-
NNLL-fast 2.0: Coloured Sparticle Production at the LHC Run 3 with $\sqrt{S}$ = 13.6 TeV
Authors:
Wim Beenakker,
Christoph Borschensky,
Michael Krämer,
Anna Kulesza,
Eric Laenen,
Judita Mamužić,
Laura Moreno Valero
Abstract:
We report on updated precision predictions for total cross sections of coloured supersymmetric particle production at the LHC with a centre-of-mass energy of $\sqrt S$ = 13.6 TeV, computed with the modern PDF4LHC21 set. The cross sections are calculated at an approximated NNLO accuracy in QCD and contain corrections from the threshold resummation of soft-gluon emission up to NNLL accuracy as well…
▽ More
We report on updated precision predictions for total cross sections of coloured supersymmetric particle production at the LHC with a centre-of-mass energy of $\sqrt S$ = 13.6 TeV, computed with the modern PDF4LHC21 set. The cross sections are calculated at an approximated NNLO accuracy in QCD and contain corrections from the threshold resummation of soft-gluon emission up to NNLL accuracy as well as Coulomb-gluon contributions including bound-state terms. The corrections are found to increase the cross sections and reduce the theoretical uncertainty as compared to the best available fixed-order calculations. These predictions constitute the state-of-the-art calculations and update the existing results for $\sqrt S$ = 13 TeV. We make our new results publicly available in the version 2.0 update to the code package NNLL-fast.
△ Less
Submitted 29 April, 2024;
originally announced April 2024.
-
Temporal genomics help in deciphering neutral and adaptive patterns in the contemporary evolution of kelp populations
Authors:
Lauric Reynes,
Louise Fouqueau,
D. Aurelle,
Stéphane Mauger,
Christophe Destombe,
Myriam Valero
Abstract:
The impact of climate change on populations will be contingent upon their contemporary adaptive evolution. In this study, we investigated the contemporary evolution of four populations of the cold-water kelp Laminaria digitata by analysing their spatial and temporal genomic variation using ddRAD-sequencing. These populations were sampled from the center to the southern margin of its north-eastern…
▽ More
The impact of climate change on populations will be contingent upon their contemporary adaptive evolution. In this study, we investigated the contemporary evolution of four populations of the cold-water kelp Laminaria digitata by analysing their spatial and temporal genomic variation using ddRAD-sequencing. These populations were sampled from the center to the southern margin of its north-eastern Atlantic distribution at two-time points, spanning at least two generations. Through genome scans for local adaptation at a single time point, we identified candidate loci that showed clinal variation correlated with changes in sea surface temperature (SST) along latitudinal gradients. This finding suggests that SST may drive the adaptive response of these kelp populations, although factors such as species' demographic history should also be considered. Additionally, we performed a simulation approach to distinguish the effect of selection from genetic drift in allele frequency changes over time. This enabled the detection of loci in the southernmost population that exhibited temporal differentiation beyond what would be expected from genetic drift alone: these are candidate loci which could have evolved under selection over time. In contrast, we did not detect any outlier locus based on temporal differentiation in the population from the North Sea, which also displayed low and decreasing levels of genetic diversity. The diverse evolutionary scenarios observed among populations can be attributed to variations in the prevalence of selection relative to genetic drift across different environments. Therefore, our study highlights the potential of temporal genomics to offer valuable insights into the contemporary evolution of marine foundation species facing climate change.
△ Less
Submitted 22 April, 2024;
originally announced April 2024.
-
Combining oligo pools and Golden Gate cloning to create protein variant libraries or guide RNA libraries for CRISPR applications
Authors:
Alicia Maciá Valero,
Rianne C. Prins,
Thijs de Vroet,
Sonja Billerbeck
Abstract:
Oligo pools are array-synthesized, user-defined mixtures of single-stranded oligonucleotides that can be used as a source of synthetic DNA for library cloning. While currently offering the most affordable source of synthetic DNA, oligo pools also come with limitations such as a maximum synthesis length (approximately 350 bases), a higher error rate compared to alternative synthesis methods, and th…
▽ More
Oligo pools are array-synthesized, user-defined mixtures of single-stranded oligonucleotides that can be used as a source of synthetic DNA for library cloning. While currently offering the most affordable source of synthetic DNA, oligo pools also come with limitations such as a maximum synthesis length (approximately 350 bases), a higher error rate compared to alternative synthesis methods, and the presence of truncated molecules in the pool due to incomplete synthesis. Here, we provide users with a comprehensive protocol that details how oligo pools can be used in combination with Golden Gate cloning to create user-defined protein mutant libraries, as well as single guide RNA libraries for CRISPR applications. Our methods are optimized to work within the Yeast Toolkit Golden Gate scheme, but are in principle compatible with any other Golden Gate-based modular cloning toolkit and extendable to other restriction enzyme-based cloning methods beyond Golden Gate. Our methods yield high-quality, affordable, in-house variant libraries.
△ Less
Submitted 22 January, 2024;
originally announced January 2024.
-
A physics-infused Immersed Boundary Method using online sequential Data Assimilation
Authors:
Miguel M. Valero,
Marcello Meldi
Abstract:
A physics-infused strategy relying on the Ensemble Kalman Filter (EnKF) is here used to augment the accuracy of a continuous Immersed Boundary Method (IBM). The latter is a classical penalty method accounting for the presence of the immersed body via a volume source term which is included in the Navier-Stokes equations. The model coefficients of the penalization method, which are usually selected…
▽ More
A physics-infused strategy relying on the Ensemble Kalman Filter (EnKF) is here used to augment the accuracy of a continuous Immersed Boundary Method (IBM). The latter is a classical penalty method accounting for the presence of the immersed body via a volume source term which is included in the Navier-Stokes equations. The model coefficients of the penalization method, which are usually selected by the user, are optimized here using an EnKF data-driven strategy. The parametric inference is governed by the physical knowledge of local and global features of the flow, such as the no-slip condition and the shear stress at the wall. The C++ library CONES (Coupling OpenFOAM with Numerical EnvironmentS) developed by the team is used to perform an online investigation, coupling on-the-fly data from synthetic sensors with results from an ensemble of coarse-grained numerical simulations. The analysis is performed for a classical test case, namely the turbulent channel flow with $Re_τ= 550$. The comparison of the results with a high-fidelity Direct Numerical Simulation (DNS) shows that the data-driven procedure exhibits remarkable accuracy despite the relatively low grid resolution of the ensemble members.
△ Less
Submitted 13 October, 2023;
originally announced October 2023.
