-
Graph neural networks with configuration cross-attention for tensor compilers
Authors:
Dmitrii Khizbullin,
Eduardo Rocha de Andrade,
Thanh Hau Nguyen,
Matheus Pedroza Ferreira,
David R. Pugh
Abstract:
With the recent popularity of neural networks comes the need for efficient serving of inference workloads. A neural network inference workload can be represented as a computational graph with nodes as operators transforming multidimensional tensors. The tensors can be transposed and/or tiled in a combinatorially large number of ways, some configurations leading to accelerated inference. We propose…
▽ More
With the recent popularity of neural networks comes the need for efficient serving of inference workloads. A neural network inference workload can be represented as a computational graph with nodes as operators transforming multidimensional tensors. The tensors can be transposed and/or tiled in a combinatorially large number of ways, some configurations leading to accelerated inference. We propose TGraph, a neural graph architecture that allows screening for fast configurations of the target computational graph, thus representing an artificial intelligence (AI) tensor compiler in contrast to the traditional heuristics-based compilers. The proposed solution improves mean Kendall's $τ$ across layout collections of TpuGraphs from 29.8% of the reliable baseline to 67.4% of TGraph. We estimate the potential CO$_2$ emission reduction associated with our work to be equivalent to over 50% of the total household emissions in the areas hosting AI-oriented data centers.
△ Less
Submitted 26 May, 2024;
originally announced May 2024.
-
Early years of Biased Random-Key Genetic Algorithms: A systematic review
Authors:
Mariana A. Londe,
Luciana S. Pessoa,
Cartlos E. Andrade,
Mauricio G. C. Resende
Abstract:
This paper presents a systematic literature review and bibliometric analysis focusing on Biased Random-Key Genetic Algorithms (BRKGA). BRKGA is a metaheuristic framework that uses random-key-based chromosomes with biased, uniform, and elitist mating strategies alongside a genetic algorithm. This review encompasses around~250 papers, covering a diverse array of applications ranging from classical c…
▽ More
This paper presents a systematic literature review and bibliometric analysis focusing on Biased Random-Key Genetic Algorithms (BRKGA). BRKGA is a metaheuristic framework that uses random-key-based chromosomes with biased, uniform, and elitist mating strategies alongside a genetic algorithm. This review encompasses around~250 papers, covering a diverse array of applications ranging from classical combinatorial optimization problems to real-world industrial scenarios, and even non-traditional applications like hyperparameter tuning in machine learning and scenario generation for two-stage problems. In summary, this study offers a comprehensive examination of the BRKGA metaheuristic and its various applications, shedding light on key areas for future research.
△ Less
Submitted 23 May, 2024; v1 submitted 2 May, 2024;
originally announced May 2024.
-
Biased Random-Key Genetic Algorithms: A Review
Authors:
Mariana A. Londe,
Luciana S. Pessoa,
Carlos E. Andrade,
Mauricio G. C. Resende
Abstract:
This paper is a comprehensive literature review of Biased Random-Key Genetic Algorithms (BRKGA). BRKGA is a metaheuristic that employs random-key-based chromosomes with biased, uniform, and elitist mating strategies in a genetic algorithm framework. The review encompasses over 150 papers with a wide range of applications, including classical combinatorial optimization problems, real-world industri…
▽ More
This paper is a comprehensive literature review of Biased Random-Key Genetic Algorithms (BRKGA). BRKGA is a metaheuristic that employs random-key-based chromosomes with biased, uniform, and elitist mating strategies in a genetic algorithm framework. The review encompasses over 150 papers with a wide range of applications, including classical combinatorial optimization problems, real-world industrial use cases, and non-orthodox applications such as neural network hyperparameter tuning in machine learning. Scheduling is by far the most prevalent application area in this review, followed by network design and location problems. The most frequent hybridization method employed is local search, and new features aim to increase population diversity. Overall, this survey provides a comprehensive overview of the BRKGA metaheuristic and its applications and highlights important areas for future research.
△ Less
Submitted 6 December, 2023; v1 submitted 1 December, 2023;
originally announced December 2023.
