-
Towards Memristive Deep Learning Systems for Real-time Mobile Epileptic Seizure Prediction
Authors:
Corey Lammie,
Wei Xiang,
Mostafa Rahimi Azghadi
Abstract:
The unpredictability of seizures continues to distress many people with drug-resistant epilepsy. On account of recent technological advances, considerable efforts have been made using different hardware technologies to realize smart devices for the real-time detection and prediction of seizures. In this paper, we investigate the feasibility of using Memristive Deep Learning Systems (MDLSs) to perf…
▽ More
The unpredictability of seizures continues to distress many people with drug-resistant epilepsy. On account of recent technological advances, considerable efforts have been made using different hardware technologies to realize smart devices for the real-time detection and prediction of seizures. In this paper, we investigate the feasibility of using Memristive Deep Learning Systems (MDLSs) to perform real-time epileptic seizure prediction on the edge. Using the MemTorch simulation framework and the Children's Hospital Boston (CHB)-Massachusetts Institute of Technology (MIT) dataset we determine the performance of various simulated MDLS configurations. An average sensitivity of 77.4% and a Area Under the Receiver Operating Characteristic Curve (AUROC) of 0.85 are reported for the optimal configuration that can process Electroencephalogram (EEG) spectrograms with 7,680 samples in 1.408ms while consuming 0.0133W and occupying an area of 0.1269mm$^2$ in a 65nm Complementary Metal-Oxide-Semiconductor (CMOS) process.
△ Less
Submitted 16 February, 2021;
originally announced February 2021.
-
Extended collinearly-improved Balitsky-Kovchegov evolution equation in target rapidity
Authors:
Wenchang Xiang,
Yanbing Cai,
Mengliang Wang,
Daicui Zhou
Abstract:
An extended collinearly-improved Balitsky-Kovchegov evolution equation in the target rapidity representation is derived by including the running coupling corrections during the expansion of the "real" $S$-matrix. We find that the running coupling brings important corrections to the evolution equation, as one can see that there are extra contributions to the evolution kernel once the running coupli…
▽ More
An extended collinearly-improved Balitsky-Kovchegov evolution equation in the target rapidity representation is derived by including the running coupling corrections during the expansion of the "real" $S$-matrix. We find that the running coupling brings important corrections to the evolution equation, as one can see that there are extra contributions to the evolution kernel once the running coupling is included. To identify the significance of the corrections, we numerically solve the evolution equation with and without the running coupling contributions during the $S$-matrix expansion. The numerical results show that the scattering amplitude is largely suppressed by the running coupling corrections, which indicate that one needs to consider the running coupling contributions during the derivation of the non-linear evolution equation in the target rapidity representation.
△ Less
Submitted 7 February, 2021;
originally announced February 2021.
-
A Data-Driven Modeling Framework of Time-Dependent Switched Dynamical Systems via Extreme Learning Machine
Authors:
Weiming Xiang
Abstract:
In this work, a data-driven modeling framework of switched dynamical systems under time-dependent switching is proposed. The learning technique utilized to model system dynamics is Extreme Learning Machine (ELM). First, a method is developed for the detection of the switching occurrence events in the training data extracted from system traces. The training data thus can be segmented by the detecte…
▽ More
In this work, a data-driven modeling framework of switched dynamical systems under time-dependent switching is proposed. The learning technique utilized to model system dynamics is Extreme Learning Machine (ELM). First, a method is developed for the detection of the switching occurrence events in the training data extracted from system traces. The training data thus can be segmented by the detected switching instants. Then, ELM is used to learn the system dynamics of subsystems. The learning process includes segmented trace data merging and subsystem dynamics modeling. Due to the specific learning structure of ELM, the modeling process is formulated as an iterative Least-Squares (LS) optimization problem. Finally, the switching sequence can be reconstructed based on the switching detection and segmented trace merging results. An example of the data-driven modeling DC-DC converter is presented to show the effectiveness of the developed approach.
△ Less
Submitted 25 January, 2021; v1 submitted 24 January, 2021;
originally announced January 2021.
-
Performance Analysis for Cache-enabled Cellular Networks with Cooperative Transmission
Authors:
Tianming Feng,
Shuo Shi,
Shushi Gu,
Ning Zhang,
Wei Xiang,
Xuemai Gu
Abstract:
The large amount of deployed smart devices put tremendous traffic pressure on networks. Caching at the edge has been widely studied as a promising technique to solve this problem. To further improve the successful transmission probability (STP) of cache-enabled cellular networks (CEN), we combine the cooperative transmission technique with CEN and propose a novel transmission scheme. Local channel…
▽ More
The large amount of deployed smart devices put tremendous traffic pressure on networks. Caching at the edge has been widely studied as a promising technique to solve this problem. To further improve the successful transmission probability (STP) of cache-enabled cellular networks (CEN), we combine the cooperative transmission technique with CEN and propose a novel transmission scheme. Local channel state information (CSI) is introduced at each cooperative base station (BS) to enhance the strength of the signal received by the user. A tight approximation for the STP of this scheme is derived using tools from stochastic geometry. The optimal content placement strategy of this scheme is obtained using a numerical method to maximize the STP. Simulation results demonstrate the optimal strategy achieves significant gains in STP over several comparative baselines with the proposed scheme.
△ Less
Submitted 21 January, 2021;
originally announced January 2021.
-
Probabilistic Placement Optimization for Non-coherent and Coherent Joint Transmission in Cache-Enabled Cellular Networks
Authors:
Tianming Feng,
Shuo Shi,
Shushi Gu,
Wei Xiang,
Xuemai Gu
Abstract:
How to design proper content placement strategies is one of the major areas of interest in cache-enabled cellular networks. In this paper, we study the probabilistic content placement optimization of base station (BS) caching with cooperative transmission in the downlink of cellular networks. With placement probability vector being the design parameter, non-coherent joint transmission (NC-JT) and…
▽ More
How to design proper content placement strategies is one of the major areas of interest in cache-enabled cellular networks. In this paper, we study the probabilistic content placement optimization of base station (BS) caching with cooperative transmission in the downlink of cellular networks. With placement probability vector being the design parameter, non-coherent joint transmission (NC-JT) and coherent joint transmission (C-JT) schemes are investigated according to whether channel state information (CSI) is available. Using stochastic geometry, we derive an integral expression for the successful transmission probability (STP) in NC-JT scheme, and present an upper bound and a tight approximation for the STP of the C-JT scheme. Next, we maximize the STP in NC-JT and the approximation of STP in C-JT by optimizing the placement probability vector, respectively. An algorithm is proposed and applied to both optimization problems. By utilizing some properties of the STP, we obtain globally optimal solutions in certain cases. Moreover, locally optimal solutions in general cases are obtained by using the interior point method. Finally, numerical results show the optimized placement strategy achieves significant gains in STP over several comparative baselines both in NC-JT and C-JT. The optimal STP in C-JT outperforms the one in NC-JT, indicating the benefits of knowing CSI in cooperative transmission.
△ Less
Submitted 21 January, 2021;
originally announced January 2021.
-
Run-Time Safety Monitoring of Neural-Network-Enabled Dynamical Systems
Authors:
Weiming Xiang
Abstract:
Complex dynamical systems rely on the correct deployment and operation of numerous components, with state-of-the-art methods relying on learning-enabled components in various stages of modeling, sensing, and control at both offline and online levels. This paper addresses the run-time safety monitoring problem of dynamical systems embedded with neural network components. A run-time safety state est…
▽ More
Complex dynamical systems rely on the correct deployment and operation of numerous components, with state-of-the-art methods relying on learning-enabled components in various stages of modeling, sensing, and control at both offline and online levels. This paper addresses the run-time safety monitoring problem of dynamical systems embedded with neural network components. A run-time safety state estimator in the form of an interval observer is developed to construct lower-bound and upper-bound of system state trajectories in run time. The developed run-time safety state estimator consists of two auxiliary neural networks derived from the neural network embedded in dynamical systems, and observer gains to ensure the positivity, namely the ability of estimator to bound the system state in run time, and the convergence of the corresponding error dynamics. The design procedure is formulated in terms of a family of linear programming feasibility problems. The developed method is illustrated by a numerical example and is validated with evaluations on an adaptive cruise control system.
△ Less
Submitted 20 January, 2021;
originally announced January 2021.
-
Stability of transonic contact discontinuity for two-dimensional steady compressible Euler flows in a finitely long nozzle
Authors:
Feimin Huang,
Jie Kuang,
Dehua Wang,
Wei Xiang
Abstract:
We consider the stability of transonic contact discontinuity for the two-dimensional steady compressible Euler flows in a finitely long nozzle. This is the first work on the mixed-type problem of transonic flows across a contact discontinuity as a free boundary in nozzles. We start with the Euler-Lagrangian transformation to straighten the contact discontinuity in the new coordinates. However, the…
▽ More
We consider the stability of transonic contact discontinuity for the two-dimensional steady compressible Euler flows in a finitely long nozzle. This is the first work on the mixed-type problem of transonic flows across a contact discontinuity as a free boundary in nozzles. We start with the Euler-Lagrangian transformation to straighten the contact discontinuity in the new coordinates. However, the upper nozzle wall in the subsonic region depending on the mass flux becomes a free boundary after the transformation. Then we develop new ideas and techniques to solve the free-boundary problem in three steps: (1) we fix the free boundary and generate a new iteration scheme to solve the corresponding fixed boundary value problem of the hyperbolic-elliptic mixed type by building some powerful estimates for both the first-order hyperbolic equation and a second-order nonlinear elliptic equation in a Lipschitz domain; (2) we update the new free boundary by constructing a map** that has a fixed point; (3) we establish via the inverse Lagrangian coordinates transformation that the original free interface problem admits a unique piecewise smooth transonic solution near the background state, which consists of a smooth subsonic flow and a smooth supersonic flow with a contact discontinuity.
