-
Federated Learning Assisted Deep Q-Learning for Joint Task Offloading and Fronthaul Segment Routing in Open RAN
Authors:
Anselme Ndikumana,
Kim Khoa Nguyen,
Mohamed Cheriet
Abstract:
Offloading computation-intensive tasks to edge clouds has become an efficient way to support resource constraint edge devices. However, task offloading delay is an issue largely due to the networks with limited capacities between edge clouds and edge devices. In this paper, we consider task offloading in Open Radio Access Network (O-RAN), which is a new 5G RAN architecture allowing Open Central Un…
▽ More
Offloading computation-intensive tasks to edge clouds has become an efficient way to support resource constraint edge devices. However, task offloading delay is an issue largely due to the networks with limited capacities between edge clouds and edge devices. In this paper, we consider task offloading in Open Radio Access Network (O-RAN), which is a new 5G RAN architecture allowing Open Central Unit (O-CU) to be co-located with Open Distributed Unit (DU) at the edge cloud for low-latency services. O-RAN relies on fronthaul network to connect O-RAN Radio Units (O-RUs) and edge clouds that host O-DUs. Consequently, tasks are offloaded onto the edge clouds via wireless and fronthaul networks \cite{10045045}, which requires routing. Since edge clouds do not have the same available computation resources and tasks' computation deadlines are different, we need a task distribution approach to multiple edge clouds. Prior work has never addressed this joint problem of task offloading, fronthaul routing, and edge computing. To this end, using segment routing, O-RAN intelligent controllers, and multiple edge clouds, we formulate an optimization problem to minimize offloading, fronthaul routing, and computation delays in O-RAN. To determine the solution of this NP-hard problem, we use Deep Q-Learning assisted by federated learning with a reward function that reduces the Cost of Delay (CoD). The simulation results show that our solution maximizes the reward in minimizing CoD.
△ Less
Submitted 14 August, 2023;
originally announced August 2023.
-
Age of Processing-Based Data Offloading for Autonomous Vehicles in Multi-RATs Open RAN
Authors:
Anselme Ndikumana,
Kim Khoa Nguyen,
Mohamed Cheriet
Abstract:
Today, vehicles use smart sensors to collect data from the road environment. This data is often processed onboard of the vehicles, using expensive hardware. Such onboard processing increases the vehicle's cost, quickly drains its battery, and exhausts its computing resources. Therefore, offloading tasks onto the cloud is required. Still, data offloading is challenging due to low latency requiremen…
▽ More
Today, vehicles use smart sensors to collect data from the road environment. This data is often processed onboard of the vehicles, using expensive hardware. Such onboard processing increases the vehicle's cost, quickly drains its battery, and exhausts its computing resources. Therefore, offloading tasks onto the cloud is required. Still, data offloading is challenging due to low latency requirements for safe and reliable vehicle driving decisions. Moreover, age of processing was not considered in prior research dealing with low-latency offloading for autonomous vehicles. This paper proposes an age of processing-based offloading approach for autonomous vehicles using unsupervised machine learning, Multi-Radio Access Technologies (multi-RATs), and Edge Computing in Open Radio Access Network (O-RAN). We design a collaboration space of edge clouds to process data in proximity to autonomous vehicles. To reduce the variation in offloading delay, we propose a new communication planning approach that enables the vehicle to optimally preselect the available RATs such as Wi-Fi, LTE, or 5G to offload tasks to edge clouds when its local resources are insufficient. We formulate an optimization problem for age-based offloading that minimizes elapsed time from generating tasks and receiving computation output. To handle this non-convex problem, we develop a surrogate problem. Then, we use the Lagrangian method to transform the surrogate problem to unconstrained optimization problem and apply the dual decomposition method. The simulation results show that our approach significantly minimizes the age of processing in data offloading with 90.34 % improvement over similar method.
△ Less
Submitted 14 August, 2023;
originally announced August 2023.
-
Evolution of MAC Protocols in the Machine Learning Decade: A Comprehensive Survey
Authors:
Mostafa Hussien,
Islam A. T. F. Taj-Eddin,
Mohammed F. A. Ahmed,
Ali Ranjha,
Kim Khoa Nguyen,
Mohamed Cheriet
Abstract:
The last decade, (2012 - 2022), saw an unprecedented advance in machine learning (ML) techniques, particularly deep learning (DL). As a result of the proven capabilities of DL, a large amount of work has been presented and studied in almost every field. Since 2012, when the convolution neural networks have been reintroduced in the context of \textit{ImagNet} competition, DL continued to achieve su…
▽ More
The last decade, (2012 - 2022), saw an unprecedented advance in machine learning (ML) techniques, particularly deep learning (DL). As a result of the proven capabilities of DL, a large amount of work has been presented and studied in almost every field. Since 2012, when the convolution neural networks have been reintroduced in the context of \textit{ImagNet} competition, DL continued to achieve superior performance in many challenging tasks and problems. Wireless communications, in general, and medium access control (MAC) techniques, in particular, were among the fields that were heavily affected by this improvement. MAC protocols play a critical role in defining the performance of wireless communication systems. At the same time, the community lacks a comprehensive survey that collects, analyses, and categorizes the recent work in ML-inspired MAC techniques. In this work, we fill this gap by surveying a long line of work in this era. We solidify the impact of machine learning on wireless MAC protocols. We provide a comprehensive background to the widely adopted MAC techniques, their design issues, and their taxonomy, in connection with the famous application domains. Furthermore, we provide an overview of the ML techniques that have been considered in this context. Finally, we augment our work by proposing some promising future research directions and open research questions that are worth further investigation.
△ Less
Submitted 23 January, 2023;
originally announced February 2023.
-
Non-Negative Matrix Factorization with Scale Data Structure Preservation
Authors:
Rachid Hedjam,
Abdelhamid Abdesselam,
Abderrahmane Rahiche,
Mohamed Cheriet
Abstract:
The model described in this paper belongs to the family of non-negative matrix factorization methods designed for data representation and dimension reduction. In addition to preserving the data positivity property, it aims also to preserve the structure of data during matrix factorization. The idea is to add, to the NMF cost function, a penalty term to impose a scale relationship between the pairw…
▽ More
The model described in this paper belongs to the family of non-negative matrix factorization methods designed for data representation and dimension reduction. In addition to preserving the data positivity property, it aims also to preserve the structure of data during matrix factorization. The idea is to add, to the NMF cost function, a penalty term to impose a scale relationship between the pairwise similarity matrices of the original and transformed data points. The solution of the new model involves deriving a new parametrized update scheme for the coefficient matrix, which makes it possible to improve the quality of reduced data when used for clustering and classification. The proposed clustering algorithm is compared to some existing NMF-based algorithms and to some manifold learning-based algorithms when applied to some real-life datasets. The obtained results show the effectiveness of the proposed algorithm.
△ Less
Submitted 22 September, 2022;
originally announced September 2022.
-
Two-level Closed Loops for RAN Slice Resources Management Serving Flying and Ground-based Cars
Authors:
Anselme Ndikumana,
Kim Khoa Nguyen,
Mohamed Cheriet
Abstract:
Flying and ground-based cars require various services such as autonomous driving, remote pilot, infotainment, and remote diagnosis. Each service requires specific Quality of Service (QoS) and network features. Therefore, network slicing can be a solution to fulfill the requirements of various services. Some services, such as infotainment, may have similar requirements to serve flying and ground-ba…
▽ More
Flying and ground-based cars require various services such as autonomous driving, remote pilot, infotainment, and remote diagnosis. Each service requires specific Quality of Service (QoS) and network features. Therefore, network slicing can be a solution to fulfill the requirements of various services. Some services, such as infotainment, may have similar requirements to serve flying and ground-based cars. Therefore, some slices can serve both kinds of cars. However, when network slice resource sharing is too aggressive, slices can not meet QoS requirements, where resource under-provisioning causes the violation of QoS, and resource over-provisioning causes resource under-utilization. We propose two closed loops for managing RAN slice resources for cars to address these challenges. First, we present an auction mechanism for allocating Resource Block (RB) to the tenants who provide services to the cars using slices. Second, we design one closed loop that maps slices and services of tenants to virtual Open Distributed Units (vO-DUs) and assigns RB to vO-DUs for management purposes. Third, we design another closed loop for intra-slices RB scheduling to serve cars. Fourth, we present a reward function that interconnects these two closed loops to satisfy the time-varying demands of cars at each slice while meeting QoS requirements in terms of delay. Finally, we design distributed deep reinforcement learning approach to maximize the formulated reward function. The simulation results show that our approach satisfies more than 90% vO-DUs resource constraints and network slice requirements.
