-
Deep Learning methodology for the identification of wood species using high-resolution macroscopic images
Authors:
David Herrera-Poyatos,
Andrés Herrera-Poyatos,
Rosana Montes,
Paloma de Palacios,
Luis G. Esteban,
Alberto García Iruela,
Francisco García Fernández,
Francisco Herrera
Abstract:
Significant advancements in the field of wood species identification are needed worldwide to support sustainable timber trade. In this work we contribute to automate the identification of wood species via high-resolution macroscopic images of timber. The main challenge of this problem is that fine-grained patterns in timber are crucial in order to accurately identify wood species, and these patter…
▽ More
Significant advancements in the field of wood species identification are needed worldwide to support sustainable timber trade. In this work we contribute to automate the identification of wood species via high-resolution macroscopic images of timber. The main challenge of this problem is that fine-grained patterns in timber are crucial in order to accurately identify wood species, and these patterns are not properly learned by traditional convolutional neural networks (CNNs) trained on low/medium resolution images.
We propose a Timber Deep Learning Identification with Patch-based Inference Voting methodology, abbreviated TDLI-PIV methodology. Our proposal exploits the concept of patching and the availability of high-resolution macroscopic images of timber in order to overcome the inherent challenges that CNNs face in timber identification. The TDLI-PIV methodology is able to capture fine-grained patterns in timber and, moreover, boosts robustness and prediction accuracy via a collaborative voting inference process.
In this work we also introduce a new data set of marcroscopic images of timber, called GOIMAI-Phase-I, which has been obtained using optical magnification in order to capture fine-grained details, which contrasts to the other datasets that are publicly available. More concretely, images in GOIMAI-Phase-I are taken with a smartphone with a 24x magnifying lens attached to the camera. Our data set contains 2120 images of timber and covers 37 legally protected wood species.
Our experiments have assessed the performance of the TDLI-PIV methodology, involving the comparison with other methodologies available in the literature, exploration of data augmentation methods and the effect that the dataset size has on the accuracy of TDLI-PIV.
△ Less
Submitted 17 June, 2024;
originally announced June 2024.
-
Evaluating Data-driven Performances of Mixed Integer Bilinear Formulations for Book Placement Planning
Authors:
Xuan Lin,
Gabriel Ikaika Fernandez,
Dennis Hong
Abstract:
Mixed integer bilinear programs (MIBLPs) offer tools to resolve robotics motion planning problems with orthogonal rotation matrices or static moment balance, but require long solving times. Recent work utilizing data-driven methods has shown potential to overcome this issue allowing for applications on larger scale problems. To solve mixed-integer bilinear programs online with data-driven methods,…
▽ More
Mixed integer bilinear programs (MIBLPs) offer tools to resolve robotics motion planning problems with orthogonal rotation matrices or static moment balance, but require long solving times. Recent work utilizing data-driven methods has shown potential to overcome this issue allowing for applications on larger scale problems. To solve mixed-integer bilinear programs online with data-driven methods, several re-formulations exist including mathematical programming with complementary constraints (MPCC), and mixed-integer programming (MIP). In this work, we compare the data-driven performances of various MIBLP reformulations using a book placement problem that has discrete configuration switches and bilinear constraints. The success rate, cost, and solving time are compared along with non-data-driven methods. Our results demonstrate the advantage of using data-driven methods to accelerate the solving speed of MIBLPs, and provide references for users to choose the suitable re-formulation.
△ Less
Submitted 6 June, 2024;
originally announced June 2024.
-
Gradient-Free Training of Recurrent Neural Networks using Random Perturbations
Authors:
Jesus Garcia Fernandez,
Sander Keemink,
Marcel van Gerven
Abstract:
Recurrent neural networks (RNNs) hold immense potential for computations due to their Turing completeness and sequential processing capabilities, yet existing methods for their training encounter efficiency challenges. Backpropagation through time (BPTT), the prevailing method, extends the backpropagation (BP) algorithm by unrolling the RNN over time. However, this approach suffers from significan…
▽ More
Recurrent neural networks (RNNs) hold immense potential for computations due to their Turing completeness and sequential processing capabilities, yet existing methods for their training encounter efficiency challenges. Backpropagation through time (BPTT), the prevailing method, extends the backpropagation (BP) algorithm by unrolling the RNN over time. However, this approach suffers from significant drawbacks, including the need to interleave forward and backward phases and store exact gradient information. Furthermore, BPTT has been shown to struggle with propagating gradient information for long sequences, leading to vanishing gradients. An alternative strategy to using gradient-based methods like BPTT involves stochastically approximating gradients through perturbation-based methods. This learning approach is exceptionally simple, necessitating only forward passes in the network and a global reinforcement signal as feedback. Despite its simplicity, the random nature of its updates typically leads to inefficient optimization, limiting its effectiveness in training neural networks. In this study, we present a new approach to perturbation-based learning in RNNs whose performance is competitive with BPTT, while maintaining the inherent advantages over gradient-based learning. To this end, we extend the recently introduced activity-based node perturbation (ANP) method to operate in the time domain, leading to more efficient learning and generalization. Subsequently, we conduct a range of experiments to validate our approach. Our results show similar performance, convergence time and scalability when compared to BPTT, strongly outperforming standard node perturbation and weight perturbation methods. These findings suggest that perturbation-based learning methods offer a versatile alternative to gradient-based methods for training RNNs which can be ideally suited for neuromorphic applications
△ Less
Submitted 24 May, 2024; v1 submitted 14 May, 2024;
originally announced May 2024.