△ Less
Submitted 28 August, 2021; v1 submitted 17 December, 2020;
originally announced December 2020.
-
Internet of Underwater Things and Big Marine Data Analytics -- A Comprehensive Survey
Authors:
Mohammad Jahanbakht,
Wei Xiang,
Lajos Hanzo,
Mostafa Rahimi Azghadi
Abstract:
The Internet of Underwater Things (IoUT) is an emerging communication ecosystem developed for connecting underwater objects in maritime and underwater environments. The IoUT technology is intricately linked with intelligent boats and ships, smart shores and oceans, automatic marine transportations, positioning and navigation, underwater exploration, disaster prediction and prevention, as well as w…
▽ More
The Internet of Underwater Things (IoUT) is an emerging communication ecosystem developed for connecting underwater objects in maritime and underwater environments. The IoUT technology is intricately linked with intelligent boats and ships, smart shores and oceans, automatic marine transportations, positioning and navigation, underwater exploration, disaster prediction and prevention, as well as with intelligent monitoring and security. The IoUT has an influence at various scales ranging from a small scientific observatory, to a midsized harbor, and to covering global oceanic trade. The network architecture of IoUT is intrinsically heterogeneous and should be sufficiently resilient to operate in harsh environments. This creates major challenges in terms of underwater communications, whilst relying on limited energy resources. Additionally, the volume, velocity, and variety of data produced by sensors, hydrophones, and cameras in IoUT is enormous, giving rise to the concept of Big Marine Data (BMD), which has its own processing challenges. Hence, conventional data processing techniques will falter, and bespoke Machine Learning (ML) solutions have to be employed for automatically learning the specific BMD behavior and features facilitating knowledge extraction and decision support. The motivation of this paper is to comprehensively survey the IoUT, BMD, and their synthesis. It also aims for exploring the nexus of BMD with ML. We set out from underwater data collection and then discuss the family of IoUT data communication techniques with an emphasis on the state-of-the-art research challenges. We then review the suite of ML solutions suitable for BMD handling and analytics. We treat the subject deductively from an educational perspective, critically appraising the material surveyed.
△ Less
Submitted 17 January, 2021; v1 submitted 11 December, 2020;
originally announced December 2020.
-
Inclusive diffractive heavy quarkonium photoproduction including quark subprocesses
Authors:
Jiayu Wu,
Yanbing Cai,
Wenchang Xiang
Abstract:
The inclusive $J/Ψ$, $Ψ(2S)$ and $Υ(1S)$ direct and resolved photoproduction are investigated by including the quark subprocesses in the framework of non-relativistic quantum chromodynamics (NRQCD). We find that the theoretical total cross section of heavy quarkonium productions are in good agreement with the data available at HERA, once the $γq$, $qg$ and $qq$ subprocesses in the heavy quark pair…
▽ More
The inclusive $J/Ψ$, $Ψ(2S)$ and $Υ(1S)$ direct and resolved photoproduction are investigated by including the quark subprocesses in the framework of non-relativistic quantum chromodynamics (NRQCD). We find that the theoretical total cross section of heavy quarkonium productions are in good agreement with the data available at HERA, once the $γq$, $qg$ and $qq$ subprocesses in the heavy quark pair productions are taken into account. The inclusive diffractive rapidity and transverse momentum distributions of $J/Ψ$, $Ψ(2S)$ and $Υ(1S)$ in $pp$, $pPb$ and $PbPb$ collisions at LHC are also studied by our quark improved NRQCD model combined with the resolved pomeron model. We find that the contributions from the quark involved subprocesses can reach to $8\%$ in the rapidity distribution and $6\%$ in the transverse momentum distribution. The numerical results show that the contributions from quark involved subprocesses are significant in heavy quarkonium photoprodution.
△ Less
Submitted 25 November, 2020;
originally announced November 2020.
-
Nonexistence of perfect permutation codes under the Kendall τ-metric
Authors:
Wang Xiang,
Wang Yuanjie,
Yin Wenjuan,
Fu Fang-Wei
Abstract:
In the rank modulation scheme for flash memories, permutation codes have been studied. In this paper, we study perfect permutation codes in $S_n$, the set of all permutations on $n$ elements, under the Kendall τ-Metric. We answer one open problem proposed by Buzaglo and Etzion. That is, proving the nonexistence of perfect codes in $S_n$, under the Kendall τ-metric, for more values of $n$. Specific…
▽ More
In the rank modulation scheme for flash memories, permutation codes have been studied. In this paper, we study perfect permutation codes in $S_n$, the set of all permutations on $n$ elements, under the Kendall τ-Metric. We answer one open problem proposed by Buzaglo and Etzion. That is, proving the nonexistence of perfect codes in $S_n$, under the Kendall τ-metric, for more values of $n$. Specifically, we present the recursive formulas for the size of a ball with radius $r$ in $S_n$ under the Kendall τ-metric. Further, We prove that there are no perfect $t$-error-correcting codes in $S_n$ under the Kendall $τ$-metric for some $n$ and $t$=2,3,4,or 5.
△ Less
Submitted 3 November, 2020;
originally announced November 2020.
-
Solution to the Sudakov suppressed Balitsky-Kovchegov equation and its application to the HERA data
Authors:
Wenchang Xiang,
Mengliang Wang,
Yanbing Cai,
Daicui Zhou
Abstract:
We analytically solve the Sudakov suppressed Balitsky-Kovchegov evolution equation with the fixed and running coupling constants in the saturation region. The analytic solution of the $S$-matrix shows the $\exp(\mathcal{O}(η^2))$ rapidity dependence of the solution with the fixed coupling constant is replaced by $\exp(\mathcal{O}(η^{3/2}))$ dependence in the smallest dipole running coupling case r…
▽ More
We analytically solve the Sudakov suppressed Balitsky-Kovchegov evolution equation with the fixed and running coupling constants in the saturation region. The analytic solution of the $S$-matrix shows the $\exp(\mathcal{O}(η^2))$ rapidity dependence of the solution with the fixed coupling constant is replaced by $\exp(\mathcal{O}(η^{3/2}))$ dependence in the smallest dipole running coupling case rather than obeying the law found in our previous publication, in which all the solutions of the next-to-leading order evolution equations comply with $\exp(\mathcal{O}(η))$ rapidity dependence once the QCD coupling is switched from the fixed coupling to the smallest dipole running coupling prescription. This finding indicates that the corrections of the sub-leading double logarithms in the Sudakov suppressed evolution equation are significant, which compensate part of the evolution decrease of the dipole amplitude made by running coupling effect. To test the analytic findings, we calculate the numerical solutions of the Sudakov suppressed evolution equation, the numerical results confirm the analytic outcomes. Moreover, we use the numerical solutions of the evolution equation to fit the HERA data. It shows that the Sudakove suppressed evolution equation can give good quality fit to the data.
△ Less
Submitted 10 August, 2020;
originally announced August 2020.
-
FASTSWARM: A Data-driven FrAmework for Real-time Flying InSecT SWARM Simulation
Authors:
Wei Xiang,
Xinran Yao,
He Wang,
Xiaogang **
Abstract:
Insect swarms are common phenomena in nature and therefore have been actively pursued in computer animation. Realistic insect swarm simulation is difficult due to two challenges: high-fidelity behaviors and large scales, which make the simulation practice subject to laborious manual work and excessive trial-and-error processes. To address both challenges, we present a novel data-driven framework,…
▽ More
Insect swarms are common phenomena in nature and therefore have been actively pursued in computer animation. Realistic insect swarm simulation is difficult due to two challenges: high-fidelity behaviors and large scales, which make the simulation practice subject to laborious manual work and excessive trial-and-error processes. To address both challenges, we present a novel data-driven framework, FASTSWARM, to model complex behaviors of flying insects based on real-world data and simulate plausible animations of flying insect swarms. FASTSWARM has a linear time complexity and achieves real-time performance for large swarms. The high-fidelity behavior model of FASTSWARM explicitly takes into consideration the most common behaviors of flying insects, including the interactions among insects such as repulsion and attraction, the self-propelled behaviors such as target following and obstacle avoidance, and other characteristics such as the random movements. To achieve scalability, an energy minimization problem is formed with different behaviors modelled as energy terms, where the minimizer is the desired behavior. The minimizer is computed from the real-world data, which ensures the plausibility of the simulation results. Extensive simulation results and evaluations show that FASTSWARM is versatile in simulating various swarm behaviors, high fidelity measured by various metrics, easily controllable in inducing user controls and highly scalable.
△ Less
Submitted 22 July, 2020;
originally announced July 2020.
-
Graphene Aerogel Ink for the Inkjet Printing of the Micro-Supercapacitors
Authors:
Anand P S Gaur,
Wenjun Xiang,
**-** Chen Arjun Nepal,
Brice Lacroix,
C M Sorensen,
S R Das
Abstract:
The advances in the mass scale manufacturing of microscale energy storage devices via inkjet printing rely on the development of high-quality printable ink. The earth-abundant, non-toxic carbon materials such as graphene, carbon nanotube (CNT), reduced graphene oxide (r-GO) have shown excellent electrochemical performance and thus garnered significant interest as suitable electrode material. Here…
▽ More
The advances in the mass scale manufacturing of microscale energy storage devices via inkjet printing rely on the development of high-quality printable ink. The earth-abundant, non-toxic carbon materials such as graphene, carbon nanotube (CNT), reduced graphene oxide (r-GO) have shown excellent electrochemical performance and thus garnered significant interest as suitable electrode material. Here we report the formulation of printable graphene aerogel ink and the fabrication of the micro-supercapacitors (μ-SCs) on flexible polyimide substrates via inkjet printing method. The advantage of using pristine graphene aerogel intends to avoid the complex processing steps and the use of toxic chemicals in the ink formulation and lower the concentration of other additive components. Thus, a higher loading of active functional material in the printable ink is achieved. The aerogel ink directly employed to write the interdigitated μ-SCs devices on a flexible polyimide substrate at room temperature via inkjet printing. The electrochemical performance measured using the organic ionic liquid in the voltage range of 0-1 volt. These printed μ-SCs showed an areal capacity of 55 μF/cm2 at a current density of 6 micro-amp/cm2. The printed devices showed good stability, with ~80% of capacity retention after 10,000 cycles. Contrary to the graphene-based μ-SCs, the aerogel micro-supercapacitors do not show a significant distortion in the CV scan even at a very high scan rate of ~2Vs-1. Thus, we propose graphene aerogel as promising electrode material for mass-scale production of the μ-SCs.
