-
INRISCO: INcident monitoRing In Smart COmmunities
Authors:
Mónica Aguilar Igartua,
Florina Almenares,
Rebeca P. Díaz Redondo,
Manuela I. Martín,
Jordi Forné,
Celeste Campo,
Ana Fernández,
Luis J. de la Cruz,
Carlos García-Rubio,
Andrés Marínn,
Ahmad Mohamad Mezher,
Daniel Díaz,
Héctor Cerezo,
David Rebollo-Monedero,
Patricia Arias,
Francisco Rico
Abstract:
Major advances in information and communication technologies (ICTs) make citizens to be considered as sensors in motion. Carrying their mobile devices, moving in their connected vehicles or actively participating in social networks, citizens provide a wealth of information that, after properly processing, can support numerous applications for the benefit of the community. In the context of smart c…
▽ More
Major advances in information and communication technologies (ICTs) make citizens to be considered as sensors in motion. Carrying their mobile devices, moving in their connected vehicles or actively participating in social networks, citizens provide a wealth of information that, after properly processing, can support numerous applications for the benefit of the community. In the context of smart communities, the INRISCO proposal intends for (i) the early detection of abnormal situations in cities (i.e., incidents), (ii) the analysis of whether, according to their impact, those incidents are really adverse for the community; and (iii) the automatic actuation by dissemination of appropriate information to citizens and authorities. Thus, INRISCO will identify and report on incidents in traffic (jam, accident) or public infrastructure (e.g., works, street cut), the occurrence of specific events that affect other citizens life (e.g., demonstrations, concerts), or environmental problems (e.g., pollution, bad weather). It is of particular interest to this proposal the identification of incidents with a social and economic impact, which affects the quality of life of citizens.
△ Less
Submitted 12 December, 2023;
originally announced December 2023.
-
Design of General Purpose Minimal-Auxiliary Ising Machines
Authors:
Isaac K. Martin,
Andrew G. Moore,
John T. Daly,
Jess J. Meyer,
Teresa M. Ranadive
Abstract:
Ising machines are a form of quantum-inspired processing-in-memory computer which has shown great promise for overcoming the limitations of traditional computing paradigms while operating at a fraction of the energy use. The process of designing Ising machines is known as the reverse Ising problem. Unfortunately, this problem is in general computationally intractable: it is a nonconvex mixed-integ…
▽ More
Ising machines are a form of quantum-inspired processing-in-memory computer which has shown great promise for overcoming the limitations of traditional computing paradigms while operating at a fraction of the energy use. The process of designing Ising machines is known as the reverse Ising problem. Unfortunately, this problem is in general computationally intractable: it is a nonconvex mixed-integer linear programming problem which cannot be naively brute-forced except in the simplest cases due to exponential scaling of runtime with number of spins. We prove new theoretical results which allow us to reduce the search space to one with quadratic scaling. We utilize this theory to develop general purpose algorithmic solutions to the reverse Ising problem. In particular, we demonstrate Ising formulations of 3-bit and 4-bit integer multiplication which use fewer total spins than previously known methods by a factor of more than three. Our results increase the practicality of implementing such circuits on modern Ising hardware, where spins are at a premium.
△ Less
Submitted 24 October, 2023;
originally announced October 2023.
-
State of the Art Report: Verified Computation
Authors:
Jim Woodcock,
Mikkel Schmidt Andersen,
Diego F. Aranha,
Stefan Hallerstede,
Simon Thrane Hansen,
Nikolaj Kuhne Jakobsen,
Tomas Kulik,
Peter Gorm Larsen,
Hugo Daniel Macedo,
Carlos Ignacio Isasa Martin,
Victor Alexander Mtsimbe Norrild
Abstract:
This report describes the state of the art in verifiable computation. The problem being solved is the following:
The Verifiable Computation Problem (Verifiable Computing Problem) Suppose we have two computing agents. The first agent is the verifier, and the second agent is the prover. The verifier wants the prover to perform a computation. The verifier sends a description of the computation to t…
▽ More
This report describes the state of the art in verifiable computation. The problem being solved is the following:
The Verifiable Computation Problem (Verifiable Computing Problem) Suppose we have two computing agents. The first agent is the verifier, and the second agent is the prover. The verifier wants the prover to perform a computation. The verifier sends a description of the computation to the prover. Once the prover has completed the task, the prover returns the output to the verifier. The output will contain proof. The verifier can use this proof to check if the prover computed the output correctly. The check is not required to verify the algorithm used in the computation. Instead, it is a check that the prover computed the output using the computation specified by the verifier. The effort required for the check should be much less than that required to perform the computation.