-
Digital Video Manipulation Detection Technique Based on Compression Algorithms
Authors:
Edgar Gonzalez Fernandez,
Ana Lucila Sandoval Orozco,
Luis Javier Garcia Villalba
Abstract:
Digital images and videos play a very important role in everyday life. Nowadays, people have access the affordable mobile devices equipped with advanced integrated cameras and powerful image processing applications. Technological development facilitates not only the generation of multimedia content, but also the intentional modification of it, either with recreational or malicious purposes. This i…
▽ More
Digital images and videos play a very important role in everyday life. Nowadays, people have access the affordable mobile devices equipped with advanced integrated cameras and powerful image processing applications. Technological development facilitates not only the generation of multimedia content, but also the intentional modification of it, either with recreational or malicious purposes. This is where forensic techniques to detect manipulation of images and videos become essential. This paper proposes a forensic technique by analysing compression algorithms used by the H.264 coding. The presence of recompression uses information of macroblocks, a characteristic of the H.264-MPEG4 standard, and motion vectors. A Vector Support Machine is used to create the model that allows to accurately detect if a video has been recompressed.
△ Less
Submitted 3 February, 2024;
originally announced March 2024.
-
Triad: Trusted Timestamps in Untrusted Environments
Authors:
Gabriel P. Fernandez,
Andrey Brito,
Christof Fetzer
Abstract:
We aim to provide trusted time measurement mechanisms to applications and cloud infrastructure deployed in environments that could harbor potential adversaries, including the hardware infrastructure provider. Despite Trusted Execution Environments (TEEs) providing multiple security functionalities, timestamps from the Operating System are not covered. Nevertheless, some services require time for v…
▽ More
We aim to provide trusted time measurement mechanisms to applications and cloud infrastructure deployed in environments that could harbor potential adversaries, including the hardware infrastructure provider. Despite Trusted Execution Environments (TEEs) providing multiple security functionalities, timestamps from the Operating System are not covered. Nevertheless, some services require time for validating permissions or ordering events. To address that need, we introduce Triad, a trusted timestamp dispatcher of time readings. The solution provides trusted timestamps enforced by mutually supportive enclave-based clock servers that create a continuous trusted timeline. We leverage enclave properties such as forced exits and CPU-based counters to mitigate attacks on the server's timestamp counters. Triad produces trusted, confidential, monotonically-increasing timestamps with bounded error and desirable, non-trivial properties. Our implementation relies on Intel SGX and SCONE, allowing transparent usage. We evaluate Triad's error and behavior in multiple dimensions.
△ Less
Submitted 26 February, 2024; v1 submitted 10 November, 2023;
originally announced November 2023.
-
A Last-Level Defense for Application Integrity and Confidentiality
Authors:
Gabriel P. Fernandez,
Andrey Brito,
Ardhi Putra Pratama Hartono,
Muhammad Usama Sardar,
Christof Fetzer
Abstract:
Our objective is to protect the integrity and confidentiality of applications operating in untrusted environments. Trusted Execution Environments (TEEs) are not a panacea. Hardware TEEs fail to protect applications against Sybil, Fork and Rollback Attacks and, consequently, fail to preserve the consistency and integrity of applications. We introduce a novel system, LLD, that enforces the integrity…
▽ More
Our objective is to protect the integrity and confidentiality of applications operating in untrusted environments. Trusted Execution Environments (TEEs) are not a panacea. Hardware TEEs fail to protect applications against Sybil, Fork and Rollback Attacks and, consequently, fail to preserve the consistency and integrity of applications. We introduce a novel system, LLD, that enforces the integrity and consistency of applications in a transparent and scalable fashion. Our solution augments TEEs with instantiation control and rollback protection. Instantiation control, enforced with TEE-supported leases, mitigates Sybil/Fork Attacks without incurring the high costs of solving crypto-puzzles. Our rollback detection mechanism does not need excessive replication, nor does it sacrifice durability. We show that implementing these functionalities in the LLD runtime automatically protects applications and services such as a popular DBMS.
△ Less
Submitted 10 November, 2023;
originally announced November 2023.
-
Evaluating the acceptance of autonomous vehicles in the future
Authors:
Angel Madridano Carrasco,
Delgermaa Gankhuyag,
Miguel Angel de Miguel Paraiso,
Martin Palos Lorite,
Cristina Olaverri-Monreal,
Fernando Garcia Fernandez
Abstract:
The continuous advance of the automotive industry is leading to the emergence of more advanced driver assistance systems that enable the automation of certain tasks and that are undoubtedly aimed at achieving vehicles in which the driving task can be completely delegated. All these advances will bring changes in the paradigm of the automotive market, as is the case of insurance. For this reason, C…
▽ More
The continuous advance of the automotive industry is leading to the emergence of more advanced driver assistance systems that enable the automation of certain tasks and that are undoubtedly aimed at achieving vehicles in which the driving task can be completely delegated. All these advances will bring changes in the paradigm of the automotive market, as is the case of insurance. For this reason, CESVIMAP and the Universidad Carlos III de Madrid are working on an Autonomous Testing pLatform for insurAnce reSearch (ATLAS) to study this technology and obtain first-hand knowledge about the responsibilities of each of the agents involved in the development of the vehicles of the future. This work gathers part of the advancements made in ATLAS, which have made it possible to have an autonomous vehicle with which to perform tests in real environments and demonstrations bringing the vehicle closer to future users. As a result of this work, and in collaboration with the Johannes Kepler University Linz, the impact, degree of acceptance and confidence of users in autonomous vehicles has been studied once they have taken a trip on board a fully autonomous vehicle such as ATLAS. This study has found that, while most users would be willing to use an autonomous vehicle, the same users are concerned about the use of this type of technology. Thus, understanding the reasons for this concern can help define the future of autonomous cars.
△ Less
Submitted 26 January, 2023;
originally announced January 2023.
