-
Using graph neural networks to reconstruct charged pion showers in the CMS High Granularity Calorimeter
Authors:
M. Aamir,
B. Acar,
G. Adamov,
T. Adams,
C. Adloff,
S. Afanasiev,
C. Agrawal,
C. Agrawal,
A. Ahmad,
H. A. Ahmed,
S. Akbar,
N. Akchurin,
B. Akgul,
B. Akgun,
R. O. Akpinar,
E. Aktas,
A. AlKadhim,
V. Alexakhin,
J. Alimena,
J. Alison,
A. Alpana,
W. Alshehri,
P. Alvarez Dominguez,
M. Alyari,
C. Amendola
, et al. (550 additional authors not shown)
Abstract:
A novel method to reconstruct the energy of hadronic showers in the CMS High Granularity Calorimeter (HGCAL) is presented. The HGCAL is a sampling calorimeter with very fine transverse and longitudinal granularity. The active media are silicon sensors and scintillator tiles readout by SiPMs and the absorbers are a combination of lead and Cu/CuW in the electromagnetic section, and steel in the hadr…
▽ More
A novel method to reconstruct the energy of hadronic showers in the CMS High Granularity Calorimeter (HGCAL) is presented. The HGCAL is a sampling calorimeter with very fine transverse and longitudinal granularity. The active media are silicon sensors and scintillator tiles readout by SiPMs and the absorbers are a combination of lead and Cu/CuW in the electromagnetic section, and steel in the hadronic section. The shower reconstruction method is based on graph neural networks and it makes use of a dynamic reduction network architecture. It is shown that the algorithm is able to capture and mitigate the main effects that normally hinder the reconstruction of hadronic showers using classical reconstruction methods, by compensating for fluctuations in the multiplicity, energy, and spatial distributions of the shower's constituents. The performance of the algorithm is evaluated using test beam data collected in 2018 prototype of the CMS HGCAL accompanied by a section of the CALICE AHCAL prototype. The capability of the method to mitigate the impact of energy leakage from the calorimeter is also demonstrated.
△ Less
Submitted 30 June, 2024; v1 submitted 17 June, 2024;
originally announced June 2024.
-
A Multivocal Review of MLOps Practices, Challenges and Open Issues
Authors:
Beyza Eken,
Samodha Pallewatta,
Nguyen Khoi Tran,
Ayse Tosun,
Muhammad Ali Babar
Abstract:
With the increasing trend of Machine Learning (ML) enabled software applications, the paradigm of ML Operations (MLOps) has gained tremendous attention of researchers and practitioners. MLOps encompasses the practices and technologies for streamlining the resources and monitoring needs of operationalizing ML models. Software development practitioners need access to the detailed and easily understa…
▽ More
With the increasing trend of Machine Learning (ML) enabled software applications, the paradigm of ML Operations (MLOps) has gained tremendous attention of researchers and practitioners. MLOps encompasses the practices and technologies for streamlining the resources and monitoring needs of operationalizing ML models. Software development practitioners need access to the detailed and easily understandable knowledge of MLOps workflows, practices, challenges and solutions to effectively and efficiently support the adoption of MLOps. Whilst the academic and industry literature on the MLOps has been growing rapidly, there have been relatively a few attempts at systematically synthesizing and analyzing the vast amount of existing literature of MLOps for improving ease of access and understanding. We conducted a Multivocal Literature Review (MLR) of 150 relevant academic studies and 48 gray literature to provide a comprehensive body of knowledge on MLOps. Through this MLR, we identified the emerging MLOps practices, adoption challenges and solutions related to various areas, including development and operation of complex pipelines, managing production at scale, managing artifacts, and ensuring quality, security, governance, and ethical aspects. We also report the socio-technical aspect of MLOps relating to diverse roles involved and collaboration practices across them through the MLOps lifecycle. We assert that this MLR provides valuable insights to researchers and practitioners seeking to navigate the rapidly evolving landscape of MLOps. We also identify the open issues that need to be addressed in order to advance the current state-of-the-art of MLOps.
△ Less
Submitted 14 June, 2024;
originally announced June 2024.
