-
LMBF-Net: A Lightweight Multipath Bidirectional Focal Attention Network for Multifeatures Segmentation
Authors:
Tariq M Khan,
Shahzaib Iqbal,
Syed S. Naqvi,
Imran Razzak,
Erik Meijering
Abstract:
Retinal diseases can cause irreversible vision loss in both eyes if not diagnosed and treated early. Since retinal diseases are so complicated, retinal imaging is likely to show two or more abnormalities. Current deep learning techniques for segmenting retinal images with many labels and attributes have poor detection accuracy and generalisability. This paper presents a multipath convolutional neu…
▽ More
Retinal diseases can cause irreversible vision loss in both eyes if not diagnosed and treated early. Since retinal diseases are so complicated, retinal imaging is likely to show two or more abnormalities. Current deep learning techniques for segmenting retinal images with many labels and attributes have poor detection accuracy and generalisability. This paper presents a multipath convolutional neural network for multifeature segmentation. The proposed network is lightweight and spatially sensitive to information. A patch-based implementation is used to extract local image features, and focal modulation attention blocks are incorporated between the encoder and the decoder for improved segmentation. Filter optimisation is used to prevent filter overlaps and speed up model convergence. A combination of convolution operations and group convolution operations is used to reduce computational costs. This is the first robust and generalisable network capable of segmenting multiple features of fundus images (including retinal vessels, microaneurysms, optic discs, haemorrhages, hard exudates, and soft exudates). The results of our experimental evaluation on more than ten publicly available datasets with multiple features show that the proposed network outperforms recent networks despite having a small number of learnable parameters.
△ Less
Submitted 3 July, 2024;
originally announced July 2024.
-
On the Application of Reliability Theory to Cellular Network Mobility Performance Analysis
Authors:
Subhyal Bin Iqbal,
Behnam Khodapanah,
Philipp Schulz,
Gerhard P. Fettweis
Abstract:
Achieving connectivity reliability is one of the significant challenges for 5G and beyond 5G cellular networks. The present understanding of reliability in the context of mobile communication does not adequately cover the stochastic temporal aspects of the network, such as the duration and spread of packet errors that an outage session may cause. Rather, it simply confines the definition to the pe…
▽ More
Achieving connectivity reliability is one of the significant challenges for 5G and beyond 5G cellular networks. The present understanding of reliability in the context of mobile communication does not adequately cover the stochastic temporal aspects of the network, such as the duration and spread of packet errors that an outage session may cause. Rather, it simply confines the definition to the percentage of successful packet delivery. In this letter, we offer an elaborate modeling of the outage for a cellular mobile network by showcasing the different types of outages and their contiguity characteristic. Thereafter, using the outage metrics, we define two new key performance indicators (KPIs), namely mean outage time and mean time between outages as counterparts to akin KPIs that already exist in classical reliability theory, i.e., mean down time and mean time between failures. Using a system-level simulation where user mobility is a crucial component, it is shown that these newly defined KPIs can be used to quantify the reliability requirements of different user applications in cellular services.
△ Less
Submitted 17 May, 2024;
originally announced May 2024.
-
RACH-less Handover with Early Timing Advance Acquisition for Outage Reduction
Authors:
Subhyal Bin Iqbal,
Umur Karabulut,
Ahmad Awada,
Philipp Schulz,
Gerhard P. Fettweis
Abstract:
For fifth-generation (5G) and 5G-Advanced networks, outage reduction within the context of reliability is a key objective since outage denotes the time period when a user equipment (UE) cannot communicate with the network. Earlier studies have shown that in the experimental high mobility scenario considered, outage is dominated by the interruption time that stems from the random access channel (RA…
▽ More
For fifth-generation (5G) and 5G-Advanced networks, outage reduction within the context of reliability is a key objective since outage denotes the time period when a user equipment (UE) cannot communicate with the network. Earlier studies have shown that in the experimental high mobility scenario considered, outage is dominated by the interruption time that stems from the random access channel (RACH)-based handover process from the serving cell to the target cell. A handover by itself is a necessary mobility process to prevent mobility failures and their associated outage. This paper proposes a RACH-less handover signaling scheme for the 3rd Generation Partnership Project (3GPP) conditional handover (CHO) mechanism. The proposed scheme exploits the decoupling between the CHO preparation and execution phases to establish initial synchronization between the UE and the target cell through an early acquisition of the timing advance. This significantly curtails the RACH process and therefore the handover interruption time. Results based on a system-level simulation-based mobility study have shown that the proposed scheme significantly reduces the outage and its constituent handover interruption time relatively by 18.7% and 43.2%, respectively.
△ Less
Submitted 27 March, 2024; v1 submitted 15 March, 2024;
originally announced March 2024.
-
Gemini 1.5: Unlocking multimodal understanding across millions of tokens of context
Authors:
Gemini Team,
Petko Georgiev,
Ving Ian Lei,
Ryan Burnell,
Libin Bai,
Anmol Gulati,
Garrett Tanzer,
Damien Vincent,
Zhufeng Pan,
Shibo Wang,
Soroosh Mariooryad,
Yifan Ding,
Xinyang Geng,
Fred Alcober,
Roy Frostig,
Mark Omernick,
Lexi Walker,
Cosmin Paduraru,
Christina Sorokin,
Andrea Tacchetti,
Colin Gaffney,
Samira Daruki,
Olcan Sercinoglu,
Zach Gleicher,
Juliette Love
, et al. (1092 additional authors not shown)
Abstract:
In this report, we introduce the Gemini 1.5 family of models, representing the next generation of highly compute-efficient multimodal models capable of recalling and reasoning over fine-grained information from millions of tokens of context, including multiple long documents and hours of video and audio. The family includes two new models: (1) an updated Gemini 1.5 Pro, which exceeds the February…
▽ More
In this report, we introduce the Gemini 1.5 family of models, representing the next generation of highly compute-efficient multimodal models capable of recalling and reasoning over fine-grained information from millions of tokens of context, including multiple long documents and hours of video and audio. The family includes two new models: (1) an updated Gemini 1.5 Pro, which exceeds the February version on the great majority of capabilities and benchmarks; (2) Gemini 1.5 Flash, a more lightweight variant designed for efficiency with minimal regression in quality. Gemini 1.5 models achieve near-perfect recall on long-context retrieval tasks across modalities, improve the state-of-the-art in long-document QA, long-video QA and long-context ASR, and match or surpass Gemini 1.0 Ultra's state-of-the-art performance across a broad set of benchmarks. Studying the limits of Gemini 1.5's long-context ability, we find continued improvement in next-token prediction and near-perfect retrieval (>99%) up to at least 10M tokens, a generational leap over existing models such as Claude 3.0 (200k) and GPT-4 Turbo (128k). Finally, we highlight real-world use cases, such as Gemini 1.5 collaborating with professionals on completing their tasks achieving 26 to 75% time savings across 10 different job categories, as well as surprising new capabilities of large language models at the frontier; when given a grammar manual for Kalamang, a language with fewer than 200 speakers worldwide, the model learns to translate English to Kalamang at a similar level to a person who learned from the same content.
△ Less
Submitted 14 June, 2024; v1 submitted 8 March, 2024;
originally announced March 2024.
-
AI-Powered Reminders for Collaborative Tasks: Experiences and Futures
Authors:
Katelyn Morrison,
Shamsi Iqbal,
Eric Horvitz
Abstract:
Email continues to serve as a central medium for managing collaborations. While unstructured email messaging is lightweight and conducive to coordination, it is easy to overlook commitments and requests for collaborations that are embedded in the text of free-flowing communications. Twenty-one years ago, Bellotti et al. proposed TaskMaster with the goal of redesigning the email interface to have e…
▽ More
Email continues to serve as a central medium for managing collaborations. While unstructured email messaging is lightweight and conducive to coordination, it is easy to overlook commitments and requests for collaborations that are embedded in the text of free-flowing communications. Twenty-one years ago, Bellotti et al. proposed TaskMaster with the goal of redesigning the email interface to have explicit task management capabilities. Recently, AI-based task recognition and reminder services have been introduced in major email systems as one approach to managing asynchronous collaborations. While these services have been provided to millions of people around the world, there is little understanding of how people interact with and benefit from them. We explore knowledge workers' experiences with Microsoft's Viva Daily Briefing Email to better understand how AI-powered reminders can support asynchronous collaborations. Through semi-structured interviews and surveys, we shed light on how AI-powered reminders are incorporated into workflows to support asynchronous collaborations. We identify what knowledge workers prefer AI-powered reminders to remind them about and how they would like to interact with these reminders. Using mixed methods and a self-assessment methodology, we investigate the relationship between information workers' work styles and the perceived value of the Viva Daily Briefing Email to identify users who are more likely to benefit from AI-powered reminders for asynchronous collaborations. We conclude by discussing the experiences and futures of AI-powered reminders for collaborative tasks and asynchronous collaborations.
△ Less
Submitted 2 March, 2024;
originally announced March 2024.
-
DISCERN: Designing Decision Support Interfaces to Investigate the Complexities of Workplace Social Decision-Making With Line Managers
Authors:
Pranav Khadpe,
Lindy Le,
Kate Nowak,
Shamsi T. Iqbal,
**a Suh
Abstract:
Line managers form the first level of management in organizations, and must make complex decisions, while maintaining relationships with those impacted by their decisions. Amidst growing interest in technology-supported decision-making at work, their needs remain understudied. Further, most existing design knowledge for supporting social decision-making comes from domains where decision-makers are…
▽ More
Line managers form the first level of management in organizations, and must make complex decisions, while maintaining relationships with those impacted by their decisions. Amidst growing interest in technology-supported decision-making at work, their needs remain understudied. Further, most existing design knowledge for supporting social decision-making comes from domains where decision-makers are more socially detached from those they decide for. We conducted iterative design research with line managers within a technology organization, investigating decision-making practices, and opportunities for technological support. Through formative research, development of a decision-representation tool -- DISCERN -- and user enactments, we identify their communication and analysis needs that lack adequate support. We found they preferred tools for externalizing reasoning rather than tools that replace interpersonal interactions, and they wanted tools to support a range of intuitive and calculative decision-making. We discuss how design of social decision-making supports, especially in the workplace, can more explicitly support highly interactional social decision-making.
△ Less
Submitted 29 February, 2024;
originally announced February 2024.
