a comparatively large amount of computational power to predict SOH and RUL due to most methods being feature-heavy. This issue calls for ways to predict RUL with the least amount of calculations and memory. This paper proposes an effective and novel peak extraction method to reduce computation and memory needs and provide accurate prediction methods using the least number of features while performing all calculations on-board. The model can self-sustain, requires minimal external interference, and hence operate remotely much longer. Experimental results prove the accuracy and reliability of this method. The Absolute Error (AE), Relative error (RE), and Root Mean Square Error (RMSE) are calculated to compare effectiveness. The training of the GPR model takes less than 2 seconds, and the correlation between SOH from peak extraction and RUL is 0.97.
△ Less
Submitted 11 June, 2021;
originally announced June 2021.
-
CoviLearn: A Machine Learning Integrated Smart X-Ray Device in Healthcare Cyber-Physical System for Automatic Initial Screening of COVID-19
Authors:
Debanjan Das,
Chirag Samal,
Deewanshu Ukey,
Gourav Chowdhary,
Saraju P. Mohanty
Abstract:
The pandemic of novel Coronavirus Disease 2019 (COVID-19) is widespread all over the world causing serious health problems as well as serious impact on the global economy. Reliable and fast testing of the COVID-19 has been a challenge for researchers and healthcare practitioners. In this work we present a novel machine learning (ML) integrated X-ray device in Healthcare Cyber-Physical System (H-CP…
▽ More
The pandemic of novel Coronavirus Disease 2019 (COVID-19) is widespread all over the world causing serious health problems as well as serious impact on the global economy. Reliable and fast testing of the COVID-19 has been a challenge for researchers and healthcare practitioners. In this work we present a novel machine learning (ML) integrated X-ray device in Healthcare Cyber-Physical System (H-CPS) or smart healthcare framework (called CoviLearn) to allow healthcare practitioners to perform automatic initial screening of COVID-19 patients. We propose convolutional neural network (CNN) models of X-ray images integrated into an X-ray device for automatic COVID-19 detection. The proposed CoviLearn device will be useful in detecting if a person is COVID-19 positive or negative by considering the chest X-ray image of individuals. CoviLearn will be useful tool doctors to detect potential COVID-19 infections instantaneously without taking more intrusive healthcare data samples, such as saliva and blood. COVID-19 attacks the endothelium tissues that support respiratory tract, X-rays images can be used to analyze the health of a patient lungs. As all healthcare centers have X-ray machines, it could be possible to use proposed CoviLearn X-rays to test for COVID-19 without the especial test kits. Our proposed automated analysis system CoviLearn which has 99% accuracy will be able to save valuable time of medical professionals as the X-ray machines come with a drawback as it needed a radiology expert.
△ Less
Submitted 8 June, 2021;
originally announced June 2021.
-
Smart Village: An IoT Based Digital Transformation
Authors:
Amit Degada,
Himanshu Thapliyal,
Saraju P. Mohanty
Abstract:
Almost 46% of the world's population resides in a rural landscape. Smart villages, alongside smart cities, are in need of time for future economic growth, improved agriculture, better health, and education. The smart village is a concept that improves the traditional rural aspects with the help of digital transformation. The smart village is built up using heterogeneous digital technologies pillar…
▽ More
Almost 46% of the world's population resides in a rural landscape. Smart villages, alongside smart cities, are in need of time for future economic growth, improved agriculture, better health, and education. The smart village is a concept that improves the traditional rural aspects with the help of digital transformation. The smart village is built up using heterogeneous digital technologies pillared around the Internet-of-Thing (IoT). There exist many opportunities in research to design a low-cost, secure, and efficient technical ecosystem. This article identifies the key application areas, where the IoT can be applied in the smart village. The article also presents a comparative study of communication technology options.
△ Less
Submitted 7 June, 2021;
originally announced June 2021.
-
Fortifying Vehicular Security Through Low Overhead Physically Unclonable Functions
Authors:
Carson Labrado,
Himanshu Thapliyal,
Saraju P. Mohanty
Abstract:
Within vehicles, the Controller Area Network (CAN) allows efficient communication between the electronic control units (ECUs) responsible for controlling the various subsystems. The CAN protocol was not designed to include much support for secure communication. The fact that so many critical systems can be accessed through an insecure communication network presents a major security concern. Adding…
▽ More
Within vehicles, the Controller Area Network (CAN) allows efficient communication between the electronic control units (ECUs) responsible for controlling the various subsystems. The CAN protocol was not designed to include much support for secure communication. The fact that so many critical systems can be accessed through an insecure communication network presents a major security concern. Adding security features to CAN is difficult due to the limited resources available to the individual ECUs and the costs that would be associated with adding the necessary hardware to support any additional security operations without overly degrading the performance of standard communication. Replacing the protocol is another option, but it is subject to many of the same problems. The lack of security becomes even more concerning as vehicles continue to adopt smart features. Smart vehicles have a multitude of communication interfaces would an attacker could exploit to gain access to the networks. In this work we propose a security framework that is based on physically unclonable functions (PUFs) and lightweight cryptography (LWC). The framework does not require any modification to the standard CAN protocol while also minimizing the amount of additional message overhead required for its operation. The improvements in our proposed framework results in major reduction in the number of CAN frames that must be sent during operation. For a system with 20 ECUs for example, our proposed framework only requires 6.5% of the number of CAN frames that is required by the existing approach to successfully authenticate every ECU.