-
Augmented state estimation of urban settings using intrusive sequential Data Assimilation
Authors:
Lucas Villanueva,
Miguel Martinez Valero,
Anina Sarkic Glumac,
Marcello Meldi
Abstract:
A data-driven investigation of the flow around a high-rise building is performed combining heterogeneous experimental samples and RANS CFD. The coupling is performed using techniques based on the Ensemble Kalman Filter (EnKF), including advanced manipulations such as localization and inflation. The augmented state estimation obtained via EnKF has also been employed to improve the predictive featur…
▽ More
A data-driven investigation of the flow around a high-rise building is performed combining heterogeneous experimental samples and RANS CFD. The coupling is performed using techniques based on the Ensemble Kalman Filter (EnKF), including advanced manipulations such as localization and inflation. The augmented state estimation obtained via EnKF has also been employed to improve the predictive features of the model via an optimization of the five free global model constant of the $\mathcal{K}-\varepsilon$ turbulence model used to close the equations. The optimized values are very far from the classical values prescribed as general recommendations and implemented in codes, but also different from other data-driven analyses reported in the literature. The results obtained with this new optimized parametric description show a global improvement for both the velocity field and the pressure field. In addition, some topological improvement for the flow organization are observed downstream, far from the location of the sensors.
△ Less
Submitted 26 January, 2023;
originally announced January 2023.
-
The ECFA Early Career Researcher's Panel: composition, structure, and activities, 2021 -- 2022
Authors:
ECFA Early-Career Researcher Panel,
:,
Andrei Alexandru Geanta,
Chiara Amendola,
Liliana Apolinario,
Jan-Hendrik Arling,
Adi Ashkenazi,
Kamil Augsten,
Emanuele Bagnaschi,
Evelin Bakos,
Liron Barak,
Diogo Bastos,
Giovanni Benato,
Bugra Bilin,
Neven Blaskovic Kraljevic,
Lydia Brenner,
Francesco Brizioli,
Antoine Camper,
Alessandra Camplani,
Xabier Cid Vidal,
Hüseyin Dag,
Flavia de Almeida Dias,
Jordy Degens,
Eleonora Diociaiuti,
Laurent Dufour
, et al. (52 additional authors not shown)
Abstract:
The European Committee for Future Accelerators (ECFA) Early Career Researcher's (ECR) panel, which represents the interests of the ECR community to ECFA, officially began its activities in January 2021. In the first two years, the panel has defined its own internal structure, responded to ECFA requests for feedback, and launched its own initiatives to better understand and support the diverse inte…
▽ More
The European Committee for Future Accelerators (ECFA) Early Career Researcher's (ECR) panel, which represents the interests of the ECR community to ECFA, officially began its activities in January 2021. In the first two years, the panel has defined its own internal structure, responded to ECFA requests for feedback, and launched its own initiatives to better understand and support the diverse interests of early career researchers. This report summarises the panel composition and structure, as well as the different activities the panel has been involved with during the first two years of its existence.
△ Less
Submitted 20 December, 2022;
originally announced December 2022.
-
Threshold resummation for the production of four top quarks at the LHC
Authors:
Melissa van Beekveld,
Anna Kulesza,
Laura Moreno Valero
Abstract:
We compute the total cross section for $t\bar{t}t\bar{t}$ production at next-to-leading logarithmic (NLL$^{\prime}$) accuracy. This is the first time resummation is performed for a hadron-collider process with four colored particles in the final state. The calculation is matched to the next-to-leading order strong and electroweak corrections. The NLL$^{\prime}$ corrections enhance the total produc…
▽ More
We compute the total cross section for $t\bar{t}t\bar{t}$ production at next-to-leading logarithmic (NLL$^{\prime}$) accuracy. This is the first time resummation is performed for a hadron-collider process with four colored particles in the final state. The calculation is matched to the next-to-leading order strong and electroweak corrections. The NLL$^{\prime}$ corrections enhance the total production rate by 15\%. The size of the theoretical error due to scale variation is reduced by more than a factor of two, bringing the theoretical error significantly below the current experimental uncertainty of the measurement.
△ Less
Submitted 6 December, 2022;
originally announced December 2022.
-
A Security and Trust Framework for Decentralized 5G Marketplaces
Authors:
José María Jorquera Valero,
Manuel Gil Pérez,
Gregorio Martínez Pérez
Abstract:
5G networks intend to cover user demands through multi-party collaborations in a secure and trustworthy manner. To this end, marketplaces play a pivotal role as enablers for network service consumers and infrastructure providers to offer, negotiate, and purchase 5G resources and services. Nevertheless, marketplaces often do not ensure trustworthy networking by analyzing the security and trust of t…
▽ More
5G networks intend to cover user demands through multi-party collaborations in a secure and trustworthy manner. To this end, marketplaces play a pivotal role as enablers for network service consumers and infrastructure providers to offer, negotiate, and purchase 5G resources and services. Nevertheless, marketplaces often do not ensure trustworthy networking by analyzing the security and trust of their members and offers. This paper presents a security and trust framework to enable the selection of reliable third-party providers based on their history and reputation. In addition, it also introduces a reward and punishment mechanism to continuously update trust scores according to security events. Finally, we showcase a real use case in which the security and trust framework is being applied.
△ Less
Submitted 20 October, 2022;
originally announced October 2022.
-
Trust-as-a-Service: A reputation-enabled trust framework for 5G networks
Authors:
José María Jorquera Valero,
Pedro Miguel Sánchez Sánchez,
Manuel Gil Pérez,
Alberto Huertas Celdrán,
Gregorio Martínez Pérez
Abstract:
Trust, security, and privacy are three of the major pillars to assemble the fifth generation network and beyond. Despite such pillars are principally interconnected, they arise a multitude of challenges to be addressed separately. 5G ought to offer flexible and pervasive computing capabilities across multiple domains according to user demands and assuring trustworthy network providers. Distributed…
▽ More
Trust, security, and privacy are three of the major pillars to assemble the fifth generation network and beyond. Despite such pillars are principally interconnected, they arise a multitude of challenges to be addressed separately. 5G ought to offer flexible and pervasive computing capabilities across multiple domains according to user demands and assuring trustworthy network providers. Distributed marketplaces expect to boost the trading of heterogeneous resources so as to enable the establishment of pervasive service chains between cross-domains. Nevertheless, the need for reliable parties as ``marketplace operators'' plays a pivotal role to achieving a trustworthy ecosystem. One of the principal blockages in managing foreseeable networks is the need of adapting previous trust models to accomplish the new network and business requirements. In this regard, this article is centered on trust management of 5G multi-party networks. The design of a reputation-based trust framework is proposed as a Trust-as-a-Service (TaaS) solution for any distributed multi-stakeholder environment where zero trust and zero-touch principles should be met. Besides, a literature review is also conducted to recognize the network and business requirements currently envisaged. Finally, the validation of the proposed trust framework is performed in a real research environment, the 5GBarcelona testbed, leveraging 12% of a 2.1GHz CPU with 20 cores and 2% of the 30GiB memory. In this regard, these outcomes reveal the feasibility of the TaaS solution in the context of determining reliable network operators.