-
Predictive Maintenance Model Based on Anomaly Detection in Induction Motors: A Machine Learning Approach Using Real-Time IoT Data
Authors:
Sergio F. Chevtchenko,
Monalisa C. M. dos Santos,
Diego M. Vieira,
Ricardo L. Mota,
Elisson Rocha,
Bruna V. Cruz,
Danilo Araújo,
Ermeson Andrade
Abstract:
With the support of Internet of Things (IoT) devices, it is possible to acquire data from degradation phenomena and design data-driven models to perform anomaly detection in industrial equipment. This approach not only identifies potential anomalies but can also serve as a first step toward building predictive maintenance policies. In this work, we demonstrate a novel anomaly detection system on i…
▽ More
With the support of Internet of Things (IoT) devices, it is possible to acquire data from degradation phenomena and design data-driven models to perform anomaly detection in industrial equipment. This approach not only identifies potential anomalies but can also serve as a first step toward building predictive maintenance policies. In this work, we demonstrate a novel anomaly detection system on induction motors used in pumps, compressors, fans, and other industrial machines. This work evaluates a combination of pre-processing techniques and machine learning (ML) models with a low computational cost. We use a combination of pre-processing techniques such as Fast Fourier Transform (FFT), Wavelet Transform (WT), and binning, which are well-known approaches for extracting features from raw data. We also aim to guarantee an optimal balance between multiple conflicting parameters, such as anomaly detection rate, false positive rate, and inference speed of the solution. To this end, multiobjective optimization and analysis are performed on the evaluated models. Pareto-optimal solutions are presented to select which models have the best results regarding classification metrics and computational effort. Differently from most works in this field that use publicly available datasets to validate their models, we propose an end-to-end solution combining low-cost and readily available IoT sensors. The approach is validated by acquiring a custom dataset from induction motors. Also, we fuse vibration, temperature, and noise data from these sensors as the input to the proposed ML model. Therefore, we aim to propose a methodology general enough to be applied in different industrial contexts in the future.
△ Less
Submitted 15 October, 2023;
originally announced October 2023.
-
Combining Two Adversarial Attacks Against Person Re-Identification Systems
Authors:
Eduardo de O. Andrade,
Igor Garcia Ballhausen Sampaio,
Joris Guérin,
José Viterbo
Abstract:
The field of Person Re-Identification (Re-ID) has received much attention recently, driven by the progress of deep neural networks, especially for image classification. The problem of Re-ID consists in identifying individuals through images captured by surveillance cameras in different scenarios. Governments and companies are investing a lot of time and money in Re-ID systems for use in public saf…
▽ More
The field of Person Re-Identification (Re-ID) has received much attention recently, driven by the progress of deep neural networks, especially for image classification. The problem of Re-ID consists in identifying individuals through images captured by surveillance cameras in different scenarios. Governments and companies are investing a lot of time and money in Re-ID systems for use in public safety and identifying missing persons. However, several challenges remain for successfully implementing Re-ID, such as occlusions and light reflections in people's images. In this work, we focus on adversarial attacks on Re-ID systems, which can be a critical threat to the performance of these systems. In particular, we explore the combination of adversarial attacks against Re-ID models, trying to strengthen the decrease in the classification results. We conduct our experiments on three datasets: DukeMTMC-ReID, Market-1501, and CUHK03. We combine the use of two types of adversarial attacks, P-FGSM and Deep Mis-Ranking, applied to two popular Re-ID models: IDE (ResNet-50) and AlignedReID. The best result demonstrates a decrease of 3.36% in the Rank-10 metric for AlignedReID applied to CUHK03. We also try to use Dropout during the inference as a defense method.
△ Less
Submitted 24 September, 2023;
originally announced September 2023.
-
Anomaly Detection in Industrial Machinery using IoT Devices and Machine Learning: a Systematic Map**
Authors:
Sérgio F. Chevtchenko,
Elisson da Silva Rocha,
Monalisa Cristina Moura Dos Santos,
Ricardo Lins Mota,
Diego Moura Vieira,
Ermeson Carneiro de Andrade,
Danilo Ricardo Barbosa de Araújo
Abstract:
Anomaly detection is critical in the smart industry for preventing equipment failure, reducing downtime, and improving safety. Internet of Things (IoT) has enabled the collection of large volumes of data from industrial machinery, providing a rich source of information for Anomaly Detection. However, the volume and complexity of data generated by the Internet of Things ecosystems make it difficult…
▽ More
Anomaly detection is critical in the smart industry for preventing equipment failure, reducing downtime, and improving safety. Internet of Things (IoT) has enabled the collection of large volumes of data from industrial machinery, providing a rich source of information for Anomaly Detection. However, the volume and complexity of data generated by the Internet of Things ecosystems make it difficult for humans to detect anomalies manually. Machine learning (ML) algorithms can automate anomaly detection in industrial machinery by analyzing generated data. Besides, each technique has specific strengths and weaknesses based on the data nature and its corresponding systems. However, the current systematic map** studies on Anomaly Detection primarily focus on addressing network and cybersecurity-related problems, with limited attention given to the industrial sector. Additionally, these studies do not cover the challenges involved in using ML for Anomaly Detection in industrial machinery within the context of the IoT ecosystems. This paper presents a systematic map** study on Anomaly Detection for industrial machinery using IoT devices and ML algorithms to address this gap. The study comprehensively evaluates 84 relevant studies spanning from 2016 to 2023, providing an extensive review of Anomaly Detection research. Our findings identify the most commonly used algorithms, preprocessing techniques, and sensor types. Additionally, this review identifies application areas and points to future challenges and research opportunities.