△ Less
Submitted 5 June, 2021;
originally announced June 2021.
-
Personal Internet of Things (PIoT): What is it Exactly?
Authors:
Biswa PS Sahoo,
Deepak Puthal,
Saraju P. Mohanty,
Prashant Pillai
Abstract:
The use of Internet of Things (IoT) devices in homes and the immediate proximity of an individual communicates to create Personal IoT (PIoT) networks. The exploratory study of PIoT is in its infancy, which will explore the expansion of new use cases, service requirements, and the proliferation of PIoT devices. This article provides a big picture of PIoT architecture, vision, and future research sc…
▽ More
The use of Internet of Things (IoT) devices in homes and the immediate proximity of an individual communicates to create Personal IoT (PIoT) networks. The exploratory study of PIoT is in its infancy, which will explore the expansion of new use cases, service requirements, and the proliferation of PIoT devices. This article provides a big picture of PIoT architecture, vision, and future research scope.
△ Less
Submitted 24 May, 2021;
originally announced May 2021.
-
The Multi-Agent Behavior Dataset: Mouse Dyadic Social Interactions
Authors:
Jennifer J. Sun,
Tomomi Karigo,
Dipam Chakraborty,
Sharada P. Mohanty,
Benjamin Wild,
Quan Sun,
Chen Chen,
David J. Anderson,
Pietro Perona,
Yisong Yue,
Ann Kennedy
Abstract:
Multi-agent behavior modeling aims to understand the interactions that occur between agents. We present a multi-agent dataset from behavioral neuroscience, the Caltech Mouse Social Interactions (CalMS21) Dataset. Our dataset consists of trajectory data of social interactions, recorded from videos of freely behaving mice in a standard resident-intruder assay. To help accelerate behavioral studies,…
▽ More
Multi-agent behavior modeling aims to understand the interactions that occur between agents. We present a multi-agent dataset from behavioral neuroscience, the Caltech Mouse Social Interactions (CalMS21) Dataset. Our dataset consists of trajectory data of social interactions, recorded from videos of freely behaving mice in a standard resident-intruder assay. To help accelerate behavioral studies, the CalMS21 dataset provides benchmarks to evaluate the performance of automated behavior classification methods in three settings: (1) for training on large behavioral datasets all annotated by a single annotator, (2) for style transfer to learn inter-annotator differences in behavior definitions, and (3) for learning of new behaviors of interest given limited training data. The dataset consists of 6 million frames of unlabeled tracked poses of interacting mice, as well as over 1 million frames with tracked poses and corresponding frame-level behavior annotations. The challenge of our dataset is to be able to classify behaviors accurately using both labeled and unlabeled tracking data, as well as being able to generalize to new settings.
△ Less
Submitted 18 November, 2021; v1 submitted 6 April, 2021;
originally announced April 2021.
-
Eternal-Thing 2.0: Analog-Trojan Resilient Ripple-Less Solar Energy Harvesting System for Sustainable IoT in Smart Cities and Smart Villages
Authors:
Saswat K. Ram,
Sauvagya R. Sahoo,
Banee B. Das,
Kamalakanta Mahapatra,
Saraju P. Mohanty
Abstract:
Recently, harvesting natural energy is gaining more attention than other conventional approaches for sustainable Internet-of-Things (IoT). System on chip (SoC) power requirement for the IoT and generating higher voltages on-chip is a massive challenge for on-chip peripherals and systems. Many sensors are employed in smart cities and smart villages in decision-making, whose power requirement is an…
▽ More
Recently, harvesting natural energy is gaining more attention than other conventional approaches for sustainable Internet-of-Things (IoT). System on chip (SoC) power requirement for the IoT and generating higher voltages on-chip is a massive challenge for on-chip peripherals and systems. Many sensors are employed in smart cities and smart villages in decision-making, whose power requirement is an issue, and it must be uninterrupted. Previously, we presented Security-by-Design (SbD) principle to bring energy dissipation and cybersecurity together through our "Eternal-Thing". In this paper, an on-chip reliable energy harvesting system (EHS) is designed for IoT end node devices which is called "Eternal-Thing 2.0". The management section monitors the process load and also the recharging of the battery or super-capacitor. An efficient maximum power point tracking (MPPT) algorithm is used to avoid quiescent power consumption. The reliability of the proposed EHS is improved by using an aging tolerant ring oscillator. The proposed EHS is intended and simulated in CMOS 90nm technology. The output voltage is within the vary of 3-3.55V with an input of 1-1.5V. The EHS consumes 22 micro Watt of power, that satisfies the ultra-low-power necessities of IoT sensible nodes.
△ Less
Submitted 9 March, 2021;
originally announced March 2021.
