-
SecGenAI: Enhancing Security of Cloud-based Generative AI Applications within Australian Critical Technologies of National Interest
Authors:
Christoforus Yoga Haryanto,
Minh Hieu Vu,
Trung Duc Nguyen,
Emily Lomempow,
Yulia Nurliana,
Sona Taheri
Abstract:
The rapid advancement of Generative AI (GenAI) technologies offers transformative opportunities within Australia's critical technologies of national interest while introducing unique security challenges. This paper presents SecGenAI, a comprehensive security framework for cloud-based GenAI applications, with a focus on Retrieval-Augmented Generation (RAG) systems. SecGenAI addresses functional, in…
▽ More
The rapid advancement of Generative AI (GenAI) technologies offers transformative opportunities within Australia's critical technologies of national interest while introducing unique security challenges. This paper presents SecGenAI, a comprehensive security framework for cloud-based GenAI applications, with a focus on Retrieval-Augmented Generation (RAG) systems. SecGenAI addresses functional, infrastructure, and governance requirements, integrating end-to-end security analysis to generate specifications emphasizing data privacy, secure deployment, and shared responsibility models. Aligned with Australian Privacy Principles, AI Ethics Principles, and guidelines from the Australian Cyber Security Centre and Digital Transformation Agency, SecGenAI mitigates threats such as data leakage, adversarial attacks, and model inversion. The framework's novel approach combines advanced machine learning techniques with robust security measures, ensuring compliance with Australian regulations while enhancing the reliability and trustworthiness of GenAI systems. This research contributes to the field of intelligent systems by providing actionable strategies for secure GenAI implementation in industry, fostering innovation in AI applications, and safeguarding national interests.
△ Less
Submitted 1 July, 2024;
originally announced July 2024.
-
EVHA: Explainable Vision System for Hardware Testing and Assurance -- An Overview
Authors:
Md Mahfuz Al Hasan,
Mohammad Tahsin Mostafiz,
Thomas An Le,
Jake Julia,
Nidish Vashistha,
Shayan Taheri,
Navid Asadizanjani
Abstract:
Due to the ever-growing demands for electronic chips in different sectors the semiconductor companies have been mandated to offshore their manufacturing processes. This unwanted matter has made security and trustworthiness of their fabricated chips concerning and caused creation of hardware attacks. In this condition, different entities in the semiconductor supply chain can act maliciously and exe…
▽ More
Due to the ever-growing demands for electronic chips in different sectors the semiconductor companies have been mandated to offshore their manufacturing processes. This unwanted matter has made security and trustworthiness of their fabricated chips concerning and caused creation of hardware attacks. In this condition, different entities in the semiconductor supply chain can act maliciously and execute an attack on the design computing layers, from devices to systems. Our attack is a hardware Trojan that is inserted during mask generation/fabrication in an untrusted foundry. The Trojan leaves a footprint in the fabricated through addition, deletion, or change of design cells. In order to tackle this problem, we propose Explainable Vision System for Hardware Testing and Assurance (EVHA) in this work that can detect the smallest possible change to a design in a low-cost, accurate, and fast manner. The inputs to this system are Scanning Electron Microscopy (SEM) images acquired from the Integrated Circuits (ICs) under examination. The system output is determination of IC status in terms of having any defect and/or hardware Trojan through addition, deletion, or change in the design cells at the cell-level. This article provides an overview on the design, development, implementation, and analysis of our defense system.
△ Less
Submitted 19 July, 2022;
originally announced July 2022.
-
PCB Component Detection using Computer Vision for Hardware Assurance
Authors:
Wenwei Zhao,
Suprith Gurudu,
Shayan Taheri,
Shajib Ghosh,
Mukhil Azhagan Mallaiyan Sathiaseelan,
Navid Asadizanjani
Abstract:
Printed Circuit Board (PCB) assurance in the optical domain is a crucial field of study. Though there are many existing PCB assurance methods using image processing, computer vision (CV), and machine learning (ML), the PCB field is complex and increasingly evolving so new techniques are required to overcome the emerging problems. Existing ML-based methods outperform traditional CV methods, however…
▽ More
Printed Circuit Board (PCB) assurance in the optical domain is a crucial field of study. Though there are many existing PCB assurance methods using image processing, computer vision (CV), and machine learning (ML), the PCB field is complex and increasingly evolving so new techniques are required to overcome the emerging problems. Existing ML-based methods outperform traditional CV methods, however they often require more data, have low explainability, and can be difficult to adapt when a new technology arises. To overcome these challenges, CV methods can be used in tandem with ML methods. In particular, human-interpretable CV algorithms such as those that extract color, shape, and texture features increase PCB assurance explainability. This allows for incorporation of prior knowledge, which effectively reduce the number of trainable ML parameters and thus, the amount of data needed to achieve high accuracy when training or retraining an ML model. Hence, this study explores the benefits and limitations of a variety of common computer vision-based features for the task of PCB component detection using semantic data. Results of this study indicate that color features demonstrate promising performance for PCB component detection. The purpose of this paper is to facilitate collaboration between the hardware assurance, computer vision, and machine learning communities.
△ Less
Submitted 17 February, 2022;
originally announced February 2022.
-
Data-Driven Modeling of Aggregate Flexibility under Uncertain and Non-Convex Load Models
Authors:
Sina Taheri,
Vassilis Kekatos,
Harsha Veeramachaneni,
Baosen Zhang
Abstract:
Bundling a large number of distributed energy resources through a load aggregator has been advocated as an effective means to integrate such resources into whole-sale energy markets. To ease market clearing, system operators allow aggregators to submit bidding models of simple prespecified polytopic shapes. Aggregators need to carefully design and commit to a polytope that best captures their ener…
▽ More
Bundling a large number of distributed energy resources through a load aggregator has been advocated as an effective means to integrate such resources into whole-sale energy markets. To ease market clearing, system operators allow aggregators to submit bidding models of simple prespecified polytopic shapes. Aggregators need to carefully design and commit to a polytope that best captures their energy flexibility along a day-ahead scheduling horizon. This work puts forth a model-informed data-based optimal flexibility design for aggregators, which deals with the time-coupled, uncertain, and non-convex models of individual loads. The proposed solution first generates efficiently a labeled dataset of (non)-disaggregatable schedules. The feasible set of the aggregator is then approximated by an ellipsoid upon training a convex quadratic classifier using the labeled dataset. The ellipsoid is subsequently inner approximated by a polytope. Using Farkas lemma, the obtained polytope is finally inner approximated by the polytopic shape dictated by the market. Numerical tests show the effectiveness of the proposed flexibility design framework for designing the feasible sets of small- and large-sized aggregators coordinating solar photovoltaics, thermostatically-controlled loads, batteries, and electric vehicles. The tests further demonstrate that it is crucial for the aggregator to consider time-coupling and uncertainties in optimal flexibility design.