△ Less
Submitted 25 August, 2022;
originally announced August 2022.
-
Leveraging Centric Data Federated Learning Using Blockchain For Integrity Assurance
Authors:
Riadh Ben Chaabene,
Darine Amayed,
Mohamed Cheriet
Abstract:
Machine learning abilities have become a vital component for various solutions across industries, applications, and sectors. Many organizations seek to leverage AI-based solutions across their business services to unlock better efficiency and increase productivity. Problems, however, can arise if there is a lack of quality data for AI-model training, scalability, and maintenance. We propose a data…
▽ More
Machine learning abilities have become a vital component for various solutions across industries, applications, and sectors. Many organizations seek to leverage AI-based solutions across their business services to unlock better efficiency and increase productivity. Problems, however, can arise if there is a lack of quality data for AI-model training, scalability, and maintenance. We propose a data-centric federated learning architecture leveraged by a public blockchain and smart contracts to overcome this significant issue. Our proposed solution provides a virtual public marketplace where developers, data scientists, and AI-engineer can publish their models and collaboratively create and access quality data for training. We enhance data quality and integrity through an incentive mechanism that rewards contributors for data contribution and verification. Those combined with the proposed framework helped increase with only one user simulation the training dataset with an average of 100 input daily and the model accuracy by approximately 4\%.
△ Less
Submitted 9 June, 2022;
originally announced June 2022.
-
A Learning Framework for Bandwidth-Efficient Distributed Inference in Wireless IoT
Authors:
Mostafa Hussien,
Kim Khoa Nguyen,
Mohamed Cheriet
Abstract:
In wireless Internet of things (IoT), the sensors usually have limited bandwidth and power resources. Therefore, in a distributed setup, each sensor should compress and quantize the sensed observations before transmitting them to a fusion center (FC) where a global decision is inferred. Most of the existing compression techniques and entropy quantizers consider only the reconstruction fidelity as…
▽ More
In wireless Internet of things (IoT), the sensors usually have limited bandwidth and power resources. Therefore, in a distributed setup, each sensor should compress and quantize the sensed observations before transmitting them to a fusion center (FC) where a global decision is inferred. Most of the existing compression techniques and entropy quantizers consider only the reconstruction fidelity as a metric, which means they decouple the compression from the sensing goal. In this work, we argue that data compression mechanisms and entropy quantizers should be co-designed with the sensing goal, specifically for machine-consumed data. To this end, we propose a novel deep learning-based framework for compressing and quantizing the observations of correlated sensors. Instead of maximizing the reconstruction fidelity, our objective is to compress the sensor observations in a way that maximizes the accuracy of the inferred decision (i.e., sensing goal) at the FC. Unlike prior work, we do not impose any assumptions about the observations distribution which emphasizes the wide applicability of our framework. We also propose a novel loss function that keeps the model focused on learning complementary features at each sensor. The results show the superior performance of our framework compared to other benchmark models.
△ Less
Submitted 17 March, 2022;
originally announced March 2022.
-
Energy Disaggregation using Variational Autoencoders
Authors:
Antoine Langevin,
Marc-André Carbonneau,
Mohamed Cheriet,
Ghyslain Gagnon
Abstract:
Non-intrusive load monitoring (NILM) is a technique that uses a single sensor to measure the total power consumption of a building. Using an energy disaggregation method, the consumption of individual appliances can be estimated from the aggregate measurement. Recent disaggregation algorithms have significantly improved the performance of NILM systems. However, the generalization capability of the…
▽ More
Non-intrusive load monitoring (NILM) is a technique that uses a single sensor to measure the total power consumption of a building. Using an energy disaggregation method, the consumption of individual appliances can be estimated from the aggregate measurement. Recent disaggregation algorithms have significantly improved the performance of NILM systems. However, the generalization capability of these methods to different houses as well as the disaggregation of multi-state appliances are still major challenges. In this paper we address these issues and propose an energy disaggregation approach based on the variational autoencoders framework. The probabilistic encoder makes this approach an efficient model for encoding information relevant to the reconstruction of the target appliance consumption. In particular, the proposed model accurately generates more complex load profiles, thus improving the power signal reconstruction of multi-state appliances. Moreover, its regularized latent space improves the generalization capabilities of the model across different houses. The proposed model is compared to state-of-the-art NILM approaches on the UK-DALE and REFIT datasets, and yields competitive results. The mean absolute error reduces by 18% on average across all appliances compared to the state-of-the-art. The F1-Score increases by more than 11%, showing improvements for the detection of the target appliance in the aggregate measurement.
△ Less
Submitted 19 July, 2021; v1 submitted 22 March, 2021;
originally announced March 2021.
-
PRVNet: A Novel Partially-Regularized Variational Autoencoders for Massive MIMO CSI Feedback
Authors:
Mostafa Hussien,
Kim Khoa Nguyen,
Mohamed Cheriet
Abstract:
In a multiple-input multiple-output frequency-division duplexing (MIMO-FDD) system, the user equipment (UE) sends the downlink channel state information (CSI) to the base station to report link status. Due to the complexity of MIMO systems, the overhead incurred in sending this information negatively affects the system bandwidth. Although this problem has been widely considered in the literature,…
▽ More
In a multiple-input multiple-output frequency-division duplexing (MIMO-FDD) system, the user equipment (UE) sends the downlink channel state information (CSI) to the base station to report link status. Due to the complexity of MIMO systems, the overhead incurred in sending this information negatively affects the system bandwidth. Although this problem has been widely considered in the literature, prior work generally assumes an ideal feedback channel. In this paper, we introduce PRVNet, a neural network architecture inspired by variational autoencoders (VAE) to compress the CSI matrix before sending it back to the base station under noisy channel conditions. Moreover, we propose a customized loss function that best suits the special characteristics of the problem being addressed. We also introduce an additional regularization hyperparameter for the learning objective, which is crucial for achieving competitive performance. In addition, we provide an efficient way to tune this hyperparameter using KL-annealing. Experimental results show the proposed model outperforms the benchmark models including two deep learning-based models in a noise-free feedback channel assumption. In addition, the proposed model achieves an outstanding performance under different noise levels for additive white Gaussian noise feedback channels.
△ Less
Submitted 18 July, 2022; v1 submitted 8 November, 2020;
originally announced November 2020.