-
MyWear: A Smart Wear for Continuous Body Vital Monitoring and Emergency Alert
Authors:
Sibi C. Sethuraman,
Pranav Kompally,
Saraju P. Mohanty,
Uma Choppali
Abstract:
Smart healthcare which is built as healthcare Cyber-Physical System (H-CPS) from Internet-of-Medical-Things (IoMT) is becoming more important than before. Medical devices and their connectivity through Internet with alongwith the electronics health record (EHR) and AI analytics making H-CPS possible. IoMT-end devices like wearables and implantables are key for H-CPS based smart healthcare. Smart g…
▽ More
Smart healthcare which is built as healthcare Cyber-Physical System (H-CPS) from Internet-of-Medical-Things (IoMT) is becoming more important than before. Medical devices and their connectivity through Internet with alongwith the electronics health record (EHR) and AI analytics making H-CPS possible. IoMT-end devices like wearables and implantables are key for H-CPS based smart healthcare. Smart garment is a specific wearable which can be used for smart healthcare. There are various smart garments that help users to monitor their body vitals in real-time. Many commercially available garments collect the vital data and transmit it to the mobile application for visualization. However, these don't perform real-time analysis for the user to comprehend their health conditions. Also, such garments are not included with an alert system to alert users and contacts in case of emergency. In MyWear, we propose a wearable body vital monitoring garment that captures physiological data and automatically analyses such heart rate, stress level, muscle activity to detect abnormalities. A copy of the physiological data is transmitted to the cloud for detecting any abnormalities in heart beats and predict any potential heart failure in future. We also propose a deep neural network (DNN) model that automatically classifies abnormal heart beat and potential heart failure. For immediate assistance in such a situation, we propose an alert system that sends an alert message to nearby medical officials. The proposed MyWear has an average accuracy of 96.9% and precision of 97.3% for detection of the abnormalities.
△ Less
Submitted 17 October, 2020;
originally announced October 2020.
-
Smart Healthcare for Diabetes: A COVID-19 Perspective
Authors:
Amit M. Joshi,
Urvashi P. Shukla,
Saraju P. Mohanty
Abstract:
Diabetes is considered as an critical comorbidity linked with the latest coronavirus disease 2019 (COVID-19) which spreads through Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-Cov-2). The diabetic patients have higher threat of infection from novel corona virus. Depending on the region in the globe, 20% to 50% of patients infected with COVID-19 pandemic had diabetes. The current article d…
▽ More
Diabetes is considered as an critical comorbidity linked with the latest coronavirus disease 2019 (COVID-19) which spreads through Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-Cov-2). The diabetic patients have higher threat of infection from novel corona virus. Depending on the region in the globe, 20% to 50% of patients infected with COVID-19 pandemic had diabetes. The current article discussed the risk associated with diabetic patients and also recommendation for controlling diabetes during this pandemic situation. The article also discusses the case study of COVID-19 at various regions around the globe and the preventive actions taken by various countries to control the effect from the virus. The article presents several smart healthcare solutions for the diabetes patients to have glucose insulin control for the protection against COVID-19.
△ Less
Submitted 29 July, 2020;
originally announced August 2020.
-
SaYoPillow: A Blockchain-Enabled, Privacy-Assured Framework for Stress Detection, Prediction and Control Considering Slee** Habits in the IoMT
Authors:
Laavanya Rachakonda,
Anand K. Bapatla,
Saraju P. Mohanty,
Elias Kougianos
Abstract:
Considering today's lifestyle, people just sleep forgetting the benefits it provides to the human body. The reasons for not having a productive sleep could be many. Smart-Yoga Pillow (SaYoPillow) is envisioned as a device that may help in recognizing the importance of a good quality sleep to alleviate stress while establishing a measurable relationship between stress and slee** habits. A system…
▽ More
Considering today's lifestyle, people just sleep forgetting the benefits it provides to the human body. The reasons for not having a productive sleep could be many. Smart-Yoga Pillow (SaYoPillow) is envisioned as a device that may help in recognizing the importance of a good quality sleep to alleviate stress while establishing a measurable relationship between stress and slee** habits. A system that analyzes the slee** habits by continuously monitoring the physiological changes that occur during rapid eye movement (REM) and non-rapid eye movement (NREM) stages of sleep is proposed in the current work. In addition to the physiological parameter changes, factors such as sleep duration, snoring range, eye movement, and limb movements are also monitored. The SaYoPillow system is processed at the edge level with the storage being at the cloud. Not having to compromise the user's privacy, SaYoPillow proposes secure data transmission for both uploading and retrieving, and secure storage and communications as an attempt to reduce malicious attacks on healthcare. A user interface is provided for the user to control data accessibility and visibility. SaYoPillow has 96% accuracy which is close to other existing research works. However, SaYoPillow is the only work with security features as well as only work that considers slee** habits for stress.
△ Less
Submitted 14 July, 2020;
originally announced July 2020.
-
sCrop: A Internet-of-Agro-Things (IoAT) Enabled Solar Powered Smart Device for Automatic Plant Disease Prediction
Authors:
Venkanna Udutalapally,
Saraju P. Mohanty,
Vishal Pallagani,
Vedant Khandelwal
Abstract:
Internet-of-Things (IoT) is omnipresent, ranging from home solutions to turning wheels for the fourth industrial revolution. This article presents the novel concept of Internet-of-Agro-Things (IoAT) with an example of automated plant disease prediction. It consists of solar enabled sensor nodes which help in continuous sensing and automating agriculture. The existing solutions have implemented a b…
▽ More
Internet-of-Things (IoT) is omnipresent, ranging from home solutions to turning wheels for the fourth industrial revolution. This article presents the novel concept of Internet-of-Agro-Things (IoAT) with an example of automated plant disease prediction. It consists of solar enabled sensor nodes which help in continuous sensing and automating agriculture. The existing solutions have implemented a battery powered sensor node. On the contrary, the proposed system has adopted the use of an energy efficient way of powering using solar energy. It is observed that around 80% of the crops are attacked with microbial diseases in traditional agriculture. To prevent this, a health maintenance system is integrated with the sensor node, which captures the image of the crop and performs an analysis with the trained Convolutional Neural Network (CNN) model. The deployment of the proposed system is demonstrated in a real-time environment using a microcontroller, solar sensor nodes with a camera module, and an mobile application for the farmers visualization of the farms. The deployed prototype was deployed for two months and has achieved a robust performance by sustaining in varied weather conditions and continued to remain rust-free. The proposed deep learning framework for plant disease prediction has achieved an accuracy of 99.2% testing accuracy.