△ Less
Submitted 28 January, 2022;
originally announced January 2022.
-
Time-discretization of a plasma-neutral MHD model with a semi-implicit leapfrog algorithm
Authors:
Sina Taheri,
Jacob R. King,
Uri Shumlak
Abstract:
The semi-implicit leapfrog time-discretization is a workhorse algorithm for initial-value MHD codes to bridge between vastly separated time scales. Inclusion of atomic interactions with neutrals breaks the functional structure of the MHD equations that exploited by the leapfrog. We address how to best integrate atomic physics into the semi-implicit leapfrog. Following the Crank-Nicolson method, on…
▽ More
The semi-implicit leapfrog time-discretization is a workhorse algorithm for initial-value MHD codes to bridge between vastly separated time scales. Inclusion of atomic interactions with neutrals breaks the functional structure of the MHD equations that exploited by the leapfrog. We address how to best integrate atomic physics into the semi-implicit leapfrog. Following the Crank-Nicolson method, one approach is to time-center the atomic interactions in the linear solver and use a Newton method to include the nonlinear contributions. Alternatively, another family of methods are based on operator-splitting the terms associated with the atomic interactions using a Strang-splitting technique. These methods naturally break equations into constituent ODE and PDE parts and preserve the structure exploited by the semi-implicit leapfrog. We study the accuracy and efficiency of these methods through a battery of 0D and 1D cases and show that a second-order-in-time Douglas-Rachford inspired coupling between the ODE and PDE advances is effective in reducing the time-discretization error to be comparable to that of Crank-Nicolson with Newton iteration of the nonlinear terms. Splitting ODE and PDE parts results in independent matrix solves for each field which reduces the computational cost considerably and provides parallelization over species relative to Crank-Nicolson.
△ Less
Submitted 5 October, 2021;
originally announced October 2021.
-
A Multi-Period Water Network Planning for Industrial Parks; Impact of Design Periods on Park's Flexibility
Authors:
Saman Taheri
Abstract:
The central goal of this study is to advance the state-of-the-art in the field of water network management for industrial ecologies. Considering the global water shortage and environmental regulations, the reduction of water consumption has become a necessity within the industrial sector. To find the optimal water management strategies in an eco-industrial park (EIP), a refined superstructure is p…
▽ More
The central goal of this study is to advance the state-of-the-art in the field of water network management for industrial ecologies. Considering the global water shortage and environmental regulations, the reduction of water consumption has become a necessity within the industrial sector. To find the optimal water management strategies in an eco-industrial park (EIP), a refined superstructure is proposed. An MINLP mathematical model is then developed, based on the superstructure, to synthesize water and wastewater streams within the network, including nearby companies. Surveying two case studies, each studied in two different scenarios, showed that the cost objective functions deteriorates with increase in number of design periods. Results also provide some evidence of a trade-off between water network flexibility and performance, and vice versa.
△ Less
Submitted 2 August, 2021;
originally announced August 2021.
-
Automated Dynamic Concurrency Analysis for Go
Authors:
Saeed Taheri,
Ganesh Gopalakrishnan
Abstract:
The concurrency features of the Go language have proven versatile in the development of a number of concurrency systems. However, correctness methods to address challenges in Go concurrency debugging have not received much attention. In this work, we present an automatic dynamic tracing mechanism that efficiently captures and helps analyze the whole-program concurrency model. Using an enhancement…
▽ More
The concurrency features of the Go language have proven versatile in the development of a number of concurrency systems. However, correctness methods to address challenges in Go concurrency debugging have not received much attention. In this work, we present an automatic dynamic tracing mechanism that efficiently captures and helps analyze the whole-program concurrency model. Using an enhancement to the built-in tracer package of Go and a framework that collects dynamic traces from application execution, we enable thorough post-mortem analysis for concurrency debugging. Preliminary results about the effectiveness and scalability (up to more than 2K goroutines) of our proposed dynamic tracing for concurrent debugging are presented. We discuss the future direction for exploiting dynamic tracing towards accelerating concurrent bug exposure.
△ Less
Submitted 23 May, 2021;
originally announced May 2021.
-
KATRec: Knowledge Aware aTtentive Sequential Recommendations
Authors:
Mehrnaz Amjadi,
Seyed Danial Mohseni Taheri,
Theja Tulabandhula
Abstract:
Sequential recommendation systems model dynamic preferences of users based on their historical interactions with platforms. Despite recent progress, modeling short-term and long-term behavior of users in such systems is nontrivial and challenging. To address this, we present a solution enhanced by a knowledge graph called KATRec (Knowledge Aware aTtentive sequential Recommendations). KATRec learns…
▽ More
Sequential recommendation systems model dynamic preferences of users based on their historical interactions with platforms. Despite recent progress, modeling short-term and long-term behavior of users in such systems is nontrivial and challenging. To address this, we present a solution enhanced by a knowledge graph called KATRec (Knowledge Aware aTtentive sequential Recommendations). KATRec learns the short and long-term interests of users by modeling their sequence of interacted items and leveraging pre-existing side information through a knowledge graph attention network. Our novel knowledge graph-enhanced sequential recommender contains item multi-relations at the entity-level and users' dynamic sequences at the item-level. KATRec improves item representation learning by considering higher-order connections and incorporating them in user preference representation while recommending the next item. Experiments on three public datasets show that KATRec outperforms state-of-the-art recommendation models and demonstrates the importance of modeling both temporal and side information to achieve high-quality recommendations.
△ Less
Submitted 5 July, 2021; v1 submitted 6 December, 2020;
originally announced December 2020.
