-
Time, Travel, and Energy in the Uniform Dispersion Problem
Authors:
Michael Amir,
Alfred M. Bruckstein
Abstract:
We investigate the algorithmic problem of uniformly dispersing a swarm of robots in an unknown, gridlike environment. In this setting, our goal is to comprehensively study the relationships between performance metrics and robot capabilities. We introduce a formal model comparing dispersion algorithms based on makespan, traveled distance, energy consumption, sensing, communication, and memory. Usin…
▽ More
We investigate the algorithmic problem of uniformly dispersing a swarm of robots in an unknown, gridlike environment. In this setting, our goal is to comprehensively study the relationships between performance metrics and robot capabilities. We introduce a formal model comparing dispersion algorithms based on makespan, traveled distance, energy consumption, sensing, communication, and memory. Using this framework, we classify several uniform dispersion algorithms according to their capability requirements and performance. We prove that while makespan and travel can be minimized in all environments, energy cannot, as long as the swarm's sensing range is bounded. In contrast, we show that energy can be minimized even by simple, ``ant-like" robots in synchronous settings and asymptotically minimized in asynchronous settings, provided the environment is topologically simply connected. Our findings offer insights into fundamental limitations that arise when designing swarm robotics systems for exploring unknown environments, highlighting the impact of environment's topology on the feasibility of energy-efficient dispersion.
△ Less
Submitted 30 April, 2024;
originally announced April 2024.
-
Real-Time Object Detection in Occluded Environment with Background Cluttering Effects Using Deep Learning
Authors:
Syed Muhammad Aamir,
Hongbin Ma,
Malak Abid Ali Khan,
Muhammad Aaqib
Abstract:
Detection of small, undetermined moving objects or objects in an occluded environment with a cluttered background is the main problem of computer vision. This greatly affects the detection accuracy of deep learning models. To overcome these problems, we concentrate on deep learning models for real-time detection of cars and tanks in an occluded environment with a cluttered background employing SSD…
▽ More
Detection of small, undetermined moving objects or objects in an occluded environment with a cluttered background is the main problem of computer vision. This greatly affects the detection accuracy of deep learning models. To overcome these problems, we concentrate on deep learning models for real-time detection of cars and tanks in an occluded environment with a cluttered background employing SSD and YOLO algorithms and improved precision of detection and reduce problems faced by these models. The developed method makes the custom dataset and employs a preprocessing technique to clean the noisy dataset. For training the developed model we apply the data augmentation technique to balance and diversify the data. We fine-tuned, trained, and evaluated these models on the established dataset by applying these techniques and highlighting the results we got more accurately than without applying these techniques. The accuracy and frame per second of the SSD-Mobilenet v2 model are higher than YOLO V3 and YOLO V4. Furthermore, by employing various techniques like data enhancement, noise reduction, parameter optimization, and model fusion we improve the effectiveness of detection and recognition. We further added a counting algorithm, and target attributes experimental comparison, and made a graphical user interface system for the developed model with features of object counting, alerts, status, resolution, and frame per second. Subsequently, to justify the importance of the developed method analysis of YOLO V3, V4, and SSD were incorporated. Which resulted in the overall completion of the proposed method.
△ Less
Submitted 1 January, 2024;
originally announced January 2024.
-
Patrolling Grids with a Bit of Memory
Authors:
Michael Amir,
Dmitry Rabinovich,
Alfred M. Bruckstein
Abstract:
This work addresses the challenge of patrolling regular grid graphs of any dimension using a single mobile agent with minimal memory and limited sensing range. We show that it is impossible to patrol some grid graphs with $0$ bits of memory, regardless of sensing range, and give an exact characterization of those grid graphs that can be patrolled with $0$ bits of memory and sensing range $V$. On t…
▽ More
This work addresses the challenge of patrolling regular grid graphs of any dimension using a single mobile agent with minimal memory and limited sensing range. We show that it is impossible to patrol some grid graphs with $0$ bits of memory, regardless of sensing range, and give an exact characterization of those grid graphs that can be patrolled with $0$ bits of memory and sensing range $V$. On the other hand, we show that an algorithm exists using $1$ bit of memory and $V=1$ that patrols any $d$-dimensional grid graph. This result is surprising given that the agent must be able to move in $2d$ distinct directions to patrol, while $1$ bit of memory allows specifying only two directions per sensory input. Our $1$-bit patrolling algorithm handles this by carefully exploiting a small state-space to access all the needed directions while avoiding getting stuck. Overall, our results give concrete evidence that extremely little memory is needed for patrolling highly regular environments like grid graphs compared to arbitrary graphs. The techniques we use, such as partitioning the environment into sensing regions and exploiting distinct coordinates resulting from higher-dimensionality, may be applicable to analyzing the space complexity of patrolling in other types of regular environments as well.
△ Less
Submitted 11 May, 2024; v1 submitted 18 July, 2023;
originally announced July 2023.