△ Less
Submitted 9 May, 2020;
originally announced May 2020.
-
Retrospective Analysis of the 2019 MineRL Competition on Sample Efficient Reinforcement Learning
Authors:
Stephanie Milani,
Nicholay Topin,
Brandon Houghton,
William H. Guss,
Sharada P. Mohanty,
Keisuke Nakata,
Oriol Vinyals,
Noboru Sean Kuno
Abstract:
To facilitate research in the direction of sample efficient reinforcement learning, we held the MineRL Competition on Sample Efficient Reinforcement Learning Using Human Priors at the Thirty-third Conference on Neural Information Processing Systems (NeurIPS 2019). The primary goal of this competition was to promote the development of algorithms that use human demonstrations alongside reinforcement…
▽ More
To facilitate research in the direction of sample efficient reinforcement learning, we held the MineRL Competition on Sample Efficient Reinforcement Learning Using Human Priors at the Thirty-third Conference on Neural Information Processing Systems (NeurIPS 2019). The primary goal of this competition was to promote the development of algorithms that use human demonstrations alongside reinforcement learning to reduce the number of samples needed to solve complex, hierarchical, and sparse environments. We describe the competition, outlining the primary challenge, the competition design, and the resources that we provided to the participants. We provide an overview of the top solutions, each of which use deep reinforcement learning and/or imitation learning. We also discuss the impact of our organizational decisions on the competition and future directions for improvement.
△ Less
Submitted 18 June, 2020; v1 submitted 10 March, 2020;
originally announced March 2020.
-
PoAh: A Novel Consensus Algorithm for Fast Scalable Private Blockchain for Large-scale IoT Frameworks
Authors:
Deepak Puthal,
Saraju P. Mohanty,
Venkata P. Yanambaka,
Elias Kougianos
Abstract:
In today's connected world, resource constrained devices are deployed for sensing and decision making applications, ranging from smart cities to environmental monitoring. Those recourse constrained devices are connected to create real-time distributed networks popularly known as the Internet of Things (IoT), fog computing and edge computing. The blockchain is gaining a lot of interest in these dom…
▽ More
In today's connected world, resource constrained devices are deployed for sensing and decision making applications, ranging from smart cities to environmental monitoring. Those recourse constrained devices are connected to create real-time distributed networks popularly known as the Internet of Things (IoT), fog computing and edge computing. The blockchain is gaining a lot of interest in these domains to secure the system by ignoring centralized dependencies, where proof-of-work (PoW) plays a vital role to make the whole security solution decentralized. Due to the resource limitations of the devices, PoW is not suitable for blockchain-based security solutions. This paper presents a novel consensus algorithm called Proof-of-Authentication (PoAh), which introduces a cryptographic authentication mechanism to replace PoW for resource constrained devices, and to make the blockchain application-specific. PoAh is thus suitable for private as well as permissioned blockchains. Further, PoAh not only secures the systems, but also maintains system sustainability and scalability. The proposed consensus algorithm is evaluated theoretically in simulation scenarios, and in real-time hardware testbeds to validate its performance. Finally, PoAh and its integration with the blockchain in the IoT and edge computing scenarios is discussed. The proposed PoAh, while running in limited computer resources (e.g. single-board computing devices like the Raspberry Pi) has a latency in the order of 3 secs.
△ Less
Submitted 20 January, 2020;
originally announced January 2020.
-
iGLU 1.0: An Accurate Non-Invasive Near-Infrared Dual Short Wavelengths Spectroscopy based Glucometer for Smart Healthcare
Authors:
Prateek Jain,
Amit M. Joshi,
Saraju P. Mohanty
Abstract:
In the case of diabetes, fingertip pricking for a blood sample is inconvenient for glucose measurement. Invasive approaches like laboratory test and one-touch glucometer enhance the risk of blood-related infections. To mitigate this important issue, in the current paper, we propose a novel Internet-of-Medical-Things (IoMT) enabled edge-device for precise, non-invasive blood glucose measurement. In…
▽ More
In the case of diabetes, fingertip pricking for a blood sample is inconvenient for glucose measurement. Invasive approaches like laboratory test and one-touch glucometer enhance the risk of blood-related infections. To mitigate this important issue, in the current paper, we propose a novel Internet-of-Medical-Things (IoMT) enabled edge-device for precise, non-invasive blood glucose measurement. In this work, a near-infrared (NIR) spectroscopic technique using two wavelengths (940 nm, 1300 nm) is taken to detect the glucose molecule from human blood. The novel device called iGLU is based on NIR spectroscopy and machine learning (ML) models of high accuracy. An optimal multiple polynomial regression model and deep neural network (DNN) model have been presented for precise measurement. The proposed device is validated and blood glucose values are stored on the cloud using open IoT platform for remote monitoring by an endocrinologist. For device validation, the estimated blood glucose values have been compared with blood glucose values obtained from the invasive device. It has been observed that mean absolute relative difference (MARD) and average error (AvgE) are found 4.66 % and 4.61 % respectively from predicted blood glucose concentration values. The regression coefficient is found 0.81. The proposed spectroscopic non-invasive device provides accurate and cost-effective solution for smart healthcare.