-
Nesting Particle Filters for Experimental Design in Dynamical Systems
Authors:
Sahel Iqbal,
Adrien Corenflos,
Simo Särkkä,
Hany Abdulsamad
Abstract:
In this paper, we propose a novel approach to Bayesian experimental design for non-exchangeable data that formulates it as risk-sensitive policy optimization. We develop the Inside-Out SMC$^2$ algorithm, a nested sequential Monte Carlo technique to infer optimal designs, and embed it into a particle Markov chain Monte Carlo framework to perform gradient-based policy amortization. Our approach is d…
▽ More
In this paper, we propose a novel approach to Bayesian experimental design for non-exchangeable data that formulates it as risk-sensitive policy optimization. We develop the Inside-Out SMC$^2$ algorithm, a nested sequential Monte Carlo technique to infer optimal designs, and embed it into a particle Markov chain Monte Carlo framework to perform gradient-based policy amortization. Our approach is distinct from other amortized experimental design techniques, as it does not rely on contrastive estimators. Numerical validation on a set of dynamical systems showcases the efficacy of our method in comparison to other state-of-the-art strategies.
△ Less
Submitted 29 May, 2024; v1 submitted 12 February, 2024;
originally announced February 2024.
-
A Computer Vision Based Approach for Stalking Detection Using a CNN-LSTM-MLP Hybrid Fusion Model
Authors:
Murad Hasan,
Shahriar Iqbal,
Md. Billal Hossain Faisal,
Md. Musnad Hossin Neloy,
Md. Tonmoy Kabir,
Md. Tanzim Reza,
Md. Golam Rabiul Alam,
Md Zia Uddin
Abstract:
Criminal and suspicious activity detection has become a popular research topic in recent years. The rapid growth of computer vision technologies has had a crucial impact on solving this issue. However, physical stalking detection is still a less explored area despite the evolution of modern technology. Nowadays, stalking in public places has become a common occurrence with women being the most aff…
▽ More
Criminal and suspicious activity detection has become a popular research topic in recent years. The rapid growth of computer vision technologies has had a crucial impact on solving this issue. However, physical stalking detection is still a less explored area despite the evolution of modern technology. Nowadays, stalking in public places has become a common occurrence with women being the most affected. Stalking is a visible action that usually occurs before any criminal activity begins as the stalker begins to follow, loiter, and stare at the victim before committing any criminal activity such as assault, kidnap**, rape, and so on. Therefore, it has become a necessity to detect stalking as all of these criminal activities can be stopped in the first place through stalking detection. In this research, we propose a novel deep learning-based hybrid fusion model to detect potential stalkers from a single video with a minimal number of frames. We extract multiple relevant features, such as facial landmarks, head pose estimation, and relative distance, as numerical values from video frames. This data is fed into a multilayer perceptron (MLP) to perform a classification task between a stalking and a non-stalking scenario. Simultaneously, the video frames are fed into a combination of convolutional and LSTM models to extract the spatio-temporal features. We use a fusion of these numerical and spatio-temporal features to build a classifier to detect stalking incidents. Additionally, we introduce a dataset consisting of stalking and non-stalking videos gathered from various feature films and television series, which is also used to train the model. The experimental results show the efficiency and dynamism of our proposed stalker detection system, achieving 89.58% testing accuracy with a significant improvement as compared to the state-of-the-art approaches.
△ Less
Submitted 5 February, 2024;
originally announced February 2024.
-
Systematically Assessing the Security Risks of AI/ML-enabled Connected Healthcare Systems
Authors:
Mohammed Elnawawy,
Mohammadreza Hallajiyan,
Gargi Mitra,
Shahrear Iqbal,
Karthik Pattabiraman
Abstract:
The adoption of machine-learning-enabled systems in the healthcare domain is on the rise. While the use of ML in healthcare has several benefits, it also expands the threat surface of medical systems. We show that the use of ML in medical systems, particularly connected systems that involve interfacing the ML engine with multiple peripheral devices, has security risks that might cause life-threate…
▽ More
The adoption of machine-learning-enabled systems in the healthcare domain is on the rise. While the use of ML in healthcare has several benefits, it also expands the threat surface of medical systems. We show that the use of ML in medical systems, particularly connected systems that involve interfacing the ML engine with multiple peripheral devices, has security risks that might cause life-threatening damage to a patient's health in case of adversarial interventions. These new risks arise due to security vulnerabilities in the peripheral devices and communication channels. We present a case study where we demonstrate an attack on an ML-enabled blood glucose monitoring system by introducing adversarial data points during inference. We show that an adversary can achieve this by exploiting a known vulnerability in the Bluetooth communication channel connecting the glucose meter with the ML-enabled app. We further show that state-of-the-art risk assessment techniques are not adequate for identifying and assessing these new risks. Our study highlights the need for novel risk analysis methods for analyzing the security of AI-enabled connected health devices.
△ Less
Submitted 11 April, 2024; v1 submitted 30 January, 2024;
originally announced January 2024.
-
DRAT Proofs of Unsatisfiability for SAT Modulo Monotonic Theories
Authors:
Nick Feng,
Alan J. Hu,
Sam Bayless,
Syed M. Iqbal,
Patrick Trentin,
Mike Whalen,
Lee Pike,
John Backes
Abstract:
Generating proofs of unsatisfiability is a valuable capability of most SAT solvers, and is an active area of research for SMT solvers. This paper introduces the first method to efficiently generate proofs of unsatisfiability specifically for an important subset of SMT: SAT Modulo Monotonic Theories (SMMT), which includes many useful finite-domain theories (e.g., bit vectors and many graph-theoreti…
▽ More
Generating proofs of unsatisfiability is a valuable capability of most SAT solvers, and is an active area of research for SMT solvers. This paper introduces the first method to efficiently generate proofs of unsatisfiability specifically for an important subset of SMT: SAT Modulo Monotonic Theories (SMMT), which includes many useful finite-domain theories (e.g., bit vectors and many graph-theoretic properties) and is used in production at Amazon Web Services. Our method uses propositional definitions of the theory predicates, from which it generates compact Horn approximations of the definitions, which lead to efficient DRAT proofs, leveraging the large investment the SAT community has made in DRAT. In experiments on practical SMMT problems, our proof generation overhead is minimal (7.41% geometric mean slowdown, 28.8% worst-case), and we can generate and check proofs for many problems that were previously intractable.
△ Less
Submitted 18 April, 2024; v1 submitted 19 January, 2024;
originally announced January 2024.
-
From User Surveys to Telemetry-Driven Agents: Exploring the Potential of Personalized Productivity Solutions
Authors:
Subigya Nepal,
Javier Hernandez,
Talie Massachi,
Kael Rowan,
Judith Amores,
**a Suh,
Gonzalo Ramos,
Brian Houck,
Shamsi T. Iqbal,
Mary Czerwinski
Abstract:
We present a comprehensive, user-centric approach to understand preferences in AI-based productivity agents and develop personalized solutions tailored to users' needs. Utilizing a two-phase method, we first conducted a survey with 363 participants, exploring various aspects of productivity, communication style, agent approach, personality traits, personalization, and privacy. Drawing on the surve…
▽ More
We present a comprehensive, user-centric approach to understand preferences in AI-based productivity agents and develop personalized solutions tailored to users' needs. Utilizing a two-phase method, we first conducted a survey with 363 participants, exploring various aspects of productivity, communication style, agent approach, personality traits, personalization, and privacy. Drawing on the survey insights, we developed a GPT-4 powered personalized productivity agent that utilizes telemetry data gathered via Viva Insights from information workers to provide tailored assistance. We compared its performance with alternative productivity-assistive tools, such as dashboard and narrative, in a study involving 40 participants. Our findings highlight the importance of user-centric design, adaptability, and the balance between personalization and privacy in AI-assisted productivity tools. By building on the insights distilled from our study, we believe that our work can enable and guide future research to further enhance productivity solutions, ultimately leading to optimized efficiency and user experiences for information workers.
△ Less
Submitted 16 January, 2024;
originally announced January 2024.
-
A Mobility Analysis of UE-Side Beamforming for Multi-Panel User Equipment with Hand Blockage
Authors:
Subhyal Bin Iqbal,
Salman Nadaf,
Umur Karabulut,
Philipp Schulz,
Anna Prado,
Gerhard P. Fettweis,
Wolfgang Kellerer
Abstract:
The hand blockage effect of the human hand around the user equipment (UE) is too considerable to be ignored in frequency range 2 (FR2). This adds another layer of complexity to the link budget design in FR2 for 5G networks, which already suffer from high path and diffraction loss. More recently, multipanel UEs (MPUEs) have been proposed as a way to address this problem, whereby multiple distinct a…
▽ More
The hand blockage effect of the human hand around the user equipment (UE) is too considerable to be ignored in frequency range 2 (FR2). This adds another layer of complexity to the link budget design in FR2 for 5G networks, which already suffer from high path and diffraction loss. More recently, multipanel UEs (MPUEs) have been proposed as a way to address this problem, whereby multiple distinct antenna panels are integrated into the UE body as a way to leverage gains from antenna directivity. MPUEs also enhance the Rx-beamforming gain because it is now subject to each individual antenna panel. In this paper, the mobility performance of hand blockage induced by three practical hand grips is analyzed in a system-level simulation, where in each grip both the UE orientation and the hand positioning around the UE is different. It is seen that each hand grip has a significant impact on mobility performance of the network, where in the worst case mobility failures increase by 43% compared to the non-hand blockage case. Moreover, a detailed analysis of the tradeoff between the mobility key performance indicators and the panel and Rx beam switching frequency is also studied. Results have shown that both the panel and Rx beam switches can be reduced considerably without compromising on the mobility performance. This is beneficial because it helps in reducing UE power consumption.
△ Less
Submitted 16 January, 2024;
originally announced January 2024.
-
Risk-Sensitive Stochastic Optimal Control as Rao-Blackwellized Markovian Score Climbing
Authors:
Hany Abdulsamad,
Sahel Iqbal,
Adrien Corenflos,
Simo Särkkä
Abstract:
Stochastic optimal control of dynamical systems is a crucial challenge in sequential decision-making. Recently, control-as-inference approaches have had considerable success, providing a viable risk-sensitive framework to address the exploration-exploitation dilemma. Nonetheless, a majority of these techniques only invoke the inference-control duality to derive a modified risk objective that is th…
▽ More
Stochastic optimal control of dynamical systems is a crucial challenge in sequential decision-making. Recently, control-as-inference approaches have had considerable success, providing a viable risk-sensitive framework to address the exploration-exploitation dilemma. Nonetheless, a majority of these techniques only invoke the inference-control duality to derive a modified risk objective that is then addressed within a reinforcement learning framework. This paper introduces a novel perspective by framing risk-sensitive stochastic control as Markovian score climbing under samples drawn from a conditional particle filter. Our approach, while purely inference-centric, provides asymptotically unbiased estimates for gradient-based policy optimization with optimal importance weighting and no explicit value function learning. To validate our methodology, we apply it to the task of learning neural non-Gaussian feedback policies, showcasing its efficacy on numerical benchmarks of stochastic dynamical systems.