-
Truveta Mapper: A Zero-shot Ontology Alignment Framework
Authors:
Mariyam Amir,
Murchana Baruah,
Mahsa Eslamialishah,
Sina Ehsani,
Alireza Bahramali,
Sadra Naddaf-Sh,
Saman Zarandioon
Abstract:
In this paper, a new perspective is suggested for unsupervised Ontology Matching (OM) or Ontology Alignment (OA) by treating it as a translation task. Ontologies are represented as graphs, and the translation is performed from a node in the source ontology graph to a path in the target ontology graph. The proposed framework, Truveta Mapper (TM), leverages a multi-task sequence-to-sequence transfor…
▽ More
In this paper, a new perspective is suggested for unsupervised Ontology Matching (OM) or Ontology Alignment (OA) by treating it as a translation task. Ontologies are represented as graphs, and the translation is performed from a node in the source ontology graph to a path in the target ontology graph. The proposed framework, Truveta Mapper (TM), leverages a multi-task sequence-to-sequence transformer model to perform alignment across multiple ontologies in a zero-shot, unified and end-to-end manner. Multi-tasking enables the model to implicitly learn the relationship between different ontologies via transfer-learning without requiring any explicit cross-ontology manually labeled data. This also enables the formulated framework to outperform existing solutions for both runtime latency and alignment quality. The model is pre-trained and fine-tuned only on publicly available text corpus and inner-ontologies data. The proposed solution outperforms state-of-the-art approaches, Edit-Similarity, LogMap, AML, BERTMap, and the recently presented new OM frameworks in Ontology Alignment Evaluation Initiative (OAEI22), offers log-linear complexity, and overall makes the OM task efficient and more straightforward without much post-processing involving map** extension or map** repair. We are open sourcing our solution.
△ Less
Submitted 21 August, 2023; v1 submitted 23 January, 2023;
originally announced January 2023.
-
Object Recognition in Different Lighting Conditions at Various Angles by Deep Learning Method
Authors:
Imran Khan Mirani,
Chen Tianhua,
Malak Abid Ali Khan,
Syed Muhammad Aamir,
Waseef Menhaj
Abstract:
Existing computer vision and object detection methods strongly rely on neural networks and deep learning. This active research area is used for applications such as autonomous driving, aerial photography, protection, and monitoring. Futuristic object detection methods rely on rectangular, boundary boxes drawn over an object to accurately locate its location. The modern object recognition algorithm…
▽ More
Existing computer vision and object detection methods strongly rely on neural networks and deep learning. This active research area is used for applications such as autonomous driving, aerial photography, protection, and monitoring. Futuristic object detection methods rely on rectangular, boundary boxes drawn over an object to accurately locate its location. The modern object recognition algorithms, however, are vulnerable to multiple factors, such as illumination, occlusion, viewing angle, or camera rotation as well as cost. Therefore, deep learning-based object recognition will significantly increase the recognition speed and compatible external interference. In this study, we use convolutional neural networks (CNN) to recognize items, the neural networks have the advantages of end-to-end, sparse relation, and sharing weights. This article aims to classify the name of the various object based on the position of an object's detected box. Instead, under different distances, we can get recognition results with different confidence. Through this study, we find that this model's accuracy through recognition is mainly influenced by the proportion of objects and the number of samples. When we have a small proportion of an object on camera, then we get higher recognition accuracy; if we have a much small number of samples, we can get greater accuracy in recognition. The epidemic has a great impact on the world economy where designing a cheaper object recognition system is the need of time.
△ Less
Submitted 18 October, 2022;
originally announced October 2022.
-
Multi-Agent Distributed and Decentralized Geometric Task Allocation
Authors:
Michael Amir,
Yigal Koifman,
Yakov Bloch,
Ariel Barel,
Alfred M. Bruckstein
Abstract:
We consider the general problem of geometric task allocation, wherein a large, decentralised swarm of simple mobile agents must detect the locations of tasks in the plane and position themselves nearby. The tasks are represented by an a priori unknown demand profile $Φ(x,y)$ that determines how many agents are needed in each location. The agents are autonomous, oblivious and indistinguishable, and…
▽ More
We consider the general problem of geometric task allocation, wherein a large, decentralised swarm of simple mobile agents must detect the locations of tasks in the plane and position themselves nearby. The tasks are represented by an a priori unknown demand profile $Φ(x,y)$ that determines how many agents are needed in each location. The agents are autonomous, oblivious and indistinguishable, and have finite sensing range. They must configure themselves according to $Φ$ using only local information about $Φ$ and about the positions of nearby agents. All agents act according to the same local sensing-based rule of motion, and cannot explicitly communicate nor share information.
We propose an optimization-based approach to the problem which results in attraction-repulsion dynamics. Repulsion encourages agents to spread out and explore the region so as to find the tasks, and attraction causes them to accumulate at task locations. We derive this approach via gradient descent over an appropriate ``error'' functional, and test it extensively through numerical simulations.
The figures in this work are snapshots of simulations that can be viewed online at https://youtu.be/kyUiGYSaaoQ.