-
Internet of Things Architectures: A Comparative Study
Authors:
Marcela G. dos Santos,
Darine Ameyed,
Fabio Petrillo,
Fehmi Jaafar,
Mohamed Cheriet
Abstract:
Over the past two decades, the Internet of Things (IoT) has become an underlying concept to a variety of solutions and technologies that it is now hardly possible to enumerate and describe all of them. The concept behind the Internet of Things is as powerful as it is complex, and for the components in the IoT solution tomesh together perfectly, they all have to be part of a well-thought-out struct…
▽ More
Over the past two decades, the Internet of Things (IoT) has become an underlying concept to a variety of solutions and technologies that it is now hardly possible to enumerate and describe all of them. The concept behind the Internet of Things is as powerful as it is complex, and for the components in the IoT solution tomesh together perfectly, they all have to be part of a well-thought-out structure. That is where understanding the IoT architecture becomes paramount. Because of the vast domain of IoT, there is no single consensus on IoT architecture. Different researchers and organizations proposed different architectures under a variety of classifications, mainly: conceptual, standard and, industrial or commercial adoption. It is indispensable to make a systematic analysis of IoT architecture to be able to compare the industrial proposals and identify their similarities and their differences. In this work, we summarize information about seven IoT industrial architectures in order to propose an approach that makes possible a comparative analysis between different IoT architectures. This work presents two main contributions: (i) an approach for analyzing and comparing IoTarchitectures using Layer-Model; (ii) a comparative study of seven industrial IoT architectures.
△ Less
Submitted 27 April, 2020;
originally announced April 2020.
-
BLCS: Brain-Like based Distributed Control Security in Cyber Physical Systems
Authors:
Hui Yang,
Kaixuan Zhan,
Michel Kadoch,
Yongshen Liang,
Mohamed Cheriet
Abstract:
Cyber-physical system (CPS) has operated, controlled and coordinated the physical systems integrated by a computing and communication core applied in industry 4.0. To accommodate CPS services, fog radio and optical networks (F-RON) has become an important supporting physical cyber infrastructure taking advantage of both the inherent ubiquity of wireless technology and the large capacity of optical…
▽ More
Cyber-physical system (CPS) has operated, controlled and coordinated the physical systems integrated by a computing and communication core applied in industry 4.0. To accommodate CPS services, fog radio and optical networks (F-RON) has become an important supporting physical cyber infrastructure taking advantage of both the inherent ubiquity of wireless technology and the large capacity of optical networks. However, cyber security is the biggest issue in CPS scenario as there is a tradeoff between security control and privacy exposure in F-RON. To deal with this issue, we propose a brain-like based distributed control security (BLCS) architecture for F-RON in CPS, by introducing a brain-like security (BLS) scheme. BLCS can accomplish the secure cross-domain control among tripartite controllers verification in the scenario of decentralized F-RON for distributed computing and communications, which has no need to disclose the private information of each domain against cyber-attacks. BLS utilizes parts of information to perform control identification through relation network and deep learning of behavior library. The functional modules of BLCS architecture are illustrated including various controllers and brain-like knowledge base. The interworking procedures in distributed control security modes based on BLS are described. The overall feasibility and efficiency of architecture are experimentally verified on the software defined network testbed in terms of average mistrust rate, path provisioning latency, packet loss probability and blocking probability. The emulation results are obtained and dissected based on the testbed.
△ Less
Submitted 8 February, 2020;
originally announced February 2020.
-
Efficient No-Reference Quality Assessment and Classification Model for Contrast Distorted Images
Authors:
Hossein Ziaei Nafchi,
Mohamed Cheriet
Abstract:
In this paper, an efficient Minkowski Distance based Metric (MDM) for no-reference (NR) quality assessment of contrast distorted images is proposed. It is shown that higher orders of Minkowski distance and entropy provide accurate quality prediction for the contrast distorted images. The proposed metric performs predictions by extracting only three features from the distorted images followed by a…
▽ More
In this paper, an efficient Minkowski Distance based Metric (MDM) for no-reference (NR) quality assessment of contrast distorted images is proposed. It is shown that higher orders of Minkowski distance and entropy provide accurate quality prediction for the contrast distorted images. The proposed metric performs predictions by extracting only three features from the distorted images followed by a regression analysis. Furthermore, the proposed features are able to classify type of the contrast distorted images with a high accuracy. Experimental results on four datasets CSIQ, TID2013, CCID2014, and SIQAD show that the proposed metric with a very low complexity provides better quality predictions than the state-of-the-art NR metrics. The MATLAB source code of the proposed metric is available to public at http://www.synchromedia.ca/system/files/MDM.zip.
△ Less
Submitted 7 April, 2018;
originally announced April 2018.
-
FSITM: A Feature Similarity Index For Tone-Mapped Images
Authors:
Hossein Ziaei Nafchi,
Atena Shahkolaei,
Reza Farrahi Moghaddam,
Mohamed Cheriet
Abstract:
In this work, based on the local phase information of images, an objective index, called the feature similarity index for tone-mapped images (FSITM), is proposed. To evaluate a tone map** operator (TMO), the proposed index compares the locally weighted mean phase angle map of an original high dynamic range (HDR) to that of its associated tone-mapped image calculated using the output of the TMO m…
▽ More
In this work, based on the local phase information of images, an objective index, called the feature similarity index for tone-mapped images (FSITM), is proposed. To evaluate a tone map** operator (TMO), the proposed index compares the locally weighted mean phase angle map of an original high dynamic range (HDR) to that of its associated tone-mapped image calculated using the output of the TMO method. In experiments on two standard databases, it is shown that the proposed FSITM method outperforms the state-of-the-art index, the tone mapped quality index (TMQI). In addition, a higher performance is obtained by combining the FSITM and TMQI indices. The MATLAB source code of the proposed metric(s) is available at https://www.mathworks.com/matlabcentral/fileexchange/59814.
△ Less
Submitted 19 April, 2017;
originally announced April 2017.
-
MUG: A Parameterless No-Reference JPEG Quality Evaluator Robust to Block Size and Misalignment
Authors:
Hossein Ziaei Nafchi,
Atena Shahkolaei,
Rachid Hedjam,
Mohamed Cheriet
Abstract:
In this letter, a very simple no-reference image quality assessment (NR-IQA) model for JPEG compressed images is proposed. The proposed metric called median of unique gradients (MUG) is based on the very simple facts of unique gradient magnitudes of JPEG compressed images. MUG is a parameterless metric and does not need training. Unlike other NR-IQAs, MUG is independent to block size and crop**.…
▽ More
In this letter, a very simple no-reference image quality assessment (NR-IQA) model for JPEG compressed images is proposed. The proposed metric called median of unique gradients (MUG) is based on the very simple facts of unique gradient magnitudes of JPEG compressed images. MUG is a parameterless metric and does not need training. Unlike other NR-IQAs, MUG is independent to block size and crop**. A more stable index called MUG+ is also introduced. The experimental results on six benchmark datasets of natural images and a benchmark dataset of synthetic images show that MUG is comparable to the state-of-the-art indices in literature. In addition, its performance remains unchanged for the case of the cropped images in which block boundaries are not known. The MATLAB source code of the proposed metrics is available at https://dl.dropboxusercontent.com/u/74505502/MUG.m and https://dl.dropboxusercontent.com/u/74505502/MUGplus.m.
△ Less
Submitted 19 September, 2016; v1 submitted 12 September, 2016;
originally announced September 2016.
-
FairGA: Fair Genetic Algorithm - Beyond Resource-oriented Sustainability for ICT Products and Services
Authors:
Reza Farrahi Moghaddam,
Yves Lemieux,
Mohamed Cheriet
Abstract:
The complexity of ICT products and services has brought them to the level of disposable `species'. The combination of the race to optimal performance and disposability has resulted in considerable footprint and impact. Although approaches such as increasing efficiency, reducing the total cost of ownership, life cycle assessment and management, and circular economy have been put forward to manage a…
▽ More
The complexity of ICT products and services has brought them to the level of disposable `species'. The combination of the race to optimal performance and disposability has resulted in considerable footprint and impact. Although approaches such as increasing efficiency, reducing the total cost of ownership, life cycle assessment and management, and circular economy have been put forward to manage and reduce the footprint and impact, the complexity of processes involved and especially invisibility of key but unobservable processes has resulted in some lower bounds for minimal achievable footprint. In this work, a modified approach to the Genetic Algorithm is proposed in order to introduce the notion of 'nondisposability' to the ICT products and services in order to implicitly influence and manage unobservable processes, and ultimately reduce the overall footprint and resource consumption. The proposed genetic algorithm is called FairGA, and it is compared with the traditional Genetic Algorithm against standard optimization functions. Also, the impact of the FairGA on the resource extraction has been illustrated with promising results.