△ Less
Submitted 3 July, 2020;
originally announced July 2020.
-
Stability of Attached Transonic Shocks in Steady Potential Flow past Three-Dimensional Wedges
Authors:
Gui-Qiang G. Chen,
Jun Chen,
Wei Xiang
Abstract:
We develop a new approach and employ it to establish the global existence and nonlinear structural stability of attached weak transonic shocks in steady potential flow past three-dimensional wedges; in particular, the restriction that the perturbation is away from the wedge edge in the previous results is removed. One of the key ingredients is to identify a "good" direction of the boundary operato…
▽ More
We develop a new approach and employ it to establish the global existence and nonlinear structural stability of attached weak transonic shocks in steady potential flow past three-dimensional wedges; in particular, the restriction that the perturbation is away from the wedge edge in the previous results is removed. One of the key ingredients is to identify a "good" direction of the boundary operator of a boundary condition of the shock along the wedge edge, based on the non-obliqueness of the boundary condition for the weak shock on the edge. With the identification of this direction, an additional boundary condition on the wedge edge can be assigned to make sure that the shock is attached on the edge and linearly stable under small perturbation. Based on the linear stability, we introduce an iteration scheme and prove that there exists a unique fixed point of the iteration scheme, which leads to the global existence and nonlinear structural stability of the attached weak transonic shock. This approach is based on neither the hodograph transformation nor the spectrum analysis, and should be useful for other problems with similar difficulties.
△ Less
Submitted 7 August, 2021; v1 submitted 8 May, 2020;
originally announced May 2020.
-
Reachable Set Estimation for Neural Network Control Systems: A Simulation-Guided Approach
Authors:
Weiming Xiang,
Hoang-Dung Tran,
Xiaodong Yang,
Taylor T. Johnson
Abstract:
The vulnerability of artificial intelligence (AI) and machine learning (ML) against adversarial disturbances and attacks significantly restricts their applicability in safety-critical systems including cyber-physical systems (CPS) equipped with neural network components at various stages of sensing and control. This paper addresses the reachable set estimation and safety verification problems for…
▽ More
The vulnerability of artificial intelligence (AI) and machine learning (ML) against adversarial disturbances and attacks significantly restricts their applicability in safety-critical systems including cyber-physical systems (CPS) equipped with neural network components at various stages of sensing and control. This paper addresses the reachable set estimation and safety verification problems for dynamical systems embedded with neural network components serving as feedback controllers. The closed-loop system can be abstracted in the form of a continuous-time sampled-data system under the control of a neural network controller. First, a novel reachable set computation method in adaptation to simulations generated out of neural networks is developed. The reachability analysis of a class of feedforward neural networks called multilayer perceptrons (MLP) with general activation functions is performed in the framework of interval arithmetic. Then, in combination with reachability methods developed for various dynamical system classes modeled by ordinary differential equations, a recursive algorithm is developed for over-approximating the reachable set of the closed-loop system. The safety verification for neural network control systems can be performed by examining the emptiness of the intersection between the over-approximation of reachable sets and unsafe sets. The effectiveness of the proposed approach has been validated with evaluations on a robotic arm model and an adaptive cruise control system.
△ Less
Submitted 25 April, 2020;
originally announced April 2020.
-
MemTorch: An Open-source Simulation Framework for Memristive Deep Learning Systems
Authors:
Corey Lammie,
Wei Xiang,
Bernabé Linares-Barranco,
Mostafa Rahimi Azghadi
Abstract:
Memristive devices have shown great promise to facilitate the acceleration and improve the power efficiency of Deep Learning (DL) systems. Crossbar architectures constructed using these Resistive Random-Access Memory (RRAM) devices can be used to efficiently implement various in-memory computing operations, such as Multiply Accumulate (MAC) and unrolled-convolutions, which are used extensively in…
▽ More
Memristive devices have shown great promise to facilitate the acceleration and improve the power efficiency of Deep Learning (DL) systems. Crossbar architectures constructed using these Resistive Random-Access Memory (RRAM) devices can be used to efficiently implement various in-memory computing operations, such as Multiply Accumulate (MAC) and unrolled-convolutions, which are used extensively in Deep Neural Networks (DNNs) and Convolutional Neural Networks (CNNs). However, memristive devices face concerns of aging and non-idealities, which limit the accuracy, reliability, and robustness of Memristive Deep Learning Systems (MDLSs), that should be considered prior to circuit-level realization. This Original Software Publication (OSP) presents MemTorch, an open-source framework for customized large-scale memristive DL simulations, with a refined focus on the co-simulation of device non-idealities. MemTorch also facilitates co-modelling of key crossbar peripheral circuitry. MemTorch adopts a modernized soft-ware engineering methodology and integrates directly with the well-known PyTorch Machine Learning (ML) library
△ Less
Submitted 18 February, 2022; v1 submitted 23 April, 2020;
originally announced April 2020.
-
NNV: The Neural Network Verification Tool for Deep Neural Networks and Learning-Enabled Cyber-Physical Systems
Authors:
Hoang-Dung Tran,
Xiaodong Yang,
Diego Manzanas Lopez,
Patrick Musau,
Luan Viet Nguyen,
Weiming Xiang,
Stanley Bak,
Taylor T. Johnson
Abstract:
This paper presents the Neural Network Verification (NNV) software tool, a set-based verification framework for deep neural networks (DNNs) and learning-enabled cyber-physical systems (CPS). The crux of NNV is a collection of reachability algorithms that make use of a variety of set representations, such as polyhedra, star sets, zonotopes, and abstract-domain representations. NNV supports both exa…
▽ More
This paper presents the Neural Network Verification (NNV) software tool, a set-based verification framework for deep neural networks (DNNs) and learning-enabled cyber-physical systems (CPS). The crux of NNV is a collection of reachability algorithms that make use of a variety of set representations, such as polyhedra, star sets, zonotopes, and abstract-domain representations. NNV supports both exact (sound and complete) and over-approximate (sound) reachability algorithms for verifying safety and robustness properties of feed-forward neural networks (FFNNs) with various activation functions. For learning-enabled CPS, such as closed-loop control systems incorporating neural networks, NNV provides exact and over-approximate reachability analysis schemes for linear plant models and FFNN controllers with piecewise-linear activation functions, such as ReLUs. For similar neural network control systems (NNCS) that instead have nonlinear plant models, NNV supports over-approximate analysis by combining the star set analysis used for FFNN controllers with zonotope-based analysis for nonlinear plant dynamics building on CORA. We evaluate NNV using two real-world case studies: the first is safety verification of ACAS Xu networks and the second deals with the safety verification of a deep learning-based adaptive cruise control system.
△ Less
Submitted 11 April, 2020;
originally announced April 2020.
-
Verification of Deep Convolutional Neural Networks Using ImageStars
Authors:
Hoang-Dung Tran,
Stanley Bak,
Weiming Xiang,
Taylor T. Johnson
Abstract:
Convolutional Neural Networks (CNN) have redefined the state-of-the-art in many real-world applications, such as facial recognition, image classification, human pose estimation, and semantic segmentation. Despite their success, CNNs are vulnerable to adversarial attacks, where slight changes to their inputs may lead to sharp changes in their output in even well-trained networks. Set-based analysis…
▽ More
Convolutional Neural Networks (CNN) have redefined the state-of-the-art in many real-world applications, such as facial recognition, image classification, human pose estimation, and semantic segmentation. Despite their success, CNNs are vulnerable to adversarial attacks, where slight changes to their inputs may lead to sharp changes in their output in even well-trained networks. Set-based analysis methods can detect or prove the absence of bounded adversarial attacks, which can then be used to evaluate the effectiveness of neural network training methodology. Unfortunately, existing verification approaches have limited scalability in terms of the size of networks that can be analyzed.
In this paper, we describe a set-based framework that successfully deals with real-world CNNs, such as VGG16 and VGG19, that have high accuracy on ImageNet. Our approach is based on a new set representation called the ImageStar, which enables efficient exact and over-approximative analysis of CNNs. ImageStars perform efficient set-based analysis by combining operations on concrete images with linear programming (LP). Our approach is implemented in a tool called NNV, and can verify the robustness of VGG networks with respect to a small set of input states, derived from adversarial attacks, such as the DeepFool attack. The experimental results show that our approach is less conservative and faster than existing zonotope methods, such as those used in DeepZ, and the polytope method used in DeepPoly.
△ Less
Submitted 14 May, 2020; v1 submitted 11 April, 2020;
originally announced April 2020.