-
Strategic Investment in Energy Markets: A Multiparametric Programming Approach
Authors:
Sina Taheri,
Vassilis Kekatos,
Harsha Veeramachaneni
Abstract:
An investor has to carefully select the location and size of new generation units it intends to build, since adding capacity in a market affects the profit from units this investor may already own. To capture this closed-loop characteristic, strategic investment (SI) can be posed as a bilevel optimization. By analytically studying a small market, we first show that its objective function can be no…
▽ More
An investor has to carefully select the location and size of new generation units it intends to build, since adding capacity in a market affects the profit from units this investor may already own. To capture this closed-loop characteristic, strategic investment (SI) can be posed as a bilevel optimization. By analytically studying a small market, we first show that its objective function can be non-convex and discontinuous. Realizing that existing mixed-integer problem formulations become impractical for larger markets and increasing number of scenarios, this work put forth two SI solvers: a grid search to handle setups where the candidate investment locations are few, and a stochastic gradient descent approach for otherwise. Both solvers leverage the powerful toolbox of multiparametric programming (MPP), each in a unique way. The grid search entails finding the primal/dual solutions for a large number of optimal power flow (OPF) problems, which nonetheless can be efficiently computed several at once thanks to the properties of MPP. The same properties facilitate the rapid calculation of gradients in a mini-batch fashion, thus accelerating the implementation of a stochastic gradient descent search. Tests on the IEEE 118-bus system using real-world data corroborate the advantages of the novel MPP-aided solvers.
△ Less
Submitted 3 January, 2021; v1 submitted 14 April, 2020;
originally announced April 2020.
-
An MILP Approach for Distribution Grid Topology Identification using Inverter Probing
Authors:
Sina Taheri,
Vassilis Kekatos,
Guido Cavraro
Abstract:
Although knowing the feeder topology and line impedances is a prerequisite for solving any grid optimization task, utilities oftentimes have limited or outdated information on their electric network assets. Given the rampant integration of smart inverters, we have previously advocated perturbing their power injections to unveil the underlying grid topology using the induced voltage responses. Unde…
▽ More
Although knowing the feeder topology and line impedances is a prerequisite for solving any grid optimization task, utilities oftentimes have limited or outdated information on their electric network assets. Given the rampant integration of smart inverters, we have previously advocated perturbing their power injections to unveil the underlying grid topology using the induced voltage responses. Under an approximate grid model, the perturbed power injections and the collected voltage deviations obey a linear regression setup, where the unknown is the vector of line resistances. Building on this model, topology processing can be performed in two steps. Given a candidate radial topology, the line resistances can be estimated via a least-squares (LS) fit on the probing data. The topology attaining the best fit can be then selected. To avoid evaluating the exponentially many candidate topologies, this two-step approach is uniquely formulated as a mixed-integer linear program (MILP) using the McCormick relaxation. If the recovered topology is not radial, a second, computationally more demanding MILP confines the search only within radial topologies. Numerical tests explain how topology recovery depends on the noise level and probing duration, and demonstrate that the first simpler MILP yields a tree topology in 90% of the cases tested.
△ Less
Submitted 6 April, 2020; v1 submitted 5 April, 2020;
originally announced April 2020.
-
Fast Probabilistic Hosting Capacity Analysis for Active Distribution Systems
Authors:
Sina Taheri,
Mana Jalali,
Vassilis Kekatos,
Lang Tong
Abstract:
Interconnection studies for distributed energy resources (DERs) can currently take months since they entail simulating a large number of power flow scenarios. If DERs are to be actively controlled, probabilistic hosting capacity analysis (PHCA) studies become more time-consuming since they require solving multiple optimal power flow (OPF) tasks. PHCA is expedited here by leveraging the powerful to…
▽ More
Interconnection studies for distributed energy resources (DERs) can currently take months since they entail simulating a large number of power flow scenarios. If DERs are to be actively controlled, probabilistic hosting capacity analysis (PHCA) studies become more time-consuming since they require solving multiple optimal power flow (OPF) tasks. PHCA is expedited here by leveraging the powerful tool of multiparametric programming (MPP). Using an approximate grid model, optimal DER setpoints are decided by a quadratic program, which depends on analysis and uncertain parameters in a possibly nonlinear fashion. By reformulating this program, feasible and infeasible OPF instances alike are handled in a unified way to uniquely reveal the location, frequency, and severity of feeder constraint violations. The effect of voltage regulators is also captured by novel approximate models. Upon properly extending MPP to PHCA, we were able to find the exact minimizers for 518,400 OPF instances on the IEEE 123-bus feeder by solving only 6,905 of them, and 86,400 instances on a 1,160-bus feeder by solving only 2,111 instances. This accelerated PHCA by a factor of 10. Thus, a utility can promptly infer grid statistics using real-world data without a probabilistic characterization of uncertain parameters.
△ Less
Submitted 29 September, 2020; v1 submitted 5 February, 2020;
originally announced February 2020.
-
Investigating usability of MSstatsQC software
Authors:
Sara Mohammad Taheri,
Omkar Terse,
Eralp Dogu,
Magy Seif El-Nasr,
Olga Vitek
Abstract:
MSstatsQC [3] is an open-source software that provides longitudinal system suitability monitoring tools in the form of control charts for proteomic experiments. It includes simultaneous tools for the mean and dispersion of suitability metrics and presents alternative methods of monitoring through different tabs that are designed in the interface. This research focuses on investigating the usabilit…
▽ More
MSstatsQC [3] is an open-source software that provides longitudinal system suitability monitoring tools in the form of control charts for proteomic experiments. It includes simultaneous tools for the mean and dispersion of suitability metrics and presents alternative methods of monitoring through different tabs that are designed in the interface. This research focuses on investigating the usability of MSstatsQC software and the interpretability of the designed plots. In this study, we ask 4 test users, from the proteomics field, to complete a series of tasks and questionnaires. The tasks are designed to test the usability of the software in terms of importing data files, selecting appropriate metrics, guide set, and peptides, and finally creating decision rules (tasks 1 and 3 in appendix). The questionnaires ask about interpretability of the plots including control charts, box plots, heat maps, river plots, and radar plots (tasks 1 and 4 in appendix). The goal of the questions is to determine if the test users understand the plots and can interpret them. Results show limitations in usability and plot interpretability, especially in the data import section. We suggest the following modifications. I) providing conspicuous guides close to the window related to up-loading a datafile as well as providing error messages that pop-up when the data set has a wrong format II) providing plot descriptions, hints to interpret plots, plot titles and appropriate axis labels, and, III) Numbering tabs to show the flow of procedures in the software.