△ Less
Submitted 7 September, 2016;
originally announced September 2016.
-
Transparent Clouds: An Enhancement to Abstraction
Authors:
Reza Farrahi Moghaddam,
Yves Lemieux,
Mohamed Cheriet
Abstract:
With the introduction of various hardware/software technologies such as Cloud Technologies or Virtualization technologies, there has been a great potential to reuse ICT artifacts thanks to Abstraction and also Exchangeability features achieved via these technologies. These technologies also provide various advantages with respect to sustainability including resource consumption reduction (in the u…
▽ More
With the introduction of various hardware/software technologies such as Cloud Technologies or Virtualization technologies, there has been a great potential to reuse ICT artifacts thanks to Abstraction and also Exchangeability features achieved via these technologies. These technologies also provide various advantages with respect to sustainability including resource consumption reduction (in the use phase only or in the whole life cycle). However, there is an additional but untapped potential associated with the anonymization of resources introduced by both abstraction and exchangeability features. By realizing on this potential, we can improve cloud solutions and reduce their by-product opacity, which usually prevents leveraging on the specialized but tweakable (i.e., nonessential modifications without changing the main function) features of components that are captured in the component models. This is especially a challenge in the case heterogeneous/disaggregated infrastructure where develo** models to cover everything is practically impossible. In this work, by leveraging on the concept of pathways, we develop a few mechanisms that enable transparency and therefore tweakability of features even in the presence of abstraction and heterogeneity. In particular, the layered-stack approach to system decomposition is considered because of its role in both software defined networking (SDN) and Network Function Virtualization (NFV) system decompositions. For a concrete example, the case of dynamic frequency scaling of processors is considered and it is shown that the associated consumption could be considerably reduced without requiring additional changes to the middle components.
△ Less
Submitted 2 September, 2016;
originally announced September 2016.
-
Mean Deviation Similarity Index: Efficient and Reliable Full-Reference Image Quality Evaluator
Authors:
Hossein Ziaei Nafchi,
Atena Shahkolaei,
Rachid Hedjam,
Mohamed Cheriet
Abstract:
Applications of perceptual image quality assessment (IQA) in image and video processing, such as image acquisition, image compression, image restoration and multimedia communication, have led to the development of many IQA metrics. In this paper, a reliable full reference IQA model is proposed that utilize gradient similarity (GS), chromaticity similarity (CS), and deviation pooling (DP). By consi…
▽ More
Applications of perceptual image quality assessment (IQA) in image and video processing, such as image acquisition, image compression, image restoration and multimedia communication, have led to the development of many IQA metrics. In this paper, a reliable full reference IQA model is proposed that utilize gradient similarity (GS), chromaticity similarity (CS), and deviation pooling (DP). By considering the shortcomings of the commonly used GS to model human visual system (HVS), a new GS is proposed through a fusion technique that is more likely to follow HVS. We propose an efficient and effective formulation to calculate the joint similarity map of two chromatic channels for the purpose of measuring color changes. In comparison with a commonly used formulation in the literature, the proposed CS map is shown to be more efficient and provide comparable or better quality predictions. Motivated by a recent work that utilizes the standard deviation pooling, a general formulation of the DP is presented in this paper and used to compute a final score from the proposed GS and CS maps. This proposed formulation of DP benefits from the Minkowski pooling and a proposed power pooling as well. The experimental results on six datasets of natural images, a synthetic dataset, and a digitally retouched dataset show that the proposed index provides comparable or better quality predictions than the most recent and competing state-of-the-art IQA metrics in the literature, it is reliable and has low complexity. The MATLAB source code of the proposed metric is available at https://www.mathworks.com/matlabcentral/fileexchange/59809.
△ Less
Submitted 19 April, 2017; v1 submitted 26 August, 2016;
originally announced August 2016.
-
A Note on Efficiency of Downsampling and Color Transformation in Image Quality Assessment
Authors:
Hossein Ziaei Nafchi,
Mohamed Cheriet
Abstract:
Several existing and successful full reference image quality assessment (IQA) models use linear color transformation and downsampling before measuring similarity or quality of images. This paper indicates to the right order of these two procedures and that the existing models have not chosen the more efficient approach. In addition, efficiency of these metrics is not compared in a fair basis in th…
▽ More
Several existing and successful full reference image quality assessment (IQA) models use linear color transformation and downsampling before measuring similarity or quality of images. This paper indicates to the right order of these two procedures and that the existing models have not chosen the more efficient approach. In addition, efficiency of these metrics is not compared in a fair basis in the literature.
△ Less
Submitted 20 June, 2016;
originally announced June 2016.
-
Sustainability-Aware Cloud Computing Using Virtual Carbon Tax
Authors:
Fereydoun Farrahi Moghaddam,
Mohamed Cheriet
Abstract:
In this paper, a solution for sustainable cloud system is proposed and then implemented on a real testbed. The solution composes of optimization of a profit model and introduction of virtual carbon tax to limit environmental footprint of the cloud. The proposed multi-criteria optimizer of the cloud system suggests new optimum CPU frequencies for CPU-cores when the local grid energy mix or the clou…
▽ More
In this paper, a solution for sustainable cloud system is proposed and then implemented on a real testbed. The solution composes of optimization of a profit model and introduction of virtual carbon tax to limit environmental footprint of the cloud. The proposed multi-criteria optimizer of the cloud system suggests new optimum CPU frequencies for CPU-cores when the local grid energy mix or the cloud workload changes. The cloud system is implemented on a blade system, and proper middlewares are developed to interact with the blades. The experimental results show that it is possible to significantly decrease the targeted environmental footprint of the system and keep it profitable.
△ Less
Submitted 1 November, 2017; v1 submitted 17 October, 2015;
originally announced October 2015.
-
Session-based Communication for Vital Machine-to-Machine Applications
Authors:
Marc-Olivier Arsenault,
Hanen Garcia Gamardo,
Kim-Khoa Nguyen,
Mohamed Cheriet
Abstract:
Although the machine to machine (M2M) communication has been emerging in recent years, many vendors' specific proprietary solutions are not suitable for vital M2M applications. While the main focus of those solutions is management and provisioning of machines, real-time monitoring and communication control are also required to handle a variety of access technologies, like WiFi and LTE, and unleash…
▽ More
Although the machine to machine (M2M) communication has been emerging in recent years, many vendors' specific proprietary solutions are not suitable for vital M2M applications. While the main focus of those solutions is management and provisioning of machines, real-time monitoring and communication control are also required to handle a variety of access technologies, like WiFi and LTE, and unleash machine deployment. In this paper, we present a new architecture addressing these issues by leveraging the IP Multimedia Subsystem (IMS) deployed in operator's networks for RCS and VoLTE.
△ Less
Submitted 29 July, 2015;
originally announced July 2015.
-
Micro Service Cloud Computing Pattern for Next Generation Networks
Authors:
Pascal Potvin,
Mahdy Nabaee,
Fabrice Labeau,
Kim-Khoa Nguyen,
Mohamed Cheriet
Abstract:
The falling trend in the revenue of traditional telephony services has attracted attention to new IP based services. The IP Multimedia System (IMS) is a key architecture which provides the necessary platform for delivery of new multimedia services. However, current implementations of IMS do not offer automatic scalability or elastisity for the growing number of customers. Although the cloud comput…
▽ More
The falling trend in the revenue of traditional telephony services has attracted attention to new IP based services. The IP Multimedia System (IMS) is a key architecture which provides the necessary platform for delivery of new multimedia services. However, current implementations of IMS do not offer automatic scalability or elastisity for the growing number of customers. Although the cloud computing paradigm has shown many promising characteristics for web applications, it is still failing to meet the requirements for telecommunication applications. In this paper, we present some related cloud computing patterns and discuss their adaptations for implementation of IMS or other telecommunication systems.