△ Less
Submitted 14 October, 2022; v1 submitted 11 October, 2022;
originally announced October 2022.
-
Machine Learning Class Numbers of Real Quadratic Fields
Authors:
Malik Amir,
Yang-Hui He,
Kyu-Hwan Lee,
Thomas Oliver,
Eldar Sultanow
Abstract:
We implement and interpret various supervised learning experiments involving real quadratic fields with class numbers 1, 2 and 3. We quantify the relative difficulties in separating class numbers of matching/different parity from a data-scientific perspective, apply the methodology of feature analysis and principal component analysis, and use symbolic classification to develop machine-learned form…
▽ More
We implement and interpret various supervised learning experiments involving real quadratic fields with class numbers 1, 2 and 3. We quantify the relative difficulties in separating class numbers of matching/different parity from a data-scientific perspective, apply the methodology of feature analysis and principal component analysis, and use symbolic classification to develop machine-learned formulas for class numbers 1, 2 and 3 that apply to our dataset.
△ Less
Submitted 19 September, 2022;
originally announced September 2022.
-
Stigmergy-based, Dual-Layer Coverage of Unknown Indoor Regions
Authors:
Ori Rappel,
Michael Amir,
Alfred M. Bruckstein
Abstract:
We present algorithms for uniformly covering an unknown indoor region with a swarm of simple, anonymous and autonomous mobile agents. The exploration of such regions is made difficult by the lack of a common global reference frame, severe degradation of radio-frequency communication, and numerous ground obstacles. We propose addressing these challenges by using airborne agents, such as Micro Air V…
▽ More
We present algorithms for uniformly covering an unknown indoor region with a swarm of simple, anonymous and autonomous mobile agents. The exploration of such regions is made difficult by the lack of a common global reference frame, severe degradation of radio-frequency communication, and numerous ground obstacles. We propose addressing these challenges by using airborne agents, such as Micro Air Vehicles, in dual capacity, both as mobile explorers and (once they land) as beacons that help other agents navigate the region.
The algorithms we propose are designed for a swarm of simple, identical, ant-like agents with local sensing capabilities. The agents enter the region, which is discretized as a graph, over time from one or more entry points and are tasked with occupying all of its vertices. Unlike many works in this area, we consider the requirement of informing an outside operator with limited information that the coverage mission is complete. Even with this additional requirement we show, both through simulations and mathematical proofs, that the dual role concept results in linear-time termination, while also besting many well-known algorithms in the literature in terms of energy use.
△ Less
Submitted 22 February, 2023; v1 submitted 18 September, 2022;
originally announced September 2022.
-
Systematic review of deep learning and machine learning for building energy
Authors:
Ardabili Sina,
Leila Abdolalizadeh,
Csaba Mako,
Bernat Torok,
Mosavi Amir
Abstract:
The building energy (BE) management has an essential role in urban sustainability and smart cities. Recently, the novel data science and data-driven technologies have shown significant progress in analyzing the energy consumption and energy demand data sets for a smarter energy management. The machine learning (ML) and deep learning (DL) methods and applications, in particular, have been promising…
▽ More
The building energy (BE) management has an essential role in urban sustainability and smart cities. Recently, the novel data science and data-driven technologies have shown significant progress in analyzing the energy consumption and energy demand data sets for a smarter energy management. The machine learning (ML) and deep learning (DL) methods and applications, in particular, have been promising for the advancement of the accurate and high-performance energy models. The present study provides a comprehensive review of ML and DL-based techniques applied for handling BE systems, and it further evaluates the performance of these techniques. Through a systematic review and a comprehensive taxonomy, the advances of ML and DL-based techniques are carefully investigated, and the promising models are introduced. According to the results obtained for energy demand forecasting, the hybrid and ensemble methods are located in high robustness range, SVM-based methods are located in good robustness limitation, ANN-based methods are located in medium robustness limitation and linear regression models are located in low robustness limitations. On the other hand, for energy consumption forecasting, DL-based, hybrid, and ensemble-based models provided the highest robustness score. ANN, SVM, and single ML models provided good and medium robustness and LR-based models provided the lower robustness score. In addition, for energy load forecasting, LR-based models provided the lower robustness score. The hybrid and ensemble-based models provided a higher robustness score. The DL-based and SVM-based techniques provided a good robustness score and ANN-based techniques provided a medium robustness score.
△ Less
Submitted 23 February, 2022;
originally announced February 2022.