△ Less
Submitted 20 October, 2022;
originally announced October 2022.
-
Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection
Authors:
Mohammad Masum,
Hossain Shahriar,
Hisham Haddad,
Md Jobair Hossain Faruk,
Maria Valero,
Md Abdullah Khan,
Mohammad A. Rahman,
Muhaiminul I. Adnan,
Alfredo Cuzzocrea
Abstract:
Traditional network intrusion detection approaches encounter feasibility and sustainability issues to combat modern, sophisticated, and unpredictable security attacks. Deep neural networks (DNN) have been successfully applied for intrusion detection problems. The optimal use of DNN-based classifiers requires careful tuning of the hyper-parameters. Manually tuning the hyperparameters is tedious, ti…
▽ More
Traditional network intrusion detection approaches encounter feasibility and sustainability issues to combat modern, sophisticated, and unpredictable security attacks. Deep neural networks (DNN) have been successfully applied for intrusion detection problems. The optimal use of DNN-based classifiers requires careful tuning of the hyper-parameters. Manually tuning the hyperparameters is tedious, time-consuming, and computationally expensive. Hence, there is a need for an automatic technique to find optimal hyperparameters for the best use of DNN in intrusion detection. This paper proposes a novel Bayesian optimization-based framework for the automatic optimization of hyperparameters, ensuring the best DNN architecture. We evaluated the performance of the proposed framework on NSL-KDD, a benchmark dataset for network intrusion detection. The experimental results show the framework's effectiveness as the resultant DNN architecture demonstrates significantly higher intrusion detection performance than the random search optimization-based approach in terms of accuracy, precision, recall, and f1-score.
△ Less
Submitted 7 July, 2022;
originally announced July 2022.
-
An Investigation on Non-Invasive Brain-Computer Interfaces: Emotiv Epoc+ Neuroheadset and Its Effectiveness
Authors:
Md Jobair Hossain Faruk,
Maria Valero,
Hossain Shahriar
Abstract:
In this study, we illustrate the progress of BCI research and present scores of unveiled contemporary approaches. First, we explore a decoding natural speech approach that is designed to decode human speech directly from the human brain onto a digital screen introduced by Facebook Reality Lab and University of California San Francisco. Then, we study a recently presented visionary project to contr…
▽ More
In this study, we illustrate the progress of BCI research and present scores of unveiled contemporary approaches. First, we explore a decoding natural speech approach that is designed to decode human speech directly from the human brain onto a digital screen introduced by Facebook Reality Lab and University of California San Francisco. Then, we study a recently presented visionary project to control the human brain using Brain-Machine Interfaces (BMI) approach. We also investigate well-known electroencephalography (EEG) based Emotiv Epoc+ Neuroheadset to identify six emotional parameters including engagement, excitement, focus, stress, relaxation, and interest using brain signals by experimenting the neuroheadset among three human subjects where we utilize two supervised learning classifiers, Naive Bayes and Linear Regression to show the accuracy and competency of the Epoc+ device and its associated applications in neurotechnological research. We present experimental studies and the demonstration indicates 69% and 62% improved accuracy for the aforementioned classifiers respectively in reading the performance matrices of the participants. We envision that non-invasive, insertable, and low-cost BCI approaches shall be the focal point for not only an alternative for patients with physical paralysis but also understanding the brain that would pave us to access and control the memories and brain somewhere very near.
△ Less
Submitted 24 June, 2022;
originally announced July 2022.
-
Blockchain-based Medical Image Sharing and Automated Critical-results Notification: A Novel Framework
Authors:
Jiyoun Randolph,
Md Jobair Hossain Faruk,
Hossain Shahriar,
Maria Valero,
Liang Zhao,
Nazmus Sakib,
Bilash Saha
Abstract:
In teleradiology, medical images are transmitted to offsite radiologists for interpretation and the dictation report is sent back to the original site to aid timely diagnosis and proper patient care. Although teleradiology offers great benefits including time and cost efficiency, after-hour coverages, and staffing shortage management, there are some technical and operational limitations to overcom…
▽ More
In teleradiology, medical images are transmitted to offsite radiologists for interpretation and the dictation report is sent back to the original site to aid timely diagnosis and proper patient care. Although teleradiology offers great benefits including time and cost efficiency, after-hour coverages, and staffing shortage management, there are some technical and operational limitations to overcome in reaching its full potential. We analyzed the current teleradiology workflow to identify inefficiencies. Image unavailability and delayed critical result communication stemmed from lack of system integration between teleradiology practice and healthcare institutions are among the most substantial factors causing prolonged turnaround time. In this paper, we propose a blockchain-based medical image sharing and automated critical-results notification platform to address the current limitation. We believe the proposed platform will enhance efficiency in workflow by eliminating the need for intermediaries and will benefit patients by eliminating the need for storing medical images in hard copies. While considerable progress was achieved, further research on governance and HIPAA compliance is required to optimize the adoption of the new application. Towards an idea to a working paradigm, we will implement the prototype during the next phase of our study.
△ Less
Submitted 7 July, 2022;
originally announced July 2022.
-
A Novel IoT-based Framework for Non-Invasive Human Hygiene Monitoring using Machine Learning Techniques
Authors:
Md Jobair Hossain Faruk,
Shashank Trivedi,
Mohammad Masum,
Maria Valero,
Hossain Shahriar,
Sheikh Iqbal Ahamed
Abstract:
People's personal hygiene habits speak volumes about the condition of taking care of their bodies and health in daily lifestyle. Maintaining good hygiene practices not only reduces the chances of contracting a disease but could also reduce the risk of spreading illness within the community. Given the current pandemic, daily habits such as washing hands or taking regular showers have taken primary…
▽ More
People's personal hygiene habits speak volumes about the condition of taking care of their bodies and health in daily lifestyle. Maintaining good hygiene practices not only reduces the chances of contracting a disease but could also reduce the risk of spreading illness within the community. Given the current pandemic, daily habits such as washing hands or taking regular showers have taken primary importance among people, especially for the elderly population living alone at home or in an assisted living facility. This paper presents a novel and non-invasive framework for monitoring human hygiene using vibration sensors where we adopt Machine Learning techniques. The approach is based on a combination of a geophone sensor, a digitizer, and a cost-efficient computer board in a practical enclosure. Monitoring daily hygiene routines may help healthcare professionals be proactive rather than reactive in identifying and controlling the spread of potential outbreaks within the community. The experimental result indicates that applying a Support Vector Machine (SVM) for binary classification exhibits a promising accuracy of ~95% in the classification of different hygiene habits. Furthermore, both tree-based classifier (Random Forrest and Decision Tree) outperforms other models by achieving the highest accuracy (100%), which means that classifying hygiene events using vibration and non-invasive sensors is possible for monitoring hygiene activity.