△ Less
Submitted 19 September, 2015; v1 submitted 24 July, 2015;
originally announced July 2015.
-
The Service-Bond Paradigm - Potentials for a Sustainable, ICT-enabled Future
Authors:
Reza Farrahi Moghaddam,
Yves Lemieux,
Mohamed Cheriet
Abstract:
The service paradigm as we know it has gone through a long journey of evolution and improvement, and it seems that a service-oriented vision to activities in general could serve as a potential platform for the global transition to a sustainable future. However, it is also apparent that the services themselves are required to move beyond their traditional definition in order to prevent any secondar…
▽ More
The service paradigm as we know it has gone through a long journey of evolution and improvement, and it seems that a service-oriented vision to activities in general could serve as a potential platform for the global transition to a sustainable future. However, it is also apparent that the services themselves are required to move beyond their traditional definition in order to prevent any secondary side effect. Here, a new paradigm is proposed based on bonding between entities involved in a service interaction, service chaining, or service orchestration. It is purposed to serve as a vehicle to approach sustainability at the global level in a manner that is thoughtful, collaborative, and incremental. Time-modulated implementation of the proposed service-bond paradigm is considered in order to reduce the associated risks and liabilities. The service bonds are then simply generalized toward representing bonding among more than two entities. Finally, a practical application of ICT agents in enabling the service bonds is presented in a use case related to smart houses. In this use case, some ICT-based agents (federal regulars, among other ICT agents) are considered to represent and govern services and service bonds of a household with external entities such as utilities.
△ Less
Submitted 27 July, 2015; v1 submitted 22 July, 2015;
originally announced July 2015.
-
Hyper Heterogeneous Cloud-based IMS Software Architecture: A Proof-of-Concept and Empirical Analysis
Authors:
Pascal Potvin,
Hanen Garcia Gamardo,
Kim-Khoa Nguyen,
Mohamed Cheriet
Abstract:
The IP Multimedia Subsystem (IMS) defined by the 3GPP has been mainly developed and deployed by telephony vendors on vendor-specific hardware. Recent advances in Network Function Virtualisation (NFV) technology paved the way for virtualized hardware and telephony function elasticity. As such, Telecom vendors have started to embrace the cloud as a deployment platform, usually selecting a privileged…
▽ More
The IP Multimedia Subsystem (IMS) defined by the 3GPP has been mainly developed and deployed by telephony vendors on vendor-specific hardware. Recent advances in Network Function Virtualisation (NFV) technology paved the way for virtualized hardware and telephony function elasticity. As such, Telecom vendors have started to embrace the cloud as a deployment platform, usually selecting a privileged virtualization platform. Operators would like to deploy telecom functionality on their already existing IT cloud platforms. Achieving such flexibility would require the telecom vendors to adopt a software architecture allowing deployment on many cloud platforms or even heterogeneous cloud platforms. We propose a distributed software architecture enabling the deployment of a single software version on multiple cloud platforms thus allowing for a solution-based deployment. We also present a prototype we developed to study the characteristics of this architecture.
△ Less
Submitted 18 September, 2015; v1 submitted 14 July, 2015;
originally announced July 2015.
-
Modified Hausdorff Fractal Dimension (MHFD)
Authors:
Reza Farrahi Moghaddam,
Mohamed Cheriet
Abstract:
The Hausdorff fractal dimension has been a fast-to-calculate method to estimate complexity of fractal shapes. In this work, a modified version of this fractal dimension is presented in order to make it more robust when applied in estimating complexity of non-fractal images. The modified Hausdorff fractal dimension stands on two features that weaken the requirement of presence of a shape and also r…
▽ More
The Hausdorff fractal dimension has been a fast-to-calculate method to estimate complexity of fractal shapes. In this work, a modified version of this fractal dimension is presented in order to make it more robust when applied in estimating complexity of non-fractal images. The modified Hausdorff fractal dimension stands on two features that weaken the requirement of presence of a shape and also reduce the impact of the noise possibly presented in the input image. The new algorithm has been evaluated on a set of images of different character with promising performance.
△ Less
Submitted 14 May, 2015; v1 submitted 13 May, 2015;
originally announced May 2015.
-
A Decentralized Approach to Software-Defined Networks (SDNs)
Authors:
Reza Farrahi Moghaddam,
Yves Lemieux,
Mohamed Cheriet
Abstract:
Redistribution of the intelligence and management in the software defined networks (SDNs) is a potential approach to address the bottlenecks of scalability and integrity of these networks. We propose to revisit the routing concept based on the notion of regions. Using basic and consistent definition of regions, a region-based packet routing called SmartRegion Routing is presented. The flexibility…
▽ More
Redistribution of the intelligence and management in the software defined networks (SDNs) is a potential approach to address the bottlenecks of scalability and integrity of these networks. We propose to revisit the routing concept based on the notion of regions. Using basic and consistent definition of regions, a region-based packet routing called SmartRegion Routing is presented. The flexibility of regions in terms of naming and addressing is then leveraged in the form of a region stack among other features placed in the associated packet header. In this way, most of complexity and dynamicity of a network is absorbed, and therefore highly fast and simplified routing at the inter-region level along with semi-autonomous intra-region routing will be feasible. In addition, multipath planning can be naturally realized at both inter and intra levels. A basic form of SmartRegion routing mechanism is provided. Simplicity, scalability, and manageability of the proposed approach would also bring future potentials to reduce energy consumption and environmental footprint associated to the SDNs. Finally, various applications, such as enabling seamless broadband access, providing beyond IP addressing mechanisms, and also address-equivalent naming mechanisms, are considered and discussed.
△ Less
Submitted 29 April, 2015;
originally announced April 2015.
-
Deviation Based Pooling Strategies For Full Reference Image Quality Assessment
Authors:
Hossein Ziaei Nafchi,
Rachid Hedjam,
Atena Shahkolaei,
Mohamed Cheriet
Abstract:
The state-of-the-art pooling strategies for perceptual image quality assessment (IQA) are based on the mean and the weighted mean. They are robust pooling strategies which usually provide a moderate to high performance for different IQAs. Recently, standard deviation (SD) pooling was also proposed. Although, this deviation pooling provides a very high performance for a few IQAs, its performance is…
▽ More
The state-of-the-art pooling strategies for perceptual image quality assessment (IQA) are based on the mean and the weighted mean. They are robust pooling strategies which usually provide a moderate to high performance for different IQAs. Recently, standard deviation (SD) pooling was also proposed. Although, this deviation pooling provides a very high performance for a few IQAs, its performance is lower than mean poolings for many other IQAs. In this paper, we propose to use the mean absolute deviation (MAD) and show that it is a more robust and accurate pooling strategy for a wider range of IQAs. In fact, MAD pooling has the advantages of both mean pooling and SD pooling. The joint computation and use of the MAD and SD pooling strategies is also considered in this paper. Experimental results provide useful information on the choice of the proper deviation pooling strategy for different IQA models.
△ Less
Submitted 6 May, 2015; v1 submitted 26 April, 2015;
originally announced April 2015.