△ Less
Submitted 21 December, 2023;
originally announced December 2023.
-
Gemini: A Family of Highly Capable Multimodal Models
Authors:
Gemini Team,
Rohan Anil,
Sebastian Borgeaud,
Jean-Baptiste Alayrac,
Jiahui Yu,
Radu Soricut,
Johan Schalkwyk,
Andrew M. Dai,
Anja Hauth,
Katie Millican,
David Silver,
Melvin Johnson,
Ioannis Antonoglou,
Julian Schrittwieser,
Amelia Glaese,
Jilin Chen,
Emily Pitler,
Timothy Lillicrap,
Angeliki Lazaridou,
Orhan Firat,
James Molloy,
Michael Isard,
Paul R. Barham,
Tom Hennigan,
Benjamin Lee
, et al. (1325 additional authors not shown)
Abstract:
This report introduces a new family of multimodal models, Gemini, that exhibit remarkable capabilities across image, audio, video, and text understanding. The Gemini family consists of Ultra, Pro, and Nano sizes, suitable for applications ranging from complex reasoning tasks to on-device memory-constrained use-cases. Evaluation on a broad range of benchmarks shows that our most-capable Gemini Ultr…
▽ More
This report introduces a new family of multimodal models, Gemini, that exhibit remarkable capabilities across image, audio, video, and text understanding. The Gemini family consists of Ultra, Pro, and Nano sizes, suitable for applications ranging from complex reasoning tasks to on-device memory-constrained use-cases. Evaluation on a broad range of benchmarks shows that our most-capable Gemini Ultra model advances the state of the art in 30 of 32 of these benchmarks - notably being the first model to achieve human-expert performance on the well-studied exam benchmark MMLU, and improving the state of the art in every one of the 20 multimodal benchmarks we examined. We believe that the new capabilities of the Gemini family in cross-modal reasoning and language understanding will enable a wide variety of use cases. We discuss our approach toward post-training and deploying Gemini models responsibly to users through services including Gemini, Gemini Advanced, Google AI Studio, and Cloud Vertex AI.
△ Less
Submitted 17 June, 2024; v1 submitted 18 December, 2023;
originally announced December 2023.
-
LogShield: A Transformer-based APT Detection System Leveraging Self-Attention
Authors:
Sihat Afnan,
Mushtari Sadia,
Shahrear Iqbal,
Anindya Iqbal
Abstract:
Cyber attacks are often identified using system and network logs. There have been significant prior works that utilize provenance graphs and ML techniques to detect attacks, specifically advanced persistent threats, which are very difficult to detect. Lately, there have been studies where transformer-based language models are being used to detect various types of attacks from system logs. However,…
▽ More
Cyber attacks are often identified using system and network logs. There have been significant prior works that utilize provenance graphs and ML techniques to detect attacks, specifically advanced persistent threats, which are very difficult to detect. Lately, there have been studies where transformer-based language models are being used to detect various types of attacks from system logs. However, no such attempts have been made in the case of APTs. In addition, existing state-of-the-art techniques that use system provenance graphs, lack a data processing framework generalized across datasets for optimal performance. For mitigating this limitation as well as exploring the effectiveness of transformer-based language models, this paper proposes LogShield, a framework designed to detect APT attack patterns leveraging the power of self-attention in transformers. We incorporate customized embedding layers to effectively capture the context of event sequences derived from provenance graphs. While acknowledging the computational overhead associated with training transformer networks, our framework surpasses existing LSTM and Language models regarding APT detection. We integrated the model parameters and training procedure from the RoBERTa model and conducted extensive experiments on well-known APT datasets (DARPA OpTC and DARPA TC E3). Our framework achieved superior F1 scores of 98% and 95% on the two datasets respectively, surpassing the F1 scores of 96% and 94% obtained by LSTM models. Our findings suggest that LogShield's performance benefits from larger datasets and demonstrates its potential for generalization across diverse domains. These findings contribute to the advancement of APT attack detection methods and underscore the significance of transformer-based architectures in addressing security challenges in computer systems.
△ Less
Submitted 9 November, 2023;
originally announced November 2023.
-
Mobility Performance Analysis of RACH Optimization Based on Decision Tree Supervised Learning for Conditional Handover in 5G Beamformed Networks
Authors:
Subhyal Bin Iqbal,
Umur Karabulut,
Ahmad Awada,
Andre Noll Barreto,
Philipp Schulz,
Gerhard P. Fettweis
Abstract:
In 5G cellular networks, frequency range 2 (FR2) introduces higher frequencies that cause rapid signal degradation and challenge user mobility. In recent studies, a conditional handover procedure has been adopted as an enhancement to baseline handover to enhance user mobility robustness. In this article, the mobility performance of conditional handover is analyzed for a 5G mm-wave network in FR2 t…
▽ More
In 5G cellular networks, frequency range 2 (FR2) introduces higher frequencies that cause rapid signal degradation and challenge user mobility. In recent studies, a conditional handover procedure has been adopted as an enhancement to baseline handover to enhance user mobility robustness. In this article, the mobility performance of conditional handover is analyzed for a 5G mm-wave network in FR2 that employs beamforming. In addition, a resource-efficient random access procedure is proposed that increases the probability of contention-free random access during a handover. Moreover, a simple yet effective decision tree-based supervised learning method is proposed to minimize the handover failures that are caused by the beam preparation phase of the random access procedure. Results have shown that a tradeoff exists between contention-free random access and handover failures. It is also seen that the optimum operation point of random access is achievable with the proposed learning algorithm for conditional handover. Moreover, a mobility performance comparison of conditional handover with baseline handover is also carried out. Results have shown that while baseline handover causes fewer handover failures than conditional handover, the total number of mobility failures in the latter is less due to the decoupling of the handover preparation and execution phases.
△ Less
Submitted 18 September, 2023;
originally announced September 2023.
-
LMBiS-Net: A Lightweight Multipath Bidirectional Skip Connection based CNN for Retinal Blood Vessel Segmentation
Authors:
Mufassir M. Abbasi,
Shahzaib Iqbal,
Asim Naveed,
Tariq M. Khan,
Syed S. Naqvi,
Wajeeha Khalid
Abstract:
Blinding eye diseases are often correlated with altered retinal morphology, which can be clinically identified by segmenting retinal structures in fundus images. However, current methodologies often fall short in accurately segmenting delicate vessels. Although deep learning has shown promise in medical image segmentation, its reliance on repeated convolution and pooling operations can hinder the…
▽ More
Blinding eye diseases are often correlated with altered retinal morphology, which can be clinically identified by segmenting retinal structures in fundus images. However, current methodologies often fall short in accurately segmenting delicate vessels. Although deep learning has shown promise in medical image segmentation, its reliance on repeated convolution and pooling operations can hinder the representation of edge information, ultimately limiting overall segmentation accuracy. In this paper, we propose a lightweight pixel-level CNN named LMBiS-Net for the segmentation of retinal vessels with an exceptionally low number of learnable parameters \textbf{(only 0.172 M)}. The network used multipath feature extraction blocks and incorporates bidirectional skip connections for the information flow between the encoder and decoder. Additionally, we have optimized the efficiency of the model by carefully selecting the number of filters to avoid filter overlap. This optimization significantly reduces training time and enhances computational efficiency. To assess the robustness and generalizability of LMBiS-Net, we performed comprehensive evaluations on various aspects of retinal images. Specifically, the model was subjected to rigorous tests to accurately segment retinal vessels, which play a vital role in ophthalmological diagnosis and treatment. By focusing on the retinal blood vessels, we were able to thoroughly analyze the performance and effectiveness of the LMBiS-Net model. The results of our tests demonstrate that LMBiS-Net is not only robust and generalizable but also capable of maintaining high levels of segmentation accuracy. These characteristics highlight the potential of LMBiS-Net as an efficient tool for high-speed and accurate segmentation of retinal images in various clinical applications.
△ Less
Submitted 10 September, 2023;
originally announced September 2023.
-
Feature Enhancer Segmentation Network (FES-Net) for Vessel Segmentation
Authors:
Tariq M. Khan,
Muhammad Arsalan,
Shahzaib Iqbal,
Imran Razzak,
Erik Meijering
Abstract:
Diseases such as diabetic retinopathy and age-related macular degeneration pose a significant risk to vision, highlighting the importance of precise segmentation of retinal vessels for the tracking and diagnosis of progression. However, existing vessel segmentation methods that heavily rely on encoder-decoder structures struggle to capture contextual information about retinal vessel configurations…
▽ More
Diseases such as diabetic retinopathy and age-related macular degeneration pose a significant risk to vision, highlighting the importance of precise segmentation of retinal vessels for the tracking and diagnosis of progression. However, existing vessel segmentation methods that heavily rely on encoder-decoder structures struggle to capture contextual information about retinal vessel configurations, leading to challenges in reconciling semantic disparities between encoder and decoder features. To address this, we propose a novel feature enhancement segmentation network (FES-Net) that achieves accurate pixel-wise segmentation without requiring additional image enhancement steps. FES-Net directly processes the input image and utilizes four prompt convolutional blocks (PCBs) during downsampling, complemented by a shallow upsampling approach to generate a binary mask for each class. We evaluate the performance of FES-Net on four publicly available state-of-the-art datasets: DRIVE, STARE, CHASE, and HRF. The evaluation results clearly demonstrate the superior performance of FES-Net compared to other competitive approaches documented in the existing literature.
△ Less
Submitted 7 September, 2023;
originally announced September 2023.