-
Reachability Analysis for Feed-Forward Neural Networks using Face Lattices
Authors:
Xiaodong Yang,
Hoang-Dung Tran,
Weiming Xiang,
Taylor Johnson
Abstract:
Deep neural networks have been widely applied as an effective approach to handle complex and practical problems. However, one of the most fundamental open problems is the lack of formal methods to analyze the safety of their behaviors. To address this challenge, we propose a parallelizable technique to compute exact reachable sets of a neural network to an input set. Our method currently focuses o…
▽ More
Deep neural networks have been widely applied as an effective approach to handle complex and practical problems. However, one of the most fundamental open problems is the lack of formal methods to analyze the safety of their behaviors. To address this challenge, we propose a parallelizable technique to compute exact reachable sets of a neural network to an input set. Our method currently focuses on feed-forward neural networks with ReLU activation functions. One of the primary challenges for polytope-based approaches is identifying the intersection between intermediate polytopes and hyperplanes from neurons. In this regard, we present a new approach to construct the polytopes with the face lattice, a complete combinatorial structure. The correctness and performance of our methodology are evaluated by verifying the safety of ACAS Xu networks and other benchmarks. Compared to state-of-the-art methods such as Reluplex, Marabou, and NNV, our approach exhibits a significantly higher efficiency. Additionally, our approach is capable of constructing the complete input set given an output set, so that any input that leads to safety violation can be tracked.
△ Less
Submitted 2 March, 2020;
originally announced March 2020.
-
Exclusive photoproduction of vector meson at next-to-leading order from Color Glass Condensate
Authors:
Yanbing Cai,
Wenchang Xiang,
Mengliang Wang,
Daicui Zhou
Abstract:
The exclusive photoproduction of vector mesons ($J/ψ$ and $φ$) are investigated by taking into account the next-to-leading order corrections in the framework of Color Glass Condensate. We confront the next-to-leading order modified dipole amplitude with the HERA data finding good agreement. Our studies show that the $χ^2/d.o.f$ from leading order, running coupling and collinearly improved next-to-…
▽ More
The exclusive photoproduction of vector mesons ($J/ψ$ and $φ$) are investigated by taking into account the next-to-leading order corrections in the framework of Color Glass Condensate. We confront the next-to-leading order modified dipole amplitude with the HERA data finding good agreement. Our studies show that the $χ^2/d.o.f$ from leading order, running coupling and collinearly improved next-to-leading order dipole amplitudes are 2.159, 1.097, and 0.932 for the elastic cross section, and 2.056, 1.449, and 1.357 for differential cross section. The outcomes indicate that the higher-order corrections have a significant contribution to the vector meson productions and the description of the experimental data is dramatically improved once the higher order corrections are included. We extend the next-to-leading order exclusive vector meson production model to LHC energies by using the same parameters obtained from HERA. We find that our model can also give a rather good description of the $J/ψ$ and $φ$ data in proton-proton collision at 7 TeV and 13 TeV at LHCb experiments.
△ Less
Submitted 28 February, 2020;
originally announced February 2020.
-
Anypath Routing Protocol Design via Q-Learning for Underwater Sensor Networks
Authors:
Yuan Zhou,
Tao Cao,
Wei Xiang
Abstract:
As a promising technology in the Internet of Underwater Things, underwater sensor networks have drawn a widespread attention from both academia and industry. However, designing a routing protocol for underwater sensor networks is a great challenge due to high energy consumption and large latency in the underwater environment. This paper proposes a Q-learning-based localization-free anypath routing…
▽ More
As a promising technology in the Internet of Underwater Things, underwater sensor networks have drawn a widespread attention from both academia and industry. However, designing a routing protocol for underwater sensor networks is a great challenge due to high energy consumption and large latency in the underwater environment. This paper proposes a Q-learning-based localization-free anypath routing (QLFR) protocol to prolong the lifetime as well as reduce the end-to-end delay for underwater sensor networks. Aiming at optimal routing policies, the Q-value is calculated by jointly considering the residual energy and depth information of sensor nodes throughout the routing process. More specifically, we define two reward functions (i.e., depth-related and energy-related rewards) for Q-learning with the objective of reducing latency and extending network lifetime. In addition, a new holding time mechanism for packet forwarding is designed according to the priority of forwarding candidate nodes. Furthermore, a mathematical analysis is presented to analyze the performance of the proposed routing protocol. Extensive simulation results demonstrate the superiority performance of the proposed routing protocol in terms of the end-to-end delay and the network lifetime.
△ Less
Submitted 21 February, 2020;
originally announced February 2020.
-
Dynamic Energy Dispatch Based on Deep Reinforcement Learning in IoT-Driven Smart Isolated Microgrids
Authors:
Lei Lei,
Yue Tan,
Glenn Dahlenburg,
Wei Xiang,
Kan Zheng
Abstract:
Microgrids (MGs) are small, local power grids that can operate independently from the larger utility grid. Combined with the Internet of Things (IoT), a smart MG can leverage the sensory data and machine learning techniques for intelligent energy management. This paper focuses on deep reinforcement learning (DRL)-based energy dispatch for IoT-driven smart isolated MGs with diesel generators (DGs),…
▽ More
Microgrids (MGs) are small, local power grids that can operate independently from the larger utility grid. Combined with the Internet of Things (IoT), a smart MG can leverage the sensory data and machine learning techniques for intelligent energy management. This paper focuses on deep reinforcement learning (DRL)-based energy dispatch for IoT-driven smart isolated MGs with diesel generators (DGs), photovoltaic (PV) panels, and a battery. A finite-horizon Partial Observable Markov Decision Process (POMDP) model is formulated and solved by learning from historical data to capture the uncertainty in future electricity consumption and renewable power generation. In order to deal with the instability problem of DRL algorithms and unique characteristics of finite-horizon models, two novel DRL algorithms, namely, finite-horizon deep deterministic policy gradient (FH-DDPG) and finite-horizon recurrent deterministic policy gradient (FH-RDPG), are proposed to derive energy dispatch policies with and without fully observable state information. A case study using real isolated MG data is performed, where the performance of the proposed algorithms are compared with the other baseline DRL and non-DRL algorithms. Moreover, the impact of uncertainties on MG performance is decoupled into two levels and evaluated respectively.
△ Less
Submitted 16 November, 2020; v1 submitted 6 February, 2020;
originally announced February 2020.
-
Training Progressively Binarizing Deep Networks Using FPGAs
Authors:
Corey Lammie,
Wei Xiang,
Mostafa Rahimi Azghadi
Abstract:
While hardware implementations of inference routines for Binarized Neural Networks (BNNs) are plentiful, current realizations of efficient BNN hardware training accelerators, suitable for Internet of Things (IoT) edge devices, leave much to be desired. Conventional BNN hardware training accelerators perform forward and backward propagations with parameters adopting binary representations, and opti…
▽ More
While hardware implementations of inference routines for Binarized Neural Networks (BNNs) are plentiful, current realizations of efficient BNN hardware training accelerators, suitable for Internet of Things (IoT) edge devices, leave much to be desired. Conventional BNN hardware training accelerators perform forward and backward propagations with parameters adopting binary representations, and optimization using parameters adopting floating or fixed-point real-valued representations--requiring two distinct sets of network parameters. In this paper, we propose a hardware-friendly training method that, contrary to conventional methods, progressively binarizes a singular set of fixed-point network parameters, yielding notable reductions in power and resource utilizations. We use the Intel FPGA SDK for OpenCL development environment to train our progressively binarizing DNNs on an OpenVINO FPGA. We benchmark our training approach on both GPUs and FPGAs using CIFAR-10 and compare it to conventional BNNs.
△ Less
Submitted 8 January, 2020;
originally announced January 2020.
-
High energy asymptotic behavior of the $S$-matrix in the saturation region with the smallest dipole running coupling prescription
Authors:
Wenchang Xiang,
Yanbing Cai,
Mengliang Wang,
Daicui Zhou
Abstract:
We present results from analytic solutions to the running coupling, full next-to-leading order, and collinearly improved next-to-leading order Balitsky-Kovchegov equations in the saturation region with the smallest dipole size QCD running coupling prescription. The analytic results of the $S$-matrix of the latter two equations show that the $\exp(-\mathcal{O}(Y^{3/2}))$ rapidity dependence of the…
▽ More
We present results from analytic solutions to the running coupling, full next-to-leading order, and collinearly improved next-to-leading order Balitsky-Kovchegov equations in the saturation region with the smallest dipole size QCD running coupling prescription. The analytic results of the $S$-matrix of the latter two equations show that the $\exp(-\mathcal{O}(Y^{3/2}))$ rapidity dependence of the solutions are replaced by $\exp(-\mathcal{O}(Y))$ dependence once the running coupling prescription is switched from parent dipole to the smallest dipole prescription, which indicate that the $S$-matrix has a strong dependence on the choice of running coupling prescription. We compute the numerical solutions of these Balitsky-Kovchegov equations with the smallest and parent dipole running coupling prescriptions, the numerical results confirm the analytic outcomes. The rare fluctuations of the $S$-matrix on top of next-to-leading order corrections are also studied under the smallest dipole running coupling prescription in the center of mass frame. It shows that the rare fluctuations are strongly suppressed and less important in the smallest dipole running coupling prescription case as compared to the parent dipole running coupling prescription case.
△ Less
Submitted 15 November, 2019;
originally announced November 2019.
-
Hypersonic Similarity for the Two Dimensional Steady Potential Flow with Large Data
Authors:
Jie Kuang,
Wei Xiang,
Yongqian Zhang
Abstract:
In this paper, we establish the first rigorous mathematical global result on the validation of the hypersonic similarity, which is also called the Mach-number independence principle, for the two dimensional steady potential flow. The hypersonic similarity is equivalent to the Van Dyke's similarity theory, that if the hypersonic similarity parameter $K$ is fixed, the shock solution structures (afte…
▽ More
In this paper, we establish the first rigorous mathematical global result on the validation of the hypersonic similarity, which is also called the Mach-number independence principle, for the two dimensional steady potential flow. The hypersonic similarity is equivalent to the Van Dyke's similarity theory, that if the hypersonic similarity parameter $K$ is fixed, the shock solution structures (after scaling) are consistent, when the Mach number of the flow is sufficiently large. One of the difficulty is that after scaling, the solutions are usually of large data since the perturbation of the hypersonic flow is usually not small related to the sonic speed. In order to make it, we first employ the modified Glimm scheme to construct the approximate solutions with large data and find fine structure of the elementary wave curves to obtain the global existence of entropy solutions with large data, for fixed $K$ and sufficiently large Mach number of the incoming flow $M_{\infty}$. Finally, we further show that for a fixed hypersonic similarity parameter $K$, if the Mach number $M_{\infty}\rightarrow\infty$, the solutions obtained above approach to the solution of the corresponding initial-boundary value problem of the hypersonic small-disturbance equations. Therefore, the Van Dyke's similarity theory is first verified rigorously.