-
Benchmark Results for Bookshelf Organization Problem as Mixed Integer Nonlinear Program with Mode Switch and Collision Avoidance
Authors:
Xuan Lin,
Gabriel I. Fernandez,
Dennis W. Hong
Abstract:
Mixed integer convex and nonlinear programs, MICP and MINLP, are expressive but require long solving times. Recent work that combines data-driven methods on solver heuristics has shown potential to overcome this issue allowing for applications on larger scale practical problems. To solve mixed-integer bilinear programs online with data-driven methods, several formulations exist including mathemati…
▽ More
Mixed integer convex and nonlinear programs, MICP and MINLP, are expressive but require long solving times. Recent work that combines data-driven methods on solver heuristics has shown potential to overcome this issue allowing for applications on larger scale practical problems. To solve mixed-integer bilinear programs online with data-driven methods, several formulations exist including mathematical programming with complementary constraints (MPCC), mixed-integer programming (MIP). In this work, we benchmark the performances of those data-driven schemes on a bookshelf organization problem that has discrete mode switch and collision avoidance constraints. The success rate, optimal cost and solving time are compared along with non-data-driven methods. Our proposed methods are demonstrated as a high level planner for a robotic arm for the bookshelf problem.
△ Less
Submitted 28 August, 2022;
originally announced August 2022.
-
Feasibility Study of LIMMS, A Multi-Agent Modular Robotic Delivery System with Various Locomotion and Manipulation Modes
Authors:
Taoyuanmin Zhu,
Gabriel I. Fernandez,
Colin Togashi,
Yeting Liu,
Dennis Hong
Abstract:
The logistics of transporting a package from a storage facility to the consumer's front door usually employs highly specialized robots often times splitting sub-tasks up to different systems, e.g., manipulator arms to sort and wheeled vehicles to deliver. More recent endeavors attempt to have a unified approach with legged and humanoid robots. These solutions, however, occupy large amounts of spac…
▽ More
The logistics of transporting a package from a storage facility to the consumer's front door usually employs highly specialized robots often times splitting sub-tasks up to different systems, e.g., manipulator arms to sort and wheeled vehicles to deliver. More recent endeavors attempt to have a unified approach with legged and humanoid robots. These solutions, however, occupy large amounts of space thus reducing the number of packages that can fit into a delivery vehicle. As a result, these bulky robotic systems often reduce the potential for scalability and task parallelization. In this paper, we introduce LIMMS (Latching Intelligent Modular Mobility System) to address both the manipulation and delivery portion of a typical last-mile delivery while maintaining a minimal spatial footprint. LIMMS is a symmetrically designed, 6 degree of freedom (DoF) appendage-like robot with wheels and latching mechanisms at both ends. By latching onto a surface and anchoring at one end, LIMMS can function as a traditional 6-DoF manipulator arm. On the other hand, multiple LIMMS can latch onto a single box and behave like a legged robotic system where the package is the body. During transit, LIMMS folds up compactly and takes up much less space compared to traditional robotic systems. A large group of LIMMS units can fit inside of a single delivery vehicle, opening the potential for new delivery optimization and hybrid planning methods never done before. In this paper, the feasibility of LIMMS is studied and presented using a hardware prototype as well as simulation results for a range of sub-tasks in a typical last-mile delivery.
△ Less
Submitted 23 August, 2022;
originally announced August 2022.
-
Multi-Modal Multi-Agent Optimization for LIMMS, A Modular Robotics Approach to Delivery Automation
Authors:
Xuan Lin,
Gabriel Fernandez,
Yeting Liu,
Taoyuanmin Zhu,
Yuki Shirai,
Dennis Hong
Abstract:
In this paper we present a motion planner for LIMMS, a modular multi-agent, multi-modal package delivery platform. A single LIMMS unit is a robot that can operate as an arm or leg depending on how and what it is attached to, e.g., a manipulator when it is anchored to walls within a delivery vehicle or a quadruped robot when 4 are attached to a box. Coordinating amongst multiple LIMMS, when each on…
▽ More
In this paper we present a motion planner for LIMMS, a modular multi-agent, multi-modal package delivery platform. A single LIMMS unit is a robot that can operate as an arm or leg depending on how and what it is attached to, e.g., a manipulator when it is anchored to walls within a delivery vehicle or a quadruped robot when 4 are attached to a box. Coordinating amongst multiple LIMMS, when each one can take on vastly different roles, can quickly become complex. For such a planning problem we first compose the necessary logic and constraints. The formulation is then solved for skill exploration and can be implemented on hardware after refinement. To solve this optimization problem we use alternating direction method of multipliers (ADMM). The proposed planner is experimented under various scenarios which shows the capability of LIMMS to enter into different modes or combinations of them to achieve their goal of moving ship** boxes.
△ Less
Submitted 31 July, 2022;
originally announced August 2022.
-
ReDUCE: Reformulation of Mixed Integer Programs using Data from Unsupervised Clusters for Learning Efficient Strategies
Authors:
Xuan Lin,
Gabriel I. Fernandez,
Dennis W. Hong
Abstract:
Mixed integer convex and nonlinear programs, MICP and MINLP, are expressive but require long solving times. Recent work that combines learning methods on solver heuristics has shown potential to overcome this issue allowing for applications on larger scale practical problems. Gathering sufficient training data to employ these methods still present a challenge since getting data from traditional so…
▽ More
Mixed integer convex and nonlinear programs, MICP and MINLP, are expressive but require long solving times. Recent work that combines learning methods on solver heuristics has shown potential to overcome this issue allowing for applications on larger scale practical problems. Gathering sufficient training data to employ these methods still present a challenge since getting data from traditional solvers are slow and newer learning approaches still require large amounts of data. In order to scale up and make these hybrid learning approaches more manageable we propose ReDUCE, a method that exploits structure within small to medium size datasets. We also introduce the bookshelf organization problem as an MINLP as a way to measure performance of solvers with ReDUCE. Results show that existing algorithms with ReDUCE can solve this problem within a few seconds, a significant improvement over the original formulation. ReDUCE is demonstrated as a high level planner for a robotic arm for the bookshelf problem.