-
Neural Networks at a Fraction with Pruned Quaternions
Authors:
Sahel Mohammad Iqbal,
Subhankar Mishra
Abstract:
Contemporary state-of-the-art neural networks have increasingly large numbers of parameters, which prevents their deployment on devices with limited computational power. Pruning is one technique to remove unnecessary weights and reduce resource requirements for training and inference. In addition, for ML tasks where the input data is multi-dimensional, using higher-dimensional data embeddings such…
▽ More
Contemporary state-of-the-art neural networks have increasingly large numbers of parameters, which prevents their deployment on devices with limited computational power. Pruning is one technique to remove unnecessary weights and reduce resource requirements for training and inference. In addition, for ML tasks where the input data is multi-dimensional, using higher-dimensional data embeddings such as complex numbers or quaternions has been shown to reduce the parameter count while maintaining accuracy. In this work, we conduct pruning on real and quaternion-valued implementations of different architectures on classification tasks. We find that for some architectures, at very high sparsity levels, quaternion models provide higher accuracies than their real counterparts. For example, at the task of image classification on CIFAR-10 using Conv-4, at $3\%$ of the number of parameters as the original model, the pruned quaternion version outperforms the pruned real by more than $10\%$. Experiments on various network architectures and datasets show that for deployment in extremely resource-constrained environments, a sparse quaternion network might be a better candidate than a real sparse model of similar architecture.
△ Less
Submitted 13 August, 2023;
originally announced August 2023.
-
On the Mobility Analysis of UE-Side Beamforming for Multi-Panel User Equipment in 5G-Advanced
Authors:
Subhyal Bin Iqbal,
Salman Nadaf,
Umur Karabulut,
Philipp Schulz,
Anna Prado,
Gerhard P. Fettweis,
Wolfgang Kellerer
Abstract:
Frequency range 2 (FR2) has become an integral part of 5G networks to fulfill the ever-increasing demand for data hungry-applications. However, radio signals in FR2 experience high path and diffraction loss, which also pronounces the problem of inter and intra-cell interference. As a result, both the serving and target links are affected, leading to radio link failures (RLFs) and handover failures…
▽ More
Frequency range 2 (FR2) has become an integral part of 5G networks to fulfill the ever-increasing demand for data hungry-applications. However, radio signals in FR2 experience high path and diffraction loss, which also pronounces the problem of inter and intra-cell interference. As a result, both the serving and target links are affected, leading to radio link failures (RLFs) and handover failures (HOFs), respectively. To address this issue, multi-panel user equipment (MPUE) is proposed for 5G-Advanced whereby multiple spatially distinct antenna panels are integrated into the UE to leverage gains from antenna directivity. It also opens the possibility of using UE-side Rx-beamforming for each panel. In this paper, three different Rx-beamforming approaches are proposed to improve the serving link, the target link, and the handover process for an MPUE equipped with three directional panels. Thereafter, the mobility performance is analyzed in a system-level simulation for a multi-beam FR2 network. Results have shown that the proposed schemes can help reduce RLFs by 53\% and HOFs by 90\%.
△ Less
Submitted 26 June, 2023;
originally announced June 2023.
-
CAMEO: A Causal Transfer Learning Approach for Performance Optimization of Configurable Computer Systems
Authors:
Md Shahriar Iqbal,
Ziyuan Zhong,
Iftakhar Ahmad,
Baishakhi Ray,
Pooyan Jamshidi
Abstract:
Modern computer systems are highly configurable, with hundreds of configuration options that interact, resulting in an enormous configuration space. As a result, optimizing performance goals (e.g., latency) in such systems is challenging due to frequent uncertainties in their environments (e.g., workload fluctuations). Recently, transfer learning has been applied to address this problem by reusing…
▽ More
Modern computer systems are highly configurable, with hundreds of configuration options that interact, resulting in an enormous configuration space. As a result, optimizing performance goals (e.g., latency) in such systems is challenging due to frequent uncertainties in their environments (e.g., workload fluctuations). Recently, transfer learning has been applied to address this problem by reusing knowledge from configuration measurements from the source environments, where it is cheaper to intervene than the target environment, where any intervention is costly or impossible. Recent empirical research showed that statistical models can perform poorly when the deployment environment changes because the behavior of certain variables in the models can change dramatically from source to target. To address this issue, we propose CAMEO, a method that identifies invariant causal predictors under environmental changes, allowing the optimization process to operate in a reduced search space, leading to faster optimization of system performance. We demonstrate significant performance improvements over state-of-the-art optimization methods in MLperf deep learning systems, a video analytics pipeline, and a database system.
△ Less
Submitted 3 October, 2023; v1 submitted 13 June, 2023;
originally announced June 2023.
-
LDMRes-Net: Enabling Efficient Medical Image Segmentation on IoT and Edge Platforms
Authors:
Shahzaib Iqbal,
Tariq M. Khan,
Syed S. Naqvi,
Muhammad Usman,
Imran Razzak
Abstract:
In this study, we propose LDMRes-Net, a lightweight dual-multiscale residual block-based computational neural network tailored for medical image segmentation on IoT and edge platforms. Conventional U-Net-based models face challenges in meeting the speed and efficiency demands of real-time clinical applications, such as disease monitoring, radiation therapy, and image-guided surgery. LDMRes-Net ove…
▽ More
In this study, we propose LDMRes-Net, a lightweight dual-multiscale residual block-based computational neural network tailored for medical image segmentation on IoT and edge platforms. Conventional U-Net-based models face challenges in meeting the speed and efficiency demands of real-time clinical applications, such as disease monitoring, radiation therapy, and image-guided surgery. LDMRes-Net overcomes these limitations with its remarkably low number of learnable parameters (0.072M), making it highly suitable for resource-constrained devices. The model's key innovation lies in its dual multi-residual block architecture, which enables the extraction of refined features on multiple scales, enhancing overall segmentation performance. To further optimize efficiency, the number of filters is carefully selected to prevent overlap, reduce training time, and improve computational efficiency. The study includes comprehensive evaluations, focusing on segmentation of the retinal image of vessels and hard exudates crucial for the diagnosis and treatment of ophthalmology. The results demonstrate the robustness, generalizability, and high segmentation accuracy of LDMRes-Net, positioning it as an efficient tool for accurate and rapid medical image segmentation in diverse clinical applications, particularly on IoT and edge platforms. Such advances hold significant promise for improving healthcare outcomes and enabling real-time medical image analysis in resource-limited settings.
△ Less
Submitted 7 September, 2023; v1 submitted 9 June, 2023;
originally announced June 2023.
-
A Review Of Progress for Component Based Software Cost Estimation From 1965 to 2023
Authors:
Muhammad Nadeem,
Humaira Afzal,
Muhammad. Idrees,
Sajid Iqbal,
M. Rafiq Asim
Abstract:
Component Based Software Engineering (CBSE) is used to develop software from Commercial Off the Shelf Components (COTs) with minimum cost and time. Component Based Software Cost Estimation (CBSCE) is an important pre-development activity for the successful planning and cost estimation of Components-Based Software Development (CBSD) that saves cost and time. Many researchers are putting their effor…
▽ More
Component Based Software Engineering (CBSE) is used to develop software from Commercial Off the Shelf Components (COTs) with minimum cost and time. Component Based Software Cost Estimation (CBSCE) is an important pre-development activity for the successful planning and cost estimation of Components-Based Software Development (CBSD) that saves cost and time. Many researchers are putting their efforts to propose and then develop a CBSCE model. This motivates to review research work and history of CBSCE from 1965 to 2023. The scope of this research also, to some extent, includes auxiliary the review of all the research work done in the areas such as CBSE, CBSCE, Component Based Software Metrics, COTs, component based process models to cover all the areas of CBSD under CBSE either to answer or to provide pointers for the answers to the questions of this area easily. Internet based search methodology has been used to review the available and published literature. This paper may also classify available literature of this area into its sub areas such as component selection, quality with chronological contribution of the researchers and pictorial presentation of its history. Thus this research paper may serve as a common source of information for the concerned researchers.
△ Less
Submitted 6 June, 2023;
originally announced June 2023.
-
A Comparative Study of Face Detection Algorithms for Masked Face Detection
Authors:
Sahel Mohammad Iqbal,
Danush Shekar,
Subhankar Mishra
Abstract:
Contemporary face detection algorithms have to deal with many challenges such as variations in pose, illumination, and scale. A subclass of the face detection problem that has recently gained increasing attention is occluded face detection, or more specifically, the detection of masked faces. Three years on since the advent of the COVID-19 pandemic, there is still a complete lack of evidence regar…
▽ More
Contemporary face detection algorithms have to deal with many challenges such as variations in pose, illumination, and scale. A subclass of the face detection problem that has recently gained increasing attention is occluded face detection, or more specifically, the detection of masked faces. Three years on since the advent of the COVID-19 pandemic, there is still a complete lack of evidence regarding how well existing face detection algorithms perform on masked faces. This article first offers a brief review of state-of-the-art face detectors and detectors made for the masked face problem, along with a review of the existing masked face datasets. We evaluate and compare the performances of a well-representative set of face detectors at masked face detection and conclude with a discussion on the possible contributing factors to their performance.
△ Less
Submitted 18 May, 2023;
originally announced May 2023.
-
Sensing Wellbeing in the Workplace, Why and For Whom? Envisioning Impacts with Organizational Stakeholders
Authors:
Anna Kawakami,
Shreya Chowdhary,
Shamsi T. Iqbal,
Q. Vera Liao,
Alexandra Olteanu,
**a Suh,
Koustuv Saha
Abstract:
With the heightened digitization of the workplace, alongside the rise of remote and hybrid work prompted by the pandemic, there is growing corporate interest in using passive sensing technologies for workplace wellbeing. Existing research on these technologies often focus on understanding or improving interactions between an individual user and the technology. Workplace settings can, however, intr…
▽ More
With the heightened digitization of the workplace, alongside the rise of remote and hybrid work prompted by the pandemic, there is growing corporate interest in using passive sensing technologies for workplace wellbeing. Existing research on these technologies often focus on understanding or improving interactions between an individual user and the technology. Workplace settings can, however, introduce a range of complexities that challenge the potential impact and in-practice desirability of wellbeing sensing technologies. Today, there is an inadequate empirical understanding of how everyday workers -- including those who are impacted by, and impact the deployment of workplace technologies -- envision its broader socio-ecological impacts. In this study, we conduct storyboard-driven interviews with 33 participants across three stakeholder groups: organizational governors, AI builders, and worker data subjects. Overall, our findings surface how workers envisioned wellbeing sensing technologies may lead to cascading impacts on their broader organizational culture, interpersonal relationships with colleagues, and individual day-to-day lives. Participants anticipated harms arising from ambiguity and misalignment around scaled notions of ``worker wellbeing,'' underlying technical limitations to workplace-situated sensing, and assumptions regarding how social structures and relationships may shape the impacts and use of these technologies. Based on our findings, we discuss implications for designing worker-centered data-driven wellbeing technologies.