△ Less
Submitted 7 July, 2022;
originally announced July 2022.
-
Software Engineering Process and Methodology in Blockchain-Oriented Software Development: A Systematic Study
Authors:
Md Jobair Hossain Faruk,
Santhiya Subramanian,
Hossain Shahriar,
Maria Valero,
Xia Li,
Masrura Tasnim
Abstract:
Software Engineering is the process of a systematic, disciplined, quantifiable approach that has significant impact on large-scale and complex software development. Scores of well-established software process models have long been adopted in the software development life cycle that pour stakeholders towards the completion of final software product development. Within the boundary of advanced techn…
▽ More
Software Engineering is the process of a systematic, disciplined, quantifiable approach that has significant impact on large-scale and complex software development. Scores of well-established software process models have long been adopted in the software development life cycle that pour stakeholders towards the completion of final software product development. Within the boundary of advanced technology, various emerging and futuristic technology is evolving that really need the attention of the software engineering community whether the conventional software process techniques are capable to inherit the core fundamental into futuristic software development. In this paper, we study the impact of existing software engineering processes and models including Agile, and DevOps in Blockchain-Oriented Software Engineering. We also examine the essentiality of adopting state-of-art concepts and evolving the current software engineering process for blockchain-oriented systems. We discuss the insight of software project management practices in BOS development. The findings of this study indicate that utilizing state-of-art techniques in software processes for futuristic technology would be challenging and promising research is needed extensively towards addressing and improving state-of-the-art software engineering processes and methodology for novel technologies.
△ Less
Submitted 2 July, 2022;
originally announced July 2022.
-
Malware Detection and Prevention using Artificial Intelligence Techniques
Authors:
Md Jobair Hossain Faruk,
Hossain Shahriar,
Maria Valero,
Farhat Lamia Barsha,
Shahriar Sobhan,
Md Abdullah Khan,
Michael Whitman,
Alfredo Cuzzocreak,
Dan Lo,
Akond Rahman,
Fan Wu
Abstract:
With the rapid technological advancement, security has become a major issue due to the increase in malware activity that poses a serious threat to the security and safety of both computer systems and stakeholders. To maintain stakeholders, particularly, end users security, protecting the data from fraudulent efforts is one of the most pressing concerns. A set of malicious programming code, scripts…
▽ More
With the rapid technological advancement, security has become a major issue due to the increase in malware activity that poses a serious threat to the security and safety of both computer systems and stakeholders. To maintain stakeholders, particularly, end users security, protecting the data from fraudulent efforts is one of the most pressing concerns. A set of malicious programming code, scripts, active content, or intrusive software that is designed to destroy intended computer systems and programs or mobile and web applications is referred to as malware. According to a study, naive users are unable to distinguish between malicious and benign applications. Thus, computer systems and mobile applications should be designed to detect malicious activities towards protecting the stakeholders. A number of algorithms are available to detect malware activities by utilizing novel concepts including Artificial Intelligence, Machine Learning, and Deep Learning. In this study, we emphasize Artificial Intelligence (AI) based techniques for detecting and preventing malware activity. We present a detailed review of current malware detection technologies, their shortcomings, and ways to improve efficiency. Our study shows that adopting futuristic approaches for the development of malware detection applications shall provide significant advantages. The comprehension of this synthesis shall help researchers for further research on malware detection and prevention using AI.
△ Less
Submitted 25 June, 2022;
originally announced June 2022.
-
Towards Blockchain-Based Secure Data Management for Remote Patient Monitoring
Authors:
Md Jobair Hossain Faruk,
Hossain Shahriar,
Maria Valero,
Sweta Sneha,
Sheikh I. Ahamed Mohammad Rahman
Abstract:
Traditional data collection, storage and processing of Electronic Health Records (EHR) utilize centralized techniques that pose several risks of single point of failure and lean the systems to a number of internal and external data breaches that compromise their reliability and availability. Blockchain is an emerging distributed technology that can solve these issues due to its immutability and ar…
▽ More
Traditional data collection, storage and processing of Electronic Health Records (EHR) utilize centralized techniques that pose several risks of single point of failure and lean the systems to a number of internal and external data breaches that compromise their reliability and availability. Blockchain is an emerging distributed technology that can solve these issues due to its immutability and architectural nature that prevent records manipulation or alterations. In this paper, we discuss the progress and opportunities of remote patient monitoring using futuristic blockchain technologies and its two primary frameworks: Ethereum and Hyperledger Fabric. We also discuss the possible blockchain use cases in software engineering for systematic, disciplined, and quantifiable application development. The study extends by introducing a system architecture for EHR data management using Ethereum as a model. We discuss the challenges and limitations along with the initial evaluation results of the proposed system and draw future research directions in this promising area.
△ Less
Submitted 25 June, 2022;
originally announced June 2022.
-
Task splitting for DNN-based acoustic echo and noise removal
Authors:
Sebastian Braun,
Maria Luis Valero
Abstract:
Neural networks have led to tremendous performance gains for single-task speech enhancement, such as noise suppression and acoustic echo cancellation (AEC). In this work, we evaluate whether it is more useful to use a single joint or separate modules to tackle these problems. We describe different possible implementations and give insights into their performance and efficiency. We show that using…
▽ More
Neural networks have led to tremendous performance gains for single-task speech enhancement, such as noise suppression and acoustic echo cancellation (AEC). In this work, we evaluate whether it is more useful to use a single joint or separate modules to tackle these problems. We describe different possible implementations and give insights into their performance and efficiency. We show that using a separate echo cancellation module and a module for noise and residual echo removal results in less near-end speech distortion and better performance during double-talk at same complexity.
△ Less
Submitted 13 July, 2022; v1 submitted 13 May, 2022;
originally announced May 2022.