-
40 Gbps Access for Metro networks: Implications in terms of Sustainability and Innovation from an LCA Perspective
Authors:
Reza Farrahi Moghaddam,
Yves Lemieux,
Mohamed Cheriet
Abstract:
In this work, the implications of new technologies, more specifically the new optical FTTH technologies, are studied both from the functional and non-functional perspectives. In particular, some direct impacts are listed in the form of abandoning non-functional technologies, such as micro-registration, which would be implicitly required for having a functioning operation before arrival the new hig…
▽ More
In this work, the implications of new technologies, more specifically the new optical FTTH technologies, are studied both from the functional and non-functional perspectives. In particular, some direct impacts are listed in the form of abandoning non-functional technologies, such as micro-registration, which would be implicitly required for having a functioning operation before arrival the new high-bandwidth access technologies. It is shown that such abandonment of non-functional best practices, which are mainly at the management level of ICT, immediately results in additional consumption and environmental footprint, and also there is a chance that some other new innovations might be 'missed.' Therefore, unconstrained deployment of these access technologies is not aligned with a possible sustainable ICT picture, except if they are regulated. An approach to pricing the best practices, including both functional and non-functional technologies, is proposed in order to develop a regulation and policy framework for a sustainable broadband access.
△ Less
Submitted 23 June, 2015; v1 submitted 23 April, 2015;
originally announced April 2015.
-
Dynamic Bandwidth-Efficient BCube Topologies for Virtualized Data Center Networks
Authors:
Vahid Asghari,
Reza Farrahi Moghaddam,
Mohamed Cheriet
Abstract:
Network virtualization enables computing networks and data center (DC) providers to manage their networking resources in a flexible manner using software running on physical computers. In this paper, we address the existing issues with the classic DC network topologies in virtualized environment, and investigate a set of DC network topologies with the capability of providing dynamic structures acc…
▽ More
Network virtualization enables computing networks and data center (DC) providers to manage their networking resources in a flexible manner using software running on physical computers. In this paper, we address the existing issues with the classic DC network topologies in virtualized environment, and investigate a set of DC network topologies with the capability of providing dynamic structures according to the service-level required by the active traffic in a virtual DC network. In particular, we propose three main approaches to modify the structure of a classic BCube topology as a topology benchmark, and investigate their associated structural features and maximum achievable interconnected bandwidth for different routing scenarios. Finally, we run an extensive simulation program to check the performance of the proposed modified topologies in a simulation environment which considers failure analysis and also traffic congestion. Our simulation experiments, which are consistent to our design goals, show the efficiency of the proposed modified topologies comparing to the classic BCube in terms of bandwidth availability and failure resiliency.
△ Less
Submitted 27 April, 2015; v1 submitted 11 February, 2015;
originally announced February 2015.
-
A Multiple-Expert Binarization Framework for Multispectral Images
Authors:
Reza Farrahi Moghaddam,
Mohamed Cheriet
Abstract:
In this work, a multiple-expert binarization framework for multispectral images is proposed. The framework is based on a constrained subspace selection limited to the spectral bands combined with state-of-the-art gray-level binarization methods. The framework uses a binarization wrapper to enhance the performance of the gray-level binarization. Nonlinear preprocessing of the individual spectral ba…
▽ More
In this work, a multiple-expert binarization framework for multispectral images is proposed. The framework is based on a constrained subspace selection limited to the spectral bands combined with state-of-the-art gray-level binarization methods. The framework uses a binarization wrapper to enhance the performance of the gray-level binarization. Nonlinear preprocessing of the individual spectral bands is used to enhance the textual information. An evolutionary optimizer is considered to obtain the optimal and some suboptimal 3-band subspaces from which an ensemble of experts is then formed. The framework is applied to a ground truth multispectral dataset with promising results. In addition, a generalization to the cross-validation approach is developed that not only evaluates generalizability of the framework, it also provides a practical instance of the selected experts that could be then applied to unseen inputs despite the small size of the given ground truth dataset.
△ Less
Submitted 26 August, 2015; v1 submitted 4 February, 2015;
originally announced February 2015.
-
SmartPacket: Re-Distributing the Routing Intelligence among Network Components in SDNs
Authors:
Reza Farrahi Moghaddam,
Mohamed Cheriet
Abstract:
In this work, a new region-based, multipath-enabled packet routing is presented and called SmartPacket Routing. The proposed approach provides several opportunities to re-distribute the smartness and decision making among various elements of a network including the packets themselves toward providing a decentralized solution for SDNs. This would bring efficiency and scalability, and therefore also…
▽ More
In this work, a new region-based, multipath-enabled packet routing is presented and called SmartPacket Routing. The proposed approach provides several opportunities to re-distribute the smartness and decision making among various elements of a network including the packets themselves toward providing a decentralized solution for SDNs. This would bring efficiency and scalability, and therefore also lower environmental footprint for the ever-growing networks. In particular, a region-based representation of the network topology is proposed which is then used to describe the routing actions along the possible paths for a packet flow. In addition to a region stack that expresses a partial or full regional path of a packet, QoS requirements of the packet (or its associated flow) is considered in the packet header in order to enable possible QoS-aware routing at region level without requiring a centralized controller.
△ Less
Submitted 18 January, 2015; v1 submitted 1 December, 2014;
originally announced December 2014.
-
A Graph-based Perspective to Total Carbon Footprint Assessment of Non-marginal Technology-driven Projects - Use case of OTT/IPTV
Authors:
Reza Farrahi Moghaddam,
Fereydoun Farrahi Moghaddam,
Mohamed Cheriet
Abstract:
Life Cycle Assessment (LCA) of green and sustainable projects has been found to be a necessary analysis in order to include all upstream, downstream, and indirect impacts. Because of the complexity of interactions, the differential impacts with respect to a baseline, i.e., a business-as-usual (BAU) scenario, are commonly considered to relatively compare various projects. However, as the degree of…
▽ More
Life Cycle Assessment (LCA) of green and sustainable projects has been found to be a necessary analysis in order to include all upstream, downstream, and indirect impacts. Because of the complexity of interactions, the differential impacts with respect to a baseline, i.e., a business-as-usual (BAU) scenario, are commonly considered to relatively compare various projects. However, as the degree of penetration of a project in the baseline increases, the popular marginal assumption does no longer hold, and the differential impacts may become inconsistent. Although various mythologies have been successfully proposed and used to contain such a side effect, the bottom-up nature, which initiates the assessment from the project itself and ultimately widens the scope, could easily fail to acknowledge critical modifications to the baseline. This is highly relevant in terms of ICT's disruptive and dynamic technologies which push the baseline to become a marginal legacy. In this work, an analytic formalism is presented to provide a means of comparison of such technologies and projects. The core idea behind the proposed methodology is a magnitude-insensitive graph-based distance function to differentially compare a project with a baseline. The applicability of the proposed methodology is then evaluated in a use case of OTT/IPTV online media distribution services.
△ Less
Submitted 17 September, 2014; v1 submitted 2 September, 2014;
originally announced September 2014.
-
Quality of Experience (QoE) beyond Quality of Service (QoS) as its baseline: QoE at the Interface of Experience Domains
Authors:
Reza Farrahi Moghaddam,
Mohamed Cheriet
Abstract:
In this work, a new approach to the definition of the quality of experience is presented. By considering the quality of service as a baseline, that portion of the QoE that can be inferred from the QoS is excluded, and then the rest of the QoE is approached with the notion of QoE at a Boundary (QoEaaB). With the QoEaaB as the core of the proposed approach, various potential boundaries, and their as…
▽ More
In this work, a new approach to the definition of the quality of experience is presented. By considering the quality of service as a baseline, that portion of the QoE that can be inferred from the QoS is excluded, and then the rest of the QoE is approached with the notion of QoE at a Boundary (QoEaaB). With the QoEaaB as the core of the proposed approach, various potential boundaries, and their associated unseen opportunities to improve the QoE are discussed. In particular, property, contract, SLA, and content are explored in terms of their boundaries and also their associated QoEaaB. With an interest in online video delivery, management of resource sharing and isolation associated with multi-tenant operations is considered. It is concluded that the proposed QoEaaB can bring a new perspective in QoE modeling and assessment toward a more enriched approach to improving the experience based on innovation and deep connectivity among actors.