△ Less
Submitted 6 June, 2023; v1 submitted 12 March, 2023;
originally announced March 2023.
-
A Domain-Agnostic Approach for Characterization of Lifelong Learning Systems
Authors:
Megan M. Baker,
Alexander New,
Mario Aguilar-Simon,
Ziad Al-Halah,
Sébastien M. R. Arnold,
Ese Ben-Iwhiwhu,
Andrew P. Brna,
Ethan Brooks,
Ryan C. Brown,
Zachary Daniels,
Anurag Daram,
Fabien Delattre,
Ryan Dellana,
Eric Eaton,
Haotian Fu,
Kristen Grauman,
Jesse Hostetler,
Shariq Iqbal,
Cassandra Kent,
Nicholas Ketz,
Soheil Kolouri,
George Konidaris,
Dhireesha Kudithipudi,
Erik Learned-Miller,
Seungwon Lee
, et al. (22 additional authors not shown)
Abstract:
Despite the advancement of machine learning techniques in recent years, state-of-the-art systems lack robustness to "real world" events, where the input distributions and tasks encountered by the deployed systems will not be limited to the original training context, and systems will instead need to adapt to novel distributions and tasks while deployed. This critical gap may be addressed through th…
▽ More
Despite the advancement of machine learning techniques in recent years, state-of-the-art systems lack robustness to "real world" events, where the input distributions and tasks encountered by the deployed systems will not be limited to the original training context, and systems will instead need to adapt to novel distributions and tasks while deployed. This critical gap may be addressed through the development of "Lifelong Learning" systems that are capable of 1) Continuous Learning, 2) Transfer and Adaptation, and 3) Scalability. Unfortunately, efforts to improve these capabilities are typically treated as distinct areas of research that are assessed independently, without regard to the impact of each separate capability on other aspects of the system. We instead propose a holistic approach, using a suite of metrics and an evaluation framework to assess Lifelong Learning in a principled way that is agnostic to specific domains or system techniques. Through five case studies, we show that this suite of metrics can inform the development of varied and complex Lifelong Learning systems. We highlight how the proposed suite of metrics quantifies performance trade-offs present during Lifelong Learning system development - both the widely discussed Stability-Plasticity dilemma and the newly proposed relationship between Sample Efficient and Robust Learning. Further, we make recommendations for the formulation and use of metrics to guide the continuing development of Lifelong Learning systems and assess their progress in the future.
△ Less
Submitted 18 January, 2023;
originally announced January 2023.
-
On the Analysis and Optimization of Fast Conditional Handover with Hand Blockage for Mobility
Authors:
Subhyal Bin Iqbal,
Salman Nadaf,
Ahmad Awada,
Umur Karabulut,
Philipp Schulz,
Gerhard P. Fettweis
Abstract:
Although frequency range 2 (FR2) systems are an essential part of 5G-Advanced and future 3GPP releases, the mobility performance of multi-panel user equipment (MPUE) with hand blockage is still an area open for research and standardization. In this article, a comprehensive study on the mobility performance of MPUE with hand blockage is performed for conditional handover (CHO) and its potential enh…
▽ More
Although frequency range 2 (FR2) systems are an essential part of 5G-Advanced and future 3GPP releases, the mobility performance of multi-panel user equipment (MPUE) with hand blockage is still an area open for research and standardization. In this article, a comprehensive study on the mobility performance of MPUE with hand blockage is performed for conditional handover (CHO) and its potential enhancement denoted by fast conditional handover (FCHO). In contrast to CHO, in FCHO the MPUE can reuse earlier target cell preparations after each handover to autonomously execute subsequent handovers. This saves both the signaling overhead associated with the reconfiguration and re-preparation of target cells after each handover and reduces mobility failures. Results have shown that FCHO offers considerable mobility performance gains as compared to CHO for different hand blockage cases that are dependent on the hand position around the MPUE. For the worst-case hand blockage scenario, it is seen that mobility failures reduce by 10.5% and 19.3% for the 60 km/h and 120 km/h mobility scenarios, respectively. This gain comes at the expense of reserving the handover resources of an MPUE for a longer time given that the target cell configurations are not necessarily released after each handover. In this article, the longer resource reservation problem in FCHO is analysed and three different resource reservation optimization techniques are introduced. Results have shown that these optimization techniques not only reduce the resource reservation time but also significantly reduce the signaling overhead at the possible expense of a tolerable degradation in mobility performance.
△ Less
Submitted 28 November, 2023; v1 submitted 1 November, 2022;
originally announced November 2022.
-
ALMA: Hierarchical Learning for Composite Multi-Agent Tasks
Authors:
Shariq Iqbal,
Robby Costales,
Fei Sha
Abstract:
Despite significant progress on multi-agent reinforcement learning (MARL) in recent years, coordination in complex domains remains a challenge. Work in MARL often focuses on solving tasks where agents interact with all other agents and entities in the environment; however, we observe that real-world tasks are often composed of several isolated instances of local agent interactions (subtasks), and…
▽ More
Despite significant progress on multi-agent reinforcement learning (MARL) in recent years, coordination in complex domains remains a challenge. Work in MARL often focuses on solving tasks where agents interact with all other agents and entities in the environment; however, we observe that real-world tasks are often composed of several isolated instances of local agent interactions (subtasks), and each agent can meaningfully focus on one subtask to the exclusion of all else in the environment. In these composite tasks, successful policies can often be decomposed into two levels of decision-making: agents are allocated to specific subtasks and each agent acts productively towards their assigned subtask alone. This decomposed decision making provides a strong structural inductive bias, significantly reduces agent observation spaces, and encourages subtask-specific policies to be reused and composed during training, as opposed to treating each new composition of subtasks as unique. We introduce ALMA, a general learning method for taking advantage of these structured tasks. ALMA simultaneously learns a high-level subtask allocation policy and low-level agent policies. We demonstrate that ALMA learns sophisticated coordination behavior in a number of challenging environments, outperforming strong baselines. ALMA's modularity also enables it to better generalize to new environment configurations. Finally, we find that while ALMA can integrate separately trained allocation and action policies, the best performance is obtained only by training all components jointly. Our code is available at https://github.com/shariqiqbal2810/ALMA
△ Less
Submitted 25 September, 2022; v1 submitted 27 May, 2022;
originally announced May 2022.
-
On the Modeling and Analysis of Fast Conditional Handover for 5G-Advanced
Authors:
Subhyal Bin Iqbal,
Ahmad Awada,
Umur Karabulut,
Ingo Viering,
Philipp Schulz,
Gerhard P. Fettweis
Abstract:
Conditional handover (CHO) is a state-of-the-art 3GPP handover mechanism used in 5G networks. Although it improves mobility robustness by reducing mobility failures, the decoupling of the handover preparation and execution phases in CHO significantly increases the signaling overhead. For 5G-Advanced networks, fast CHO (FCHO) is a recent 3GPP proposal that offers a practical solution whereby the us…
▽ More
Conditional handover (CHO) is a state-of-the-art 3GPP handover mechanism used in 5G networks. Although it improves mobility robustness by reducing mobility failures, the decoupling of the handover preparation and execution phases in CHO significantly increases the signaling overhead. For 5G-Advanced networks, fast CHO (FCHO) is a recent 3GPP proposal that offers a practical solution whereby the user equipment (UE) can reuse earlier target cell preparations after each handover to autonomously execute subsequent handovers. This saves the signaling overhead associated with the reconfiguration and repreparation of target cells after each handover. In this paper, a comprehensive study on the mobility performance of FCHO with respect to mobility failures and signaling overhead in frequency range 2 (FR2) is carried out. In particular, the performance of FCHO is compared with CHO for two different multi-panel UE (MPUE) schemes. Results show that FCHO substantially reduces the signaling overhead of CHO, while at the same time it also reduces mobility failures due to faster triggering of the handover that is achieved by saving the preparation delay.
△ Less
Submitted 29 July, 2022; v1 submitted 14 April, 2022;
originally announced April 2022.
-
Analysis and Performance Evaluation of Mobility for Multi-Panel User Equipment in 5G Networks
Authors:
Subhyal Bin Iqbal,
Ahmad Awada,
Umur Karabulut,
Ingo Viering,
Philipp Schulz,
Gerhard P. Fettweis
Abstract:
Frequency Range 2 (FR2) has become an integral part of 5G networks to fulfill the ever increasing demand for user data throughput. However, radio signals in FR2 experience high path and diffraction loss in mobile environments. To address this issue, multi-panel user equipment (MPUE) is adopted for FR2 whereby multiple antenna panels are placed on the UE body to leverage gains from antenna directiv…
▽ More
Frequency Range 2 (FR2) has become an integral part of 5G networks to fulfill the ever increasing demand for user data throughput. However, radio signals in FR2 experience high path and diffraction loss in mobile environments. To address this issue, multi-panel user equipment (MPUE) is adopted for FR2 whereby multiple antenna panels are placed on the UE body to leverage gains from antenna directivity. In contrast to traditional UEs with isotropic radiation patterns, signal measurements of cells in the network may not be available on all panels simultaneously for MPUE, which may result in outdated signal measurements that affect the reliability of mobility decisions. In this paper, we investigate the mobility performance of two different MPUE schemes following different paradigms for signal measurement and compare their performance with traditional UEs. This performance evaluation is based in multi-beam 5G networks operating in FR2 where there are multiple simultaneously active beams per cell to realize the high throughput requirements. Furthermore, an in-depth analysis of the mobility performance is carried out to determine the best mobility parameter combinations for the different MPUE schemes. Results have shown that both MPUE schemes offer considerable mobility performance gains as compared to traditional UEs. Moreover, it is seen that the MPUE schemes require different mobility parameter settings for the best mobility performance.
△ Less
Submitted 11 April, 2022; v1 submitted 28 March, 2022;
originally announced March 2022.