-
Digital Twinning Remote Laboratories for Online Practical Learning
Authors:
Claire Palmer,
Ben Roullier,
Muhammad Aamir,
Frank McQuade,
Leonardo Stella,
Ashiq Anjum
Abstract:
The COVID19 pandemic has demonstrated a need for remote learning and virtual learning applications such as virtual reality (VR) and tablet-based solutions. Creating complex learning scenarios by developers is highly time-consuming and can take over a year. It is also costly to employ teams of system analysts, developers and 3D artists. There is a requirement to provide a simple method to enable le…
▽ More
The COVID19 pandemic has demonstrated a need for remote learning and virtual learning applications such as virtual reality (VR) and tablet-based solutions. Creating complex learning scenarios by developers is highly time-consuming and can take over a year. It is also costly to employ teams of system analysts, developers and 3D artists. There is a requirement to provide a simple method to enable lecturers to create their own content for their laboratory tutorials. Research has been undertaken into develo** generic models to enable the semi-automatic creation of a virtual learning tools for subjects that require practical interactions with the lab resources. In addition to the system for creating digital twins, a case study describing the creation of a virtual learning application for an electrical laboratory tutorial has been presented.
△ Less
Submitted 21 July, 2022; v1 submitted 1 December, 2021;
originally announced December 2021.
-
Optimal Physical Sorting of Mobile Agents
Authors:
Dmitry Rabinovich,
Michael Amir,
Alfred M. Bruckstein
Abstract:
Given a collection of red and blue mobile agents located on two grid rows, we seek to move all the blue agents to the far left side and all the red agents to the far right side, thus \textit{physically sorting} them according to color. The agents all start on the bottom row. They move simultaneously at discrete time steps and must not collide. Our goal is to design a centralized algorithm that con…
▽ More
Given a collection of red and blue mobile agents located on two grid rows, we seek to move all the blue agents to the far left side and all the red agents to the far right side, thus \textit{physically sorting} them according to color. The agents all start on the bottom row. They move simultaneously at discrete time steps and must not collide. Our goal is to design a centralized algorithm that controls the agents so as to sort them in the least number of time steps.
We derive an \textbf{exact} lower bound on the amount of time any algorithm requires to sort a given initial configuration of agents. We find an instance optimal algorithm that provably matches this lower bound, attaining the best possible sorting time for any initial configuration. Surprisingly, we find that whenever the leftmost agent is red and the rightmost agent is blue, a straightforward decentralized and local sensing-based algorithm is at most $1$ time step slower than the centralized instance-optimal algorithm.
△ Less
Submitted 6 September, 2022; v1 submitted 11 November, 2021;
originally announced November 2021.
-
Virtual Reality based Digital Twin System for remote laboratories and online practical learning
Authors:
Claire Palmer,
Ben Roullier,
Muhammad Aamir,
Leonardo Stella,
Uchenna Diala,
Ashiq Anjum,
Frank Mcquade,
Keith Cox,
Alex Calvert
Abstract:
There is a need for remote learning and virtual learning applications such as virtual reality (VR) and tablet-based solutions which the current pandemic has demonstrated. Creating complex learning scenarios by developers is highly time-consuming and can take over a year. There is a need to provide a simple method to enable lecturers to create their own content for their laboratory tutorials. Resea…
▽ More
There is a need for remote learning and virtual learning applications such as virtual reality (VR) and tablet-based solutions which the current pandemic has demonstrated. Creating complex learning scenarios by developers is highly time-consuming and can take over a year. There is a need to provide a simple method to enable lecturers to create their own content for their laboratory tutorials. Research is currently being undertaken into develo** generic models to enable the semi-automatic creation of a virtual learning application. A case study describing the creation of a virtual learning application for an electrical laboratory tutorial is presented.
△ Less
Submitted 17 June, 2021;
originally announced June 2021.
-
Comparative Analysis of Machine Learning Approaches to Analyze and Predict the Covid-19 Outbreak
Authors:
Muhammad Naeem,
Jian Yu,
Muhammad Aamir,
Sajjad Ahmad Khan,
Olayinka Adeleye,
Zardad Khan
Abstract:
Background. Forecasting the time of forthcoming pandemic reduces the impact of diseases by taking precautionary steps such as public health messaging and raising the consciousness of doctors. With the continuous and rapid increase in the cumulative incidence of COVID-19, statistical and outbreak prediction models including various machine learning (ML) models are being used by the research communi…
▽ More
Background. Forecasting the time of forthcoming pandemic reduces the impact of diseases by taking precautionary steps such as public health messaging and raising the consciousness of doctors. With the continuous and rapid increase in the cumulative incidence of COVID-19, statistical and outbreak prediction models including various machine learning (ML) models are being used by the research community to track and predict the trend of the epidemic, and also in develo** appropriate strategies to combat and manage its spread. Methods. In this paper, we present a comparative analysis of various ML approaches including Support Vector Machine, Random Forest, K-Nearest Neighbor and Artificial Neural Network in predicting the COVID-19 outbreak in the epidemiological domain. We first apply the autoregressive distributed lag (ARDL) method to identify and model the short and long-run relationships of the time-series COVID-19 datasets. That is, we determine the lags between a response variable and its respective explanatory time series variables as independent variables. Then, the resulting significant variables concerning their lags are used in the regression model selected by the ARDL for predicting and forecasting the trend of the epidemic. Results. Statistical measures i.e., Root Mean Square Error (RMSE), Mean Absolute Error (MAE) and Mean Absolute Percentage Error (MAPE) are used for model accuracy. The values of MAPE for the best selected models for confirmed, recovered and deaths cases are 0.407, 0.094 and 0.124 respectively, which falls under the category of highly accurate forecasts. In addition, we computed fifteen days ahead forecast for the daily deaths, recover, and confirm patients and the cases fluctuated across time in all aspects. Besides, the results reveal the advantages of ML algorithms for supporting decision making of evolving short term policies.