△ Less
Submitted 9 February, 2015; v1 submitted 18 July, 2014;
originally announced July 2014.
-
Spiralet Sparse Representation
Authors:
Reza Farrahi Moghaddam,
Mohamed Cheriet
Abstract:
This is the first report on Working Paper WP-RFM-14-01. The potential and capability of sparse representations is well-known. However, their (multivariate variable) vectorial form, which is completely fine in many fields and disciplines, results in removal and filtering of important "spatial" relations that are implicitly carried by two-dimensional [or multi-dimensional] objects, such as images. I…
▽ More
This is the first report on Working Paper WP-RFM-14-01. The potential and capability of sparse representations is well-known. However, their (multivariate variable) vectorial form, which is completely fine in many fields and disciplines, results in removal and filtering of important "spatial" relations that are implicitly carried by two-dimensional [or multi-dimensional] objects, such as images. In this paper, a new approach, called spiralet sparse representation, is proposed in order to develop an augmented representation and therefore a modified sparse representation and theory, which is capable to preserve the data associated to the spatial relations.
△ Less
Submitted 15 April, 2014;
originally announced April 2014.
-
Challenges and complexities in application of LCA approaches in the case of ICT for a sustainable future
Authors:
Reza Farrahi Moghaddam,
Fereydoun Farrahi Moghaddam,
Thomas Dandres,
Yves Lemieux,
Réjean Samson,
Mohamed Cheriet
Abstract:
In this work, three of many ICT-specific challenges of LCA are discussed. First, the inconsistency versus uncertainty is reviewed with regard to the meta-technological nature of ICT. As an example, the semiconductor technologies are used to highlight the complexities especially with respect to energy and water consumption. The need for specific representations and metric to separately assess produ…
▽ More
In this work, three of many ICT-specific challenges of LCA are discussed. First, the inconsistency versus uncertainty is reviewed with regard to the meta-technological nature of ICT. As an example, the semiconductor technologies are used to highlight the complexities especially with respect to energy and water consumption. The need for specific representations and metric to separately assess products and technologies is discussed. It is highlighted that applying product-oriented approaches would result in abandoning or disfavoring of new technologies that could otherwise help toward a better world. Second, several believed-untouchable hot spots are highlighted to emphasize on their importance and footprint. The list includes, but not limited to, i) User Computer-Interfaces (UCIs), especially screens and displays, ii) Network-Computer Interlaces (NCIs), such as electronic and optical ports, and iii) electricity power interfaces. In addition, considering cross-regional social and economic impacts, and also taking into account the marketing nature of the need for many ICT's product and services in both forms of hardware and software, the complexity of End of Life (EoL) stage of ICT products, technologies, and services is explored. Finally, the impact of smart management and intelligence, and in general software, in ICT solutions and products is highlighted. In particular, it is observed that, even using the same technology, the significance of software could be highly variable depending on the level of intelligence and awareness deployed. With examples from an interconnected network of data centers managed using Dynamic Voltage and Frequency Scaling (DVFS) technology and smart cooling systems, it is shown that the unadjusted assessments could be highly uncertain, and even inconsistent, in calculating the management component's significance on the ICT impacts.
△ Less
Submitted 30 May, 2014; v1 submitted 11 March, 2014;
originally announced March 2014.
-
A Monte-Carlo Approach to Lifespan Failure Performance Analysis of the Network Fabric in Modular Data Centers
Authors:
Reza Farrahi Moghaddam,
Vahid Asghari,
Fereydoun Farrahi Moghaddam,
Yves Lemieux,
Mohamed Cheriet
Abstract:
Data centers have been evolved from a passive element of compute infrastructure to become an active, core part of any ICT solution. In particular, modular data centers (MDCs), which are a promising design approach to improve resiliency of data centers, can play a key role in deploying ICT infrastructure in remote and inhospitable environments in order to take advantage of low temperatures and hydr…
▽ More
Data centers have been evolved from a passive element of compute infrastructure to become an active, core part of any ICT solution. In particular, modular data centers (MDCs), which are a promising design approach to improve resiliency of data centers, can play a key role in deploying ICT infrastructure in remote and inhospitable environments in order to take advantage of low temperatures and hydro- and wind-electric capabilities. This is because of capability of the modular data centers to survive even in lack of continuous on-site maintenance and support. The most critical part of a data center is its network fabric that could impede the whole system even if all other components are fully functional, assuming that other analyses has been already performed to ensure the reliability of the underlying infrastructure and support systems. In this work, a complete failure analysis of modular data centers using failure models of various components including servers, switches, and links is performed using a proposed Monte-Carlo approach. The proposed Monte-Carlo approach, which is based on the concept of snapshots, allows us to effectively calculate the performance of a design along its lifespan even up to the terminal stages. To show the capabilities of the proposed approach, various network topologies, such as FatTree, BCube, MDCube, and their modifications are considered. The performance and also the lifespan of each topology design in presence of failures of their components are studied against the topology parameters.
△ Less
Submitted 22 March, 2017; v1 submitted 29 January, 2014;
originally announced January 2014.
-
Computer Simulation of 3-D Finite-Volume Liquid Transport in Fibrous Materials: a Physical Model for Ink Seepage into Paper
Authors:
Reza Farrahi Moghaddam,
Fereydoun Farrahi Moghaddam,
Mohamed Cheriet
Abstract:
A physical model for the simulation ink/paper interaction at the mesoscopic scale is developed. It is based on the modified Ising model, and is generalized to consider the restriction of the finite-volume of ink and also its dynamic seepage. This allows the model to obtain the ink distribution within the paper volume. At the mesoscopic scale, the paper is modeled using a discretized fiber structur…
▽ More
A physical model for the simulation ink/paper interaction at the mesoscopic scale is developed. It is based on the modified Ising model, and is generalized to consider the restriction of the finite-volume of ink and also its dynamic seepage. This allows the model to obtain the ink distribution within the paper volume. At the mesoscopic scale, the paper is modeled using a discretized fiber structure. The ink distribution is obtained by solving its equivalent optimization problem, which is solved using a modified genetic algorithm, along with a new boundary condition and the quasi-linear technique. The model is able to simulate the finite-volume distribution of ink.
△ Less
Submitted 10 July, 2013;
originally announced July 2013.
-
A maximal-information color to gray conversion method for document images: Toward an optimal grayscale representation for document image binarization
Authors:
Reza Farrahi Moghaddam,
Shaohua Chen,
Rachid Hedjam,
Mohamed Cheriet
Abstract:
A novel method to convert color/multi-spectral images to gray-level images is introduced to increase the performance of document binarization methods. The method uses the distribution of the pixel data of the input document image in a color space to find a transformation, called the dual transform, which balances the amount of information on all color channels. Furthermore, in order to reduce the…
▽ More
A novel method to convert color/multi-spectral images to gray-level images is introduced to increase the performance of document binarization methods. The method uses the distribution of the pixel data of the input document image in a color space to find a transformation, called the dual transform, which balances the amount of information on all color channels. Furthermore, in order to reduce the intensity variations on the gray output, a color reduction preprocessing step is applied. Then, a channel is selected as the gray value representation of the document image based on the homogeneity criterion on the text regions. In this way, the proposed method can provide a luminance-independent contrast enhancement. The performance of the method is evaluated against various images from two databases, the ICDAR'03 Robust Reading, the KAIST and the DIBCO'09 datasets, subjectively and objectively with promising results. The ground truth images for the images from the ICDAR'03 Robust Reading dataset have been created manually by the authors.
△ Less
Submitted 26 June, 2013; v1 submitted 25 June, 2013;
originally announced June 2013.