△ Less
Submitted 10 November, 2019;
originally announced November 2019.
-
PUFchain: Hardware-Assisted Blockchain for Sustainable Simultaneous Device and Data Security in the Internet of Everything (IoE)
Authors:
Saraju P. Mohanty,
Venkata P. Yanambaka,
Elias Kougianos,
Deepak Puthal
Abstract:
This article presents the first-ever blockchain which can simultaneously handle device and data security, which is important for the emerging Internet-of-Everything (IoE). This article presents a unique concept of blockchain that integrates hardware security primitives called Physical Unclonable Functions (PUFs) to solve scalability, latency, and energy requirement challenges and is called PUFchai…
▽ More
This article presents the first-ever blockchain which can simultaneously handle device and data security, which is important for the emerging Internet-of-Everything (IoE). This article presents a unique concept of blockchain that integrates hardware security primitives called Physical Unclonable Functions (PUFs) to solve scalability, latency, and energy requirement challenges and is called PUFchain. Data management and security (and privacy) of data, devices, and individuals, are some of the issues in the IoE architectures that need to be resolved. Integrating the blockchain into the IoE environment can help solve these issues and helps in the aspects of data storage and security. This article introduces a new blockchain architecture called PUFchain and introduces a new consensus algorithm called "Proof of PUF-Enabled Authentication" (PoP) for deployment in PUFchain. The proposed PoP is the PUF integration into our previously proposed Proof-of-Authentication (PoAh) consensus algorithm and can be called "Hardware-Assisted Proof-of-Authentication (HA-PoAh)". However, PUF integration is possible in the existing and new consensus algorithms. PoP utilizes PUFs which are responsible for generating a unique key that cannot be cloned and hence provide the highest level of security. A PUF uses the nanoelectronic manufacturing variations that are introduced during the fabrication of an integrated circuit to generate the keys. Hence, once generated from a PUF module, the keys cannot be cloned or generated from any other module. PUFchain uses a PUF and Hashing module which performs the necessary cryptographic functions. Hence the mining process is offloaded to the hardware module which reduces the processing times. PoP is approximately 1,000X faster than the well-established Proof-of-Work (PoW) and 5X faster than Proof-of-Authentication (PoAh).
△ Less
Submitted 13 September, 2019;
originally announced September 2019.
-
cSeiz: An Edge-Device for Accurate Seizure Detection and Control for Smart Healthcare
Authors:
Md Abu Sayeed,
Saraju P. Mohanty,
Elias Kougianos
Abstract:
Epilepsy is one of the most common neurological disorders affecting up to 1% of the world's population and approximately 2.5 million people in the United States. Seizures in more than 30% of epilepsy patients are refractory to anti-epileptic drugs. An important biomedical research effort is focused on the development of an energy efficient implantable device for the real-time control of seizures.…
▽ More
Epilepsy is one of the most common neurological disorders affecting up to 1% of the world's population and approximately 2.5 million people in the United States. Seizures in more than 30% of epilepsy patients are refractory to anti-epileptic drugs. An important biomedical research effort is focused on the development of an energy efficient implantable device for the real-time control of seizures. In this paper we propose an Internet of Medical Things (IoMT) based automated seizure detection and drug delivery system (DDS) for the control of seizures. The proposed system will detect seizures and inject a fast acting anti-convulsant drug at the onset to suppress seizure progression. The drug injection is performed in two stages. Initially, the seizure detector detects the seizure from the electroencephalography (EEG) signal using a hyper-synchronous signal detection circuit and a signal rejection algorithm (SRA). In the second stage, the drug is released in the seizure onset area upon seizure detection. The design was validated using a system-level simulation and consumer electronics proof of concept. The proposed seizure detector reports a sensitivity of 96.9% and specificity of 97.5%. The use of minimal circuitry leads to a considerable reduction of power consumption compared to previous approaches. The proposed approach can be generalized to other sensor modalities and the use of both wearable and implantable solutions, or a combination of the two.
△ Less
Submitted 21 August, 2019;
originally announced August 2019.