△ Less
Submitted 11 February, 2021;
originally announced February 2021.
-
A Discrete Model of Collective Marching on Rings
Authors:
Michael Amir,
Noa Agmon,
Alfred M. Bruckstein
Abstract:
We study the collective motion of autonomous mobile agents on a ringlike environment. The agents' dynamics is inspired by known laboratory experiments on the dynamics of locust swarms. In these experiments, locusts placed at arbitrary locations and initial orientations on a ring-shaped arena are observed to eventually all march in the same direction. In this work we ask whether, and how fast, a si…
▽ More
We study the collective motion of autonomous mobile agents on a ringlike environment. The agents' dynamics is inspired by known laboratory experiments on the dynamics of locust swarms. In these experiments, locusts placed at arbitrary locations and initial orientations on a ring-shaped arena are observed to eventually all march in the same direction. In this work we ask whether, and how fast, a similar phenomenon occurs in a stochastic swarm of simple agents whose goal is to maintain the same direction of motion for as long as possible. The agents are randomly initiated as marching either clockwise or counterclockwise on a wide ring-shaped region, which we model as $k$ "narrow" concentric tracks on a cylinder. Collisions cause agents to change their direction of motion. To avoid this, agents may decide to switch tracks so as to merge with platoons of agents marching in their direction.
We prove that such agents must eventually converge to a local consensus about their direction of motion, meaning that all agents on each narrow track must eventually march in the same direction. We give asymptotic bounds for the expected amount of time it takes for such convergence or "stabilization" to occur, which depends on the number of agents, the length of the tracks, and the number of tracks. We show that when agents also have a small probability of "erratic", random track-jum** behaviour, a global consensus on the direction of motion across all tracks will eventually be reached. Finally, we verify our theoretical findings in numerical simulations.
△ Less
Submitted 30 May, 2022; v1 submitted 9 December, 2020;
originally announced December 2020.
-
Fast Uniform Dispersion of a Crash-prone Swarm
Authors:
Michael Amir,
Alfred M. Bruckstein
Abstract:
We consider the problem of completely covering an unknown discrete environment with a swarm of asynchronous, frequently-crashing autonomous mobile robots. We represent the environment by a discrete graph, and task the robots with occupying every vertex and with constructing an implicit distributed spanning tree of the graph. The robotic agents activate independently at random exponential waiting t…
▽ More
We consider the problem of completely covering an unknown discrete environment with a swarm of asynchronous, frequently-crashing autonomous mobile robots. We represent the environment by a discrete graph, and task the robots with occupying every vertex and with constructing an implicit distributed spanning tree of the graph. The robotic agents activate independently at random exponential waiting times of mean $1$ and enter the graph environment over time from a source location. They grow the environment's coverage by 'settling' at empty locations and aiding other robots' navigation from these locations. The robots are identical and make decisions driven by the same simple and local rule of behaviour. The local rule is based only on the presence of neighbouring robots, and on whether a settled robot points to the current location. Whenever a robot moves, it may crash and disappear from the environment. Each vertex in the environment has limited physical space, so robots frequently obstruct each other.
Our goal is to show that even under conditions of asynchronicity, frequent crashing, and limited physical space, the simple mobile robots complete their mission in linear time asymptotically almost surely, and time to completion degrades gracefully with the frequency of the crashes. Our model and analysis are based on the well-studied "totally asymmetric simple exclusion process" in statistical mechanics.
△ Less
Submitted 3 June, 2020; v1 submitted 1 July, 2019;
originally announced July 2019.
-
Minimizing Travel in the Uniform Dispersal Problem for Robotic Sensors
Authors:
Michael Amir,
Alfred M. Bruckstein
Abstract:
The limited energy capacity of individual robotic agents in a swarm often limits the possible cooperative tasks they can perform. In this work, we investigate the problem of covering an unknown connected grid environment (e.g. a maze or connected corridors) with a robotic swarm so as to minimize the maximal number of steps that each member of the swarm makes and their activity time before their wo…
▽ More
The limited energy capacity of individual robotic agents in a swarm often limits the possible cooperative tasks they can perform. In this work, we investigate the problem of covering an unknown connected grid environment (e.g. a maze or connected corridors) with a robotic swarm so as to minimize the maximal number of steps that each member of the swarm makes and their activity time before their work is finished, thereby minimizing the energy requirements. The robots are autonomous, anonymous and identical, with local sensors and finite memory, and possess no communication capabilities. They are assumed to disperse over time from a fixed location, and to move synchronously. The robots are tasked with occupying every cell of the environment, while avoiding collisions.