△ Less
Submitted 2 February, 2020;
originally announced February 2020.
-
A Tool for Automatically Suggesting Source-Code Optimizations for Complex GPU Kernels
Authors:
Saeed Taheri,
Apan Qasem,
Martin Burtscher
Abstract:
Future computing systems, from handhelds to supercomputers, will undoubtedly be more parallel and heterogeneous than todays systems to provide more performance and energy efficiency. Thus, GPUs are increasingly being used to accelerate general purpose applications, including applications with data dependent, irregular control flow and memory access patterns. However, the growing complexity, expose…
▽ More
Future computing systems, from handhelds to supercomputers, will undoubtedly be more parallel and heterogeneous than todays systems to provide more performance and energy efficiency. Thus, GPUs are increasingly being used to accelerate general purpose applications, including applications with data dependent, irregular control flow and memory access patterns. However, the growing complexity, exposed memory hierarchy, incoherence, heterogeneity, and parallelism will make accelerator based systems progressively more difficult to program. In the foreseeable future, the vast majority of programmers will no longer be able to extract additional performance or energy savings from next generation systems be-cause the programming will be too difficult. Automatic performance analysis and optimization recommendation tools have the potential to avert this situation. They embody expert knowledge and make it available to software developers when needed. In this paper, we describe and evaluate such a tool.
△ Less
Submitted 17 October, 2019;
originally announced October 2019.
-
Joint Grid Topology Reconfiguration and Design of Watt-VAR Curves for DERs
Authors:
Manish K. Singh,
Sina Taheri,
Vassilis Kekatos,
Kevin P. Schneider,
Chen-Ching Liu
Abstract:
Operators can now remotely control switches and update the control settings for voltage regulators and distributed energy resources (DERs), thus unleashing the network reconfiguration opportunities to improve efficiency. Aligned to this direction, this work puts forth a comprehensive toolbox of optimization models leveraging the control capabilities of smart grid assets. We put forth detailed yet…
▽ More
Operators can now remotely control switches and update the control settings for voltage regulators and distributed energy resources (DERs), thus unleashing the network reconfiguration opportunities to improve efficiency. Aligned to this direction, this work puts forth a comprehensive toolbox of optimization models leveraging the control capabilities of smart grid assets. We put forth detailed yet practical models to capture the operation of locally and remotely controlled regulators, and customize the watt-var DER control curves complying with the IEEE 1547.8 mandates. Maintaining radiality is a key requirement germane to various feeder optimization tasks. This requirement is accomplished here through an intuitive and provably correct formulation. The developed toolbox is put into action to reconfigure a grid for minimizing losses using real-world data on a benchmark feeder. The results corroborate that optimal topologies vary across the day and coordinating DERs and regulators is critical during periods of steep net load changes.
△ Less
Submitted 22 February, 2020; v1 submitted 7 October, 2019;
originally announced October 2019.
-
Accelerometer Based Method for Tire Load and Slip Angle Estimation
Authors:
Kanwar Bharat Singh,
Saied Taheri
Abstract:
Tire mounted sensors are emerging as a promising technology, capable of providing information about important tire states. This paper presents a survey of the state-of-the-art in the field of smart tire technology, with a special focus on the different signal processing techniques proposed by researchers to estimate the tire load and slip angle using tire mounted accelerometers. Next, details abou…
▽ More
Tire mounted sensors are emerging as a promising technology, capable of providing information about important tire states. This paper presents a survey of the state-of-the-art in the field of smart tire technology, with a special focus on the different signal processing techniques proposed by researchers to estimate the tire load and slip angle using tire mounted accelerometers. Next, details about the research activities undertaken as part of this study to develop a smart tire are presented. Finally, novel algorithms for estimating the tire load and slip angle are presented. Experimental results demonstrate the effectiveness of the proposed algorithms.
△ Less
Submitted 23 January, 2019;
originally announced January 2019.
-
Anomaly Generation using Generative Adversarial Networks in Host Based Intrusion Detection
Authors:
Milad Salem,
Shayan Taheri,
Jiann Shiun Yuan
Abstract:
Generative adversarial networks have been able to generate striking results in various domains. This generation capability can be general while the networks gain deep understanding regarding the data distribution. In many domains, this data distribution consists of anomalies and normal data, with the anomalies commonly occurring relatively less, creating datasets that are imbalanced. The capabilit…
▽ More
Generative adversarial networks have been able to generate striking results in various domains. This generation capability can be general while the networks gain deep understanding regarding the data distribution. In many domains, this data distribution consists of anomalies and normal data, with the anomalies commonly occurring relatively less, creating datasets that are imbalanced. The capabilities that generative adversarial networks offer can be leveraged to examine these anomalies and help alleviate the challenge that imbalanced datasets propose via creating synthetic anomalies. This anomaly generation can be specifically beneficial in domains that have costly data creation processes as well as inherently imbalanced datasets. One of the domains that fits this description is the host-based intrusion detection domain. In this work, ADFA-LD dataset is chosen as the dataset of interest containing system calls of small foot-print next generation attacks. The data is first converted into images, and then a Cycle-GAN is used to create images of anomalous data from images of normal data. The generated data is combined with the original dataset and is used to train a model to detect anomalies. By doing so, it is shown that the classification results are improved, with the AUC rising from 0.55 to 0.71, and the anomaly detection rate rising from 17.07% to 80.49%. The results are also compared to SMOTE, showing the potential presented by generative adversarial networks in anomaly generation.
△ Less
Submitted 11 December, 2018;
originally announced December 2018.