-
LwHBench: A low-level hardware component benchmark and dataset for Single Board Computers
Authors:
Pedro Miguel Sánchez Sánchez,
José María Jorquera Valero,
Alberto Huertas Celdrán,
Gérôme Bovet,
Manuel Gil Pérez,
Gregorio Martínez Pérez
Abstract:
In today's computing environment, where Artificial Intelligence (AI) and data processing are moving toward the Internet of Things (IoT) and Edge computing paradigms, benchmarking resource-constrained devices is a critical task to evaluate their suitability and performance. Between the employed devices, Single-Board Computers arise as multi-purpose and affordable systems. The literature has explore…
▽ More
In today's computing environment, where Artificial Intelligence (AI) and data processing are moving toward the Internet of Things (IoT) and Edge computing paradigms, benchmarking resource-constrained devices is a critical task to evaluate their suitability and performance. Between the employed devices, Single-Board Computers arise as multi-purpose and affordable systems. The literature has explored Single-Board Computers performance when running high-level benchmarks specialized in particular application scenarios, such as AI or medical applications. However, lower-level benchmarking applications and datasets are needed to enable new Edge-based AI solutions for network, system and service management based on device and component performance, such as individual device identification. Thus, this paper presents LwHBench, a low-level hardware benchmarking application for Single-Board Computers that measures the performance of CPU, GPU, Memory and Storage taking into account the component constraints in these types of devices. LwHBench has been implemented for Raspberry Pi devices and run for 100 days on a set of 45 devices to generate an extensive dataset that allows the usage of AI techniques in scenarios where performance data can help in the device management process. Besides, to demonstrate the inter-scenario capability of the dataset, a series of AI-enabled use cases about device identification and context impact on performance are presented as exploration of the published data. Finally, the benchmark application has been adapted and applied to an agriculture-focused scenario where three RockPro64 devices are present.
△ Less
Submitted 24 October, 2022; v1 submitted 18 April, 2022;
originally announced April 2022.
-
Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go?
Authors:
Mohammad Masum,
Mohammad Nazim,
Md Jobair Hossain Faruk,
Hossain Shahriar,
Maria Valero,
Md Abdullah Hafiz Khan,
Gias Uddin,
Shabir Barzanjeh,
Erhan Saglamyurek,
Akond Rahman,
Sheikh Iqbal Ahamed
Abstract:
Quantum Computing (QC) has gained immense popularity as a potential solution to deal with the ever-increasing size of data and associated challenges leveraging the concept of quantum random access memory (QRAM). QC promises quadratic or exponential increases in computational time with quantum parallelism and thus offer a huge leap forward in the computation of Machine Learning algorithms. This pap…
▽ More
Quantum Computing (QC) has gained immense popularity as a potential solution to deal with the ever-increasing size of data and associated challenges leveraging the concept of quantum random access memory (QRAM). QC promises quadratic or exponential increases in computational time with quantum parallelism and thus offer a huge leap forward in the computation of Machine Learning algorithms. This paper analyzes speed up performance of QC when applied to machine learning algorithms, known as Quantum Machine Learning (QML). We applied QML methods such as Quantum Support Vector Machine (QSVM), and Quantum Neural Network (QNN) to detect Software Supply Chain (SSC) attacks. Due to the access limitations of real quantum computers, the QML methods were implemented on open-source quantum simulators such as IBM Qiskit and TensorFlow Quantum. We evaluated the performance of QML in terms of processing speed and accuracy and finally, compared with its classical counterparts. Interestingly, the experimental results differ to the speed up promises of QC by demonstrating higher computational time and lower accuracy in comparison to the classical approaches for SSC attacks.
△ Less
Submitted 4 April, 2022;
originally announced April 2022.
-
On soft gluon resummation for associated single top production with a Higgs boson at the LHC
Authors:
Anna Kulesza,
Laura Moreno Valero,
Vincent Theeuwes
Abstract:
We investigate threshold resummation of soft gluon corrections for the s-channel process of a single top quark production in association with a Higgs boson in the Standard Model. We choose to work in the three-particle invariant mass kinematics in direct QCD, i.e. in the space of Mellin moments. Our results take into account terms of up to next-to-leading logarithmic (NLL) precision, as well as…
▽ More
We investigate threshold resummation of soft gluon corrections for the s-channel process of a single top quark production in association with a Higgs boson in the Standard Model. We choose to work in the three-particle invariant mass kinematics in direct QCD, i.e. in the space of Mellin moments. Our results take into account terms of up to next-to-leading logarithmic (NLL) precision, as well as $\mathcal{O} (α_s)$ non-logarithmic terms which do not vanish at threshold. After presenting analytical expressions we discuss the corresponding numerical results for the total cross section and the invariant mass distributions at the LHC.
△ Less
Submitted 30 September, 2021;
originally announced September 2021.
-
Results of the 2021 ECFA Early-Career Researcher Survey on Training in Instrumentation
Authors:
ECFA Early-Career Researcher Panel,
:,
Anamika Aggarwal,
Chiara Amendola,
Liliana Apolinario,
Jan-Hendrik Arling,
Adi Ashkenazi,
Kamil Augsten,
Julien Baglio,
Evelin Bakos,
Liron Barak,
Diogo Bastos,
Bugra Bilin,
Silvia Biondi,
Neven Blaskovic Kraljevic,
Lydia Brenner,
Francesco Brizioli,
Antoine Camper,
Alessandra Camplani,
Xabier Cid Vidal,
Hüseyin Dag,
Flavia de Almeida Dias,
Eleonora Diociaiuti,
Lennart van Doremalen,
Katherine Dunne
, et al. (52 additional authors not shown)
Abstract:
The European Committee for Future Accelerators (ECFA) Early-Career Researchers (ECR) Panel was invited by the ECFA Detector R&D Roadmap conveners to collect feedback from the European ECR community. A working group within the ECFA ECR panel held a Townhall Meeting to get first input, and then designed and broadly circulated a detailed survey to gather feedback from the larger ECR community. A tota…
▽ More
The European Committee for Future Accelerators (ECFA) Early-Career Researchers (ECR) Panel was invited by the ECFA Detector R&D Roadmap conveners to collect feedback from the European ECR community. A working group within the ECFA ECR panel held a Townhall Meeting to get first input, and then designed and broadly circulated a detailed survey to gather feedback from the larger ECR community. A total of 473 responses to this survey were received, providing a useful overview of the experiences of ECRs in instrumentation training and related topics. This report summarises the feedback received, and is intended to serve as an input to the ECFA Detector R&D Roadmap process.
△ Less
Submitted 1 July, 2021;
originally announced July 2021.