In the literature such topics are known as \textit{uniform dispersal problems}. The goal of minimizing the number of steps traveled by the robots has previously been studied in this context. Our contribution is a local robotic strategy for simply connected grid environments that, by exploiting their topology, achieves optimal makespan (the amount of time it takes to cover the environment) and minimizes the maximal number of steps taken by the individual robots before their deactivation. The robots succeed in discovering optimal paths to their eventual destinations, and finish the covering process in $2V-1$ time steps, where $V$ is the number of cells in the environment.
△ Less
Submitted 7 March, 2019;
originally announced March 2019.
-
Edge-Host Partitioning of Deep Neural Networks with Feature Space Encoding for Resource-Constrained Internet-of-Things Platforms
Authors:
Jong Hwan Ko,
Taesik Na,
Mohammad Faisal Amir,
Saibal Mukhopadhyay
Abstract:
This paper introduces partitioning an inference task of a deep neural network between an edge and a host platform in the IoT environment. We present a DNN as an encoding pipeline, and propose to transmit the output feature space of an intermediate layer to the host. The lossless or lossy encoding of the feature space is proposed to enhance the maximum input rate supported by the edge platform and/…
▽ More
This paper introduces partitioning an inference task of a deep neural network between an edge and a host platform in the IoT environment. We present a DNN as an encoding pipeline, and propose to transmit the output feature space of an intermediate layer to the host. The lossless or lossy encoding of the feature space is proposed to enhance the maximum input rate supported by the edge platform and/or reduce the energy of the edge platform. Simulation results show that partitioning a DNN at the end of convolutional (feature extraction) layers coupled with feature space encoding enables significant improvement in the energy-efficiency and throughput over the baseline configurations that perform the entire inference at the edge or at the host.
△ Less
Submitted 11 February, 2018;
originally announced February 2018.
-
Probabilistic Pursuits on Graphs
Authors:
Michael Amir,
Alfred M. Bruckstein
Abstract:
We consider discrete dynamical systems of "ant-like" agents engaged in a sequence of pursuits on a graph environment. The agents emerge one by one at equal time intervals from a source vertex $s$ and pursue each other by greedily attempting to close the distance to their immediate predecessor, the agent that emerged just before them from $s$, until they arrive at the destination point $t$. Such pu…
▽ More
We consider discrete dynamical systems of "ant-like" agents engaged in a sequence of pursuits on a graph environment. The agents emerge one by one at equal time intervals from a source vertex $s$ and pursue each other by greedily attempting to close the distance to their immediate predecessor, the agent that emerged just before them from $s$, until they arrive at the destination point $t$. Such pursuits have been investigated before in the continuous setting and in discrete time when the underlying environment is a regular grid. In both these settings the agents' walks provably converge to a shortest path from $s$ to $t$. Furthermore, assuming a certain natural probability distribution over the move choices of the agents on the grid (in case there are multiple shortest paths between an agent and its predecessor), the walks converge to the uniform distribution over all shortest paths from $s$ to $t$.
We study the evolution of agent walks over a general finite graph environment $G$. Our model is a natural generalization of the pursuit rule proposed for the case of the grid. The main results are as follows. We show that "convergence" to the shortest paths in the sense of previous work extends to all pseudo-modular graphs (i.e. graphs in which every three pairwise intersecting disks have a nonempty intersection), and also to environments obtained by taking graph products, generalizing previous results in two different ways. We show that convergence to the shortest paths is also obtained by chordal graphs, and discuss some further positive and negative results for planar graphs. In the most general case, convergence to the shortest paths is not guaranteed, and the agents may get stuck on sets of recurrent, non-optimal walks from $s$ to $t$. However, we show that the limiting distributions of the agents' walks will always be uniform distributions over some set of walks of equal length.
△ Less
Submitted 31 January, 2019; v1 submitted 23 October, 2017;
originally announced October 2017.
-
On the Secure Degrees of Freedom of the K-user MAC and 2-user Interference Channels
Authors:
Mohamed Amir,
Tamer Khattab,
Tarek Elfouly
Abstract:
We investigate the secure degrees of freedom (SDoF) of the K-user MIMO multiple access (MAC) and the two user MIMO interference channel. An unknown number of eavesdroppers are trying to decode the messages sent by the transmitters. Each eavesdropper is equipped with a number of antennas less than or equal to a known value NE. The legitimate transmitters and receivers are assumed to have global cha…
▽ More
We investigate the secure degrees of freedom (SDoF) of the K-user MIMO multiple access (MAC) and the two user MIMO interference channel. An unknown number of eavesdroppers are trying to decode the messages sent by the transmitters. Each eavesdropper is equipped with a number of antennas less than or equal to a known value NE. The legitimate transmitters and receivers are assumed to have global channel knowledge. We present the sum SDoF of the two user MIMO interference channel. We derive an upperbound on the sum SDoF of the K-user MAC channel and present an achievable scheme that partially meets the derived upperbound.