-
iVAMS 2.0: Machine-Learning-Metamodel-Integrated Intelligent Verilog-AMS for Fast and Accurate Mixed-Signal Design Optimization
Authors:
Saraju P. Mohanty,
Elias Kougianos
Abstract:
The gap between abstraction levels in analog design is a major obstacle for advancing analog and mixed-signal (AMS) design automation and computer-aided design (CAD). Intelligent models for low-level analog building blocks are needed to bridge the accuracy gap between behavioral and transistor-level simulations. The models should be able to accurately estimate the characteristics of the analog blo…
▽ More
The gap between abstraction levels in analog design is a major obstacle for advancing analog and mixed-signal (AMS) design automation and computer-aided design (CAD). Intelligent models for low-level analog building blocks are needed to bridge the accuracy gap between behavioral and transistor-level simulations. The models should be able to accurately estimate the characteristics of the analog block over a large design space. Machine learning (ML) models based on actual silicon have the capabilities of capturing detailed characteristics of complex designs. In this paper, a ML model called Artificial Neural Network Metamodels (ANNM) have been explored to capture the highly nonlinear nature of analog blocks. The application of these intelligent models to multi-objective AMS block optimization is demonstrated. Parameterized behavioral models in Verilog-AMS based on the ANN metamodels are constructed for efficient AMS design exploration. To the best of the authors' knowledge this is the first paper to integrate ANN models in Verilog-AMS, which is called iVAMS 2.0. To demonstrate the application of iVAMS 2.0, this paper presents two case studies: an operational amplifier (OP-AMP) and a phase-locked loop (PLL). A biologically-inspired "firefly optimization algorithm" is applied to an OP-AMP design in the iVAMS 2.0 framework. The optimization process is sped up by 5580X due to the use of iVAMS with negligible loss in accuracy. Similarly, for a PLL design, the physical design aware ANNs are trained and used as metamodels to predict its frequency, locking time, and power. Thorough experimental results demonstrate that only 100 sample points are sufficient for ANNs to predict the output of circuits with 21 design parameters within 3% accuracy. A proposed artificial bee colony (ABC) based algorithm performs optimization over the ANN metamodels of the PLL.
△ Less
Submitted 11 June, 2019;
originally announced July 2019.
-
Investment Ranking Challenge: Identifying the best performing stocks based on their semi-annual returns
Authors:
Shanka Subhra Mondal,
Sharada Prasanna Mohanty,
Benjamin Harlander,
Mehmet Koseoglu,
Lance Rane,
Kirill Romanov,
Wei-Kai Liu,
Pranoot Hatwar,
Marcel Salathe,
Joe Byrum
Abstract:
In the IEEE Investment ranking challenge 2018, participants were asked to build a model which would identify the best performing stocks based on their returns over a forward six months window. Anonymized financial predictors and semi-annual returns were provided for a group of anonymized stocks from 1996 to 2017, which were divided into 42 non-overlap** six months period. The second half of 2017…
▽ More
In the IEEE Investment ranking challenge 2018, participants were asked to build a model which would identify the best performing stocks based on their returns over a forward six months window. Anonymized financial predictors and semi-annual returns were provided for a group of anonymized stocks from 1996 to 2017, which were divided into 42 non-overlap** six months period. The second half of 2017 was used as an out-of-sample test of the model's performance. Metrics used were Spearman's Rank Correlation Coefficient and Normalized Discounted Cumulative Gain (NDCG) of the top 20% of a model's predicted rankings. The top six participants were invited to describe their approach. The solutions used were varied and were based on selecting a subset of data to train, combination of deep and shallow neural networks, different boosting algorithms, different models with different sets of features, linear support vector machine, combination of convoltional neural network (CNN) and Long short term memory (LSTM).
△ Less
Submitted 20 June, 2019;
originally announced June 2019.
-
iVAMS 1.0: Polynomial-Metamodel-Integrated Intelligent Verilog-AMS for Fast, Accurate Mixed-Signal Design Optimization
Authors:
Saraju P. Mohanty,
Elias Kougianos
Abstract:
Electronic circuit behavioral models built with hardware description/modeling languages such as Verilog-AMS for system-level simulations are typically functional models. They do not capture the physical design (layout) information of the target design. Numerous iterations of post-layout design adjustments are usually required to ensure that design specifications are met with the presence of layout…
▽ More
Electronic circuit behavioral models built with hardware description/modeling languages such as Verilog-AMS for system-level simulations are typically functional models. They do not capture the physical design (layout) information of the target design. Numerous iterations of post-layout design adjustments are usually required to ensure that design specifications are met with the presence of layout parasitics. In this paper a paradigm shift of the current trend is presented that integrates layout-level information in Verilog-AMS through metamodels such that system-level simulation of a mixed-signal circuit/system is realistic and as accurate as true parasitic netlist simulation. The simulations performed with these parasitic-aware models can be used to estimate system performance without layout iterations. We call this new form of Verilog-AMS as iVAMS (i.e. Intelligent Verilog-AMS). We call this iVAMS 1.0 as it is simple polynomial-metamodel integrated Intelligent Verilog-AMS. As a specific case study, a voltage-controlled oscillator (VCO) Verilog-AMS behavioral model and design flow are proposed to assist fast PLL design space exploration. The PLL simulation employing quadratic metamodels achieves approximately 10X speedup compared to that employing the layout extracted, parasitic netlist. The simulations using this behavioral model attain high accuracy. The observed error for the simulated lock time and average power dissipation are 0.7% and 3%, respectively. This behavioral metamodel approach bridges the gap between layout-accurate but fast simulation and design space exploration. The proposed method also allows much shorter design verification and optimization to meet stringent time-to-market requirements. Compared to the optimization using the layout netlist, the runtime using the behavioral model is reduced by 88.9%.
△ Less
Submitted 29 May, 2019;
originally announced May 2019.