△ Less
Submitted 5 November, 2019;
originally announced November 2019.
-
Detached shock past a blunt body
Authors:
Myoungjean Bae,
Wei Xiang
Abstract:
In $\R^2$, a symmetric blunt body $W_b$ is fixed by smoothing out the tip of a symmetric wedge $W_0$ with the half-wedge angle $θ_w\in (0, \fracπ{2})$. We first show that if a horizontal supersonic flow of uniform state moves toward $W_0$ with a Mach number $M_{\infty}>1$ sufficiently large, %depending on $θ_w$, then there exist two shock solutions, {\emph{a weak shock solution and a strong shock…
▽ More
In $\R^2$, a symmetric blunt body $W_b$ is fixed by smoothing out the tip of a symmetric wedge $W_0$ with the half-wedge angle $θ_w\in (0, \fracπ{2})$. We first show that if a horizontal supersonic flow of uniform state moves toward $W_0$ with a Mach number $M_{\infty}>1$ sufficiently large, %depending on $θ_w$, then there exist two shock solutions, {\emph{a weak shock solution and a strong shock solution}}, with the shocks being straight and attached to the tip of the wedge $W_0$. Such shock solutions are given by a shock polar analysis, and they satisfy entropy conditions. The main goal of this work is to construct a detached shock solution of the steady Euler system for inviscid compressible irrotational flow in $\R^2\setminus W_b$. In particular, we seek a shock solution with the far-field state being the strong shock solution obtained from the shock polar analysis. Furthermore, we prove that the detached shock forms a convex curve around the blunt body $W_b$ if the Mach number of the incoming supersonic flow is sufficiently large, and if the boundary of $W_b$ is convex.
△ Less
Submitted 12 June, 2020; v1 submitted 29 September, 2019;
originally announced September 2019.
-
Real-Time Verification for Distributed Cyber-Physical Systems
Authors:
Hoang-Dung Tran,
Luan Viet Nguyen,
Patrick Musau,
Weiming Xiang,
Taylor T. Johnson
Abstract:
Safety-critical distributed cyber-physical systems (CPSs) have been found in a wide range of applications. Notably, they have displayed a great deal of utility in intelligent transportation, where autonomous vehicles communicate and cooperate with each other via a high-speed communication network. Such systems require an ability to identify maneuvers in real-time that cause dangerous circumstances…
▽ More
Safety-critical distributed cyber-physical systems (CPSs) have been found in a wide range of applications. Notably, they have displayed a great deal of utility in intelligent transportation, where autonomous vehicles communicate and cooperate with each other via a high-speed communication network. Such systems require an ability to identify maneuvers in real-time that cause dangerous circumstances and ensure the implementation always meets safety-critical requirements. In this paper, we propose a real-time decentralized reachability approach for safety verification of a distributed multi-agent CPS with the underlying assumption that all agents are time-synchronized with a low degree of error. In the proposed approach, each agent periodically computes its local reachable set and exchanges this reachable set with the other agents with the goal of verifying the system safety. Our method, implemented in Java, takes advantages of the timing information and the reachable set information that are available in the exchanged messages to reason about the safety of the whole system in a decentralized manner. Any particular agent can also perform local safety verification tasks based on their local clocks by analyzing the messages it receives. We applied the proposed method to verify, in real-time, the safety properties of a group of quadcopters performing a distributed search mission.
△ Less
Submitted 19 September, 2019;
originally announced September 2019.
-
Inclusive diffractive heavy quarkonium photoproduction in pp, pA and AA collisions
Authors:
Yi Yang,
Shaohong Cai,
Yanbing Cai,
Wenchang Xiang
Abstract:
The inclusive $J/Ψ$ production by direct and resolved photoproduction in the $γ$p scattering is calculated based on the nonrelativistic quantum chromodynamics (NRQCD) factorization formalism, which is in good agreement with the experimental data of total cross section distribution of heavy quarkonium production at HERA. Then we extend the formalism including the direct and resolved photoproduction…
▽ More
The inclusive $J/Ψ$ production by direct and resolved photoproduction in the $γ$p scattering is calculated based on the nonrelativistic quantum chromodynamics (NRQCD) factorization formalism, which is in good agreement with the experimental data of total cross section distribution of heavy quarkonium production at HERA. Then we extend the formalism including the direct and resolved photoproduction processes to resolved pomeron model to study the heavy quarkonium photoproduction at the LHC energies. We present the predictions of rapidity and transverse momentum distributions of the inclusive diffractive $J/Ψ$, $Ψ(2S)$ and $Υ$ photoproduction in pp, pPb and PbPb collisions at the LHC energies. Our numerical results indicate that the resolved photoproduction processes play an important role in the heavy quarkonium production. Especially for pp collisions, the contribution of resolved photoproduction processes is the largest, which can reach to $28\%$, $13\%$ and $44\%$ for the rapidity distributions of $J/Ψ$, $Ψ(2S)$ and $Υ$ inclusive diffractive photoproduction, respectively.
△ Less
Submitted 21 July, 2019;
originally announced July 2019.
-
Multi-user Resource Control with Deep Reinforcement Learning in IoT Edge Computing
Authors:
Lei Lei,
Huijuan Xu,
Xiong Xiong,
Kan Zheng,
Wei Xiang,
Xianbin Wang
Abstract:
By leveraging the concept of mobile edge computing (MEC), massive amount of data generated by a large number of Internet of Things (IoT) devices could be offloaded to MEC server at the edge of wireless network for further computational intensive processing. However, due to the resource constraint of IoT devices and wireless network, both the communications and computation resources need to be allo…
▽ More
By leveraging the concept of mobile edge computing (MEC), massive amount of data generated by a large number of Internet of Things (IoT) devices could be offloaded to MEC server at the edge of wireless network for further computational intensive processing. However, due to the resource constraint of IoT devices and wireless network, both the communications and computation resources need to be allocated and scheduled efficiently for better system performance. In this paper, we propose a joint computation offloading and multi-user scheduling algorithm for IoT edge computing system to minimize the long-term average weighted sum of delay and power consumption under stochastic traffic arrival. We formulate the dynamic optimization problem as an infinite-horizon average-reward continuous-time Markov decision process (CTMDP) model. One critical challenge in solving this MDP problem for the multi-user resource control is the curse-of-dimensionality problem, where the state space of the MDP model and the computation complexity increase exponentially with the growing number of users or IoT devices. In order to overcome this challenge, we use the deep reinforcement learning (RL) techniques and propose a neural network architecture to approximate the value functions for the post-decision system states. The designed algorithm to solve the CTMDP problem supports semi-distributed auction-based implementation, where the IoT devices submit bids to the BS to make the resource control decisions centrally. Simulation results show that the proposed algorithm provides significant performance improvement over the baseline algorithms, and also outperforms the RL algorithms based on other neural network architectures.
△ Less
Submitted 18 June, 2019;
originally announced June 2019.
-
A Survey of Asynchronous Programming Using Coroutines in the Internet of Things and Embedded Systems
Authors:
Bruce Belson,
Jason Holdsworth,
Wei Xiang,
Bronson Philippa
Abstract:
Many Internet of Things and embedded projects are event-driven, and therefore require asynchronous and concurrent programming. Current proposals for C++20 suggest that coroutines will have native language support. It is timely to survey the current use of coroutines in embedded systems development. This paper investigates existing research which uses or describes coroutines on resource-constrained…
▽ More
Many Internet of Things and embedded projects are event-driven, and therefore require asynchronous and concurrent programming. Current proposals for C++20 suggest that coroutines will have native language support. It is timely to survey the current use of coroutines in embedded systems development. This paper investigates existing research which uses or describes coroutines on resource-constrained platforms. The existing research is analysed with regard to: software platform, hardware platform and capacity; use cases and intended benefits; and the application programming interface design used for coroutines. A systematic map** study was performed, to select studies published between 2007 and 2018 which contained original research into the application of coroutines on resource-constrained platforms. An initial set of 566 candidate papers were reduced to only 35 after filters were applied, revealing the following taxonomy. The C & C++ programming languages were used by 22 studies out of 35. As regards hardware, 16 studies used 8- or 16-bit processors while 13 used 32-bit processors. The four most common use cases were concurrency (17 papers), network communication (15), sensor readings (9) and data flow (7). The leading intended benefits were code style and simplicity (12 papers), scheduling (9) and efficiency (8). A wide variety of techniques have been used to implement coroutines, including native macros, additional tool chain steps, new language features and non-portable assembly language. We conclude that there is widespread demand for coroutines on resource-constrained devices. Our findings suggest that there is significant demand for a formalised, stable, well-supported implementation of coroutines in C++, designed with consideration of the special needs of resource-constrained devices, and further that such an implementation would bring benefits specific to such devices.
△ Less
Submitted 2 June, 2019;
originally announced June 2019.