-
A methodology to identify identical single-board computers based on hardware behavior fingerprinting
Authors:
Pedro Miguel Sánchez Sánchez,
José María Jorquera Valero,
Alberto Huertas Celdrán,
Gérôme Bovet,
Manuel Gil Pérez,
Gregorio Martínez Pérez
Abstract:
The connectivity and resource-constrained nature of single-board devices open the door to cybersecurity concerns affecting Internet of Things (IoT) scenarios. One of the most important issues is the presence of unauthorized IoT devices that want to impersonate legitimate ones by using identical hardware and software specifications. This situation can provoke sensitive information leakages, data po…
▽ More
The connectivity and resource-constrained nature of single-board devices open the door to cybersecurity concerns affecting Internet of Things (IoT) scenarios. One of the most important issues is the presence of unauthorized IoT devices that want to impersonate legitimate ones by using identical hardware and software specifications. This situation can provoke sensitive information leakages, data poisoning, or privilege escalation in IoT scenarios. Combining behavioral fingerprinting and Machine/Deep Learning (ML/DL) techniques is a promising approach to identify these malicious spoofing devices by detecting minor performance differences generated by imperfections in manufacturing. However, existing solutions are not suitable for single-board devices since they do not consider their hardware and software limitations, underestimate critical aspects such as fingerprint stability or context changes, and do not explore the potential of ML/DL techniques. To improve it, this work first identifies the essential properties for single-board device identification: uniqueness, stability, diversity, scalability, efficiency, robustness, and security. Then, a novel methodology relies on behavioral fingerprinting to identify identical single-board devices and meet the previous properties. The methodology leverages the different built-in components of the system and ML/DL techniques, comparing the device internal behavior with each other to detect manufacturing variations. The methodology validation has been performed in a real environment composed of 15 identical Raspberry Pi 4 B and 10 Raspberry Pi 3 B+ devices, obtaining a 91.9% average TPR and identifying all devices by setting a 50% threshold in the evaluation process. Finally, a discussion compares the proposed solution with related work, highlighting the fingerprint properties not met, and provides important lessons learned and limitations.
△ Less
Submitted 22 June, 2022; v1 submitted 15 June, 2021;
originally announced June 2021.
-
Quantum rescaling, domain metastability and hybrid domain-walls in two-dimensional CrI3 magnets
Authors:
Dina Abdul-Wahab,
Mathias Augustin,
Samuel Manas Valero,
Wenjun Kuang,
Sarah Jenkins,
Eugenio Coronado,
Irina V. Grigorieva,
Ivan J. Vera-Marun,
Efren Navarro-Moratalla,
Richard F. L. Evans,
Kostya S. Novoselov,
Elton J. G. Santos
Abstract:
Higher-order exchange interactions and quantum effects are widely known to play an important role in describing the properties of low-dimensional magnetic compounds. Here we identify the recently discovered two-dimensional (2D) van der Waals (vdW) CrI3 as a quantum non-Heisenberg material with properties far beyond an Ising magnet as initially assumed. We find that biquadratic exchange interaction…
▽ More
Higher-order exchange interactions and quantum effects are widely known to play an important role in describing the properties of low-dimensional magnetic compounds. Here we identify the recently discovered two-dimensional (2D) van der Waals (vdW) CrI3 as a quantum non-Heisenberg material with properties far beyond an Ising magnet as initially assumed. We find that biquadratic exchange interactions are essential to quantitatively describe the magnetism of CrI3 but requiring quantum rescaling corrections to reproduce its thermal properties. The quantum nature of the heat bath represented by discrete electron-spin and phonon-spin scattering processes induced the formation of spin fluctuations in the low temperature regime. These fluctuations induce the formation of metastable magnetic domains evolving into a single macroscopic magnetization or even a monodomain over surface areas of a few micrometers. Such domains display hybrid characteristics of Neel and Bloch types with a narrow domain wall width in the range of 3-5 nm. Similar behaviour is expected for the majority of 2D vdW magnets where higher-order exchange interactions are appreciable.
△ Less
Submitted 5 November, 2020;
originally announced November 2020.
-
Machine Learning Research Towards Combating COVID-19: Virus Detection, Spread Prevention, and Medical Assistance
Authors:
Osama Shahid,
Mohammad Nasajpour,
Seyedamin Pouriyeh,
Reza M. Parizi,
Meng Han,
Maria Valero,
Fangyu Li,
Mohammed Aledhari,
Quan Z. Sheng
Abstract:
COVID-19 was first discovered in December 2019 and has continued to rapidly spread across countries worldwide infecting thousands and millions of people. The virus is deadly, and people who are suffering from prior illnesses or are older than the age of 60 are at a higher risk of mortality. Medicine and Healthcare industries have surged towards finding a cure, and different policies have been amen…
▽ More
COVID-19 was first discovered in December 2019 and has continued to rapidly spread across countries worldwide infecting thousands and millions of people. The virus is deadly, and people who are suffering from prior illnesses or are older than the age of 60 are at a higher risk of mortality. Medicine and Healthcare industries have surged towards finding a cure, and different policies have been amended to mitigate the spread of the virus. While Machine Learning (ML) methods have been widely used in other domains, there is now a high demand for ML-aided diagnosis systems for screening, tracking, and predicting the spread of COVID-19 and finding a cure against it. In this paper, we present a journey of what role ML has played so far in combating the virus, mainly looking at it from a screening, forecasting, and vaccine perspectives. We present a comprehensive survey of the ML algorithms and models that can be used on this expedition and aid with battling the virus.
△ Less
Submitted 29 September, 2020;
originally announced October 2020.
-
The Ultimate DataFlow for Ultimate SuperComputers-on-a-Chip, for Scientific Computing, Geo Physics, Complex Mathematics, and Information Processing
Authors:
Veljko Milutinovic,
Erfan Sadeqi Azer,
Kristy Yoshimoto,
Gerhard Klimeck,
Miljan Djordjevic,
Milos Kotlar,
Miroslav Bojovic,
Bozidar Miladinovic,
Nenad Korolija,
Stevan Stankovic,
Nenad Filipović,
Zoran Babovic,
Miroslav Kosanic,
Akira Tsuda,
Mateo Valero,
Massimo De Santo,
Erich Neuhold,
Jelena Skoručak,
Laura Dipietro,
Ivan Ratkovic
Abstract:
This article starts from the assumption that near future 100BTransistor SuperComputers-on-a-Chip will include N big multi-core processors, 1000N small many-core processors, a TPU-like fixed-structure systolic array accelerator for the most frequently used Machine Learning algorithms needed in bandwidth-bound applications and a flexible-structure reprogrammable accelerator for less frequently used…
▽ More
This article starts from the assumption that near future 100BTransistor SuperComputers-on-a-Chip will include N big multi-core processors, 1000N small many-core processors, a TPU-like fixed-structure systolic array accelerator for the most frequently used Machine Learning algorithms needed in bandwidth-bound applications and a flexible-structure reprogrammable accelerator for less frequently used Machine Learning algorithms needed in latency-critical applications.