-
Artificial Intelligence for Prosthetics - challenge solutions
Authors:
Łukasz Kidziński,
Carmichael Ong,
Sharada Prasanna Mohanty,
Jennifer Hicks,
Sean F. Carroll,
Bo Zhou,
Hongsheng Zeng,
Fan Wang,
Rongzhong Lian,
Hao Tian,
Wojciech Jaśkowski,
Garrett Andersen,
Odd Rune Lykkebø,
Nihat Engin Toklu,
Pranav Shyam,
Rupesh Kumar Srivastava,
Sergey Kolesnikov,
Oleksii Hrinchuk,
Anton Pechenko,
Mattias Ljungström,
Zhen Wang,
Xu Hu,
Zehong Hu,
Minghui Qiu,
Jun Huang
, et al. (25 additional authors not shown)
Abstract:
In the NeurIPS 2018 Artificial Intelligence for Prosthetics challenge, participants were tasked with building a controller for a musculoskeletal model with a goal of matching a given time-varying velocity vector. Top participants were invited to describe their algorithms. In this work, we describe the challenge and present thirteen solutions that used deep reinforcement learning approaches. Many s…
▽ More
In the NeurIPS 2018 Artificial Intelligence for Prosthetics challenge, participants were tasked with building a controller for a musculoskeletal model with a goal of matching a given time-varying velocity vector. Top participants were invited to describe their algorithms. In this work, we describe the challenge and present thirteen solutions that used deep reinforcement learning approaches. Many solutions use similar relaxations and heuristics, such as reward sha**, frame skip**, discretization of the action space, symmetry, and policy blending. However, each team implemented different modifications of the known algorithms by, for example, dividing the task into subtasks, learning low-level control, or by incorporating expert knowledge and using imitation learning.
△ Less
Submitted 6 February, 2019;
originally announced February 2019.
-
The Multi-Agent Reinforcement Learning in MalmÖ (MARLÖ) Competition
Authors:
Diego Perez-Liebana,
Katja Hofmann,
Sharada Prasanna Mohanty,
Noburu Kuno,
Andre Kramer,
Sam Devlin,
Raluca D. Gaina,
Daniel Ionita
Abstract:
Learning in multi-agent scenarios is a fruitful research direction, but current approaches still show scalability problems in multiple games with general reward settings and different opponent types. The Multi-Agent Reinforcement Learning in MalmÖ (MARLÖ) competition is a new challenge that proposes research in this domain using multiple 3D games. The goal of this contest is to foster research in…
▽ More
Learning in multi-agent scenarios is a fruitful research direction, but current approaches still show scalability problems in multiple games with general reward settings and different opponent types. The Multi-Agent Reinforcement Learning in MalmÖ (MARLÖ) competition is a new challenge that proposes research in this domain using multiple 3D games. The goal of this contest is to foster research in general agents that can learn across different games and opponent types, proposing a challenge as a milestone in the direction of Artificial General Intelligence.
△ Less
Submitted 23 January, 2019;
originally announced January 2019.
-
Adversarial Vision Challenge
Authors:
Wieland Brendel,
Jonas Rauber,
Alexey Kurakin,
Nicolas Papernot,
Behar Veliqi,
Marcel Salathé,
Sharada P. Mohanty,
Matthias Bethge
Abstract:
The NIPS 2018 Adversarial Vision Challenge is a competition to facilitate measurable progress towards robust machine vision models and more generally applicable adversarial attacks. This document is an updated version of our competition proposal that was accepted in the competition track of 32nd Conference on Neural Information Processing Systems (NIPS 2018).
The NIPS 2018 Adversarial Vision Challenge is a competition to facilitate measurable progress towards robust machine vision models and more generally applicable adversarial attacks. This document is an updated version of our competition proposal that was accepted in the competition track of 32nd Conference on Neural Information Processing Systems (NIPS 2018).
△ Less
Submitted 6 December, 2018; v1 submitted 6 August, 2018;
originally announced August 2018.
-
Learning to Run challenge solutions: Adapting reinforcement learning methods for neuromusculoskeletal environments
Authors:
Łukasz Kidziński,
Sharada Prasanna Mohanty,
Carmichael Ong,
Zhewei Huang,
Shuchang Zhou,
Anton Pechenko,
Adam Stelmaszczyk,
Piotr Jarosik,
Mikhail Pavlov,
Sergey Kolesnikov,
Sergey Plis,
Zhibo Chen,
Zhizheng Zhang,
Jiale Chen,
Jun Shi,
Zhuobin Zheng,
Chun Yuan,
Zhihui Lin,
Henryk Michalewski,
Piotr Miłoś,
Błażej Osiński,
Andrew Melnik,
Malte Schilling,
Helge Ritter,
Sean Carroll
, et al. (4 additional authors not shown)
Abstract:
In the NIPS 2017 Learning to Run challenge, participants were tasked with building a controller for a musculoskeletal model to make it run as fast as possible through an obstacle course. Top participants were invited to describe their algorithms. In this work, we present eight solutions that used deep reinforcement learning approaches, based on algorithms such as Deep Deterministic Policy Gradient…
▽ More
In the NIPS 2017 Learning to Run challenge, participants were tasked with building a controller for a musculoskeletal model to make it run as fast as possible through an obstacle course. Top participants were invited to describe their algorithms. In this work, we present eight solutions that used deep reinforcement learning approaches, based on algorithms such as Deep Deterministic Policy Gradient, Proximal Policy Optimization, and Trust Region Policy Optimization. Many solutions use similar relaxations and heuristics, such as reward sha**, frame skip**, discretization of the action space, symmetry, and policy blending. However, each of the eight teams implemented different modifications of the known algorithms.