-
Accelerating Deterministic and Stochastic Binarized Neural Networks on FPGAs Using OpenCL
Authors:
Corey Lammie,
Wei Xiang,
Mostafa Rahimi Azghadi
Abstract:
Recent technological advances have proliferated the available computing power, memory, and speed of modern Central Processing Units (CPUs), Graphics Processing Units (GPUs), and Field Programmable Gate Arrays (FPGAs). Consequently, the performance and complexity of Artificial Neural Networks (ANNs) is burgeoning. While GPU accelerated Deep Neural Networks (DNNs) currently offer state-of-the-art pe…
▽ More
Recent technological advances have proliferated the available computing power, memory, and speed of modern Central Processing Units (CPUs), Graphics Processing Units (GPUs), and Field Programmable Gate Arrays (FPGAs). Consequently, the performance and complexity of Artificial Neural Networks (ANNs) is burgeoning. While GPU accelerated Deep Neural Networks (DNNs) currently offer state-of-the-art performance, they consume large amounts of power. Training such networks on CPUs is inefficient, as data throughput and parallel computation is limited. FPGAs are considered a suitable candidate for performance critical, low power systems, e.g. the Internet of Things (IOT) edge devices. Using the Xilinx SDAccel or Intel FPGA SDK for OpenCL development environment, networks described using the high-level OpenCL framework can be accelerated on heterogeneous platforms. Moreover, the resource utilization and power consumption of DNNs can be further enhanced by utilizing regularization techniques that binarize network weights. In this paper, we introduce, to the best of our knowledge, the first FPGA-accelerated stochastically binarized DNN implementations, and compare them to implementations accelerated using both GPUs and FPGAs. Our developed networks are trained and benchmarked using the popular MNIST and CIFAR-10 datasets, and achieve near state-of-the-art performance, while offering a >16-fold improvement in power consumption, compared to conventional GPU-accelerated networks. Both our FPGA-accelerated determinsitic and stochastic BNNs reduce inference times on MNIST and CIFAR-10 by >9.89x and >9.91x, respectively.
△ Less
Submitted 15 May, 2019;
originally announced May 2019.
-
Uniqueness and Stability for the Shock Reflection-Diffraction Problem for Potential Flow
Authors:
Gui-Qiang G. Chen,
Mikhail Feldman,
Wei Xiang
Abstract:
When a plane shock hits a two-dimensional wedge head on, it experiences a reflection-diffraction process, and then a self-similar reflected shock moves outward as the original shock moves forward in time. The experimental, computational, and asymptotic analysis has indicated that various patterns occur, including regular reflection and Mach reflection. The von Neumann conjectures on the transition…
▽ More
When a plane shock hits a two-dimensional wedge head on, it experiences a reflection-diffraction process, and then a self-similar reflected shock moves outward as the original shock moves forward in time. The experimental, computational, and asymptotic analysis has indicated that various patterns occur, including regular reflection and Mach reflection. The von Neumann conjectures on the transition from regular to Mach reflection involve the existence, uniqueness, and stability of regular shock reflection-diffraction configurations, generated by concave cornered wedges for compressible flow. In this paper, we discuss some recent developments in the study of the von Neumann conjectures. More specifically, we present our recent results of the uniqueness and stability of regular shock reflection-diffraction configurations governed by the potential flow equation in an appropriate class of solutions. We first show that the transonic shocks in the global solutions obtained in Chen-Feldman [19] are convex. Then we establish the uniqueness of global shock reflection-diffraction configurations with convex transonic shocks for any wedge angle larger than the detachment angle or the critical angle. Moreover, the stability of the solutions with respect to the wedge angle is also shown. Our approach also provides an alternative way of proving the existence of the admissible solutions established first in [19].
△ Less
Submitted 5 October, 2019; v1 submitted 29 March, 2019;
originally announced April 2019.
-
Low Mach Number Limit of Multidimensional Steady Flows on the Airfoil Problem
Authors:
Mingjie Li,
Tian-Yi Wang,
Wei Xiang
Abstract:
In this paper, we justify the low Mach number limit of the steady irrotational Euler flows for the airfoil problem, which is the first result for the low Mach number limit of the steady Euler flows in an exterior domain. The uniform estimates on the compressibility parameter $\varepsilon$, which is singular for the flows, are established via a variational approach based on the compressible-incompr…
▽ More
In this paper, we justify the low Mach number limit of the steady irrotational Euler flows for the airfoil problem, which is the first result for the low Mach number limit of the steady Euler flows in an exterior domain. The uniform estimates on the compressibility parameter $\varepsilon$, which is singular for the flows, are established via a variational approach based on the compressible-incompressible difference functions. The limit is on the Hölder space and is unique. Moreover, the convergence rate is of order $\varepsilon^2$. It is noticeable that, due to the feature of the airfoil problem, the extra force dominates the asymptotic decay rate of the compressible flow to the infinity. And the effect of extra force vanishes in the limiting process from compressible flows to the incompressible ones, as the Mach number goes to zero.
△ Less
Submitted 11 January, 2019;
originally announced January 2019.
-
Low Mach Number Limit of Steady Euler Flows in Multi-Dimensional Nozzles
Authors:
Mingjie Li,
Tian-Yi Wang,
Wei Xiang
Abstract:
In this paper, we consider the steady irrotational Euler flows in multidimensional nozzles. The first rigorous proof on the existence and uniqueness of the incompressible flow is provided. Then, we justify the corresponding low Mach number limit, which is the first result of the low Mach number limit on the steady Euler flows. We establish several uniform estimates, which does not depend on the Ma…
▽ More
In this paper, we consider the steady irrotational Euler flows in multidimensional nozzles. The first rigorous proof on the existence and uniqueness of the incompressible flow is provided. Then, we justify the corresponding low Mach number limit, which is the first result of the low Mach number limit on the steady Euler flows. We establish several uniform estimates, which does not depend on the Mach number, to validate the convergence of the compressible flow with extra force to the corresponding incompressible flow, which is free from the extra force effect, as the Mach number goes to zero. The limit is on the Holder space and is unique. Moreover, the convergence rate is of order $\varepsilon^2$, which is higher than the ones in the previous results on the low Mach number limit for the unsteady flow.
△ Less
Submitted 4 January, 2019;
originally announced January 2019.
-
Basis Signal Optimization for N-Continuous OFDM
Authors:
Peng Wei,
Yue Xiao,
Wei Xiang
Abstract:
A novel basis signal optimization method is proposed for reducing the interference in the N-continuous orthogonal frequency division multiplexing (NC-OFDM) system. Compared to conventional NC-OFDM, the proposed scheme is capable of improving the transmission performance while maintaining an identical sidelobe suppression performance imposed by the linear combination of two groups of basis signals.…
▽ More
A novel basis signal optimization method is proposed for reducing the interference in the N-continuous orthogonal frequency division multiplexing (NC-OFDM) system. Compared to conventional NC-OFDM, the proposed scheme is capable of improving the transmission performance while maintaining an identical sidelobe suppression performance imposed by the linear combination of two groups of basis signals. Our performance results demonstrate that with a low complexity overhead, the proposed scheme is capable of striking a better trade-off among the bit error rate (BER), complexity, and the sidelobe suppression performance compared to its conventional counterpart.
△ Less
Submitted 3 November, 2020; v1 submitted 28 December, 2018;
originally announced December 2018.
-
Rare fluctuations of the $S$-matrix at NLO in QCD
Authors:
Wenchang Xiang,
Yanbing Cai,
Mengliang Wang,
Daicui Zhou
Abstract:
We calculate the rare fluctuations of the $S$-matrix on top of the full next-to-leading order corrections in the center of mass frame. The relevant result in the saturation regime shows that the exponential factor of the $S$-matrix is $\sqrt{2}$ as large as the result which emerges when the rare fluctuation effects are taken into account. We find that the factor of $\sqrt{2}$ change of the exponen…
▽ More
We calculate the rare fluctuations of the $S$-matrix on top of the full next-to-leading order corrections in the center of mass frame. The relevant result in the saturation regime shows that the exponential factor of the $S$-matrix is $\sqrt{2}$ as large as the result which emerges when the rare fluctuation effects are taken into account. We find that the factor of $\sqrt{2}$ change of the exponential factor is induced by the gluon loop corrections which compensate part of rapidity decrease of the $S$-matrix made by quark loops and lead to the rare fluctuations becoming important again. To ensure the relevant results of the $S$-matrix are independent of the frame choice, the rare fluctuations of the $S$-matrix are also derived in a general frame. It is found that all the results are consistent with each other in both frames.
△ Less
Submitted 27 December, 2018;
originally announced December 2018.
-
Specification-Guided Safety Verification for Feedforward Neural Networks
Authors:
Weiming Xiang,
Hoang-Dung Tran,
Taylor T. Johnson
Abstract:
This paper presents a specification-guided safety verification method for feedforward neural networks with general activation functions. As such feedforward networks are memoryless, they can be abstractly represented as mathematical functions, and the reachability analysis of the neural network amounts to interval analysis problems. In the framework of interval analysis, a computationally efficien…
▽ More
This paper presents a specification-guided safety verification method for feedforward neural networks with general activation functions. As such feedforward networks are memoryless, they can be abstractly represented as mathematical functions, and the reachability analysis of the neural network amounts to interval analysis problems. In the framework of interval analysis, a computationally efficient formula which can quickly compute the output interval sets of a neural network is developed. Then, a specification-guided reachability algorithm is developed. Specifically, the bisection process in the verification algorithm is completely guided by a given safety specification. Due to the employment of the safety specification, unnecessary computations are avoided and thus the computational cost can be reduced significantly. Experiments show that the proposed method enjoys much more efficiency in safety verification with significantly less computational cost.
△ Less
Submitted 14 December, 2018;
originally announced December 2018.