△ Less
Submitted 1 October, 2021;
originally announced October 2021.
-
Broad-UNet: Multi-scale feature learning for nowcasting tasks
Authors:
Jesus Garcia Fernandez,
Siamak Mehrkanoon
Abstract:
Weather nowcasting consists of predicting meteorological components in the short term at high spatial resolutions. Due to its influence in many human activities, accurate nowcasting has recently gained plenty of attention. In this paper, we treat the nowcasting problem as an image-to-image translation problem using satellite imagery. We introduce Broad-UNet, a novel architecture based on the core…
▽ More
Weather nowcasting consists of predicting meteorological components in the short term at high spatial resolutions. Due to its influence in many human activities, accurate nowcasting has recently gained plenty of attention. In this paper, we treat the nowcasting problem as an image-to-image translation problem using satellite imagery. We introduce Broad-UNet, a novel architecture based on the core UNet model, to efficiently address this problem. In particular, the proposed Broad-UNet is equipped with asymmetric parallel convolutions as well as Atrous Spatial Pyramid Pooling (ASPP) module. In this way, The the Broad-UNet model learns more complex patterns by combining multi-scale features while using fewer parameters than the core UNet model. The proposed model is applied on two different nowcasting tasks, i.e. precipitation maps and cloud cover nowcasting. The obtained numerical results show that the introduced Broad-UNet model performs more accurate predictions compared to the other examined architectures.
△ Less
Submitted 26 October, 2021; v1 submitted 12 February, 2021;
originally announced February 2021.
-
Design, analysis and control of the series-parallel hybrid RH5 humanoid robot
Authors:
Julian Esser,
Shivesh Kumar,
Heiner Peters,
Vinzenz Bargsten,
Jose de Gea Fernandez,
Carlos Mastalli,
Olivier Stasse,
Frank Kirchner
Abstract:
Last decades of humanoid research has shown that humanoids developed for high dynamic performance require a stiff structure and optimal distribution of mass--inertial properties. Humanoid robots built with a purely tree type architecture tend to be bulky and usually suffer from velocity and force/torque limitations. This paper presents a novel series-parallel hybrid humanoid called RH5 which is 2…
▽ More
Last decades of humanoid research has shown that humanoids developed for high dynamic performance require a stiff structure and optimal distribution of mass--inertial properties. Humanoid robots built with a purely tree type architecture tend to be bulky and usually suffer from velocity and force/torque limitations. This paper presents a novel series-parallel hybrid humanoid called RH5 which is 2 m tall and weighs only 62.5 kg capable of performing heavy-duty dynamic tasks with 5 kg payloads in each hand. The analysis and control of this humanoid is performed with whole-body trajectory optimization technique based on differential dynamic programming (DDP). Additionally, we present an improved contact stability soft-constrained DDP algorithm which is able to generate physically consistent walking trajectories for the humanoid that can be tracked via a simple PD position control in a physics simulator. Finally, we showcase preliminary experimental results on the RH5 humanoid robot.
△ Less
Submitted 26 January, 2021;
originally announced January 2021.
-
InTAS -- The Ingolstadt Traffic Scenario for SUMO
Authors:
Silas C. Lobo,
Stefan Neumeier,
Evelio M. G. Fernandez,
Christian Facchi
Abstract:
Vehicular Ad Hoc Networks (VANETs) are expected to be the next big step towards safer road transport, supporting applications to exchange information between vehicles. To develop novel applications for this area a high number of tests, considering all traffic situations, are demanded. However, it is unfeasible to reproduce these tests in real life, by the fact that any failure on the applications…
▽ More
Vehicular Ad Hoc Networks (VANETs) are expected to be the next big step towards safer road transport, supporting applications to exchange information between vehicles. To develop novel applications for this area a high number of tests, considering all traffic situations, are demanded. However, it is unfeasible to reproduce these tests in real life, by the fact that any failure on the applications would cause severe impacts on transport system safety and could risk human lives. Thus, this paper presents the concept, model, and validation for InTAS, a realistic traffic scenario for Ingolstadt. InTAS road topology accurately represents Ingolstadt real road map. Elements such as buildings, bus stops, and traffic lights were added to the map. Twenty traffic lights systems were simulated according to the real program deployed on the traffic lights. Traffic demand was modeled based on the activitygen method, considering demographic data and real-traffic information. The city public transport system was also simulated accordingly to bus time-tables and their routes. The simulation step was implemented considering the best value for device.rerouting.probability, which was defined by evaluating InTAS output and real traffic data. The scenario was validated by comparing real-traffic data from 24 measurement points with InTAS simulation results.
△ Less
Submitted 24 November, 2020;
originally announced November 2020.
-
Deep coastal sea elements forecasting using U-Net based models
Authors:
Jesús García Fernández,
Ismail Alaoui Abdellaoui,
Siamak Mehrkanoon
Abstract:
The supply and demand of energy is influenced by meteorological conditions. The relevance of accurate weather forecasts increases as the demand for renewable energy sources increases. The energy providers and policy makers require weather information to make informed choices and establish optimal plans according to the operational objectives. Due to the recent development of deep learning techniqu…
▽ More
The supply and demand of energy is influenced by meteorological conditions. The relevance of accurate weather forecasts increases as the demand for renewable energy sources increases. The energy providers and policy makers require weather information to make informed choices and establish optimal plans according to the operational objectives. Due to the recent development of deep learning techniques applied to satellite imagery, weather forecasting that uses remote sensing data has also been the subject of major progress. The present paper investigates multiple steps ahead frame prediction for coastal sea elements in the Netherlands using U-Net based architectures. Hourly data from the Copernicus observation programme spanned over a period of 2 years has been used to train the models and make the forecasting, including seasonal predictions. We propose a variation of the U-Net architecture and further extend this novel model using residual connections, parallel convolutions and asymmetric convolutions in order to introduce three additional architectures. In particular, we show that the architecture equipped with parallel and asymmetric convolutions as well as skip connections outperforms the other three discussed models.