-
LUCID: A Framework for Reducing False Positives and Inconsistencies Among Container Scanning Tools
Authors:
Md Sadun Haq,
Ali Saman Tosun,
Turgay Korkmaz
Abstract:
Containerization has emerged as a revolutionary technology in the software development and deployment industry. Containers offer a portable and lightweight solution that allows for packaging applications and their dependencies systematically and efficiently. In addition, containers offer faster deployment and near-native performance with isolation and security drawbacks compared to Virtual Machine…
▽ More
Containerization has emerged as a revolutionary technology in the software development and deployment industry. Containers offer a portable and lightweight solution that allows for packaging applications and their dependencies systematically and efficiently. In addition, containers offer faster deployment and near-native performance with isolation and security drawbacks compared to Virtual Machines. To address the security issues, scanning tools that scan containers for preexisting vulnerabilities have been developed, but they suffer from false positives. Moreover, using different scanning tools to scan the same container provides different results, which leads to inconsistencies and confusion. Limited work has been done to address these issues. This paper provides a fully functional and extensible framework named LUCID that can reduce false positives and inconsistencies provided by multiple scanning tools. We use a database-centric approach and perform query-based analysis, to pinpoint the causes for inconsistencies. Our results show that our framework can reduce inconsistencies by 70%. The framework has been tested on both Intel64/AMD64 and ARM architecture. We also create a Dynamic Classification component that can successfully classify and predict the different severity levels with an accuracy of 84%. We believe this paper will raise awareness regarding security in container technologies and enable container scanning companies to improve their tool to provide better and more consistent results.
△ Less
Submitted 11 May, 2024;
originally announced May 2024.
-
The Patch Topology in Univalent Foundations
Authors:
Igor Arrieta,
Martín Hötzel Escardó,
Ayberk Tosun
Abstract:
Stone locales together with continuous maps form a coreflective subcategory of spectral locales and perfect maps. A proof in the internal language of an elementary topos was previously given by the second-named author. This proof can be easily translated to univalent type theory using resizing axioms. In this work, we show how to achieve such a translation without resizing axioms, by working with…
▽ More
Stone locales together with continuous maps form a coreflective subcategory of spectral locales and perfect maps. A proof in the internal language of an elementary topos was previously given by the second-named author. This proof can be easily translated to univalent type theory using resizing axioms. In this work, we show how to achieve such a translation without resizing axioms, by working with large and locally small frames with small bases. This requires predicative reformulations of several fundamental concepts of locale theory in predicative HoTT/UF, which we investigate systematically.
△ Less
Submitted 2 May, 2024; v1 submitted 5 February, 2024;
originally announced February 2024.
-
Analyzing the concept of technical debt in the context of agile software development: A systematic literature review
Authors:
Woubshet Nema Behutiye,
Pilar Rodriguez,
Markku Oivo,
Ayse Tosun
Abstract:
Technical debt (TD) is a metaphor that is used to communicate the consequences of poor software development practices to non-technical stakeholders. In recent years, it has gained significant attention in agile software development (ASD). The purpose of this study is to analyze and synthesize the state of the art of TD, and its causes, consequences, and management strategies in the context of ASD.…
▽ More
Technical debt (TD) is a metaphor that is used to communicate the consequences of poor software development practices to non-technical stakeholders. In recent years, it has gained significant attention in agile software development (ASD). The purpose of this study is to analyze and synthesize the state of the art of TD, and its causes, consequences, and management strategies in the context of ASD. Using a systematic literature review (SLR), 38 primary studies, out of 346 studies, were identified and analyzed. We found five research areas of interest related to the literature of TD in ASD. Among those areas, managing TD in ASD received the highest attention, followed by architecture in ASD and its relationship with TD. In addition, eight categories regarding the causes and five categories regarding the consequences of incurring TD in ASD were identified. Focus on quick delivery and architectural and design issues were the most popular causes of incurring TD in ASD. Reduced productivity, system degradation and increased maintenance cost were identified as significant consequences of incurring TD in ASD. Additionally, we found 12 strategies for managing TD in the context of ASD, out of which refactoring and enhancing the visibility of TD were the most significant. The results of this study provide a structured synthesis of TD and its management in the context of ASD as well as potential research areas for further investigation.