△ Less
Submitted 14 November, 2023; v1 submitted 28 July, 2023;
originally announced July 2023.
-
A Map** Study of Machine Learning Methods for Remaining Useful Life Estimation of Lead-Acid Batteries
Authors:
Sérgio F Chevtchenko,
Elisson da Silva Rocha,
Bruna Cruz,
Ermeson Carneiro de Andrade,
Danilo Ricardo Barbosa de Araújo
Abstract:
Energy storage solutions play an increasingly important role in modern infrastructure and lead-acid batteries are among the most commonly used in the rechargeable category. Due to normal degradation over time, correctly determining the battery's State of Health (SoH) and Remaining Useful Life (RUL) contributes to enhancing predictive maintenance, reliability, and longevity of battery systems. Besi…
▽ More
Energy storage solutions play an increasingly important role in modern infrastructure and lead-acid batteries are among the most commonly used in the rechargeable category. Due to normal degradation over time, correctly determining the battery's State of Health (SoH) and Remaining Useful Life (RUL) contributes to enhancing predictive maintenance, reliability, and longevity of battery systems. Besides improving the cost savings, correct estimation of the SoH can lead to reduced pollution though reuse of retired batteries. This paper presents a map** study of the state-of-the-art in machine learning methods for estimating the SoH and RUL of lead-acid batteries. These two indicators are critical in the battery management systems of electric vehicles, renewable energy systems, and other applications that rely heavily on this battery technology. In this study, we analyzed the types of machine learning algorithms employed for estimating SoH and RUL, and evaluated their performance in terms of accuracy and inference time. Additionally, this map** identifies and analyzes the most commonly used combinations of sensors in specific applications, such as vehicular batteries. The map** concludes by highlighting potential gaps and opportunities for future research, which lays the foundation for further advancements in the field.
△ Less
Submitted 11 July, 2023;
originally announced July 2023.
-
CSS-T Codes from Reed Muller Codes for Quantum Fault Tolerance
Authors:
Emma Andrade,
Jessalyn Bolkema,
Thomas Dexter,
Harrison Eggers,
Victoria Luongo,
Felice Manganiello,
Luke Szramowski
Abstract:
CSS-T codes are a class of stabilizer codes introduced by Rengaswami et al with desired properties for quantum fault-tolerance. In this work, we give a comprehensive study of CSS-T codes built from Reed-Muller codes. These classical codes allow for the construction of CSST code families with non-vanishing asymptotic rate up to 1/2 and possibly diverging minimum distance. This desirable property en…
▽ More
CSS-T codes are a class of stabilizer codes introduced by Rengaswami et al with desired properties for quantum fault-tolerance. In this work, we give a comprehensive study of CSS-T codes built from Reed-Muller codes. These classical codes allow for the construction of CSST code families with non-vanishing asymptotic rate up to 1/2 and possibly diverging minimum distance. This desirable property enables constant overhead magic state distillation.
△ Less
Submitted 10 May, 2023;
originally announced May 2023.
-
Social-based Cooperation of Vehicles for Data Dissemination of Critical Urban Events
Authors:
Alisson Yury,
Everaldo Andrade,
Michele Nogueira,
Aldri Santos,
Fernando Matos
Abstract:
Critical urban events need to be efficiently handled, for instance, through rapid notification. VANETs are a promising choice in supporting notification of information on arbitrary critical events. Although the dynamicity of VANETs compromises the dissemination process, the connections among vehicles based on users' social interests allow for optimizing message exchange and data dissemination. Thi…
▽ More
Critical urban events need to be efficiently handled, for instance, through rapid notification. VANETs are a promising choice in supporting notification of information on arbitrary critical events. Although the dynamicity of VANETs compromises the dissemination process, the connections among vehicles based on users' social interests allow for optimizing message exchange and data dissemination. This paper introduces SOCIABLE, a robust data dissemination system for critical urban events that operates in a SIoV network. It is based on vehicles' community with common interests and/or similar routines and employs social influence of vehicles according to their network location to select relay vehicles. In a comparative analysis on NS3 with the MINUET system, SOCIABLE achieved 36.56% less packets transmitted in a dense VANET and a maximum packet delivery delay of 28ms in a sparse VANET, delivering critical event data in a real-time and robust way without overloading the~network.
△ Less
Submitted 9 September, 2020;
originally announced September 2020.