△ Less
Submitted 30 March, 2016;
originally announced March 2016.
-
Content-Priority based Interest Forwarding in Content Centric Networks
Authors:
Muhammad Aamir
Abstract:
Content Centric Networking (CCN) is a recent advancement in communication networks where the current research is mainly focusing on routing & cache management strategies of CCN. Nonetheless, other perspectives such as network level security and service quality are also of prime importance; areas which have not been covered deeply so far. This paper introduces an interest forwarding mechanism to pr…
▽ More
Content Centric Networking (CCN) is a recent advancement in communication networks where the current research is mainly focusing on routing & cache management strategies of CCN. Nonetheless, other perspectives such as network level security and service quality are also of prime importance; areas which have not been covered deeply so far. This paper introduces an interest forwarding mechanism to process the requests of consumers at a CCN router. Interest packets are forwarded with respect to the priorities of addressed content while the priority level settings are done by content publishers during an initialization phase using a collaborative mechanism of exchanging messages to agree to the priority levels of all content according to the content-nature. Interests with higher priority content are recorded in Pending Interest Table (PIT) as well as forwarded to content publishers prior to those with lower priority content. A simulation study is also conducted to show the effectiveness of proposed scheme and we observe that the interests with higher priority content are satisfied earlier than the interests with lower priority content.
△ Less
Submitted 18 October, 2014;
originally announced October 2014.
-
Secure Degrees of Freedom of the Gaussian MIMO Wiretap and MIMO Broadcast Channels with Unknown Eavesdroppers
Authors:
Mohamed Amir,
Tamer Khattab,
Tarek Elfouly,
Amr Mohamed
Abstract:
We investigate the secure degrees of freedom (SDoF) of the wiretap and the K user Gaussian broadcast channels with multiple antennas at the transmitter, the legitimate receivers and an unknown number of eavesdroppers each with a number of antennas less than or equal to a known value NE. The channel matrices between the legitimate transmitter and the receivers are available everywhere, while the le…
▽ More
We investigate the secure degrees of freedom (SDoF) of the wiretap and the K user Gaussian broadcast channels with multiple antennas at the transmitter, the legitimate receivers and an unknown number of eavesdroppers each with a number of antennas less than or equal to a known value NE. The channel matrices between the legitimate transmitter and the receivers are available everywhere, while the legitimate pair have no information about the eavesdroppers' channels. We provide the exact sum SDoF for the considered system. A new comprehensive upperbound is deduced and a new achievable scheme based on utilizing jamming is exploited. We prove that cooperative jamming is SDoF optimal even without the eavesdropper CSI available at the transmitters.
△ Less
Submitted 30 March, 2016; v1 submitted 19 September, 2014;
originally announced September 2014.
-
A New Web Based Student Annual Review Information System (SARIS) With Student Success Prediction
Authors:
A. A. Memon,
C. Wang,
M. R. Naeem,
M. Tahir,
M. Aamir
Abstract:
In this paper, we are proposing new web based Student Annual Review Information System (SARIS) and prediction method for the success of scholar students to China Scholarship Council(CSC). The main objective of develo** this system is to save the cost of paper, to reduce the risk of data loss, to decrease the processing time, to reduce the delay in finding for the successful students. The propose…
▽ More
In this paper, we are proposing new web based Student Annual Review Information System (SARIS) and prediction method for the success of scholar students to China Scholarship Council(CSC). The main objective of develo** this system is to save the cost of paper, to reduce the risk of data loss, to decrease the processing time, to reduce the delay in finding for the successful students. The proposed system and prediction method is intended to be used by China Scholarship Council; however SARIS and prediction method are quite generic and can be used by other scholarship agencies.
△ Less
Submitted 16 May, 2014;
originally announced June 2014.
-
Secure Degrees of Freedom of the MIMO Multiple Access Channel with Multiple unknown Eavesdroppers
Authors:
Mohamed Amir,
Tamer Khattab,
Tarek Elfouly,
Amr Mohamed
Abstract:
We investigate the secure degrees of freedom (SDoF) of a two-transmitter Gaussian multiple access channel with multiple antennas at the transmitters, the legitimate receiver with the existence of an unknown number of eavesdroppers each with a number of antennas less than or equal to a known value $N_E$. The channel matrices between the legitimate transmitters and the receiver are available everywh…
▽ More
We investigate the secure degrees of freedom (SDoF) of a two-transmitter Gaussian multiple access channel with multiple antennas at the transmitters, the legitimate receiver with the existence of an unknown number of eavesdroppers each with a number of antennas less than or equal to a known value $N_E$. The channel matrices between the legitimate transmitters and the receiver are available everywhere, while the legitimate pair does not know the eavesdroppers' channels matrices. We provide the exact sum SDoF for the considered system. A new comprehensive upperbound is deduced and a new achievable scheme based on utilizing jamming is exploited. We prove that Cooperative Jamming is SDoF optimal even without the instantaneous eavesdropper CSI available at the transmitters.