△ Less
Submitted 26 January, 2024;
originally announced January 2024.
-
Study of time and energy resolution of an ultra-compact sampling calorimeter (RADiCAL) module at EM shower maximum over the energy range 25 GeV $\leq$ E $\leq$ 150 GeV
Authors:
Carlos Perez-Lara,
James Wetzel,
Ugur Akgun,
Thomas Anderson,
Thomas Barbera,
Dylan Blend,
Kerem Cankocak,
Salim Cerci,
Nehal Chigurupati,
Bradley Cox,
Paul Debbins,
Max Dubnowski,
Buse Duran,
Gizem Gul Dincer,
Selbi Hatipoglu,
Ilknur Hos,
Bora Isildak,
Colin Jessop,
Ohannes Kamer Koseyan,
Ayben Karasu Uysal,
Reyhan Kurt,
Berkan Kaynak,
Alexander Ledovskoy,
Alexi Mestvirishvili,
Yasar Onel
, et al. (14 additional authors not shown)
Abstract:
The RADiCAL Collaboration is conducting R\&D on high performance electromagnetic (EM) calorimetry to address the challenges expected in future collider experiments under conditions of high luminosity and/or high irradiation (FCC-ee, FCC-hh and fixed target and forward physics environments). Under development is a sampling calorimeter approach, known as RADiCAL modules, based on scintillation and w…
▽ More
The RADiCAL Collaboration is conducting R\&D on high performance electromagnetic (EM) calorimetry to address the challenges expected in future collider experiments under conditions of high luminosity and/or high irradiation (FCC-ee, FCC-hh and fixed target and forward physics environments). Under development is a sampling calorimeter approach, known as RADiCAL modules, based on scintillation and wavelength-shifting (WLS) technologies and photosensor, including SiPM and SiPM-like technology. The modules discussed herein consist of alternating layers of very dense (W) absorber and scintillating crystal (LYSO:Ce) plates, assembled to a depth of 25 $X_0$. The scintillation signals produced by the EM showers in the region of EM shower maximum (shower max) are transmitted to SiPM located at the upstream and downstream ends of the modules via quartz capillaries which penetrate the full length of the module. The capillaries contain DSB1 organic plastic WLS filaments positioned within the region of shower max, where the shower energy deposition is greatest, and fused with quartz rod elsewhere. The wavelength shifted light from this spatially-localized shower max region is then propagated to the photosensors. This paper presents the results of an initial measurement of the time resolution of a RADiCAL module over the energy range 25 GeV $\leq$ E $\leq$ 150 GeV using the H2 electron beam at CERN. The data indicate an energy dependence of the time resolution that follows the functional form: $σ_{t} = a/\sqrt{E} \oplus b$, where a = 256 $\sqrt{GeV}$~ps and b = 17.5 ps. The time resolution measured at the highest electron beam energy for which data was currently recorded (150 GeV) was found to be $σ_{t}$ = 27 ps.
△ Less
Submitted 3 January, 2024;
originally announced January 2024.