△ Less
Submitted 5 July, 2021; v1 submitted 20 September, 2020;
originally announced September 2020.
-
A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets
Authors:
Pedro Miguel Sánchez Sánchez,
Jose María Jorquera Valero,
Alberto Huertas Celdrán,
Gérôme Bovet,
Manuel Gil Pérez,
Gregorio Martínez Pérez
Abstract:
In the current network-based computing world, where the number of interconnected devices grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at the same rate. To guarantee the correct functioning and performance of novel environments such as Smart Cities, Industry 4.0, or crowdsensing, it is crucial to identify the capabilities of their devices (e.g., senso…
▽ More
In the current network-based computing world, where the number of interconnected devices grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at the same rate. To guarantee the correct functioning and performance of novel environments such as Smart Cities, Industry 4.0, or crowdsensing, it is crucial to identify the capabilities of their devices (e.g., sensors, actuators) and detect potential misbehavior that may arise due to cyberattacks, system faults, or misconfigurations. With this goal in mind, a promising research field emerged focusing on creating and managing fingerprints that model the behavior of both the device actions and its components. The article at hand studies the recent growth of the device behavior fingerprinting field in terms of application scenarios, behavioral sources, and processing and evaluation techniques. First, it performs a comprehensive review of the device types, behavioral data, and processing and evaluation techniques used by the most recent and representative research works dealing with two major scenarios: device identification and device misbehavior detection. After that, each work is deeply analyzed and compared, emphasizing its characteristics, advantages, and limitations. This article also provides researchers with a review of the most relevant characteristics of existing datasets as most of the novel processing techniques are based on machine learning and deep learning. Finally, it studies the evolution of these two scenarios in recent years, providing lessons learned, current trends, and future research challenges to guide new solutions in the area.
△ Less
Submitted 3 March, 2021; v1 submitted 7 August, 2020;
originally announced August 2020.
-
Internet of Things for Current COVID-19 and Future Pandemics: An Exploratory Study
Authors:
Mohammad Nasajpour,
Seyedamin Pouriyeh,
Reza M. Parizi,
Mohsen Dorodchi,
Maria Valero,
Hamid R. Arabnia
Abstract:
In recent years, the Internet of Things (IoT) has drawn convincing research ground as a new research topic in a wide variety of academic and industrial disciplines, especially in healthcare. The IoT revolution is resha** modern healthcare systems by incorporating technological, economic, and social prospects. It is evolving healthcare systems from conventional to more personalized healthcare sys…
▽ More
In recent years, the Internet of Things (IoT) has drawn convincing research ground as a new research topic in a wide variety of academic and industrial disciplines, especially in healthcare. The IoT revolution is resha** modern healthcare systems by incorporating technological, economic, and social prospects. It is evolving healthcare systems from conventional to more personalized healthcare systems through which patients can be diagnosed, treated, and monitored more easily. The current global challenge of the pandemic caused by the novel severe contagious respiratory syndrome coronavirus 2 presents the greatest global public health crisis since the pandemic influenza outbreak of 1918. At the time this paper was written, the number of diagnosed COVID-19 cases around the world had reached more than 31 million. Since the pandemic started, there has been a rapid effort in different research communities to exploit a wide variety of technologies to combat this worldwide threat, and IoT technology is one of the pioneers in this area. In the context of COVID-19, IoT enabled /linked devices/applications are utilized to lower the possible spread of COVID-19 to others by early diagnosis, monitoring patients, and practicing defined protocols after patient recovery. This paper surveys the role of IoT-based technologies in COVID-19 and reviews the state-of-the-art architectures, platforms, applications, and industrial IoT-based solutions combating COVID-19 in three main phases, including early diagnosis, quarantine time, and after recovery.
△ Less
Submitted 25 September, 2020; v1 submitted 21 July, 2020;
originally announced July 2020.
-
Improving accuracy and speeding up Document Image Classification through parallel systems
Authors:
Javier Ferrando,
Juan Luis Dominguez,
Jordi Torres,
Raul Garcia,
David Garcia,
Daniel Garrido,
Jordi Cortada,
Mateo Valero
Abstract:
This paper presents a study showing the benefits of the EfficientNet models compared with heavier Convolutional Neural Networks (CNNs) in the Document Classification task, essential problem in the digitalization process of institutions. We show in the RVL-CDIP dataset that we can improve previous results with a much lighter model and present its transfer learning capabilities on a smaller in-domai…
▽ More
This paper presents a study showing the benefits of the EfficientNet models compared with heavier Convolutional Neural Networks (CNNs) in the Document Classification task, essential problem in the digitalization process of institutions. We show in the RVL-CDIP dataset that we can improve previous results with a much lighter model and present its transfer learning capabilities on a smaller in-domain dataset such as Tobacco3482. Moreover, we present an ensemble pipeline which is able to boost solely image input by combining image model predictions with the ones generated by BERT model on extracted text by OCR. We also show that the batch size can be effectively increased without hindering its accuracy so that the training process can be sped up by parallelizing throughout multiple GPUs, decreasing the computational time needed. Lastly, we expose the training performance differences between PyTorch and Tensorflow Deep Learning frameworks.
△ Less
Submitted 16 June, 2020;
originally announced June 2020.
-
Toward Creating Subsurface Camera
Authors:
WenZhan Song,
Fangyu Li,
Maria Valero,
Liang Zhao
Abstract:
In this article, the framework and architecture of Subsurface Camera (SAMERA) is envisioned and described for the first time. A SAMERA is a geophysical sensor network that senses and processes geophysical sensor signals, and computes a 3D subsurface image in-situ in real-time. The basic mechanism is: geophysical waves propagating/reflected/refracted through subsurface enter a network of geophysica…
▽ More
In this article, the framework and architecture of Subsurface Camera (SAMERA) is envisioned and described for the first time. A SAMERA is a geophysical sensor network that senses and processes geophysical sensor signals, and computes a 3D subsurface image in-situ in real-time. The basic mechanism is: geophysical waves propagating/reflected/refracted through subsurface enter a network of geophysical sensors, where a 2D or 3D image is computed and recorded; a control software may be connected to this network to allow view of the 2D/3D image and adjustment of settings such as resolution, filter, regularization and other algorithm parameters. System prototypes based on seismic imaging have been designed. SAMERA technology is envisioned as a game changer to transform many subsurface survey and monitoring applications, including oil/gas exploration and production, subsurface infrastructures and homeland security, wastewater and CO2 sequestration, earthquake and volcano hazard monitoring. The system prototypes for seismic imaging have been built. Creating SAMERA requires an interdisciplinary collaboration and transformation of sensor networks, signal processing, distributed computing, and geophysical imaging.