△ Less
Submitted 30 March, 2016; v1 submitted 20 April, 2014;
originally announced April 2014.
-
DDoS Attack and Defense: Review of Some Traditional and Current Techniques
Authors:
Muhammad Aamir,
Mustafa Ali Zaidi
Abstract:
Distributed Denial of Service (DDoS) attacks exhaust victim's bandwidth or services. Traditional architecture of Internet is vulnerable to DDoS attacks and an ongoing cycle of attack & defense is observed. In this paper, different types and techniques of DDoS attacks and their countermeasures are reviewed. The significance of this paper is the coverage of many aspects of countering DDoS attacks in…
▽ More
Distributed Denial of Service (DDoS) attacks exhaust victim's bandwidth or services. Traditional architecture of Internet is vulnerable to DDoS attacks and an ongoing cycle of attack & defense is observed. In this paper, different types and techniques of DDoS attacks and their countermeasures are reviewed. The significance of this paper is the coverage of many aspects of countering DDoS attacks including new research on the topic. We survey different papers describing methods of defense against DDoS attacks based on entropy variations, traffic anomaly parameters, neural networks, device level defense, botnet flux identifications and application layer DDoS defense. We also discuss some traditional methods of defense such as traceback and packet filtering techniques so that readers can identify major differences between traditional and current techniques of defense against DDoS attacks. Before the discussion on countermeasures, we mention different attack types under DDoS with traditional and advanced schemes while some information on DDoS trends in the year 2012 Quarter-1 is also provided. We identify that application layer DDoS attacks possess the ability to produce greater impact on the victim as they are driven by legitimate-like traffic making it quite difficult to identify and distinguish from legitimate requests. The need of improved defense against such attacks is therefore more demanding in research. The study conducted in this paper can be helpful for readers and researchers to recognize better techniques of defense in current times against DDoS attacks and contribute with more research on the topic in the light of future challenges identified in this paper.
△ Less
Submitted 21 March, 2014; v1 submitted 24 January, 2014;
originally announced January 2014.
-
Performance Analysis of DiffServ based Quality of Service in a Multimedia Wired Network and VPN effect using OPNET
Authors:
Muhammad Aamir,
Mustafa Zaidi,
Husnain Mansoor
Abstract:
Quality of Service (QoS) techniques are applied in IP networks to utilize available network resources in the most efficient manner to minimize delays and delay variations (jitters) in network traffic having multiple type of services. Multimedia services may include voice, video and database. Researchers have done considerable work on queuing disciplines to analyze and improve QoS performance in wi…
▽ More
Quality of Service (QoS) techniques are applied in IP networks to utilize available network resources in the most efficient manner to minimize delays and delay variations (jitters) in network traffic having multiple type of services. Multimedia services may include voice, video and database. Researchers have done considerable work on queuing disciplines to analyze and improve QoS performance in wired and wireless IP networks. This paper highlights QoS analysis in a wired IP network with more realistic enterprise modeling and presents simulation results of a few statistics not presented and discussed before. Four different applications are used i.e. FTP, Database, Voice over IP (VoIP) and Video Conferencing (VC). Two major queuing disciplines are evaluated i.e. 'Priority Queuing' and 'Weighted Fair Queuing' for packet identification under Differentiated Services Code Point (DSCP). The simulation results show that WFQ has an edge over PQ in terms of queuing delays and jitters experienced by low priority services. For high priority traffic, dependency of 'Traffic Drop', 'Buffer Usage' and 'Packet Delay Variation' on selected buffer sizes is simulated and discussed to evaluate QoS deeper. In the end, it is also analyzed how network's database service with applied Quality of Service may be affected in terms of throughput (average rate of data received) for internal network users when the server is also accessed by external user(s) through Virtual Private Network (VPN).
△ Less
Submitted 24 June, 2012;
originally announced June 2012.
-
A New Achievable DoF Region for the 3-user MxN Symmetric Interference Channel
Authors:
Mohamed Amir,
Amr El-Keyi,
Mohammed Nafie
Abstract:
In this paper, the 3-user multiple-input multiple-output Gaussian interference channel with M antennas at each transmitter and N antennas at each receiver is considered. It is assumed that the channel coefficients are constant and known to all transmitters and receivers. A novel scheme is presented that spans a new achievable degrees of freedom region. For some values of M and N, the proposed sche…
▽ More
In this paper, the 3-user multiple-input multiple-output Gaussian interference channel with M antennas at each transmitter and N antennas at each receiver is considered. It is assumed that the channel coefficients are constant and known to all transmitters and receivers. A novel scheme is presented that spans a new achievable degrees of freedom region. For some values of M and N, the proposed scheme achieve higher number of DoF than are currently achievable, while for other values it meets the best known upperbound. Simulation results are presented showing the superior performance of the proposed schemes to earlier approaches.
△ Less
Submitted 20 May, 2011;
originally announced May 2011.