-
Integration of Digital Twin and Federated Learning for Securing Vehicular Internet of Things
Authors:
Deepti Gupta,
Shafika Showkat Moni,
Ali Saman Tosun
Abstract:
In the present era of advanced technology, the Internet of Things (IoT) plays a crucial role in enabling smart connected environments. This includes various domains such as smart homes, smart healthcare, smart cities, smart vehicles, and many others.With ubiquitous smart connected devices and systems, a large amount of data associated with them is at a prime risk from malicious entities (e.g., use…
▽ More
In the present era of advanced technology, the Internet of Things (IoT) plays a crucial role in enabling smart connected environments. This includes various domains such as smart homes, smart healthcare, smart cities, smart vehicles, and many others.With ubiquitous smart connected devices and systems, a large amount of data associated with them is at a prime risk from malicious entities (e.g., users, devices, applications) in these systems. Innovative technologies, including cloud computing, Machine Learning (ML), and data analytics, support the development of anomaly detection models for the Vehicular Internet of Things (V-IoT), which encompasses collaborative automatic driving and enhanced transportation systems. However, traditional centralized anomaly detection models fail to provide better services for connected vehicles due to issues such as high latency, privacy leakage, performance overhead, and model drift. Recently, Federated Learning (FL) has gained significant recognition for its ability to address data privacy concerns in the IoT domain. Digital Twin (DT), proves beneficial in addressing uncertain crises and data security issues by creating a virtual replica that simulates various factors, including traffic trajectories, city policies, and vehicle utilization. However, the effectiveness of a V-IoT DT system heavily relies on the collection of long-term and high-quality data to make appropriate decisions. This paper introduces a Hierarchical Federated Learning (HFL) based anomaly detection model for V-IoT, aiming to enhance the accuracy of the model. Our proposed model integrates both DT and HFL approaches to create a comprehensive system for detecting malicious activities using an anomaly detection model. Additionally, real-world V-IoT use case scenarios are presented to demonstrate the application of the proposed model.
△ Less
Submitted 25 July, 2023;
originally announced July 2023.
-
Large eddy simulation of a low-pressure turbine cascade with turbulent end wall boundary layers
Authors:
Christian Morsbach,
Michael Bergmann,
Adem Tosun,
Bjoern F. Klose,
Edmund Kügeler,
Matthias Franke
Abstract:
We present results of implicit large eddy simulation (LES) and different Reynolds-averaged Navier-Stokes (RANS) models of the MTU 161 low pressure turbine at an exit Reynolds number of 90,000 and exit Mach number of 0.6. The LES results are based on a high order discontinuous Galerkin method and the RANS is computed using a classical finite-volume approach. The paper discusses the steps taken to c…
▽ More
We present results of implicit large eddy simulation (LES) and different Reynolds-averaged Navier-Stokes (RANS) models of the MTU 161 low pressure turbine at an exit Reynolds number of 90,000 and exit Mach number of 0.6. The LES results are based on a high order discontinuous Galerkin method and the RANS is computed using a classical finite-volume approach. The paper discusses the steps taken to create realistic inflow boundary conditions in terms of end wall boundary layer thickness and free stream turbulence intensity. This is achieved by tailoring the input distribution of total pressure and temperature, Reynolds stresses and turbulent length scale to a Fourier series based synthetic turbulence generator. With this procedure, excellent agreement with the experiment can be achieved in terms of blade loading at midspan and wake total pressure losses at midspan and over the channel height. Based on the validated setup, we focus on the discussion of secondary flow structures emerging due to the interaction of the incoming boundary layer and the turbine blade and compare the LES to two commonly used RANS models. Since we are able to create consistent setups for both LES and RANS, all discrepancies can be directly attributed to physical modelling problems. We show that both a linear eddy viscosity model and a differential Reynolds stress model coupled with a state-of-the-art correlation-based transition model fail, in this case, to predict the separation induced transition process around midspan. Moreover, their prediction of secondary flow losses leaves room for improvement as shown by a detailed discussion turbulence kinetic energy and anisotropy fields.
△ Less
Submitted 2 May, 2023;
originally announced May 2023.
-
Patch Locale of a Spectral Locale in Univalent Type Theory
Authors:
Ayberk Tosun,
Martín Hötzel Escardó
Abstract:
Stone locales together with continuous maps form a coreflective subcategory of spectral locales and perfect maps. A proof in the internal language of an elementary topos was previously given by the second-named author. This proof can be easily translated to univalent type theory using resizing axioms. In this work, we show how to achieve such a translation without resizing axioms, by working with…
▽ More
Stone locales together with continuous maps form a coreflective subcategory of spectral locales and perfect maps. A proof in the internal language of an elementary topos was previously given by the second-named author. This proof can be easily translated to univalent type theory using resizing axioms. In this work, we show how to achieve such a translation without resizing axioms, by working with large, locally small, and small complete frames with small bases. This turns out to be nontrivial and involves predicative reformulations of several fundamental concepts of locale theory.