-
ECG Arrhythmia Classification Using Transfer Learning from 2-Dimensional Deep CNN Features
Authors:
Milad Salem,
Shayan Taheri,
Jiann Shiun-Yuan
Abstract:
Due to the recent advances in the area of deep learning, it has been demonstrated that a deep neural network, trained on a huge amount of data, can recognize cardiac arrhythmias better than cardiologists. Moreover, traditionally feature extraction was considered an integral part of ECG pattern recognition; however, recent findings have shown that deep neural networks can carry out the task of feat…
▽ More
Due to the recent advances in the area of deep learning, it has been demonstrated that a deep neural network, trained on a huge amount of data, can recognize cardiac arrhythmias better than cardiologists. Moreover, traditionally feature extraction was considered an integral part of ECG pattern recognition; however, recent findings have shown that deep neural networks can carry out the task of feature extraction directly from the data itself. In order to use deep neural networks for their accuracy and feature extraction, high volume of training data is required, which in the case of independent studies is not pragmatic. To arise to this challenge, in this work, the identification and classification of four ECG patterns are studied from a transfer learning perspective, transferring knowledge learned from the image classification domain to the ECG signal classification domain. It is demonstrated that feature maps learned in a deep neural network trained on great amounts of generic input images can be used as general descriptors for the ECG signal spectrograms and result in features that enable classification of arrhythmias. Overall, an accuracy of 97.23 percent is achieved in classifying near 7000 instances by ten-fold cross validation.
△ Less
Submitted 11 December, 2018;
originally announced December 2018.
-
Power Flow Solvers for Direct Current Networks
Authors:
Sina Taheri,
Vassilis Kekatos
Abstract:
With increasing smart grid direct current (DC) deployments in distribution feeders, microgrids, buildings, and high-voltage transmission, there is a need for better understanding the landscape of power flow (PF) solutions as well as for efficient PF solvers with performance guarantees. This work puts forth three approaches with complementary strengths towards co** with the PF task in DC power sy…
▽ More
With increasing smart grid direct current (DC) deployments in distribution feeders, microgrids, buildings, and high-voltage transmission, there is a need for better understanding the landscape of power flow (PF) solutions as well as for efficient PF solvers with performance guarantees. This work puts forth three approaches with complementary strengths towards co** with the PF task in DC power systems. We consider a possibly meshed network hosting ZIP loads and constant-voltage/power generators. The first approach relies on a monotone map**. In the absence of constant-power generation, the related iterates converge to the high-voltage solution, if one exists. To handle generators operating in constant-power mode at any time, an alternative Z-bus method is studied. For bounded constant-power generation and demand, the analysis establishes the existence and uniqueness of a PF solution within a predefined ball. Moreover, the Z-bus updates converge to this solution. Third, an energy function approach shows that under limited constant-power demand, all PF solutions are local minima of a function. The derived conditions can be checked without knowing the system state. The applicability of the conditions and the performance of the algorithms are numerically validated on a radial distribution feeder and two meshed transmission systems under varying loading conditions.
△ Less
Submitted 9 July, 2019; v1 submitted 10 July, 2018;
originally announced July 2018.
-
Distributed Maximal Independent Set on Scale-Free Networks
Authors:
Hasan Heydari,
S. Mahmoud Taheri,
Kaveh Kavousi
Abstract:
The problem of distributed maximal independent set (MIS) is investigated on inhomogeneous random graphs with power-law weights by which the scale-free networks can be produced. Such a particular problem has been solved on graphs with $n$ vertices by state-of-the-art algorithms with the time complexity of $O(\log{n})$. We prove that for a scale-free network with power-law exponent $β> 3$, the induc…
▽ More
The problem of distributed maximal independent set (MIS) is investigated on inhomogeneous random graphs with power-law weights by which the scale-free networks can be produced. Such a particular problem has been solved on graphs with $n$ vertices by state-of-the-art algorithms with the time complexity of $O(\log{n})$. We prove that for a scale-free network with power-law exponent $β> 3$, the induced subgraph is constructed by vertices with degrees larger than $\log{n}\log^{*}{n}$ is a scale-free network with $β' = 2$, almost surely (a.s.). Then, we propose a new algorithm that computes an MIS on scale-free networks with the time complexity of $O(\frac{\log{n}}{\log{\log{n}}})$ a.s., which is better than $O(\log{n})$. Furthermore, we prove that on scale-free networks with $β\geq 3$, the arboricity and degeneracy are less than $2^{log^{1/3}n}$ with high probability (w.h.p.). Finally, we prove that the time complexity of finding an MIS on scale-free networks with $β\geq 3$ is $O(log^{2/3}n)$ w.h.p.
△ Less
Submitted 11 June, 2018; v1 submitted 7 April, 2018;
originally announced April 2018.
-
Automated Formal Equivalence Verification of Pipelined Nested Loops in Datapath Designs
Authors:
Payman Behnam,
Bijan Alizadeh,
Sajjad Taheri
Abstract:
In this paper, we present an efficient formal approach to check the equivalence of synthesized RTL against the high-level specification in the presence of pipelining transformations. To increase the scalability of our proposed method, we dynamically divide the designs into several smaller parts called segments by introducing cut-points. Then we employ Modular Horner Expansion Diagram (M-HED) to ch…
▽ More
In this paper, we present an efficient formal approach to check the equivalence of synthesized RTL against the high-level specification in the presence of pipelining transformations. To increase the scalability of our proposed method, we dynamically divide the designs into several smaller parts called segments by introducing cut-points. Then we employ Modular Horner Expansion Diagram (M-HED) to check whether the specification and implementation are equivalent or not. In an iterative manner, the equivalence checking for each segment is performed. At each step, the equivalent nodes and those nodes which have an impact on them are removed until the whole design is covered. Our proposed method enables us to deal with the equivalence checking problem for behaviorally synthesized designs even in the presence of pipelines for nested loops. The empirical results demonstrate the efficiency and scalability of our proposed method in terms of run-time and memory usage for several large designs synthesized by a commercial behavioral synthesis tool. Average improvements in terms of the memory usage and run time in comparison with SMT- and SAT-based equivalence checking are 16.7x and 111.9x, respectively.
△ Less
Submitted 28 December, 2017;
originally announced December 2017.