△ Less
Submitted 29 October, 2018;
originally announced October 2018.
-
Memory Vulnerability: A Case for Delaying Error Reporting
Authors:
Luc Jaulmes,
Miquel Moretó,
Mateo Valero,
Marc Casas
Abstract:
To face future reliability challenges, it is necessary to quantify the risk of error in any part of a computing system. To this goal, the Architectural Vulnerability Factor (AVF) has long been used for chips. However, this metric is used for offline characterisation, which is inappropriate for memory. We survey the literature and formalise one of the metrics used, the Memory Vulnerability Factor,…
▽ More
To face future reliability challenges, it is necessary to quantify the risk of error in any part of a computing system. To this goal, the Architectural Vulnerability Factor (AVF) has long been used for chips. However, this metric is used for offline characterisation, which is inappropriate for memory. We survey the literature and formalise one of the metrics used, the Memory Vulnerability Factor, and extend it to take into account false errors. These are reported errors which would have no impact on the program if they were ignored. We measure the False Error Aware MVF (FEA) and related metrics precisely in a cycle-accurate simulator, and compare them with the effects of injecting faults in a program's data, in native parallel runs. Our findings show that MVF and FEA are the only two metrics that are safe to use at runtime, as they both consistently give an upper bound on the probability of incorrect program outcome. FEA gives a tighter bound than MVF, and is the metric that correlates best with the incorrect outcome probability of all considered metrics.
△ Less
Submitted 15 October, 2018;
originally announced October 2018.
-
Adaptive and application dependent runtime guided hardware prefetcher reconfiguration on the IBM POWER7
Authors:
David Prat,
Cristobal Ortega,
Marc Casas,
Miquel Moretó,
Mateo Valero
Abstract:
Hardware data prefetcher engines have been extensively used to reduce the impact of memory latency. However, microprocessors' hardware prefetcher engines do not include any automatic hardware control able to dynamically tune their operation. This lacking architectural feature causes systems to operate with prefetchers in a fixed configuration, which in many cases harms performance and energy consu…
▽ More
Hardware data prefetcher engines have been extensively used to reduce the impact of memory latency. However, microprocessors' hardware prefetcher engines do not include any automatic hardware control able to dynamically tune their operation. This lacking architectural feature causes systems to operate with prefetchers in a fixed configuration, which in many cases harms performance and energy consumption.
In this paper, a piece of software that solves the discussed problem in the context of the IBM POWER7 microprocessor is presented. The proposed solution involves using the runtime software as a bridge that is able to characterize user applications' workload and dynamically reconfigure the prefetcher engine. The proposed mechanisms has been deployed over OmpSs, a state-of-the-art task-based programming model. The paper shows significant performance improvements over a representative set of microbenchmarks and High Performance Computing (HPC) applications.
△ Less
Submitted 9 January, 2015;
originally announced January 2015.
-
Self-Stabilizing Balancing Algorithm for Containment-Based Trees
Authors:
Evangelos Bampas,
Anissa Lamani,
Franck Petit,
Mathieu Valero
Abstract:
Containment-based trees encompass various handy structures such as B+-trees, R-trees and M-trees. They are widely used to build data indexes, range-queryable overlays, publish/subscribe systems both in centralized and distributed contexts. In addition to their versatility, their balanced shape ensures an overall satisfactory performance. Re- cently, it has been shown that their distributed impleme…
▽ More
Containment-based trees encompass various handy structures such as B+-trees, R-trees and M-trees. They are widely used to build data indexes, range-queryable overlays, publish/subscribe systems both in centralized and distributed contexts. In addition to their versatility, their balanced shape ensures an overall satisfactory performance. Re- cently, it has been shown that their distributed implementations can be fault-resilient. However, this robustness is achieved at the cost of un-balancing the structure. While the structure remains correct in terms of searchability, its performance can be significantly decreased. In this paper, we propose a distributed self-stabilizing algorithm to balance containment-based trees.
△ Less
Submitted 14 December, 2012;
originally announced December 2012.
-
Towards a Scalable Dynamic Spatial Database System
Authors:
Joaquín Keller,
Raluca Diaconu,
Mathieu Valero
Abstract:
With the rise of GPS-enabled smartphones and other similar mobile devices, massive amounts of location data are available. However, no scalable solutions for soft real-time spatial queries on large sets of moving objects have yet emerged. In this paper we explore and measure the limits of actual algorithms and implementations regarding different application scenarios. And finally we propose a nove…
▽ More
With the rise of GPS-enabled smartphones and other similar mobile devices, massive amounts of location data are available. However, no scalable solutions for soft real-time spatial queries on large sets of moving objects have yet emerged. In this paper we explore and measure the limits of actual algorithms and implementations regarding different application scenarios. And finally we propose a novel distributed architecture to solve the scalability issues.
△ Less
Submitted 19 November, 2012;
originally announced November 2012.
-
Physical expander in Virtual Tree Overlay
Authors:
Taisuke Izumi,
Maria Potop-Butucaru,
Mathieu Valero
Abstract:
In this paper, we propose a new construction of constantdegree expanders motivated by their application in P2P overlay networks and in particular in the design of robust trees overlay. Our key result can be stated as follows. Consider a complete binary tree T and construct a random pairing Π between leaf nodes and internal nodes. We prove that the graph GΠobtained from T by contracting all pairs (…
▽ More
In this paper, we propose a new construction of constantdegree expanders motivated by their application in P2P overlay networks and in particular in the design of robust trees overlay. Our key result can be stated as follows. Consider a complete binary tree T and construct a random pairing Π between leaf nodes and internal nodes. We prove that the graph GΠobtained from T by contracting all pairs (leaf-internal nodes) achieves a constant node expansion with high probability. The use of our result in improving the robustness of tree overlays is straightforward. That is, if each physical node participating to the overlay manages a random pair that couples one virtual internal node and one virtual leaf node then the physical-node layer exhibits a constant expansion with high probability. We encompass the difficulty of obtaining this random tree virtualization by proposing a local, selforganizing and churn resilient uniformly-random pairing algorithm with O(log2 n) running time. Our algorithm has the merit to not modify the original tree virtual overlay (we just control the map** between physical nodes and virtual nodes). Therefore, our scheme is general and can be applied to a large number of tree overlay implementations. We validate its performances in dynamic environments via extensive simulations.
△ Less
Submitted 24 February, 2011;
originally announced February 2011.