△ Less
Submitted 20 February, 2023; v1 submitted 11 January, 2023;
originally announced January 2023.
-
Large eddy simulation of a low pressure turbine cascade with turbulent end wall boundary layers
Authors:
Christian Morsbach,
Michael Bergmann,
Adem Tosun,
Edmund Kügeler,
Matthias Franke
Abstract:
We present first results of an implicit large eddy simulation of the MTU T161 low pressure turbine at a Reynolds number of 90,000 and Mach number of 0.6, both based on isentropic exit conditions, using a high order discontinuous Galerkin method. The aim is to validate the numerical setup with respect to available experimental data. We discuss the steps taken to create realistic inflow boundary con…
▽ More
We present first results of an implicit large eddy simulation of the MTU T161 low pressure turbine at a Reynolds number of 90,000 and Mach number of 0.6, both based on isentropic exit conditions, using a high order discontinuous Galerkin method. The aim is to validate the numerical setup with respect to available experimental data. We discuss the steps taken to create realistic inflow boundary conditions in terms of end wall boundary layer thickness and free stream turbulence intensity. This is achieved by tailoring the input distribution of Reynolds stresses and turbulent length scale to a Fourier series based synthetic turbulence generator. Both blade loading and total pressure losses at midspan show excellent agreement with the measurements. Following a short discussion of the secondary flow structures emerging due to the interaction of the incoming boundary layer and the turbine blade, we show that this simulation is also able to reproduce loss distribution behind the blade over the whole channel height.
△ Less
Submitted 16 December, 2022;
originally announced December 2022.
-
Hierarchical Federated Learning based Anomaly Detection using Digital Twins for Smart Healthcare
Authors:
Deepti Gupta,
Olumide Kayode,
Smriti Bhatt,
Maanak Gupta,
Ali Saman Tosun
Abstract:
Internet of Medical Things (IoMT) is becoming ubiquitous with a proliferation of smart medical devices and applications used in smart hospitals, smart-home based care, and nursing homes. It utilizes smart medical devices and cloud computing services along with core Internet of Things (IoT) technologies to sense patients' vital body parameters, monitor health conditions and generate multivariate da…
▽ More
Internet of Medical Things (IoMT) is becoming ubiquitous with a proliferation of smart medical devices and applications used in smart hospitals, smart-home based care, and nursing homes. It utilizes smart medical devices and cloud computing services along with core Internet of Things (IoT) technologies to sense patients' vital body parameters, monitor health conditions and generate multivariate data to support just-in-time health services. Mostly, this large amount of data is analyzed in centralized servers. Anomaly Detection (AD) in a centralized healthcare ecosystem is often plagued by significant delays in response time with high performance overhead. Moreover, there are inherent privacy issues associated with sending patients' personal health data to a centralized server, which may also introduce several security threats to the AD model, such as possibility of data poisoning. To overcome these issues with centralized AD models, here we propose a Federated Learning (FL) based AD model which utilizes edge cloudlets to run AD models locally without sharing patients' data. Since existing FL approaches perform aggregation on a single server which restricts the scope of FL, in this paper, we introduce a hierarchical FL that allows aggregation at different levels enabling multi-party collaboration. We introduce a novel disease-based grou** mechanism where different AD models are grouped based on specific types of diseases. Furthermore, we develop a new Federated Time Distributed (FedTimeDis) Long Short-Term Memory (LSTM) approach to train the AD model. We present a Remote Patient Monitoring (RPM) use case to demonstrate our model, and illustrate a proof-of-concept implementation using Digital Twin (DT) and edge cloudlets.
△ Less
Submitted 25 November, 2021; v1 submitted 23 November, 2021;
originally announced November 2021.