-
Complex-Valued Symbol Transmissions in Filter Bank Multicarrier Systems using Filter Deconvolution
Authors:
Adnan Zafar,
Mahmoud Abdullahi,
Lei Zhang,
Sohail Taheri,
Pei Xiao,
Muhammad Ali Imran
Abstract:
Transmission of complex-valued symbols using filter bank multicarrier systems has been an issue due to the self-interference between the transmitted symbols both in the time and frequency domain (so-called intrinsic interference). In this paper, we propose a novel low-complexity interference-free filter bank multicarrier system with QAM modulation (FBMC/QAM) using filter deconvolution. The propose…
▽ More
Transmission of complex-valued symbols using filter bank multicarrier systems has been an issue due to the self-interference between the transmitted symbols both in the time and frequency domain (so-called intrinsic interference). In this paper, we propose a novel low-complexity interference-free filter bank multicarrier system with QAM modulation (FBMC/QAM) using filter deconvolution. The proposed method is based on inversion of the prototype filters which completely removes the intrinsic interference at the receiver and allows the use of complex-valued signaling. The interference terms in FBMC/QAM with and without the proposed system are analyzed and compared in terms of mean square error (MSE). It is shown with theoretical and simulation results that the proposed method cancels the intrinsic interference and improves the output signal to interference plus noise ratio (SINR) at the expense of slight enhancement of residual interferences caused by multipath channel. The complexity of the proposed system is also analyzed along with performance evaluation in an asynchronous multiservice scenario. It is shown that the proposed FBMC/QAM system with filter deconvolution outperforms the conventional OFDM system.
△ Less
Submitted 23 November, 2017;
originally announced November 2017.
-
Security Protection for Magnetic Tunnel Junction
Authors:
Shayan Taheri,
Jiann-Shiun Yuan
Abstract:
Energy efficiency is one of the most important parameters for designing and building a computing system nowadays. Introduction of new transistor and memory technologies to the integrated circuits design have brought hope for low energy very large scale integration (VLSI) circuit design. This excellency is pleasant if the computing system is secure and the energy is not wasted through execution of…
▽ More
Energy efficiency is one of the most important parameters for designing and building a computing system nowadays. Introduction of new transistor and memory technologies to the integrated circuits design have brought hope for low energy very large scale integration (VLSI) circuit design. This excellency is pleasant if the computing system is secure and the energy is not wasted through execution of malicious actions. In fact, it is required to make sure that the utilized transistor and memory devices function correctly and no error occurs in the system operation. In this regard, we propose a built-in-self-test architecture for security checking of the magnetic tunnel junction (MTJ) device under malicious process variations attack. Also, a general identification technique is presented to investigate the behaviour and activities of the employed circuitries within this MTJ testing architecture. The presented identification technique tries to find any abnormal behaviour using the circuit current signal.
△ Less
Submitted 27 April, 2017;
originally announced April 2017.
-
Security Analysis of Tunnel Field-Effect Transistor for Low Power Hardware
Authors:
Shayan Taheri,
Jiann-Shiun Yuan
Abstract:
Security and energy are considered as the most important parameters for designing and building a computing system nowadays. Today's attacks target different layers of the computing system (i.e. software and hardware). Introduction of new transistor technologies to the integrated circuits design is beneficial, especially for low energy requirements. The new devices have unique features and properti…
▽ More
Security and energy are considered as the most important parameters for designing and building a computing system nowadays. Today's attacks target different layers of the computing system (i.e. software and hardware). Introduction of new transistor technologies to the integrated circuits design is beneficial, especially for low energy requirements. The new devices have unique features and properties that provide security advantages. However, these properties may come to the aid of an adversary to design stronger attacks. Therefore, the advantages as well as the disadvantages of these technologies need to be well studied. This paper demonstrates the area and power efficiency of the tunnel field-effect transistor (TFET) technology along with analyzing its security aspects.
△ Less
Submitted 25 April, 2017;
originally announced April 2017.
-
HellRank: A Hellinger-based Centrality Measure for Bipartite Social Networks
Authors:
Seyed Mohammad Taheri,
Hamidreza Mahyar,
Mohammad Firouzi,
Elahe Ghalebi K.,
Radu Grosu,
Ali Movaghar
Abstract:
Measuring centrality in a social network, especially in bipartite mode, poses several challenges such as requirement of full knowledge of the network topology and lack of properly detection of top-k behavioral representative users. In this paper, to overcome the aforementioned challenging issues, we propose an accurate centrality measure, called HellRank, to identify central nodes in bipartite soc…
▽ More
Measuring centrality in a social network, especially in bipartite mode, poses several challenges such as requirement of full knowledge of the network topology and lack of properly detection of top-k behavioral representative users. In this paper, to overcome the aforementioned challenging issues, we propose an accurate centrality measure, called HellRank, to identify central nodes in bipartite social networks. HellRank is based on the Hellinger distance between two nodes on the same side of a bipartite network. We theoretically analyze the impact of the Hellinger distance on a bipartite network and find an upper and lower bounds for this distance. The computation of HellRank centrality measure can be distributed by letting each node uses only local information on its immediate neighbors and therefore do not need a central entity to have full knowledge of the network topological structure. We experimentally evaluate performance of the HellRank measure in correlation with other centrality measures on real-world networks. The results show partial ranking similarity between the HellRank and the other conventional metrics according to the Kendall and Spearman rank correlation coefficient.
△ Less
Submitted 17 March, 2017; v1 submitted 5 December, 2016;
originally announced December 2016.
-
Extracting Implicit Social Relation for Social Recommendation Techniques in User Rating Prediction
Authors:
Seyed Mohammad Taheri,
Hamidreza Mahyar,
Mohammad Firouzi,
Elahe Ghalebi K.,
Radu Grosu,
Ali Movaghar
Abstract:
Recommendation plays an increasingly important role in our daily lives. Recommender systems automatically suggest items to users that might be interesting for them. Recent studies illustrate that incorporating social trust in Matrix Factorization methods demonstrably improves accuracy of rating prediction. Such approaches mainly use the trust scores explicitly expressed by users. However, it is of…
▽ More
Recommendation plays an increasingly important role in our daily lives. Recommender systems automatically suggest items to users that might be interesting for them. Recent studies illustrate that incorporating social trust in Matrix Factorization methods demonstrably improves accuracy of rating prediction. Such approaches mainly use the trust scores explicitly expressed by users. However, it is often challenging to have users provide explicit trust scores of each other. There exist quite a few works, which propose Trust Metrics to compute and predict trust scores between users based on their interactions. In this paper, first we present how social relation can be extracted from users' ratings to items by describing Hellinger distance between users in recommender systems. Then, we propose to incorporate the predicted trust scores into social matrix factorization models. By analyzing social relation extraction from three well-known real-world datasets, which both: trust and recommendation data available, we conclude that using the implicit social relation in social recommendation techniques has almost the same performance compared to the actual trust scores explicitly expressed by users. Hence, we build our method, called Hell-TrustSVD, on top of the state-of-the-art social recommendation technique to incorporate both the extracted implicit social relations and ratings given by users on the prediction of items for an active user. To the best of our knowledge, this is the first work to extend TrustSVD with extracted social trust information. The experimental results support the idea of employing implicit trust into matrix factorization whenever explicit trust is not available, can perform much better than the state-of-the-art approaches in user rating prediction.