-
Possibility Before Utility: Learning And Using Hierarchical Affordances
Authors:
Robby Costales,
Shariq Iqbal,
Fei Sha
Abstract:
Reinforcement learning algorithms struggle on tasks with complex hierarchical dependency structures. Humans and other intelligent agents do not waste time assessing the utility of every high-level action in existence, but instead only consider ones they deem possible in the first place. By focusing only on what is feasible, or "afforded", at the present moment, an agent can spend more time both ev…
▽ More
Reinforcement learning algorithms struggle on tasks with complex hierarchical dependency structures. Humans and other intelligent agents do not waste time assessing the utility of every high-level action in existence, but instead only consider ones they deem possible in the first place. By focusing only on what is feasible, or "afforded", at the present moment, an agent can spend more time both evaluating the utility of and acting on what matters. To this end, we present Hierarchical Affordance Learning (HAL), a method that learns a model of hierarchical affordances in order to prune impossible subtasks for more effective learning. Existing works in hierarchical reinforcement learning provide agents with structural representations of subtasks but are not affordance-aware, and by grounding our definition of hierarchical affordances in the present state, our approach is more flexible than the multitude of approaches that ground their subtask dependencies in a symbolic history. While these logic-based methods often require complete knowledge of the subtask hierarchy, our approach is able to utilize incomplete and varying symbolic specifications. Furthermore, we demonstrate that relative to non-affordance-aware methods, HAL agents are better able to efficiently learn complex tasks, navigate environment stochasticity, and acquire diverse skills in the absence of extrinsic supervision -- all of which are hallmarks of human learning.
△ Less
Submitted 23 March, 2022;
originally announced March 2022.
-
Simulating Malicious Attacks on VANETs for Connected and Autonomous Vehicle Cybersecurity: A Machine Learning Dataset
Authors:
Safras Iqbal,
Peter Ball,
Muhammad H Kamarudin,
Andrew Bradley
Abstract:
Connected and Autonomous Vehicles (CAVs) rely on Vehicular Adhoc Networks with wireless communication between vehicles and roadside infrastructure to support safe operation. However, cybersecurity attacks pose a threat to VANETs and the safe operation of CAVs. This study proposes the use of simulation for modelling typical communication scenarios which may be subject to malicious attacks. The Ecli…
▽ More
Connected and Autonomous Vehicles (CAVs) rely on Vehicular Adhoc Networks with wireless communication between vehicles and roadside infrastructure to support safe operation. However, cybersecurity attacks pose a threat to VANETs and the safe operation of CAVs. This study proposes the use of simulation for modelling typical communication scenarios which may be subject to malicious attacks. The Eclipse MOSAIC simulation framework is used to model two typical road scenarios, including messaging between the vehicles and infrastructure - and both replay and bogus information cybersecurity attacks are introduced. The model demonstrates the impact of these attacks, and provides an open dataset to inform the development of machine learning algorithms to provide anomaly detection and mitigation solutions for enhancing secure communications and safe deployment of CAVs on the road.
△ Less
Submitted 15 February, 2022;
originally announced February 2022.
-
Unicorn: Reasoning about Configurable System Performance through the lens of Causality
Authors:
Md Shahriar Iqbal,
Rahul Krishna,
Mohammad Ali Javidian,
Baishakhi Ray,
Pooyan Jamshidi
Abstract:
Modern computer systems are highly configurable, with the total variability space sometimes larger than the number of atoms in the universe. Understanding and reasoning about the performance behavior of highly configurable systems, over a vast and variable space, is challenging. State-of-the-art methods for performance modeling and analyses rely on predictive machine learning models, therefore, th…
▽ More
Modern computer systems are highly configurable, with the total variability space sometimes larger than the number of atoms in the universe. Understanding and reasoning about the performance behavior of highly configurable systems, over a vast and variable space, is challenging. State-of-the-art methods for performance modeling and analyses rely on predictive machine learning models, therefore, they become (i) unreliable in unseen environments (e.g., different hardware, workloads), and (ii) may produce incorrect explanations. To tackle this, we propose a new method, called Unicorn, which (i) captures intricate interactions between configuration options across the software-hardware stack and (ii) describes how such interactions can impact performance variations via causal inference. We evaluated Unicorn on six highly configurable systems, including three on-device machine learning systems, a video encoder, a database management system, and a data analytics pipeline. The experimental results indicate that Unicorn outperforms state-of-the-art performance debugging and optimization methods in finding effective repairs for performance faults and finding configurations with near-optimal performance. Further, unlike the existing methods, the learned causal performance models reliably predict performance for new environments.
△ Less
Submitted 17 March, 2022; v1 submitted 20 January, 2022;
originally announced January 2022.
-
Gridiron: A Technique for Augmenting Cloud Workloads with Network Bandwidth Requirements
Authors:
Nodir Kodirov,
Shane Bergsma,
Syed M. Iqbal,
Alan J. Hu,
Ivan Beschastnikh,
Margo Seltzer
Abstract:
Cloud applications use more than just server resources, they also require networking resources. We propose a new technique to model network bandwidth demand of networked cloud applications. Our technique, Gridiron, augments VM workload traces from Azure cloud with network bandwidth requirements. The key to the Gridiron technique is to derive inter-VM network bandwidth requirements using Amdahl's s…
▽ More
Cloud applications use more than just server resources, they also require networking resources. We propose a new technique to model network bandwidth demand of networked cloud applications. Our technique, Gridiron, augments VM workload traces from Azure cloud with network bandwidth requirements. The key to the Gridiron technique is to derive inter-VM network bandwidth requirements using Amdahl's second law. As a case study, we use Gridiron to generate realistic traces with network bandwidth demands for a distributed machine learning training application. Workloads generated with Gridiron allow datacenter operators to estimate the network bandwidth demands of cloud applications and enable more realistic cloud resource scheduler evaluation.
△ Less
Submitted 12 January, 2022;
originally announced January 2022.
-
ANUBIS: A Provenance Graph-Based Framework for Advanced Persistent Threat Detection
Authors:
Md. Monowar Anjum,
Shahrear Iqbal,
Benoit Hamelin
Abstract:
We present ANUBIS, a highly effective machine learning-based APT detection system. Our design philosophy for ANUBIS involves two principal components. Firstly, we intend ANUBIS to be effectively utilized by cyber-response teams. Therefore, prediction explainability is one of the main focuses of ANUBIS design. Secondly, ANUBIS uses system provenance graphs to capture causality and thereby achieve h…
▽ More
We present ANUBIS, a highly effective machine learning-based APT detection system. Our design philosophy for ANUBIS involves two principal components. Firstly, we intend ANUBIS to be effectively utilized by cyber-response teams. Therefore, prediction explainability is one of the main focuses of ANUBIS design. Secondly, ANUBIS uses system provenance graphs to capture causality and thereby achieve high detection performance. At the core of the predictive capability of ANUBIS, there is a Bayesian Neural Network that can tell how confident it is in its predictions. We evaluate ANUBIS against a recent APT dataset (DARPA OpTC) and show that ANUBIS can detect malicious activity akin to APT campaigns with high accuracy. Moreover, ANUBIS learns about high-level patterns that allow it to explain its predictions to threat analysts. The high predictive performance with explainable attack story reconstruction makes ANUBIS an effective tool to use for enterprise cyber defense.
△ Less
Submitted 21 December, 2021;
originally announced December 2021.
-
CVEH: A Dynamic Framework To Profile Vehicle Movements To Mitigate Hit And Run Cases Using Crowdsourcing
Authors:
Attiq ur Rehman,
Asad Waqar Malik,
Anis ur Rahman,
Sohail Iqbal,
Ghalib Ahmed Tahir
Abstract:
In developed countries like the USA, Germany, and the UK, the security forces used highly sophisticated equipment, fast vehicles, drones, and helicopters to catch offenders' vehicles. Whereas, in develo** countries with limited resources such schemes cannot be utilized due to management cost and other constraints. In this paper, we proposed a framework called CVEH that enables develo** countri…
▽ More
In developed countries like the USA, Germany, and the UK, the security forces used highly sophisticated equipment, fast vehicles, drones, and helicopters to catch offenders' vehicles. Whereas, in develo** countries with limited resources such schemes cannot be utilized due to management cost and other constraints. In this paper, we proposed a framework called CVEH that enables develo** countries to profile the offender vehicle movements through crowdsourcing technique and act as an early warning system to the law forcing agencies. It also engages citizens to play their role in improving security conditions. The proposed CVEH framework allows Vehicle-to-Infrastructure (V2I) communication to monitor the movement of the offender's vehicle and shared its information with the Command and Control (CC) centre. The CC centre projects the path and engages nearly located law enforcement agencies. CVEH is developed and evaluated on android smartphones. Simulations conducted for this study exhibit the effectiveness of our framework.
△ Less
Submitted 28 June, 2021;
originally announced July 2021.
-
Coconut trees detection and segmentation in aerial imagery using mask region-based convolution neural network
Authors:
Muhammad Shakaib Iqbal,
Hazrat Ali,
Son N. Tran,
Talha Iqbal
Abstract:
Food resources face severe damages under extraordinary situations of catastrophes such as earthquakes, cyclones, and tsunamis. Under such scenarios, speedy assessment of food resources from agricultural land is critical as it supports aid activity in the disaster hit areas. In this article, a deep learning approach is presented for the detection and segmentation of coconut tress in aerial imagery…
▽ More
Food resources face severe damages under extraordinary situations of catastrophes such as earthquakes, cyclones, and tsunamis. Under such scenarios, speedy assessment of food resources from agricultural land is critical as it supports aid activity in the disaster hit areas. In this article, a deep learning approach is presented for the detection and segmentation of coconut tress in aerial imagery provided through the AI competition organized by the World Bank in collaboration with OpenAerialMap and WeRobotics. Maked Region-based Convolutional Neural Network approach was used identification and segmentation of coconut trees. For the segmentation task, Mask R-CNN model with ResNet50 and ResNet1010 based architectures was used. Several experiments with different configuration parameters were performed and the best configuration for the detection of coconut trees with more than 90% confidence factor was reported. For the purpose of evaluation, Microsoft COCO dataset evaluation metric namely mean average precision (mAP) was used. An overall 91% mean average precision for coconut trees detection was achieved.
△ Less
Submitted 10 May, 2021;
originally announced May 2021.