-
Detecting Anomalous User Behavior in Remote Patient Monitoring
Authors:
Deepti Gupta,
Maanak Gupta,
Smriti Bhatt,
Ali Saman Tosun
Abstract:
The growth in Remote Patient Monitoring (RPM) services using wearable and non-wearable Internet of Medical Things (IoMT) promises to improve the quality of diagnosis and facilitate timely treatment for a gamut of medical conditions. At the same time, the proliferation of IoMT devices increases the potential for malicious activities that can lead to catastrophic results including theft of personal…
▽ More
The growth in Remote Patient Monitoring (RPM) services using wearable and non-wearable Internet of Medical Things (IoMT) promises to improve the quality of diagnosis and facilitate timely treatment for a gamut of medical conditions. At the same time, the proliferation of IoMT devices increases the potential for malicious activities that can lead to catastrophic results including theft of personal information, data breach, and compromised medical devices, putting human lives at risk. IoMT devices generate tremendous amount of data that reflect user behavior patterns including both personal and day-to-day social activities along with daily routine health monitoring. In this context, there are possibilities of anomalies generated due to various reasons including unexpected user behavior, faulty sensor, or abnormal values from malicious/compromised devices. To address this problem, there is an imminent need to develop a framework for securing the smart health care infrastructure to identify and mitigate anomalies. In this paper, we present an anomaly detection model for RPM utilizing IoMT and smart home devices. We propose Hidden Markov Model (HMM) based anomaly detection that analyzes normal user behavior in the context of RPM comprising both smart home and smart health devices, and identifies anomalous user behavior. We design a testbed with multiple IoMT devices and home sensors to collect data and use the HMM model to train using network and user behavioral data. Proposed HMM based anomaly detection model achieved over 98% accuracy in identifying the anomalies in the context of RPM.
△ Less
Submitted 22 June, 2021;
originally announced June 2021.
-
A Deep Reinforcement Learning Approach for the Meal Delivery Problem
Authors:
Hadi Jahanshahi,
Aysun Bozanta,
Mucahit Cevik,
Eray Mert Kavuk,
Ayşe Tosun,
Sibel B. Sonuc,
Bilgin Kosucu,
Ayşe Başar
Abstract:
We consider a meal delivery service fulfilling dynamic customer requests given a set of couriers over the course of a day. A courier's duty is to pick-up an order from a restaurant and deliver it to a customer. We model this service as a Markov decision process and use deep reinforcement learning as the solution approach. We experiment with the resulting policies on synthetic and real-world datase…
▽ More
We consider a meal delivery service fulfilling dynamic customer requests given a set of couriers over the course of a day. A courier's duty is to pick-up an order from a restaurant and deliver it to a customer. We model this service as a Markov decision process and use deep reinforcement learning as the solution approach. We experiment with the resulting policies on synthetic and real-world datasets and compare those with the baseline policies. We also examine the courier utilization for different numbers of couriers. In our analysis, we specifically focus on the impact of the limited available resources in the meal delivery problem. Furthermore, we investigate the effect of intelligent order rejection and re-positioning of the couriers. Our numerical experiments show that, by incorporating the geographical locations of the restaurants, customers, and the depot, our model significantly improves the overall service quality as characterized by the expected total reward and the delivery times. Our results present valuable insights on both the courier assignment process and the optimal number of couriers for different order frequencies on a given day. The proposed model also shows a robust performance under a variety of scenarios for real-world implementation.
△ Less
Submitted 23 February, 2022; v1 submitted 24 April, 2021;
originally announced April 2021.
-
Hybrid SDN Evolution: A Comprehensive Survey of the State-of-the-Art
Authors:
Sajad Khorsandroo,
Adrian Gallego Sanchez,
Ali Saman Tosun,
Jose' Manuel Arco Rodriguez,
Roberto Doriguzzi-Corin
Abstract:
Software-Defined Networking (SDN) is an evolutionary networking paradigm which has been adopted by large network and cloud providers, among which are Tech Giants. However, embracing a new and futuristic paradigm as an alternative to well-established and mature legacy networking paradigm requires a lot of time along with considerable financial resources and technical expertise. Consequently, many e…
▽ More
Software-Defined Networking (SDN) is an evolutionary networking paradigm which has been adopted by large network and cloud providers, among which are Tech Giants. However, embracing a new and futuristic paradigm as an alternative to well-established and mature legacy networking paradigm requires a lot of time along with considerable financial resources and technical expertise. Consequently, many enterprises can not afford it. A compromise solution then is a hybrid networking environment (a.k.a. Hybrid SDN (hSDN)) in which SDN functionalities are leveraged while existing traditional network infrastructures are acknowledged. Recently, hSDN has been seen as a viable networking solution for a diverse range of businesses and organizations. Accordingly, the body of literature on hSDN research has improved remarkably. On this account, we present this paper as a comprehensive state-of-the-art survey which expands upon hSDN from many different perspectives.