△ Less
Submitted 17 March, 2017; v1 submitted 5 December, 2016;
originally announced December 2016.
-
Impact of Physical Activity on Sleep:A Deep Learning Based Exploration
Authors:
Aarti Sathyanarayana,
Shafiq Joty,
Luis Fernandez-Luque,
Ferda Ofli,
Jaideep Srivastava,
Ahmed Elmagarmid,
Shahrad Taheri,
Teresa Arora
Abstract:
The importance of sleep is paramount for maintaining physical, emotional and mental wellbeing. Though the relationship between sleep and physical activity is known to be important, it is not yet fully understood. The explosion in popularity of actigraphy and wearable devices, provides a unique opportunity to understand this relationship. Leveraging this information source requires new tools to be…
▽ More
The importance of sleep is paramount for maintaining physical, emotional and mental wellbeing. Though the relationship between sleep and physical activity is known to be important, it is not yet fully understood. The explosion in popularity of actigraphy and wearable devices, provides a unique opportunity to understand this relationship. Leveraging this information source requires new tools to be developed to facilitate data-driven research for sleep and activity patient-recommendations.
In this paper we explore the use of deep learning to build sleep quality prediction models based on actigraphy data. We first use deep learning as a pure model building device by performing human activity recognition (HAR) on raw sensor data, and using deep learning to build sleep prediction models. We compare the deep learning models with those build using classical approaches, i.e. logistic regression, support vector machines, random forest and adaboost. Secondly, we employ the advantage of deep learning with its ability to handle high dimensional datasets. We explore several deep learning models on the raw wearable sensor output without performing HAR or any other feature extraction.
Our results show that using a convolutional neural network on the raw wearables output improves the predictive value of sleep quality from physical activity, by an additional 8% compared to state-of-the-art non-deep learning approaches, which itself shows a 15% improvement over current practice. Moreover, utilizing deep learning on raw data eliminates the need for data pre-processing and simplifies the overall workflow to analyze actigraphy data for sleep and physical activity research.
△ Less
Submitted 24 July, 2016;
originally announced July 2016.
-
Robust Automated Human Activity Recognition and its Application to Sleep Research
Authors:
Aarti Sathyanarayana,
Ferda Ofli,
Luis Fernandes-Luque,
Jaideep Srivastava,
Ahmed Elmagarmid,
Teresa Arora,
Shahrad Taheri
Abstract:
Human Activity Recognition (HAR) is a powerful tool for understanding human behaviour. Applying HAR to wearable sensors can provide new insights by enriching the feature set in health studies, and enhance the personalisation and effectiveness of health, wellness, and fitness applications. Wearable devices provide an unobtrusive platform for user monitoring, and due to their increasing market penet…
▽ More
Human Activity Recognition (HAR) is a powerful tool for understanding human behaviour. Applying HAR to wearable sensors can provide new insights by enriching the feature set in health studies, and enhance the personalisation and effectiveness of health, wellness, and fitness applications. Wearable devices provide an unobtrusive platform for user monitoring, and due to their increasing market penetration, feel intrinsic to the wearer. The integration of these devices in daily life provide a unique opportunity for understanding human health and wellbeing. This is referred to as the "quantified self" movement. The analyses of complex health behaviours such as sleep, traditionally require a time-consuming manual interpretation by experts. This manual work is necessary due to the erratic periodicity and persistent noisiness of human behaviour. In this paper, we present a robust automated human activity recognition algorithm, which we call RAHAR. We test our algorithm in the application area of sleep research by providing a novel framework for evaluating sleep quality and examining the correlation between the aforementioned and an individual's physical activity. Our results improve the state-of-the-art procedure in sleep research by 15 percent for area under ROC and by 30 percent for F1 score on average. However, application of RAHAR is not limited to sleep analysis and can be used for understanding other health problems such as obesity, diabetes, and cardiac diseases.
△ Less
Submitted 19 July, 2016; v1 submitted 17 July, 2016;
originally announced July 2016.
-
BioInfoBase : A Bioinformatics Resourceome
Authors:
Saeid Kadkhodaei,
Fatemeh Barantalab,
Sima Taheri,
Majid Foroughi,
Farahnaz Golestan Hashemi,
Mahmood Reza Shabanimofrad,
Hossein Hosseinimonfared,
Morvarid Akhavan Rezaei,
Ali Ranjbarfard,
Mahbod Sahebi,
Parisa Azizi,
Maryam Dadar,
Rambod Abiri,
Mohammad Fazel Harighi,
Nahid Kalhori,
Mohammad Reza Etemadi,
Ali Baradaran,
Mahmoud Danaee,
Iman Zare,
Ahmad Ghafarpour,
Zahra Azhdari,
Hamid Rajabi Memari,
Vajiheh Safavi,
Naser Tajabadi,
Faruku Bande
Abstract:
Over the past decade there has been a significant growth in bioinformatics databases, tools and resources. Although, bioinformatics is becoming more specific, increasing the number of bioinformatics-wares has made it difficult for researchers to find the most appropriate databases, tools or methods which match their needs. Our coordinated effort has been planned to establish a reference website in…
▽ More
Over the past decade there has been a significant growth in bioinformatics databases, tools and resources. Although, bioinformatics is becoming more specific, increasing the number of bioinformatics-wares has made it difficult for researchers to find the most appropriate databases, tools or methods which match their needs. Our coordinated effort has been planned to establish a reference website in Bioinformatics as a public repository of tools, databases, directories and resources annotated with contextual information and organized by functional relevance. Within the first phase of BioInfoBase development, 22 experts in different fields of molecular biology contributed and more than 2500 records were registered, which are increasing daily. For each record submitted to the database of website almost all related data (40 features) has been extracted. These include information from the biological category and subcategory to the scientific article and developer information. Searching the query keyword(s) returns links containing the entered keyword(s) found within the different features of the records with more weights on the title, abstract and application fields. The search results simply provide the users with the most informative features of the records to select the most suitable ones. The usefulness of the returned results is ranked according to the matching score based on the Term Frequency-Inverse Document Frequency (TF-IDF) methods. Therefore, this search engine will screen a comprehensive index of bioinformatics tools, databases and resources and provide the best suited records (links) to the researchers need. The BioInfoBase resource is available at www.bioinfobase.info.