△ Less
Submitted 8 November, 2021; v1 submitted 6 November, 2020;
originally announced November 2020.
-
Deep brain state classification of MEG data
Authors:
Ismail Alaoui Abdellaoui,
Jesus Garcia Fernandez,
Caner Sahinli,
Siamak Mehrkanoon
Abstract:
Neuroimaging techniques have shown to be useful when studying the brain's activity. This paper uses Magnetoencephalography (MEG) data, provided by the Human Connectome Project (HCP), in combination with various deep artificial neural network models to perform brain decoding. More specifically, here we investigate to which extent can we infer the task performed by a subject based on its MEG data. T…
▽ More
Neuroimaging techniques have shown to be useful when studying the brain's activity. This paper uses Magnetoencephalography (MEG) data, provided by the Human Connectome Project (HCP), in combination with various deep artificial neural network models to perform brain decoding. More specifically, here we investigate to which extent can we infer the task performed by a subject based on its MEG data. Three models based on compact convolution, combined convolutional and long short-term architecture as well as a model based on multi-view learning that aims at fusing the outputs of the two stream networks are proposed and examined. These models exploit the spatio-temporal MEG data for learning new representations that are used to decode the relevant tasks across subjects. In order to realize the most relevant features of the input signals, two attention mechanisms, i.e. self and global attention, are incorporated in all the models. The experimental results of cross subject multi-class classification on the studied MEG dataset show that the inclusion of attention improves the generalization of the models across subjects.
△ Less
Submitted 4 July, 2020; v1 submitted 2 July, 2020;
originally announced July 2020.
-
Deep Reinforcement Learning with Linear Quadratic Regulator Regions
Authors:
Gabriel I. Fernandez,
Colin Togashi,
Dennis W. Hong,
Lin F. Yang
Abstract:
Practitioners often rely on compute-intensive domain randomization to ensure reinforcement learning policies trained in simulation can robustly transfer to the real world. Due to unmodeled nonlinearities in the real system, however, even such simulated policies can still fail to perform stably enough to acquire experience in real environments. In this paper we propose a novel method that guarantee…
▽ More
Practitioners often rely on compute-intensive domain randomization to ensure reinforcement learning policies trained in simulation can robustly transfer to the real world. Due to unmodeled nonlinearities in the real system, however, even such simulated policies can still fail to perform stably enough to acquire experience in real environments. In this paper we propose a novel method that guarantees a stable region of attraction for the output of a policy trained in simulation, even for highly nonlinear systems. Our core technique is to use "bias-shifted" neural networks for constructing the controller and training the network in the simulator. The modified neural networks not only capture the nonlinearities of the system but also provably preserve linearity in a certain region of the state space and thus can be tuned to resemble a linear quadratic regulator that is known to be stable for the real system. We have tested our new method by transferring simulated policies for a swing-up inverted pendulum to real systems and demonstrated its efficacy.
△ Less
Submitted 25 February, 2020; v1 submitted 22 February, 2020;
originally announced February 2020.
-
A Data-Centric Approach to Extreme-Scale Ab initio Dissipative Quantum Transport Simulations
Authors:
Alexandros Nikolaos Ziogas,
Tal Ben-Nun,
Guillermo Indalecio Fernández,
Timo Schneider,
Mathieu Luisier,
Torsten Hoefler
Abstract:
The computational efficiency of a state of the art ab initio quantum transport (QT) solver, capable of revealing the coupled electro-thermal properties of atomically-resolved nano-transistors, has been improved by up to two orders of magnitude through a data centric reorganization of the application. The approach yields coarse-and fine-grained data-movement characteristics that can be used for per…
▽ More
The computational efficiency of a state of the art ab initio quantum transport (QT) solver, capable of revealing the coupled electro-thermal properties of atomically-resolved nano-transistors, has been improved by up to two orders of magnitude through a data centric reorganization of the application. The approach yields coarse-and fine-grained data-movement characteristics that can be used for performance and communication modeling, communication-avoidance, and dataflow transformations. The resulting code has been tuned for two top-6 hybrid supercomputers, reaching a sustained performance of 85.45 Pflop/s on 4,560 nodes of Summit (42.55% of the peak) in double precision, and 90.89 Pflop/s in mixed precision. These computational achievements enable the restructured QT simulator to treat realistic nanoelectronic devices made of more than 10,000 atoms within a 14$\times$ shorter duration than the original code needs to handle a system with 1,000 atoms, on the same number of CPUs/GPUs and with the same physical accuracy.
△ Less
Submitted 18 December, 2019;
originally announced December 2019.
-
Optimizing the Data Movement in Quantum Transport Simulations via Data-Centric Parallel Programming
Authors:
Alexandros Nikolaos Ziogas,
Tal Ben-Nun,
Guillermo Indalecio Fernández,
Timo Schneider,
Mathieu Luisier,
Torsten Hoefler
Abstract:
Designing efficient cooling systems for integrated circuits (ICs) relies on a deep understanding of the electro-thermal properties of transistors. To shed light on this issue in currently fabricated FinFETs, a quantum mechanical solver capable of revealing atomically-resolved electron and phonon transport phenomena from first-principles is required. In this paper, we consider a global, data-centri…
▽ More
Designing efficient cooling systems for integrated circuits (ICs) relies on a deep understanding of the electro-thermal properties of transistors. To shed light on this issue in currently fabricated FinFETs, a quantum mechanical solver capable of revealing atomically-resolved electron and phonon transport phenomena from first-principles is required. In this paper, we consider a global, data-centric view of a state-of-the-art quantum transport simulator to optimize its execution on supercomputers. The approach yields coarse- and fine-grained data-movement characteristics, which are used for performance and communication modeling, communication-avoidance, and data-layout transformations. The transformations are tuned for the Piz Daint and Summit supercomputers, where each platform requires different caching and fusion strategies to perform optimally. The presented results make ab initio device simulation enter a new era, where nanostructures composed of over 10,000 atoms can be investigated at an unprecedented level of accuracy, paving the way for better heat management in next-generation ICs.