-
Large Margin Low Rank Tensor Analysis
Authors:
Guoqiang Zhong,
Mohamed Cheriet
Abstract:
Other than vector representations, the direct objects of human cognition are generally high-order tensors, such as 2D images and 3D textures. From this fact, two interesting questions naturally arise: How does the human brain represent these tensor perceptions in a "manifold" way, and how can they be recognized on the "manifold"? In this paper, we present a supervised model to learn the intrinsic…
▽ More
Other than vector representations, the direct objects of human cognition are generally high-order tensors, such as 2D images and 3D textures. From this fact, two interesting questions naturally arise: How does the human brain represent these tensor perceptions in a "manifold" way, and how can they be recognized on the "manifold"? In this paper, we present a supervised model to learn the intrinsic structure of the tensors embedded in a high dimensional Euclidean space. With the fixed point continuation procedures, our model automatically and jointly discovers the optimal dimensionality and the representations of the low dimensional embeddings. This makes it an effective simulation of the cognitive process of human brain. Furthermore, the generalization of our model based on similarity between the learned low dimensional embeddings can be viewed as counterpart of recognition of human brain. Experiments on applications for object recognition and face recognition demonstrate the superiority of our proposed model over state-of-the-art approaches.
△ Less
Submitted 11 June, 2013;
originally announced June 2013.
-
Unsupervised ensemble of experts (EoE) framework for automatic binarization of document images
Authors:
Reza Farrahi Moghaddam,
Fereydoun Farrahi Moghaddam,
Mohamed Cheriet
Abstract:
In recent years, a large number of binarization methods have been developed, with varying performance generalization and strength against different benchmarks. In this work, to leverage on these methods, an ensemble of experts (EoE) framework is introduced, to efficiently combine the outputs of various methods. The proposed framework offers a new selection process of the binarization methods, whic…
▽ More
In recent years, a large number of binarization methods have been developed, with varying performance generalization and strength against different benchmarks. In this work, to leverage on these methods, an ensemble of experts (EoE) framework is introduced, to efficiently combine the outputs of various methods. The proposed framework offers a new selection process of the binarization methods, which are actually the experts in the ensemble, by introducing three concepts: confidentness, endorsement and schools of experts. The framework, which is highly objective, is built based on two general principles: (i) consolidation of saturated opinions and (ii) identification of schools of experts. After building the endorsement graph of the ensemble for an input document image based on the confidentness of the experts, the saturated opinions are consolidated, and then the schools of experts are identified by thresholding the consolidated endorsement graph. A variation of the framework, in which no selection is made, is also introduced that combines the outputs of all experts using endorsement-dependent weights. The EoE framework is evaluated on the set of participating methods in the H-DIBCO'12 contest and also on an ensemble generated from various instances of grid-based Sauvola method with promising performance.
△ Less
Submitted 29 May, 2013; v1 submitted 13 May, 2013;
originally announced May 2013.
-
Curved Space Optimization: A Random Search based on General Relativity Theory
Authors:
Fereydoun Farrahi Moghaddam,
Reza Farrahi Moghaddam,
Mohamed Cheriet
Abstract:
Designing a fast and efficient optimization method with local optima avoidance capability on a variety of optimization problems is still an open problem for many researchers. In this work, the concept of a new global optimization method with an open implementation area is introduced as a Curved Space Optimization (CSO) method, which is a simple probabilistic optimization method enhanced by concept…
▽ More
Designing a fast and efficient optimization method with local optima avoidance capability on a variety of optimization problems is still an open problem for many researchers. In this work, the concept of a new global optimization method with an open implementation area is introduced as a Curved Space Optimization (CSO) method, which is a simple probabilistic optimization method enhanced by concepts of general relativity theory. To address global optimization challenges such as performance and convergence, this new method is designed based on transformation of a random search space into a new search space based on concepts of space-time curvature in general relativity theory. In order to evaluate the performance of our proposed method, an implementation of CSO is deployed and its results are compared on benchmark functions with state-of-the art optimization methods. The results show that the performance of CSO is promising on unimodal and multimodal benchmark functions with different search space dimension sizes.
△ Less
Submitted 10 August, 2012;
originally announced August 2012.
-
A prototype system for handwritten sub-word recognition: Toward Arabic-manuscript transliteration
Authors:
Reza Farrahi Moghaddam,
Mohamed Cheriet,
Thomas Milo,
Robert Wisnovsky
Abstract:
A prototype system for the transliteration of diacritics-less Arabic manuscripts at the sub-word or part of Arabic word (PAW) level is developed. The system is able to read sub-words of the input manuscript using a set of skeleton-based features. A variation of the system is also developed which reads archigraphemic Arabic manuscripts, which are dot-less, into archigraphemes transliteration. In or…
▽ More
A prototype system for the transliteration of diacritics-less Arabic manuscripts at the sub-word or part of Arabic word (PAW) level is developed. The system is able to read sub-words of the input manuscript using a set of skeleton-based features. A variation of the system is also developed which reads archigraphemic Arabic manuscripts, which are dot-less, into archigraphemes transliteration. In order to reduce the complexity of the original highly multiclass problem of sub-word recognition, it is redefined into a set of binary descriptor classifiers. The outputs of trained binary classifiers are combined to generate the sequence of sub-word letters. SVMs are used to learn the binary classifiers. Two specific Arabic databases have been developed to train and test the system. One of them is a database of the Naskh style. The initial results are promising. The systems could be trained on other scripts found in Arabic manuscripts.
△ Less
Submitted 14 November, 2011;
originally announced November 2011.
-
The BlueNetwork Concept
Authors:
Reza Farrahi Moghaddam,
Fereydoun Farrahi Moghaddam,
Mohamed Cheriet
Abstract:
Most of energy efficiency and carbon reduction initiatives and concepts attempt to regulate and optimize machines behavior, and therefore, human behavior itself is left neglected. Although most of energy and resource consumption is the result of machines functioning and behavior (including domesticated animals such as cows), these behaviors themselves are actually in answer to humans demands and n…
▽ More
Most of energy efficiency and carbon reduction initiatives and concepts attempt to regulate and optimize machines behavior, and therefore, human behavior itself is left neglected. Although most of energy and resource consumption is the result of machines functioning and behavior (including domesticated animals such as cows), these behaviors themselves are actually in answer to humans demands and needs, and therefore, can be considered the indirect results of humans behavior. Resolving the source of problems, i.e., the unhealthy human behavior, not only reduces these footprints including energy and water consumption, and GHG emissions, it also helps increasing the quality of life in society. Here, we propose an approach which focuses on adjusting humans behavior toward eliminating unnecessary demand on the machines that consequently lowers the consumption. This goal is achieved by creating a social environment in which directed and selective interactions help humans to adjust to healthier behavior. The solution consists of human-friendly interfaces and also artificial intelligence software in order to learn and emulate human interactions.
△ Less
Submitted 3 October, 2011;
originally announced October 2011.
-
Beyond pixels and regions: A non local patch means (NLPM) method for content-level restoration, enhancement, and reconstruction of degraded document images
Authors:
Reza Farrahi Moghaddam,
Mohamed Cheriet
Abstract:
A patch-based non-local restoration and reconstruction method for preprocessing degraded document images is introduced. The method collects relative data from the whole input image, while the image data are first represented by a content-level descriptor based on patches. This patch-equivalent representation of the input image is then corrected based on similar patches identified using a modified…
▽ More
A patch-based non-local restoration and reconstruction method for preprocessing degraded document images is introduced. The method collects relative data from the whole input image, while the image data are first represented by a content-level descriptor based on patches. This patch-equivalent representation of the input image is then corrected based on similar patches identified using a modified genetic algorithm (GA) resulting in a low computational load. The corrected patch-equivalent is then converted to the output restored image. The fact that the method uses the patches at the content level allows it to incorporate high-level restoration in an objective and self-sufficient way. The method has been applied to several degraded document images, including the DIBCO'09 contest dataset with promising results.
△ Less
Submitted 8 November, 2011; v1 submitted 22 September, 2011;
originally announced September 2011.