△ Less
Submitted 30 March, 2021;
originally announced March 2021.
-
Game Theory Based Privacy Preserving Approach for Collaborative Deep Learning in IoT
Authors:
Deepti Gupta,
Smriti Bhatt,
Paras Bhatt,
Maanak Gupta,
Ali Saman Tosun
Abstract:
The exponential growth of Internet of Things (IoT) has become a transcending force in creating innovative smart devices and connected domains including smart homes, healthcare, transportation and manufacturing. With billions of IoT devices, there is a huge amount of data continuously being generated, transmitted, and stored at various points in the IoT architecture. Deep learning is widely being u…
▽ More
The exponential growth of Internet of Things (IoT) has become a transcending force in creating innovative smart devices and connected domains including smart homes, healthcare, transportation and manufacturing. With billions of IoT devices, there is a huge amount of data continuously being generated, transmitted, and stored at various points in the IoT architecture. Deep learning is widely being used in IoT applications to extract useful insights from IoT data. However, IoT users have security and privacy concerns and prefer not to share their personal data with third party applications or stakeholders. In order to address user privacy concerns, Collaborative Deep Learning (CDL) has been largely employed in data-driven applications which enables multiple IoT devices to train their models locally on edge gateways. In this chapter, we first discuss different types of deep learning approaches and how these approaches can be employed in the IoT domain. We present a privacy-preserving collaborative deep learning approach for IoT devices which can achieve benefits from other devices in the system. This learning approach is analyzed from the behavioral perspective of mobile edge devices using a game-theoretic model. We analyze the Nash Equilibrium in N-player static game model. We further present a novel fair collaboration strategy among edge IoT devices using cluster based approach to solve the CDL game, which enforces mobile edge devices for cooperation. We also present implementation details and evaluation analysis in a real-world smart home deployment.
△ Less
Submitted 3 April, 2021; v1 submitted 28 March, 2021;
originally announced March 2021.
-
A Family of Experiments on Test-Driven Development
Authors:
Adrian Santos,
Sira Vegas,
Oscar Dieste,
Fernando Uyaguari,
Aysee Tosun,
Davide Fucci,
Burak Turhan,
Giuseppe Scanniello,
Simone Romano,
Itir Karac,
Marco Kuhrmann,
Vladimir Mandic,
Robert Ramac,
Dietmar Pfahl,
Christian Engblom,
Jarno Kyykka,
Kerli Rungi,
Carolina Palomeque,
Jaroslav Spisak,
Markku Oivo,
Natalia Juristo
Abstract:
Context: Test-driven development (TDD) is an agile software development approach that has been widely claimed to improve software quality. However, the extent to which TDD improves quality appears to be largely dependent upon the characteristics of the study in which it is evaluated (e.g., the research method, participant type, programming environment, etc.). The particularities of each study make…
▽ More
Context: Test-driven development (TDD) is an agile software development approach that has been widely claimed to improve software quality. However, the extent to which TDD improves quality appears to be largely dependent upon the characteristics of the study in which it is evaluated (e.g., the research method, participant type, programming environment, etc.). The particularities of each study make the aggregation of results untenable. Objectives: The goal of this paper is to: increase the accuracy and generalizability of the results achieved in isolated experiments on TDD, provide joint conclusions on the performance of TDD across different industrial and academic settings, and assess the extent to which the characteristics of the experiments affect the quality-related performance of TDD. Method: We conduct a family of 12 experiments on TDD in academia and industry. We aggregate their results by means of meta-analysis. We perform exploratory analyses to identify variables impacting the quality-related performance of TDD. Results: TDD novices achieve a slightly higher code quality with iterative test-last development (i.e., ITL, the reverse approach of TDD) than with TDD. The task being developed largely determines quality. The programming environment, the order in which TDD and ITL are applied, or the learning effects from one development approach to another do not appear to affect quality. The quality-related performance of professionals using TDD drops more than for students. We hypothesize that this may be due to their being more resistant to change and potentially less motivated than students. Conclusion: Previous studies seem to provide conflicting results on TDD performance (i.e., positive vs. negative, respectively). We hypothesize that these conflicting results may be due to different study durations, experiment participants being unfamiliar with the TDD process...