△ Less
Submitted 18 December, 2019;
originally announced December 2019.
-
Massive Wireless Energy Transfer: Enabling Sustainable IoT Towards 6G Era
Authors:
Onel L. Alcaraz López,
Hirley Alves,
Richard Demo Souza,
Samuel Montejo-Sánchez,
Evelio M. García Fernández,
Matti Latva-aho
Abstract:
Recent advances on wireless energy transfer (WET) make it a promising solution for powering future Internet of Things (IoT) devices enabled by the upcoming sixth generation (6G) era. The main architectures, challenges and techniques for efficient and scalable wireless powering are overviewed in this paper. Candidates enablers such as energy beamforming (EB), distributed antenna systems (DAS), adva…
▽ More
Recent advances on wireless energy transfer (WET) make it a promising solution for powering future Internet of Things (IoT) devices enabled by the upcoming sixth generation (6G) era. The main architectures, challenges and techniques for efficient and scalable wireless powering are overviewed in this paper. Candidates enablers such as energy beamforming (EB), distributed antenna systems (DAS), advances on devices' hardware and programmable medium, new spectrum opportunities, resource scheduling and distributed ledger technology are outlined. Special emphasis is placed on discussing the suitability of channel state information (CSI)-limited/free strategies when powering simultaneously a massive number of devices. The benefits from combining DAS and EB, and from using average CSI whenever available, are numerically illustrated. The pros and cons of the state-of-the-art CSI-free WET techniques in ultra-low power setups are thoroughly revised, and some possible future enhancements are outlined. Finally, key research directions towards realizing WET-enabled massive IoT networks in the 6G era are identified and discussed in detail.
△ Less
Submitted 2 January, 2021; v1 submitted 11 December, 2019;
originally announced December 2019.
-
A Case Study on Using Deep Learning for Network Intrusion Detection
Authors:
Gabriel C. Fernandez,
Shouhuai Xu
Abstract:
Deep Learning has been very successful in many application domains. However, its usefulness in the context of network intrusion detection has not been systematically investigated. In this paper, we report a case study on using deep learning for both supervised network intrusion detection and unsupervised network anomaly detection. We show that Deep Neural Networks (DNNs) can outperform other machi…
▽ More
Deep Learning has been very successful in many application domains. However, its usefulness in the context of network intrusion detection has not been systematically investigated. In this paper, we report a case study on using deep learning for both supervised network intrusion detection and unsupervised network anomaly detection. We show that Deep Neural Networks (DNNs) can outperform other machine learning based intrusion detection systems, while being robust in the presence of dynamic IP addresses. We also show that Autoencoders can be effective for network anomaly detection.
△ Less
Submitted 4 October, 2019;
originally announced October 2019.
-
Rate Control for Wireless-Powered Communication Network with Reliability and Delay Constraints
Authors:
Onel L. Alcaraz López,
Hirley Alves,
Richard Demo Souza,
Samuel Montejo-Sánchez,
Evelio M. García Fernández
Abstract:
We consider a two-phase Wireless-Powered Communication Network under Nakagami-m fading, where a wireless energy transfer process first powers a sensor node that then uses such energy to transmit its data in the wireless information transmission phase. We explore a fixed transmit rate scheme designed to cope with the reliability and delay constraints of the system while attaining closed-form approx…
▽ More
We consider a two-phase Wireless-Powered Communication Network under Nakagami-m fading, where a wireless energy transfer process first powers a sensor node that then uses such energy to transmit its data in the wireless information transmission phase. We explore a fixed transmit rate scheme designed to cope with the reliability and delay constraints of the system while attaining closed-form approximations for the optimum wireless energy transfer and wireless information transmission blocklength. Then, a more-elaborate rate control strategy exploiting the readily available battery charge information is proposed and the results evidence its outstanding performance when compared with the fixed transmit rate, for which no battery charge information is available. It even reaches an average rate performance close to that of an ideal scheme requiring full Channel State Information at transmitter side. Numerical results show the positive impact of a greater number of antennas at the destination, and evidence that the greater the reliability constraints, the smaller the message sizes on average, and the smaller the optimum information blocklengths. Finally, we corroborate the appropriateness of using the asymptotic blocklength formulation as an approximation of the non-asymptotic finite blocklength results.
△ Less
Submitted 30 August, 2019;
originally announced September 2019.
-
Optimization Based Motion Planning for Multi-Limbed Vertical Climbing Robots
Authors:
Xuan Lin,
**gwen Zhang,
Junjie Shen,
Gabriel Fernandez,
Dennis W Hong
Abstract:
Motion planning trajectories for a multi-limbed robot to climb up walls requires a unique combination of constraints on torque, contact force, and posture. This paper focuses on motion planning for one particular setup wherein a six-legged robot braces itself between two vertical walls and climbs vertically with end effectors that only use friction. Instead of motion planning with a single nonline…
▽ More
Motion planning trajectories for a multi-limbed robot to climb up walls requires a unique combination of constraints on torque, contact force, and posture. This paper focuses on motion planning for one particular setup wherein a six-legged robot braces itself between two vertical walls and climbs vertically with end effectors that only use friction. Instead of motion planning with a single nonlinear programming (NLP) solver, we decoupled the problem into two parts with distinct physical meaning: torso postures and contact forces. The first part can be formulated as either a mixed-integer convex programming (MICP) or NLP problem, while the second part is formulated as a series of standard convex optimization problems. Variants of the two wall climbing problem e.g., obstacle avoidance, uneven surfaces, and angled walls, help verify the proposed method in simulation and experimentation.