-
Analyzing Cooperative Monitoring and Dissemination of Critical Mobile Events by VANETs
Authors:
Everaldo Andrade,
Aldri Santos,
Paulo Maciel Jr,
Fernando Matos
Abstract:
The treatment of mobile and simultaneous critical urban events requires effective actions by the appropriate authorities. Additionally it implies communication challenges in the speed and accuracy of their occurrence by the entities, as well as dealing with the dynamics and speed in these environments. Cooperative solutions with shared resources that address these challenges become a real option i…
▽ More
The treatment of mobile and simultaneous critical urban events requires effective actions by the appropriate authorities. Additionally it implies communication challenges in the speed and accuracy of their occurrence by the entities, as well as dealing with the dynamics and speed in these environments. Cooperative solutions with shared resources that address these challenges become a real option in hel** to handle these events. This paper presents an evaluation of dynamic monitoring and collaborative dissemination supported by vehicular groups. It aims to analyze the impact of multiple mobile and fixed events in an urban environment on information propagation, considering barriers imposed by the events and the environment. Differently from other studies in the literature, this work takes into account both fixed and mobile events, as well as simultaneous events. NS3 results show that the evaluated system monitored at least 87% and 51.5% of the time for mobile and fixed events respectively, and delivered information over 77% and 50% of the time for those events, with average delay remains close to 0.3s in most scenarios. The results also reveal that a more continuous monitoring of the mobile events is highly dependent on the orientation of the vehicles. The main contribution of this work consists of the performance analysis of both fixed and mobile simultaneous events to support studies on how moving events impact on the dissemination and delivery of real-time data, and thus encouraging the development of new data dissemination protocols for VANETs.
△ Less
Submitted 8 September, 2020;
originally announced September 2020.
-
Cooperative Monitoring and Dissemination of Urban Events Supported by Dynamic Clustering of Vehicles
Authors:
Everaldo Andrade,
Kevin Veloso,
Nathália Vasconcelos,
Aldri Santos,
Fernando Matos
Abstract:
Critical urban events take places at a random way and they need to be dealt with by public authorities quickly to maintain the proper operation of cities. The main challenges for an efficient handling of an event fall precisely in its random nature, and in the speed and accuracy of the notification of its manifestation to the authority. The pervasiveness of vehicles in urban environments, and thei…
▽ More
Critical urban events take places at a random way and they need to be dealt with by public authorities quickly to maintain the proper operation of cities. The main challenges for an efficient handling of an event fall precisely in its random nature, and in the speed and accuracy of the notification of its manifestation to the authority. The pervasiveness of vehicles in urban environments, and their communication and monitoring capabilities, allow to employ VANETs to support the dissemination and handling of such events. Thus, this work proposes MINUET, a dynamic system to support the monitoring and dissemination of urban events, which operates in an ad hoc vehicular network. It uses a cooperative-based strategy where vehicles are able to dynamically coordinate the monitoring and dissemination of events in real time by the means of clusters. Results obtained by NS3 show the performance of MINUET regarding the real-time monitoring and dissemination of events detected in urban areas.
△ Less
Submitted 13 May, 2020;
originally announced May 2020.
-
Joint Spatial Multiplexing and Transmit Diversity in MIMO Ad Hoc Networks
Authors:
Fadhil Firyaguna,
Ana C. O. Christófaro,
Éverton A. L. Andrade,
Tiago Bonfim,
Marcelo M. Carvalho
Abstract:
This paper investigates the performance of MIMO ad hoc networks that employ transmit diversity, as delivered by the Alamouti scheme, and/or spatial multiplexing, according to the Vertical Bell Labs Layered Space-Time system (V-BLAST). Both techniques are implemented in a discrete-event network simulator by focusing on their overall effect on the resulting signal-to-interference-plus-noise ratio (S…
▽ More
This paper investigates the performance of MIMO ad hoc networks that employ transmit diversity, as delivered by the Alamouti scheme, and/or spatial multiplexing, according to the Vertical Bell Labs Layered Space-Time system (V-BLAST). Both techniques are implemented in a discrete-event network simulator by focusing on their overall effect on the resulting signal-to-interference-plus-noise ratio (SINR) at the intended receiver. Unlike previous works that have studied fully-connected scenarios or have assumed simple abstractions to represent MIMO behavior, this paper evaluates MIMO ad hoc networks that are not fully connected by taking into account the effects of multiple antennas on the clear channel assessment (CCA) mechanism of CSMA-like medium access control (MAC) protocols. In addition to presenting a performance evaluation of ad hoc networks operating according to each individual MIMO scheme, this paper proposes simple modifications to the IEEE 802.11 DCF MAC to allow the joint operation of both MIMO techniques. Hence, each pair of nodes is allowed to select the best MIMO configuration for the impending data transfer. The joint operation is based on three operation modes that are selected based on the estimated SINR at the intended receiver and its comparision with a set of threshold values. The performance of ad hoc networks operating with the joint MIMO scheme is compared with their operation using each individual MIMO scheme and the standard SISO IEEE 802.11. Performance results are presented based on MAC-level throughput per node, delay, and fairness under saturated traffic conditions.
△ Less
Submitted 10 April, 2017;
originally announced April 2017.