-
Heter-Sim: Heterogeneous multi-agent systems simulation by interactive data-driven optimization
Authors:
Jia** Ren,
Wei Xiang,
Yangxi Xiao,
Ruigang Yang,
Dinesh Manocha,
Xiaogang **
Abstract:
Interactive multi-agent simulation algorithms are used to compute the trajectories and behaviors of different entities in virtual reality scenarios. However, current methods involve considerable parameter tweaking to generate plausible behaviors. We introduce a novel approach (Heter-Sim) that combines physics-based simulation methods with data-driven techniques using an optimization-based formulat…
▽ More
Interactive multi-agent simulation algorithms are used to compute the trajectories and behaviors of different entities in virtual reality scenarios. However, current methods involve considerable parameter tweaking to generate plausible behaviors. We introduce a novel approach (Heter-Sim) that combines physics-based simulation methods with data-driven techniques using an optimization-based formulation. Our approach is general and can simulate heterogeneous agents corresponding to human crowds, traffic, vehicles, or combinations of different agents with varying dynamics. We estimate motion states from real-world datasets that include information about position, velocity, and control direction. Our optimization algorithm considers several constraints, including velocity continuity, collision avoidance, attraction, and direction control. To accelerate the computations, we reduce the search space for both collision avoidance and optimal solution computation. Heter-Sim can simulate tens or hundreds of agents at interactive rates and we compare its accuracy with real-world datasets and prior algorithms. We also perform user studies that evaluate the plausible behaviors generated by our algorithm and a user study that evaluates the plausibility of our algorithm via VR.
△ Less
Submitted 1 December, 2018;
originally announced December 2018.
-
Performance Analysis of Low-Interference N-Continuous OFDM
Authors:
Peng Wei,
Yue Xiao,
Lilin Dan,
Shichao Lv,
Wei Xiang
Abstract:
The low-interference N-continuous orthogonal frequency division multiplexing (NC-OFDM) system [25], [26] is investigated in terms of power spectrum density (PSD) and bit error rate (BER), to prove and quantify its advantages over traditional NC-OFDM. The PSD and BER performances of the low-interference scheme are analyzed and compared under the parameters of the highest derivative order (HDO) and…
▽ More
The low-interference N-continuous orthogonal frequency division multiplexing (NC-OFDM) system [25], [26] is investigated in terms of power spectrum density (PSD) and bit error rate (BER), to prove and quantify its advantages over traditional NC-OFDM. The PSD and BER performances of the low-interference scheme are analyzed and compared under the parameters of the highest derivative order (HDO) and the length of the smooth signal. In the context of PSD, different from one discontinuous point per NC-OFDM symbol in [25], the sidelobe suppression performance is evaluated upon considering two discontinuous points due to the finite continuity of the smooth signal and its higher-order derivatives. It was shown that with an increased HDO and an increased length of the smooth signal, a more rapid sidelobe decaying is achieved, for the significant continuity improvement of the OFDM signal and its higher-order derivatives. However, our PSD analysis also shows that if the length of the smooth signal is set inappropriately, the performance may be degraded, even if the HDO is large. Furthermore, it was shown in the error performance analysis that under the assumptions of perfect and imperfect synchronization, the low-interference scheme incurs small BER performance degradation for a short length of the smooth signal or a small HDO as opposed to conventional NC-OFDM. Based on analysis and simulation results, the trade-offs between sidelobe suppression and BER are studied with the above two parameters.
△ Less
Submitted 3 November, 2020; v1 submitted 27 November, 2018;
originally announced November 2018.
-
Verification for Machine Learning, Autonomy, and Neural Networks Survey
Authors:
Weiming Xiang,
Patrick Musau,
Ayana A. Wild,
Diego Manzanas Lopez,
Nathaniel Hamilton,
Xiaodong Yang,
Joel Rosenfeld,
Taylor T. Johnson
Abstract:
This survey presents an overview of verification techniques for autonomous systems, with a focus on safety-critical autonomous cyber-physical systems (CPS) and subcomponents thereof. Autonomy in CPS is enabling by recent advances in artificial intelligence (AI) and machine learning (ML) through approaches such as deep neural networks (DNNs), embedded in so-called learning enabled components (LECs)…
▽ More
This survey presents an overview of verification techniques for autonomous systems, with a focus on safety-critical autonomous cyber-physical systems (CPS) and subcomponents thereof. Autonomy in CPS is enabling by recent advances in artificial intelligence (AI) and machine learning (ML) through approaches such as deep neural networks (DNNs), embedded in so-called learning enabled components (LECs) that accomplish tasks from classification to control. Recently, the formal methods and formal verification community has developed methods to characterize behaviors in these LECs with eventual goals of formally verifying specifications for LECs, and this article presents a survey of many of these recent approaches.
△ Less
Submitted 3 October, 2018;
originally announced October 2018.
-
Non-coherent Massive SIMO Systems in ISI Channels: Constellation Design and Performance Analysis
Authors:
Huiqiang Xie,
Weiyang Xu,
Wei Xiang,
Ke Shao,
Shengbo Xu
Abstract:
A massive single-input multiple-output (SIMO) system with a single transmit antenna and a large number of receive antennas in intersymbol interference (ISI) channels is considered. Contrast to existing energy detection (ED)-based non-coherent receiver where conventional pulse amplitude modulation (PAM) is employed, we propose a constellation design which minimizes the symbol-error rate (SER) with…
▽ More
A massive single-input multiple-output (SIMO) system with a single transmit antenna and a large number of receive antennas in intersymbol interference (ISI) channels is considered. Contrast to existing energy detection (ED)-based non-coherent receiver where conventional pulse amplitude modulation (PAM) is employed, we propose a constellation design which minimizes the symbol-error rate (SER) with the knowledge of channel statistics. To make a comparison, we derive the SERs of the ED-based receiver with both the proposed constellation and PAM, namely $P_{e\_opt}$ and $P_{e\_pam}$. Specifically, asymptotic behaviors of the SER in regimes of a large number of receive antennas and high signal-to-noise ratio (SNR) are investigated. Analytical results demonstrate that the logarithms of both $P_{e\_opt}$ and $P_{e\_pam}$ decrease approximately linearly with the number of receive antennas, while $P_{e\_opt}$ degrades faster. It is also shown that the proposed design is of less cost, because compared with PAM, less antennas are required to achieve the same error rate.
△ Less
Submitted 9 September, 2018;
originally announced September 2018.
-
Global Instability of the Multi-dimensional Plane Shocks for the isothermal flow
Authors:
Ning-An Lai,
Wei Xiang,
Yi Zhou
Abstract:
In this paper, we are concerned with the long time behavior of the piecewise smooth solutions to the generalized Riemann problem governed by the compressible isothermal Euler equations in two and three dimensions. Non-existence result is established for the fan-shaped wave structure solution, including two shocks and one contact discontinuity and which is a perturbation of plane waves. Therefore,…
▽ More
In this paper, we are concerned with the long time behavior of the piecewise smooth solutions to the generalized Riemann problem governed by the compressible isothermal Euler equations in two and three dimensions. Non-existence result is established for the fan-shaped wave structure solution, including two shocks and one contact discontinuity and which is a perturbation of plane waves. Therefore, unlike the one-dimensional case, the multi-dimensional plane shocks are not stable globally. What is more, the sharp lifespan estimate is established which is the same as the lifespan estimate for the nonlinear wave equations in both two and three space dimensions.
△ Less
Submitted 19 July, 2018; v1 submitted 19 July, 2018;
originally announced July 2018.
-
Large Margin Few-Shot Learning
Authors:
Yong Wang,
Xiao-Ming Wu,
Qimai Li,
Jiatao Gu,
Wangmeng Xiang,
Lei Zhang,
Victor O. K. Li
Abstract:
The key issue of few-shot learning is learning to generalize. This paper proposes a large margin principle to improve the generalization capacity of metric based methods for few-shot learning. To realize it, we develop a unified framework to learn a more discriminative metric space by augmenting the classification loss function with a large margin distance loss function for training. Extensive exp…
▽ More
The key issue of few-shot learning is learning to generalize. This paper proposes a large margin principle to improve the generalization capacity of metric based methods for few-shot learning. To realize it, we develop a unified framework to learn a more discriminative metric space by augmenting the classification loss function with a large margin distance loss function for training. Extensive experiments on two state-of-the-art few-shot learning methods, graph neural networks and prototypical networks, show that our method can improve the performance of existing models substantially with very little computational overhead, demonstrating the effectiveness of the large margin principle and the potential of our method.
△ Less
Submitted 21 September, 2018; v1 submitted 8 July, 2018;
originally announced July 2018.
-
Reachability Analysis and Safety Verification for Neural Network Control Systems
Authors:
Weiming Xiang,
Taylor T. Johnson
Abstract:
Autonomous cyber-physical systems (CPS) rely on the correct operation of numerous components, with state-of-the-art methods relying on machine learning (ML) and artificial intelligence (AI) components in various stages of sensing and control. This paper develops methods for estimating the reachable set and verifying safety properties of dynamical systems under control of neural network-based contr…
▽ More
Autonomous cyber-physical systems (CPS) rely on the correct operation of numerous components, with state-of-the-art methods relying on machine learning (ML) and artificial intelligence (AI) components in various stages of sensing and control. This paper develops methods for estimating the reachable set and verifying safety properties of dynamical systems under control of neural network-based controllers that may be implemented in embedded software. The neural network controllers we consider are feedforward neural networks called multilayer perceptrons (MLP) with general activation functions. As such feedforward networks are memoryless, they may be abstractly represented as mathematical functions, and the reachability analysis of the network amounts to range (image) estimation of this function provided a set of inputs. By discretizing the input set of the MLP into a finite number of hyper-rectangular cells, our approach develops a linear programming (LP) based algorithm for over-approximating the output set of the MLP with its input set as a union of hyper-rectangular cells. Combining the over-approximation for the output set of an MLP based controller and reachable set computation routines for ordinary difference/differential equation (ODE) models, an algorithm is developed to estimate the reachable set of the closed-loop system. Finally, safety verification for neural network control systems can be performed by checking the existence of intersections between the estimated reachable set and unsafe regions. The approach is implemented in a computational software prototype and evaluated on numerical examples.