-
Analyzing the Usefulness of the DARPA OpTC Dataset in Cyber Threat Detection Research
Authors:
Md. Monowar Anjum,
Shahrear Iqbal,
Benoit Hamelin
Abstract:
Maintaining security and privacy in real-world enterprise networks is becoming more and more challenging. Cyber actors are increasingly employing previously unreported and state-of-the-art techniques to break into corporate networks. To develop novel and effective methods to thwart these sophisticated cyberattacks, we need datasets that reflect real-world enterprise scenarios to a high degree of a…
▽ More
Maintaining security and privacy in real-world enterprise networks is becoming more and more challenging. Cyber actors are increasingly employing previously unreported and state-of-the-art techniques to break into corporate networks. To develop novel and effective methods to thwart these sophisticated cyberattacks, we need datasets that reflect real-world enterprise scenarios to a high degree of accuracy. However, precious few such datasets are publicly available. Researchers still predominantly use the decade-old KDD datasets, however, studies showed that these datasets do not adequately reflect modern attacks like Advanced Persistent Threats(APT). In this work, we analyze the usefulness of the recently introduced DARPA Operationally Transparent Cyber (OpTC) dataset in this regard. We describe the content of the dataset in detail and present a qualitative analysis. We show that the OpTC dataset is an excellent candidate for advanced cyber threat detection research while also highlighting its limitations. Additionally, we propose several research directions where this dataset can be useful.
△ Less
Submitted 8 May, 2021; v1 submitted 4 March, 2021;
originally announced March 2021.
-
Personal Productivity and Well-being -- Chapter 2 of the 2021 New Future of Work Report
Authors:
Jenna Butler,
Mary Czerwinski,
Shamsi Iqbal,
Sonia Jaffe,
Kate Nowak,
Emily Peloquin,
Longqi Yang
Abstract:
We now turn to understanding the impact that COVID-19 had on the personal productivity and well-being of information workers as their work practices were impacted by remote work. This chapter overviews people's productivity, satisfaction, and work patterns, and shows that the challenges and benefits of remote work are closely linked. Looking forward, the infrastructure surrounding work will need t…
▽ More
We now turn to understanding the impact that COVID-19 had on the personal productivity and well-being of information workers as their work practices were impacted by remote work. This chapter overviews people's productivity, satisfaction, and work patterns, and shows that the challenges and benefits of remote work are closely linked. Looking forward, the infrastructure surrounding work will need to evolve to help people adapt to the challenges of remote and hybrid work.
△ Less
Submitted 3 March, 2021;
originally announced March 2021.
-
Classification of COVID-19 via Homology of CT-SCAN
Authors:
Sohail Iqbal,
H. Fareed Ahmed,
Talha Qaiser,
Muhammad Imran Qureshi,
Nasir Rajpoot
Abstract:
In this worldwide spread of SARS-CoV-2 (COVID-19) infection, it is of utmost importance to detect the disease at an early stage especially in the hot spots of this epidemic. There are more than 110 Million infected cases on the globe, sofar. Due to its promptness and effective results computed tomography (CT)-scan image is preferred to the reverse-transcription polymerase chain reaction (RT-PCR).…
▽ More
In this worldwide spread of SARS-CoV-2 (COVID-19) infection, it is of utmost importance to detect the disease at an early stage especially in the hot spots of this epidemic. There are more than 110 Million infected cases on the globe, sofar. Due to its promptness and effective results computed tomography (CT)-scan image is preferred to the reverse-transcription polymerase chain reaction (RT-PCR). Early detection and isolation of the patient is the only possible way of controlling the spread of the disease. Automated analysis of CT-Scans can provide enormous support in this process. In this article, We propose a novel approach to detect SARS-CoV-2 using CT-scan images. Our method is based on a very intuitive and natural idea of analyzing shapes, an attempt to mimic a professional medic. We mainly trace SARS-CoV-2 features by quantifying their topological properties. We primarily use a tool called persistent homology, from Topological Data Analysis (TDA), to compute these topological properties. We train and test our model on the "SARS-CoV-2 CT-scan dataset" \citep{soares2020sars}, an open-source dataset, containing 2,481 CT-scans of normal and COVID-19 patients. Our model yielded an overall benchmark F1 score of $99.42\% $, accuracy $99.416\%$, precision $99.41\%$, and recall $99.42\%$. The TDA techniques have great potential that can be utilized for efficient and prompt detection of COVID-19. The immense potential of TDA may be exploited in clinics for rapid and safe detection of COVID-19 globally, in particular in the low and middle-income countries where RT-PCR labs and/or kits are in a serious crisis.
△ Less
Submitted 21 February, 2021;
originally announced February 2021.
-
Large Scale Analysis of Multitasking Behavior During Remote Meetings
Authors:
Hancheng Cao,
Chia-Jung Lee,
Shamsi Iqbal,
Mary Czerwinski,
Priscilla Wong,
Sean Rintel,
Brent Hecht,
Jaime Teevan,
Longqi Yang
Abstract:
Virtual meetings are critical for remote work because of the need for synchronous collaboration in the absence of in-person interactions. In-meeting multitasking is closely linked to people's productivity and wellbeing. However, we currently have limited understanding of multitasking in remote meetings and its potential impact. In this paper, we present what we believe is the most comprehensive st…
▽ More
Virtual meetings are critical for remote work because of the need for synchronous collaboration in the absence of in-person interactions. In-meeting multitasking is closely linked to people's productivity and wellbeing. However, we currently have limited understanding of multitasking in remote meetings and its potential impact. In this paper, we present what we believe is the most comprehensive study of remote meeting multitasking behavior through an analysis of a large-scale telemetry dataset collected from February to May 2020 of U.S. Microsoft employees and a 715-person diary study. Our results demonstrate that intrinsic meeting characteristics such as size, length, time, and type, significantly correlate with the extent to which people multitask, and multitasking can lead to both positive and negative outcomes. Our findings suggest important best-practice guidelines for remote meetings (e.g., avoid important meetings in the morning) and design implications for productivity tools (e.g., support positive remote multitasking).
△ Less
Submitted 28 January, 2021;
originally announced January 2021.
-
Towards a Robust and Trustworthy Machine Learning System Development: An Engineering Perspective
Authors:
Pulei Xiong,
Scott Buffett,
Shahrear Iqbal,
Philippe Lamontagne,
Mohammad Mamun,
Heather Molyneaux
Abstract:
While Machine Learning (ML) technologies are widely adopted in many mission critical fields to support intelligent decision-making, concerns remain about system resilience against ML-specific security attacks and privacy breaches as well as the trust that users have in these systems. In this article, we present our recent systematic and comprehensive survey on the state-of-the-art ML robustness an…
▽ More
While Machine Learning (ML) technologies are widely adopted in many mission critical fields to support intelligent decision-making, concerns remain about system resilience against ML-specific security attacks and privacy breaches as well as the trust that users have in these systems. In this article, we present our recent systematic and comprehensive survey on the state-of-the-art ML robustness and trustworthiness from a security engineering perspective, focusing on the problems in system threat analysis, design and evaluation faced in develo** practical machine learning applications, in terms of robustness and user trust. Accordingly, we organize the presentation of this survey intended to facilitate the convey of the body of knowledge from this angle. We then describe a metamodel we created that represents the body of knowledge in a standard and visualized way. We further illustrate how to leverage the metamodel to guide a systematic threat analysis and security design process which extends and scales up the classic process. Finally, we propose the future research directions motivated by our findings. Our work differs itself from the existing surveys by (i) exploring the fundamental principles and best practices to support robust and trustworthy ML system development, and (ii) studying the interplay of robustness and user trust in the context of ML systems. We expect this survey provides a big picture for machine learning security practitioners.
△ Less
Submitted 14 February, 2022; v1 submitted 8 January, 2021;
originally announced January 2021.
-
A Survey of Methods for Managing the Classification and Solution of Data Imbalance Problem
Authors:
Khan Md. Hasib,
Md. Sadiq Iqbal,
Faisal Muhammad Shah,
Jubayer Al Mahmud,
Mahmudul Hasan Popel,
Md. Imran Hossain Showrov,
Shakil Ahmed,
Obaidur Rahman
Abstract:
The problem of class imbalance is extensive for focusing on numerous applications in the real world. In such a situation, nearly all of the examples are labeled as one class called majority class, while far fewer examples are labeled as the other class usually, the more important class is called minority. Over the last few years, several types of research have been carried out on the issue of clas…
▽ More
The problem of class imbalance is extensive for focusing on numerous applications in the real world. In such a situation, nearly all of the examples are labeled as one class called majority class, while far fewer examples are labeled as the other class usually, the more important class is called minority. Over the last few years, several types of research have been carried out on the issue of class imbalance, including data sampling, cost-sensitive analysis, Genetic Programming based models, bagging, boosting, etc. Nevertheless, in this survey paper, we enlisted the 24 related studies in the years 2003, 2008, 2010, 2012 and 2014 to 2019, focusing on the architecture of single, hybrid, and ensemble method design to understand the current status of improving classification output in machine learning techniques to fix problems with class imbalances. This survey paper also includes a statistical analysis of the classification algorithms under various methods and several other experimental conditions, as well as datasets used in different research papers.
△ Less
Submitted 22 December, 2020;
originally announced December 2020.
-
CADET: Debugging and Fixing Misconfigurations using Counterfactual Reasoning
Authors:
Rahul Krishna,
Md Shahriar Iqbal,
Mohammad Ali Javidian,
Baishakhi Ray,
Pooyan Jamshidi
Abstract:
Modern computing platforms are highly-configurable with thousands of interacting configurations. However, configuring these systems is challenging. Erroneous configurations can cause unexpected non-functional faults. This paper proposes CADET (short for Causal Debugging Toolkit) that enables users to identify, explain, and fix the root cause of non-functional faults early and in a principled fashi…
▽ More
Modern computing platforms are highly-configurable with thousands of interacting configurations. However, configuring these systems is challenging. Erroneous configurations can cause unexpected non-functional faults. This paper proposes CADET (short for Causal Debugging Toolkit) that enables users to identify, explain, and fix the root cause of non-functional faults early and in a principled fashion. CADET builds a causal model by observing the performance of the system under different configurations. Then, it uses casual path extraction followed by counterfactual reasoning over the causal model to: (a) identify the root causes of non-functional faults, (b) estimate the effects of various configurable parameters on the performance objective(s), and (c) prescribe candidate repairs to the relevant configuration options to fix the non-functional fault. We evaluated CADET on 5 highly-configurable systems deployed on 3 NVIDIA Jetson systems-on-chip. We compare CADET with state-of-the-art configuration optimization and ML-based debugging approaches. The experimental results indicate that CADET can find effective repairs for faults in multiple non-functional properties with (at most) 17% more accuracy, 28% higher gain, and $40\times$ speed-up than other ML-based performance debugging methods. Compared to multi-objective optimization approaches, CADET can find fixes (at most) $9\times$ faster with comparable or better performance gain. Our case study of non-functional faults reported in NVIDIA's forum show that CADET can find $14%$ better repairs than the experts' advice in less than 30 minutes.