△ Less
Submitted 15 August, 2023; v1 submitted 13 September, 2019;
originally announced September 2019.
-
BACH: Grand Challenge on Breast Cancer Histology Images
Authors:
Guilherme Aresta,
Teresa Araújo,
Scotty Kwok,
Sai Saketh Chennamsetty,
Mohammed Safwan,
Varghese Alex,
Bahram Marami,
Marcel Prastawa,
Monica Chan,
Michael Donovan,
Gerardo Fernandez,
Jack Zeineh,
Matthias Kohl,
Christoph Walz,
Florian Ludwig,
Stefan Braunewell,
Maximilian Baust,
Quoc Dang Vu,
Minh Nguyen Nhat To,
Eal Kim,
** Tae Kwak,
Sameh Galal,
Veronica Sanchez-Freire,
Nadia Brancati,
Maria Frucci
, et al. (11 additional authors not shown)
Abstract:
Breast cancer is the most common invasive cancer in women, affecting more than 10% of women worldwide. Microscopic analysis of a biopsy remains one of the most important methods to diagnose the type of breast cancer. This requires specialized analysis by pathologists, in a task that i) is highly time- and cost-consuming and ii) often leads to nonconsensual results. The relevance and potential of a…
▽ More
Breast cancer is the most common invasive cancer in women, affecting more than 10% of women worldwide. Microscopic analysis of a biopsy remains one of the most important methods to diagnose the type of breast cancer. This requires specialized analysis by pathologists, in a task that i) is highly time- and cost-consuming and ii) often leads to nonconsensual results. The relevance and potential of automatic classification algorithms using hematoxylin-eosin stained histopathological images has already been demonstrated, but the reported results are still sub-optimal for clinical use. With the goal of advancing the state-of-the-art in automatic classification, the Grand Challenge on BreAst Cancer Histology images (BACH) was organized in conjunction with the 15th International Conference on Image Analysis and Recognition (ICIAR 2018). A large annotated dataset, composed of both microscopy and whole-slide images, was specifically compiled and made publicly available for the BACH challenge. Following a positive response from the scientific community, a total of 64 submissions, out of 677 registrations, effectively entered the competition. From the submitted algorithms it was possible to push forward the state-of-the-art in terms of accuracy (87%) in automatic classification of breast cancer with histopathological images. Convolutional neuronal networks were the most successful methodology in the BACH challenge. Detailed analysis of the collective results allowed the identification of remaining challenges in the field and recommendations for future developments. The BACH dataset remains publically available as to promote further improvements to the field of automatic classification in digital pathology.
△ Less
Submitted 17 June, 2019; v1 submitted 13 August, 2018;
originally announced August 2018.
-
Ultra-Reliable Cooperative Short-Packet Communications with Wireless Energy Transfer
Authors:
Onel L. A. López,
Evelio M. G. Fernández,
Richard D. Souza,
Hirley Alves
Abstract:
We analyze a cooperative wireless communication system with finite block length and finite battery energy, under quasi-static Rayleigh fading. Source and relay nodes are powered by a wireless energy transfer (WET) process, while using the harvested energy to feed their circuits, send pilot signals to estimate channels at receivers, and for wireless information transmission (WIT). Other power consu…
▽ More
We analyze a cooperative wireless communication system with finite block length and finite battery energy, under quasi-static Rayleigh fading. Source and relay nodes are powered by a wireless energy transfer (WET) process, while using the harvested energy to feed their circuits, send pilot signals to estimate channels at receivers, and for wireless information transmission (WIT). Other power consumption sources beyond data transmission power are considered. The error probability is investigated under perfect/imperfect channel state information (CSI), while reaching accurate closed-form approximations in ideal direct communication system setups. We consider ultra-reliable communication (URC) scenarios under discussion for the next fifth-generation (5G) of wireless systems. The numerical results show the existence of an optimum pilot transmit power for channel estimation, which increases with the harvested energy. We also show the importance of cooperation, even taking into account the multiplexing loss, in order to meet the error and latency constraints of the URC systems.
△ Less
Submitted 1 January, 2018;
originally announced January 2018.
-
Wireless Powered Communications with Finite Battery and Finite Blocklength
Authors:
Onel L. A. López,
Evelio M. G. Fernández,
R. D. Souza,
H. Alves
Abstract:
We analyze a wireless communication system with finite block length and finite battery energy, under quasi-static Nakagami-m fading. Wireless energy transfer is carried out in the downlink while information transfer occurs in the uplink. Transmission strategies for scenarios with/without energy accumulation between transmission rounds are characterized in terms of error probability and energy cons…
▽ More
We analyze a wireless communication system with finite block length and finite battery energy, under quasi-static Nakagami-m fading. Wireless energy transfer is carried out in the downlink while information transfer occurs in the uplink. Transmission strategies for scenarios with/without energy accumulation between transmission rounds are characterized in terms of error probability and energy consumption. A power control protocol for the energy accumulation scenario is proposed and results show the enormous impact on improving the system performance, in terms of error probability and energy consumption. The numerical results corroborate the existence and uniqueness of an optimum target error probability, while showing that a relatively small battery could be a limiting factor for some setups, specially when using the energy accumulation strategy.
△ Less
Submitted 20 December, 2017; v1 submitted 25 May, 2017;
originally announced May 2017.