△ Less
Submitted 1 April, 2018;
originally announced April 2018.
-
Learning to Run challenge: Synthesizing physiologically accurate motion using deep reinforcement learning
Authors:
Łukasz Kidziński,
Sharada P. Mohanty,
Carmichael Ong,
Jennifer L. Hicks,
Sean F. Carroll,
Sergey Levine,
Marcel Salathé,
Scott L. Delp
Abstract:
Synthesizing physiologically-accurate human movement in a variety of conditions can help practitioners plan surgeries, design experiments, or prototype assistive devices in simulated environments, reducing time and costs and improving treatment outcomes. Because of the large and complex solution spaces of biomechanical models, current methods are constrained to specific movements and models, requi…
▽ More
Synthesizing physiologically-accurate human movement in a variety of conditions can help practitioners plan surgeries, design experiments, or prototype assistive devices in simulated environments, reducing time and costs and improving treatment outcomes. Because of the large and complex solution spaces of biomechanical models, current methods are constrained to specific movements and models, requiring careful design of a controller and hindering many possible applications. We sought to discover if modern optimization methods efficiently explore these complex spaces. To do this, we posed the problem as a competition in which participants were tasked with develo** a controller to enable a physiologically-based human model to navigate a complex obstacle course as quickly as possible, without using any experimental data. They were provided with a human musculoskeletal model and a physics-based simulation environment. In this paper, we discuss the design of the competition, technical difficulties, results, and analysis of the top controllers. The challenge proved that deep reinforcement learning techniques, despite their high computational cost, can be successfully employed as an optimization method for synthesizing physiologically feasible motion in high-dimensional biomechanical systems.
△ Less
Submitted 31 March, 2018;
originally announced April 2018.
-
Learning to Recognize Musical Genre from Audio
Authors:
Michaël Defferrard,
Sharada P. Mohanty,
Sean F. Carroll,
Marcel Salathé
Abstract:
We here summarize our experience running a challenge with open data for musical genre recognition. Those notes motivate the task and the challenge design, show some statistics about the submissions, and present the results.
We here summarize our experience running a challenge with open data for musical genre recognition. Those notes motivate the task and the challenge design, show some statistics about the submissions, and present the results.
△ Less
Submitted 13 March, 2018;
originally announced March 2018.
-
Using Deep Learning for Image-Based Plant Disease Detection
Authors:
Sharada Prasanna Mohanty,
David Hughes,
Marcel Salathe
Abstract:
Crop diseases are a major threat to food security, but their rapid identification remains difficult in many parts of the world due to the lack of the necessary infrastructure. The combination of increasing global smartphone penetration and recent advances in computer vision made possible by deep learning has paved the way for smartphone-assisted disease diagnosis. Using a public dataset of 54,306…
▽ More
Crop diseases are a major threat to food security, but their rapid identification remains difficult in many parts of the world due to the lack of the necessary infrastructure. The combination of increasing global smartphone penetration and recent advances in computer vision made possible by deep learning has paved the way for smartphone-assisted disease diagnosis. Using a public dataset of 54,306 images of diseased and healthy plant leaves collected under controlled conditions, we train a deep convolutional neural network to identify 14 crop species and 26 diseases (or absence thereof). The trained model achieves an accuracy of 99.35% on a held-out test set, demonstrating the feasibility of this approach. When testing the model on a set of images collected from trusted online sources - i.e. taken under conditions different from the images used for training - the model still achieves an accuracy of 31.4%. While this accuracy is much higher than the one based on random selection (2.6%), a more diverse set of training data is needed to improve the general accuracy. Overall, the approach of training deep learning models on increasingly large and publicly available image datasets presents a clear path towards smartphone-assisted crop disease diagnosis on a massive global scale.
△ Less
Submitted 15 April, 2016; v1 submitted 11 April, 2016;
originally announced April 2016.
-
ISWAR: An Imaging System with Watermarking and Attack Resilience
Authors:
Saraju P. Mohanty
Abstract:
With the explosive growth of internet technology, easy transfer of digital multimedia is feasible. However, this kind of convenience with which authorized users can access information, turns out to be a mixed blessing due to information piracy. The emerging field of Digital Rights Management (DRM) systems addresses issues related to the intellectual property rights of digital content. In this pape…
▽ More
With the explosive growth of internet technology, easy transfer of digital multimedia is feasible. However, this kind of convenience with which authorized users can access information, turns out to be a mixed blessing due to information piracy. The emerging field of Digital Rights Management (DRM) systems addresses issues related to the intellectual property rights of digital content. In this paper, an object-oriented (OO) DRM system, called "Imaging System with Watermarking and Attack Resilience" (ISWAR), is presented that generates and authenticates color images with embedded mechanisms for protection against infringement of ownership rights as well as security attacks. In addition to the methods, in the object-oriented sense, for performing traditional encryption and decryption, the system implements methods for visible and invisible watermarking. This paper presents one visible and one invisible watermarking algorithm that have been integrated in the system. The qualitative and quantitative results obtained for these two watermarking algorithms with several benchmark images indicate that high-quality watermarked images are produced by the algorithms. With the help of experimental results it is demonstrated that the presented invisible watermarking techniques are resilient to the well known benchmark attacks and hence a fail-safe method for providing constant protection to ownership rights.
△ Less
Submitted 21 May, 2012;
originally announced May 2012.