△ Less
Submitted 8 March, 2021; v1 submitted 12 October, 2020;
originally announced October 2020.
-
An Environmentally Sustainable Closed-Loop Supply Chain Network Design under Uncertainty: Application of Optimization
Authors:
Md. Mohsin Ahmed,
S. M. Salauddin Iqbal,
Tazrin Jahan Priyanka,
Mohammad Arani,
Mohsen Momenitabar,
Md Mashum Billal
Abstract:
Newly, the rates of energy and material consumption to augment industrial pro-duction are substantially high, thus the environmentally sustainable industrial de-velopment has emerged as the main issue of either developed or develo** coun-tries. A novel approach to supply chain management is proposed to maintain economic growth along with environmentally friendly concerns for the design of the su…
▽ More
Newly, the rates of energy and material consumption to augment industrial pro-duction are substantially high, thus the environmentally sustainable industrial de-velopment has emerged as the main issue of either developed or develo** coun-tries. A novel approach to supply chain management is proposed to maintain economic growth along with environmentally friendly concerns for the design of the supply chain network. In this paper, a new green supply chain design approach has been suggested to maintain the financial virtue accompanying the environ-mental factors that required to be mitigated the negative effect of rapid industrial development on the environment. This approach has been suggested a multi-objective mathematical model minimizing the total costs and CO2 emissions for establishing an environmentally sustainable closed-loop supply chain. Two opti-mization methods are used namely Epsilon Constraint Method, and Genetic Al-gorithm Optimization Method. The results of the two mentioned methods have been compared and illustrated their effectiveness. The outcome of the analysis is approved to verify the accuracy of the proposed model to deal with financial and environmental issues concurrently.
△ Less
Submitted 24 September, 2020;
originally announced September 2020.
-
A Decade of In-text Citation Analysis based on Natural Language Processing and Machine Learning Techniques: An overview of empirical studies
Authors:
Sehrish Iqbal,
Saeed-Ul Hassan,
Naif Radi Aljohani,
Salem Alelyani,
Raheel Nawaz,
Lutz Bornmann
Abstract:
Citation analysis is one of the most frequently used methods in research evaluation. We are seeing significant growth in citation analysis through bibliometric metadata, primarily due to the availability of citation databases such as the Web of Science, Scopus, Google Scholar, Microsoft Academic, and Dimensions. Due to better access to full-text publication corpora in recent years, information sci…
▽ More
Citation analysis is one of the most frequently used methods in research evaluation. We are seeing significant growth in citation analysis through bibliometric metadata, primarily due to the availability of citation databases such as the Web of Science, Scopus, Google Scholar, Microsoft Academic, and Dimensions. Due to better access to full-text publication corpora in recent years, information scientists have gone far beyond traditional bibliometrics by tap** into advancements in full-text data processing techniques to measure the impact of scientific publications in contextual terms. This has led to technical developments in citation context and content analysis, citation classifications, citation sentiment analysis, citation summarisation, and citation-based recommendation. This article aims to narratively review the studies on these developments. Its primary focus is on publications that have used natural language processing and machine learning techniques to analyse citations.
△ Less
Submitted 29 August, 2020;
originally announced August 2020.
-
Randomized Entity-wise Factorization for Multi-Agent Reinforcement Learning
Authors:
Shariq Iqbal,
Christian A. Schroeder de Witt,
Bei Peng,
Wendelin Böhmer,
Shimon Whiteson,
Fei Sha
Abstract:
Multi-agent settings in the real world often involve tasks with varying types and quantities of agents and non-agent entities; however, common patterns of behavior often emerge among these agents/entities. Our method aims to leverage these commonalities by asking the question: ``What is the expected utility of each agent when only considering a randomly selected sub-group of its observed entities?…
▽ More
Multi-agent settings in the real world often involve tasks with varying types and quantities of agents and non-agent entities; however, common patterns of behavior often emerge among these agents/entities. Our method aims to leverage these commonalities by asking the question: ``What is the expected utility of each agent when only considering a randomly selected sub-group of its observed entities?'' By posing this counterfactual question, we can recognize state-action trajectories within sub-groups of entities that we may have encountered in another task and use what we learned in that task to inform our prediction in the current one. We then reconstruct a prediction of the full returns as a combination of factors considering these disjoint groups of entities and train this ``randomly factorized" value function as an auxiliary objective for value-based multi-agent reinforcement learning. By doing so, our model can recognize and leverage similarities across tasks to improve learning efficiency in a multi-task setting. Our approach, Randomized Entity-wise Factorization for Imagined Learning (REFIL), outperforms all strong baselines by a significant margin in challenging multi-task StarCraft micromanagement settings.
△ Less
Submitted 11 June, 2021; v1 submitted 7 June, 2020;
originally announced June 2020.
-
Minimum Length Scheduling for Discrete-Rate Full-Duplex Wireless Powered Communication Networks
Authors:
Muhammad Shahid Iqbal,
Yalcin Sadi,
Sinem Coleri
Abstract:
In this paper, we consider a wireless powered communication network where multiple users with RF energy harvesting capabilities communicate to a hybrid energy and information access point (HAP) in full-duplex mode. Each user has to transmit a certain amount of data with a transmission rate from a finite set of discrete rate levels, using the energy initially available in its battery and the energy…
▽ More
In this paper, we consider a wireless powered communication network where multiple users with RF energy harvesting capabilities communicate to a hybrid energy and information access point (HAP) in full-duplex mode. Each user has to transmit a certain amount of data with a transmission rate from a finite set of discrete rate levels, using the energy initially available in its battery and the energy it can harvest until the end of its transmission. Considering this model, we propose a novel discrete rate based minimum length scheduling problem to determine the optimal power control, rate adaptation and transmission schedule subject to data, energy causality and maximum transmit power constraints. The proposed optimization problem is proven to be NP-hard which requires exponential-time algorithms to solve for the global optimum. As a solution strategy, first, we demonstrate that the power control and rate adaptation, and scheduling problems can be solved separately in the optimal solution. For the power control and rate adaptation problem, we derive the optimal solution based on the proposed minimum length scheduling slot definition. For the scheduling, we classify the problem based on the distribution of minimum length scheduling slots of the users over time. For the non-overlap** slots scenario, we present the optimal scheduling algorithm. For the overlap** scenario, we propose a polynomial-time heuristic scheduling algorithm.
△ Less
Submitted 13 February, 2020;
originally announced February 2020.
-
Minimum Length Scheduling for Full Duplex Time-Critical Wireless Powered Communication Networks
Authors:
Muhammad Shahid Iqbal,
Yalcin Sadi,
Sinem Coleri
Abstract:
Radio frequency (RF) energy harvesting is key in attaining perpetual lifetime for time-critical wireless powered communication networks due to full control on energy transfer, far field region, small and low-cost circuitry. In this paper, we propose a novel minimum length scheduling problem to determine the optimal power control, time allocation and transmission schedule subject to data, energy ca…
▽ More
Radio frequency (RF) energy harvesting is key in attaining perpetual lifetime for time-critical wireless powered communication networks due to full control on energy transfer, far field region, small and low-cost circuitry. In this paper, we propose a novel minimum length scheduling problem to determine the optimal power control, time allocation and transmission schedule subject to data, energy causality and maximum transmit power constraints in a full-duplex wireless powered communication network. We first formulate the problem as a mixed integer non-linear programming problem and conjecture that the problem is NP-hard. As a solution strategy, we demonstrate that the power control and time allocation, and scheduling problems can be solved separately in the optimal solution. For the power control and time allocation problem, we derive the optimal solution by using Karush-Kuhn-Tucker conditions. For the scheduling, we introduce a penalty function allowing reformulation as a sum penalty minimization problem. Upon derivation of the optimality conditions based on the characteristics of the penalty function, we propose two polynomial-time heuristic algorithms and a reduced-complexity exact algorithm employing smart pruning techniques. Via extensive simulations, we illustrate that the proposed heuristic schemes outperform the previously proposed schemes for predetermined transmission order of users and achieve close-to-optimal solutions.
△ Less
Submitted 21 June, 2020; v1 submitted 3 February, 2020;
originally announced February 2020.
-
FlexiBO: A Decoupled Cost-Aware Multi-Objective Optimization Approach for Deep Neural Networks
Authors:
Md Shahriar Iqbal,
Jianhai Su,
Lars Kotthoff,
Pooyan Jamshidi
Abstract:
The design of machine learning systems often requires trading off different objectives, for example, prediction error and energy consumption for deep neural networks (DNNs). Typically, no single design performs well in all objectives; therefore, finding Pareto-optimal designs is of interest. The search for Pareto-optimal designs involves evaluating designs in an iterative process, and the measurem…
▽ More
The design of machine learning systems often requires trading off different objectives, for example, prediction error and energy consumption for deep neural networks (DNNs). Typically, no single design performs well in all objectives; therefore, finding Pareto-optimal designs is of interest. The search for Pareto-optimal designs involves evaluating designs in an iterative process, and the measurements are used to evaluate an acquisition function that guides the search process. However, measuring different objectives incurs different costs. For example, the cost of measuring the prediction error of DNNs is orders of magnitude higher than that of measuring the energy consumption of a pre-trained DNN, as it requires re-training the DNN. Current state-of-the-art methods do not consider this difference in objective evaluation cost, potentially incurring expensive evaluations of objective functions in the optimization process. In this paper, we develop a novel decoupled and cost-aware multi-objective optimization algorithm, we call Flexible Multi-Objective Bayesian Optimization (FlexiBO) to address this issue. FlexiBO weights the improvement of the hypervolume of the Pareto region by the measurement cost of each objective to balance the expense of collecting new information with the knowledge gained through objective evaluations, preventing us from performing expensive measurements for little to no gain. We evaluate FlexiBO on seven state-of-the-art DNNs for image recognition, natural language processing (NLP), and speech-to-text translation. Our results indicate that, given the same total experimental budget, FlexiBO discovers designs with 4.8$\%$ to 12.4$\%$ lower hypervolume error than the best method in state-of-the-art multi-objective optimization.
△ Less
Submitted 21 August, 2022; v1 submitted 17 January, 2020;
originally announced January 2020.