-
A General Scheme Implicit Force Control for a Flexible-Link Manipulator
Authors:
Cecilia Murrugarra,
Osberth De Castro,
Juan Carlos Grieco,
Gerardo Fernandez
Abstract:
In this paper we propose an implicit force control scheme for a one-link flexible manipulator that interact with a compliant environment. The controller was based in the mathematical model of the manipulator, considering the dynamics of the beam flexible and the gravitational force. With this method, the controller parameters are obtained from the structural parameters of the beam (link) of the ma…
▽ More
In this paper we propose an implicit force control scheme for a one-link flexible manipulator that interact with a compliant environment. The controller was based in the mathematical model of the manipulator, considering the dynamics of the beam flexible and the gravitational force. With this method, the controller parameters are obtained from the structural parameters of the beam (link) of the manipulator. This controller ensure the stability based in the Lyapunov Theory. The controller proposed has two closed loops: the inner loop is a tracking control with gravitational force and vibration frequencies compensation and the outer loop is a implicit force control. To evaluate the performance of the controller, we have considered to three different manipulators (the length, the diameter were modified) and three environments with compliance modified. The results obtained from simulations verify the asymptotic tracking and regulated in position and force respectively and the vibrations suppression of the beam in a finite time.
△ Less
Submitted 13 May, 2017;
originally announced May 2017.
-
Ultra-Reliable Short-Packet Communications with Wireless Energy Transfer
Authors:
Onel L. Alcaraz López,
Hirley Alves,
Richard Demo Souza,
Evelio Martín García Fernández
Abstract:
We analyze and optimize a wireless system with energy transfer in the downlink and information transfer in the uplink, under quasi-static Nakagami-m fading. We consider ultra-reliable communication scenarios representative of the fifth-generation of wireless systems, with strict error and latency requirements. The error probability and delay are investigated, and an approximation for the former is…
▽ More
We analyze and optimize a wireless system with energy transfer in the downlink and information transfer in the uplink, under quasi-static Nakagami-m fading. We consider ultra-reliable communication scenarios representative of the fifth-generation of wireless systems, with strict error and latency requirements. The error probability and delay are investigated, and an approximation for the former is given and validated through simulations. The numerical results demonstrate that there are optimum numbers of channels uses for both energy and information transfer for a given message length.
△ Less
Submitted 21 February, 2017;
originally announced February 2017.
-
Eye-Movement behavior identification for AD diagnosis
Authors:
Juan Biondi,
Gerardo Fernandez,
Silvia Castro,
Osvaldo Agamennoni
Abstract:
In the present work, we develop a deep-learning approach for differentiating the eye-movement behavior of people with neurodegenerative diseases over healthy control subjects during reading well-defined sentences. We define an information compaction of the eye-tracking data of subjects without and with probable Alzheimer's disease when reading a set of well-defined, previously validated, sentences…
▽ More
In the present work, we develop a deep-learning approach for differentiating the eye-movement behavior of people with neurodegenerative diseases over healthy control subjects during reading well-defined sentences. We define an information compaction of the eye-tracking data of subjects without and with probable Alzheimer's disease when reading a set of well-defined, previously validated, sentences including high-, low-predictable sentences, and proverbs. Using this information we train a set of denoising sparse-autoencoders and build a deep neural network with these and a softmax classifier. Our results are very promising and show that these models may help to understand the dynamics of eye movement behavior and its relationship with underlying neuropsychological correlates.
△ Less
Submitted 15 January, 2018; v1 submitted 2 February, 2017;
originally announced February 2017.
-
Ultra Reliable Short Message Relaying with Wireless Power Transfer
Authors:
Onel L. Alcaraz López,
Hirley Alves,
Richard Demo Souza,
Evelio Martín García Fernández
Abstract:
We consider a dual-hop wireless network where an energy constrained relay node first harvests energy through the received radio-frequency signal from the source, and then uses the harvested energy to forward the source's information to the destination node. The throughput and delay metrics are investigated for a decode-and-forward relaying mechanism at finite blocklength regime and delay-limited t…
▽ More
We consider a dual-hop wireless network where an energy constrained relay node first harvests energy through the received radio-frequency signal from the source, and then uses the harvested energy to forward the source's information to the destination node. The throughput and delay metrics are investigated for a decode-and-forward relaying mechanism at finite blocklength regime and delay-limited transmission mode. We consider ultra-reliable communication scenarios under discussion for the next fifth-generation of wireless systems, with error and latency constraints. The impact on these metrics of the blocklength, information bits, and relay position is investigated.
△ Less
Submitted 2 February, 2017;
originally announced February 2017.
-
A Novel Performance Evaluation Methodology for Single-Target Trackers
Authors:
Matej Kristan,
Jiri Matas,
Ales Leonardis,
Tomas Vojir,
Roman Pflugfelder,
Gustavo Fernandez,
Georg Nebehay,
Fatih Porikli,
Luka Cehovin
Abstract:
This paper addresses the problem of single-target tracker performance evaluation. We consider the performance measures, the dataset and the evaluation system to be the most important components of tracker evaluation and propose requirements for each of them. The requirements are the basis of a new evaluation methodology that aims at a simple and easily interpretable tracker comparison. The ranking…
▽ More
This paper addresses the problem of single-target tracker performance evaluation. We consider the performance measures, the dataset and the evaluation system to be the most important components of tracker evaluation and propose requirements for each of them. The requirements are the basis of a new evaluation methodology that aims at a simple and easily interpretable tracker comparison. The ranking-based methodology addresses tracker equivalence in terms of statistical significance and practical differences. A fully-annotated dataset with per-frame annotations with several visual attributes is introduced. The diversity of its visual properties is maximized in a novel way by clustering a large number of videos according to their visual attributes. This makes it the most sophistically constructed and annotated dataset to date. A multi-platform evaluation system allowing easy integration of third-party trackers is presented as well. The proposed evaluation methodology was tested on the VOT2014 challenge on the new dataset and 38 trackers, making it the largest benchmark to date. Most of the tested trackers are indeed state-of-the-art since they outperform the standard baselines, resulting in a highly-challenging benchmark. An exhaustive analysis of the dataset from the perspective of tracking difficulty is carried out. To facilitate tracker comparison a new performance visualization technique is proposed.
△ Less
Submitted 8 January, 2016; v1 submitted 4 March, 2015;
originally announced March 2015.