△ Less
Submitted 24 November, 2020;
originally announced November 2020.
-
Learner's Dilemma: IoT Devices Training Strategies in Collaborative Deep Learning
Authors:
Deepti Gupta,
Olumide Kayode,
Smriti Bhatt,
Maanak Gupta,
Ali Saman Tosun
Abstract:
With the growth of Internet of Things (IoT) and mo-bile edge computing, billions of smart devices are interconnected to develop applications used in various domains including smart homes, healthcare and smart manufacturing. Deep learning has been extensively utilized in various IoT applications which require huge amount of data for model training. Due to privacy requirements, smart IoT devices do…
▽ More
With the growth of Internet of Things (IoT) and mo-bile edge computing, billions of smart devices are interconnected to develop applications used in various domains including smart homes, healthcare and smart manufacturing. Deep learning has been extensively utilized in various IoT applications which require huge amount of data for model training. Due to privacy requirements, smart IoT devices do not release data to a remote third party for their use. To overcome this problem, collaborative approach to deep learning, also known as Collaborative DeepLearning (CDL) has been largely employed in data-driven applications. This approach enables multiple edge IoT devices to train their models locally on mobile edge devices. In this paper,we address IoT device training problem in CDL by analyzing the behavior of mobile edge devices using a game-theoretic model,where each mobile edge device aims at maximizing the accuracy of its local model at the same time limiting the overhead of participating in CDL. We analyze the Nash Equilibrium in anN-player static game model. We further present a novel cluster-based fair strategy to approximately solve the CDL game to enforce mobile edge devices for cooperation. Our experimental results and evaluation analysis in a real-world smart home deployment show that 80% mobile edge devices are ready to cooperate in CDL, while 20% of them do not train their local models collaboratively.
△ Less
Submitted 29 July, 2020;
originally announced July 2020.
-
Future Smart Connected Communities to Fight COVID-19 Outbreak
Authors:
Deepti Gupta,
Smriti Bhatt,
Maanak Gupta,
Ali Saman Tosun
Abstract:
Internet of Things (IoT) has grown rapidly in the last decade and continue to develop in terms of dimension and complexity offering wide range of devices to support diverse set of applications. With ubiquitous Internet, connected sensors and actuators, networking and communication technology, and artificial intelligence (AI), smart cyber-physical systems (CPS) provide services rendering assistance…
▽ More
Internet of Things (IoT) has grown rapidly in the last decade and continue to develop in terms of dimension and complexity offering wide range of devices to support diverse set of applications. With ubiquitous Internet, connected sensors and actuators, networking and communication technology, and artificial intelligence (AI), smart cyber-physical systems (CPS) provide services rendering assistance to humans in their daily lives. However, the recent outbreak of COVID-19 (also known as coronavirus) pandemic has exposed and highlighted the limitations of current technological deployments to curtail this disease. IoT and smart connected technologies together with data-driven applications can play a crucial role not only in prevention, continuous monitoring, and mitigation of the disease, but also enable prompt enforcement of guidelines, rules and government orders to contain such future outbreaks. In this paper, we envision an IoT-enabled ecosystem for intelligent monitoring, pro-active prevention and control, and mitigation of COVID-19. We propose different architectures, applications and technology systems for various smart infrastructures including E-health, smart home, smart supply chain management, smart locality, and smart city, to develop future connected communities to manage and mitigate similar outbreaks. Furthermore, we present research challenges together with future directions to enable and develop these smart communities and infrastructures to fight and prepare against such outbreaks.
△ Less
Submitted 26 November, 2020; v1 submitted 20 July, 2020;
originally announced July 2020.