△ Less
Submitted 24 May, 2018;
originally announced May 2018.
-
Homocentric Hypersphere Feature Embedding for Person Re-identification
Authors:
Wangmeng Xiang,
Jianqiang Huang,
Xianbiao Qi,
Xiansheng Hua,
Lei Zhang
Abstract:
Person re-identification (Person ReID) is a challenging task due to the large variations in camera viewpoint, lighting, resolution, and human pose. Recently, with the advancement of deep learning technologies, the performance of Person ReID has been improved swiftly. Feature extraction and feature matching are two crucial components in the training and deployment stages of Person ReID. However, ma…
▽ More
Person re-identification (Person ReID) is a challenging task due to the large variations in camera viewpoint, lighting, resolution, and human pose. Recently, with the advancement of deep learning technologies, the performance of Person ReID has been improved swiftly. Feature extraction and feature matching are two crucial components in the training and deployment stages of Person ReID. However, many existing Person ReID methods have measure inconsistency between the training stage and the deployment stage, and they couple magnitude and orientation information of feature vectors in feature representation. Meanwhile, traditional triplet loss methods focus on samples within a mini-batch and lack knowledge of global feature distribution. To address these issues, we propose a novel homocentric hypersphere embedding scheme to decouple magnitude and orientation information for both feature and weight vectors, and reformulate classification loss and triplet loss to their angular versions and combine them into an angular discriminative loss. We evaluate our proposed method extensively on the widely used Person ReID benchmarks, including Market1501, CUHK03 and DukeMTMC-ReID. Our method demonstrates leading performance on all datasets.
△ Less
Submitted 30 April, 2018; v1 submitted 24 April, 2018;
originally announced April 2018.
-
Stability of supersonic contact discontinuity for two-dimensional steady compressible Euler flows in a finite nozzle
Authors:
Feimin Huang,
Jie Kuang,
Dehua Wang,
Wei Xiang
Abstract:
In this paper, we study the stability of supersonic contact discontinuity for the two-dimensional steady compressible Euler flows in a finitely long nozzle of varying cross-sections. We formulate the problem as an initial-boundary value problem with the contact discontinuity as a free boundary. To deal with the free boundary value problem, we employ the Lagrangian transformation to straighten the…
▽ More
In this paper, we study the stability of supersonic contact discontinuity for the two-dimensional steady compressible Euler flows in a finitely long nozzle of varying cross-sections. We formulate the problem as an initial-boundary value problem with the contact discontinuity as a free boundary. To deal with the free boundary value problem, we employ the Lagrangian transformation to straighten the contact discontinuity and then the free boundary value problem becomes a fixed boundary value problem. We develop an iteration scheme and establish some novel estimates of solutions for the first order of hyperbolic equations on a cornered domain. Finally, by using the inverse Lagrangian transformation and under the assumption that the incoming flows and the nozzle walls are smooth perturbations of the background state, we prove that the original free boundary problem admits a unique weak solution which is a small perturbation of the background state and the solution consists of two smooth supersonic flows separated by a smooth contact discontinuity.
△ Less
Submitted 12 April, 2018;
originally announced April 2018.
-
Simulation-Based Reachability Analysis for High-Index Large Linear Differential Algebraic Equations
Authors:
Hoang-Dung Tran,
Weiming Xiang,
Nathaniel Hamilton,
Taylor T. Johnson
Abstract:
Reachability analysis is a fundamental problem for safety verification and falsification of Cyber-Physical Systems (CPS) whose dynamics follow physical laws usually represented as differential equations. In the last two decades, numerous reachability analysis methods and tools have been proposed for a common class of dynamics in CPS known as ordinary differential equations (ODE). However, there is…
▽ More
Reachability analysis is a fundamental problem for safety verification and falsification of Cyber-Physical Systems (CPS) whose dynamics follow physical laws usually represented as differential equations. In the last two decades, numerous reachability analysis methods and tools have been proposed for a common class of dynamics in CPS known as ordinary differential equations (ODE). However, there is lack of methods dealing with differential algebraic equations (DAE) which is a more general class of dynamics that is widely used to describe a variety of problems from engineering and science such as multibody mechanics, electrical cicuit design, incompressible fluids, molecular dynamics and chemcial process control. Reachability analysis for DAE systems is more complex than ODE systems, especially for high-index DAEs because they contain both a differential part (i.e., ODE) and algebraic constraints (AC). In this paper, we extend the recent scalable simulation-based reachability analysis in combination with decoupling techniques for a class of high-index large linear DAEs. In particular, a high-index linear DAE is first decoupled into one ODE and one or several AC subsystems based on the well-known Marz decoupling method ultilizing admissible projectors. Then, the discrete reachable set of the DAE, represented as a list of star-sets, is computed using simulation. Unlike ODE reachability analysis where the initial condition is freely defined by a user, in DAE cases, the consistency of the inititial condition is an essential requirement to guarantee a feasible solution. Therefore, a thorough check for the consistency is invoked before computing the discrete reachable set. Our approach sucessfully verifies (or falsifies) a wide range of practical, high-index linear DAE systems in which the number of state variables varies from several to thousands.
△ Less
Submitted 9 April, 2018;
originally announced April 2018.
-
Convexity of Self-Similar Transonic Shocks and Free Boundaries for the Euler Equations for Potential Flow
Authors:
Gui-Qiang G. Chen,
Mikhail Feldman,
Wei Xiang
Abstract:
We are concerned with geometric properties of transonic shocks as free boundaries in two-dimensional self-similar coordinates for compressible fluid flows, which are not only important for the understanding of geometric structure and stability of fluid motions in continuum mechanics but also fundamental in the mathematical theory of multidimensional conservation laws. A transonic shock for the Eul…
▽ More
We are concerned with geometric properties of transonic shocks as free boundaries in two-dimensional self-similar coordinates for compressible fluid flows, which are not only important for the understanding of geometric structure and stability of fluid motions in continuum mechanics but also fundamental in the mathematical theory of multidimensional conservation laws. A transonic shock for the Euler equations for self-similar potential flow separates elliptic (subsonic) and hyperbolic (supersonic) phases of the self-similar solution of the corresponding nonlinear partial differential equation in a domain under consideration, in which the location of the transonic shock is apriori unknown. We first develop a general framework under which self-similar transonic shocks, as free boundaries, are proved to be uniformly convex, and then apply this framework to prove the uniform convexity of transonic shocks in the two longstanding fundamental shock problems -- the shock reflection-diffraction by wedges and the Prandtl-Meyer reflection for supersonic flows past solid ramps. To achieve this, our approach is to exploit underlying nonlocal properties of the solution and the free boundary for the potential flow equation.
△ Less
Submitted 6 June, 2020; v1 submitted 6 March, 2018;
originally announced March 2018.
-
Reachable Set Estimation and Safety Verification for Piecewise Linear Systems with Neural Network Controllers
Authors:
Weiming Xiang,
Hoang-Dung Tran,
Joel A. Rosenfeld,
Taylor T. Johnson
Abstract:
In this work, the reachable set estimation and safety verification problems for a class of piecewise linear systems equipped with neural network controllers are addressed. The neural network is considered to consist of Rectified Linear Unit (ReLU) activation functions. A layer-by-layer approach is developed for the output reachable set computation of ReLU neural networks. The computation is formul…
▽ More
In this work, the reachable set estimation and safety verification problems for a class of piecewise linear systems equipped with neural network controllers are addressed. The neural network is considered to consist of Rectified Linear Unit (ReLU) activation functions. A layer-by-layer approach is developed for the output reachable set computation of ReLU neural networks. The computation is formulated in the form of a set of manipulations for a union of polytopes. Based on the output reachable set for neural network controllers, the output reachable set for a piecewise linear feedback control system can be estimated iteratively for a given finite-time interval. With the estimated output reachable set, the safety verification for piecewise linear systems with neural network controllers can be performed by checking the existence of intersections of unsafe regions and output reach set. A numerical example is presented to illustrate the effectiveness of our approach.
△ Less
Submitted 20 February, 2018;
originally announced February 2018.
-
Reachable Set Estimation and Verification for Neural Network Models of Nonlinear Dynamic Systems
Authors:
Weiming Xiang,
Diego Manzanas Lopez,
Patrick Musau,
Taylor T. Johnson
Abstract:
Neural networks have been widely used to solve complex real-world problems. Due to the complicate, nonlinear, non-convex nature of neural networks, formal safety guarantees for the behaviors of neural network systems will be crucial for their applications in safety-critical systems. In this paper, the reachable set estimation and verification problems for Nonlinear Autoregressive-Moving Average (N…
▽ More
Neural networks have been widely used to solve complex real-world problems. Due to the complicate, nonlinear, non-convex nature of neural networks, formal safety guarantees for the behaviors of neural network systems will be crucial for their applications in safety-critical systems. In this paper, the reachable set estimation and verification problems for Nonlinear Autoregressive-Moving Average (NARMA) models in the forms of neural networks are addressed. The neural network involved in the model is a class of feed-forward neural networks called Multi-Layer Perceptron (MLP). By partitioning the input set of an MLP into a finite number of cells, a layer-by-layer computation algorithm is developed for reachable set estimation for each individual cell. The union of estimated reachable sets of all cells forms an over-approximation of reachable set of the MLP. Furthermore, an iterative reachable set estimation algorithm based on reachable set estimation for MLPs is developed for NARMA models. The safety verification can be performed by checking the existence of intersections of unsafe regions and estimated reachable set. Several numerical examples are provided to illustrate our approach.
△ Less
Submitted 10 February, 2018;
originally announced February 2018.