△ Less
Submitted 20 November, 2016; v1 submitted 11 July, 2016;
originally announced July 2016.
-
Semi-active Suspension Control using Modern Methodology: Comprehensive Comparison Study
Authors:
Omid Ghasemalizadeh,
Saied Taheri,
Amandeep Singh,
Jill Goryca
Abstract:
Semi-active suspensions have drawn particular attention due to their superior performance over the other types of suspensions. One of their advantages is that their dam** coefficient can be controlled without the need for any external source of power. In this study, three control approaches are implemented on a quarter-car model using MATLAB/Simulink. The investigated control methodologies are A…
▽ More
Semi-active suspensions have drawn particular attention due to their superior performance over the other types of suspensions. One of their advantages is that their dam** coefficient can be controlled without the need for any external source of power. In this study, three control approaches are implemented on a quarter-car model using MATLAB/Simulink. The investigated control methodologies are Acceleration Driven Damper, Power Driven Damper, and H_infinity Robust Control. The three controllers are known as comfort-oriented approaches. H_infinity Robust Control is an advanced method that guarantees transient performance and rejects external disturbances. It is shown that H_infinity with the proposed modification, has the best performance although its relatively high cost of computation could be potentially considered as a drawback.
△ Less
Submitted 12 November, 2014;
originally announced November 2014.
-
The effects of minimal length and maximal momentum on the transition rate of ultra cold neutrons in gravitational field
Authors:
Pouria Pedram,
Kourosh Nozari,
S. H. Taheri
Abstract:
The existence of a minimum observable length and/or a maximum observable momentum is in agreement with various candidates of quantum gravity such as string theory, loop quantum gravity, doubly special relativity and black hole physics. In this scenario, the Heisenberg uncertainty principle is changed to the so-called Generalized (Gravitational) Uncertainty Principle (GUP) which results in modifica…
▽ More
The existence of a minimum observable length and/or a maximum observable momentum is in agreement with various candidates of quantum gravity such as string theory, loop quantum gravity, doubly special relativity and black hole physics. In this scenario, the Heisenberg uncertainty principle is changed to the so-called Generalized (Gravitational) Uncertainty Principle (GUP) which results in modification of all Hamiltonians in quantum mechanics. In this paper, following a recently proposed GUP which is consistent with quantum gravity theories, we study the quantum mechanical systems in the presence of both a minimum length and a maximum momentum. The generalized Hamiltonian contains two additional terms which are proportional to $αp^3$ and $α^2 p^4$ where $α\sim 1/M_{Pl}c$ is the GUP parameter. For the case of a quantum bouncer, we solve the generalized Schrodinger equation in the momentum space and find the modified energy eigenvalues and eigenfunctions up to the second-order in GUP parameter. The effects of the GUP on the transition rate of ultra cold neutrons in gravitational spectrometers are discussed finally.
△ Less
Submitted 5 March, 2011;
originally announced March 2011.
-
Cyclooxygenase Inhibition Limits Blood-Brain Barrier Disruption following Intracerebral Injection of Tumor Necrosis Factor-alpha in the Rat
Authors:
Eduardo Candelario-Jalil,
Saeid Taheri,
Yi Yang,
Rohit Sood,
Mark Grossetete,
Eduardo Y. Estrada,
Bernd L. Fiebich,
Gary A. Rosenberg
Abstract:
Increased permeability of the blood-brain barrier (BBB) is important in neurological disorders. Neuroinflammation is associated with increased BBB breakdown and brain injury. Tumor necrosis factor-a (TNF-a) is involved in BBB injury and edema formation through a mechanism involving matrix metalloproteinase (MMP) upregulation. There is emerging evidence indicating that cyclooxygenase (COX) inhibi…
▽ More
Increased permeability of the blood-brain barrier (BBB) is important in neurological disorders. Neuroinflammation is associated with increased BBB breakdown and brain injury. Tumor necrosis factor-a (TNF-a) is involved in BBB injury and edema formation through a mechanism involving matrix metalloproteinase (MMP) upregulation. There is emerging evidence indicating that cyclooxygenase (COX) inhibition limits BBB disruption following ischemic stroke and bacterial meningitis, but the mechanisms involved are not known. We used intracerebral injection of TNF-a to study the effect of COX inhibition on TNF-a-induced BBB breakdown, MMP expression/activity and oxidative stress. BBB disruption was evaluated by the uptake of 14C-sucrose into the brain and by magnetic resonance imaging (MRI) utilizing Gd-DTPA as a paramagnetic contrast agent. Using selective inhibitors of each COX isoform, we found that COX-1 activity is more important than COX-2 in BBB opening. TNF-a induced a significant upregulation of gelatinase B (MMP-9), stromelysin-1 (MMP-3) and COX-2. In addition, TNF-a significantly depleted glutathione as compared to saline. Indomethacin (10 mg/kg; i.p.), an inhibitor of COX-1 and COX-2, reduced BBB damage at 24 h. Indomethacin significantly attenuated MMP-9 and MMP-3 expression and activation, and prevented the loss of endogenous radical scavenging capacity following intracerebral injection of TNF-a. Our results show for the first time that BBB disruption during neuroinflammation can be significantly reduced by administration of COX inhibitors. Modulation of COX in brain injury by COX inhibitors or agents modulating prostaglandin E2 formation/signaling may be useful in clinical settings associated with BBB disruption.
△ Less
Submitted 13 November, 2007;
originally announced November 2007.