This state-of-the-art report surveys 128 papers from the literature comprising more than 4,000 pages. Other papers and books were surveyed but were omitted. The papers surveyed were overwhelmingly mathematical. We have summarised the major concepts that form the foundations for verifiable computation. The report contains two main sections. The first, larger section covers the theoretical foundations for probabilistically checkable and zero-knowledge proofs. The second section contains a description of the current practice in verifiable computation. Two further reports will cover (i) military applications of verifiable computation and (ii) a collection of technical demonstrators. The first of these is intended to be read by those who want to know what applications are enabled by the current state of the art in verifiable computation. The second is for those who want to see practical tools and conduct experiments themselves.
△ Less
Submitted 16 February, 2024; v1 submitted 29 August, 2023;
originally announced August 2023.
-
Electromechanical memcapacitive neurons for energy-efficient spiking neural networks
Authors:
Zixi Zhang,
Yuriy V. Pershin,
Ivar Martin
Abstract:
In this article, we introduce a new nanoscale electromechanical device -- a leaky memcapacitor -- and show that it may be useful for the hardware implementation of spiking neurons. The leaky memcapacitor is a movable-plate capacitor that becomes quite conductive when the plates come close to each other. The equivalent circuit of the leaky memcapacitor involves a memcapacitive and memristive system…
▽ More
In this article, we introduce a new nanoscale electromechanical device -- a leaky memcapacitor -- and show that it may be useful for the hardware implementation of spiking neurons. The leaky memcapacitor is a movable-plate capacitor that becomes quite conductive when the plates come close to each other. The equivalent circuit of the leaky memcapacitor involves a memcapacitive and memristive system connected in parallel. In the leaky memcapacitor, the resistance and capacitance depend on the same internal state variable, which is the displacement of the movable plate. We have performed a comprehensive analysis showing that several spiking types observed in biological neurons can be implemented with the leaky memcapacitor. Significant attention is paid to the dynamic properties of the model. As in leaky memcapacitors the capacitive and leaking resistive functionalities are implemented naturally within the same device structure, their use will simplify the creation of spiking neural networks.
△ Less
Submitted 21 April, 2023;
originally announced April 2023.
-
Bridging Natural Language Processing and Psycholinguistics: computationally grounded semantic similarity datasets for Basque and Spanish
Authors:
J. Goikoetxea,
M. Arantzeta,
I. San Martin
Abstract:
We present a computationally-grounded word similarity dataset based on two well-known Natural Language Processing resources; text corpora and knowledge bases. This dataset aims to fulfil a gap in psycholinguistic research by providing a variety of quantifications of semantic similarity in an extensive set of noun pairs controlled by variables that play a significant role in lexical processing. The…
▽ More
We present a computationally-grounded word similarity dataset based on two well-known Natural Language Processing resources; text corpora and knowledge bases. This dataset aims to fulfil a gap in psycholinguistic research by providing a variety of quantifications of semantic similarity in an extensive set of noun pairs controlled by variables that play a significant role in lexical processing. The dataset creation has consisted in three steps, 1) computing four key psycholinguistic features for each noun; concreteness, frequency, semantic and phonological neighbourhood density; 2) pairing nouns across these four variables; 3) for each noun pair, assigning three types of word similarity measurements, computed out of text, Wordnet and hybrid embeddings. The present dataset includes noun pairs' information in Basque and European Spanish, but further work intends to extend it to more languages.
△ Less
Submitted 20 April, 2023; v1 submitted 19 April, 2023;
originally announced April 2023.
-
Improved Segmentation of Deep Sulci in Cortical Gray Matter Using a Deep Learning Framework Incorporating Laplace's Equation
Authors:
Sadhana Ravikumar,
Ranjit Ittyerah,
Sydney Lim,
Long Xie,
Sandhitsu Das,
Pulkit Khandelwal,
Laura E. M. Wisse,
Madigan L. Bedard,
John L. Robinson,
Terry Schuck,
Murray Grossman,
John Q. Trojanowski,
Edward B. Lee,
M. Dylan Tisdall,
Karthik Prabhakaran,
John A. Detre,
David J. Irwin,
Winifred Trotman,
Gabor Mizsei,
Emilio Artacho-Pérula,
Maria Mercedes Iñiguez de Onzono Martin,
Maria del Mar Arroyo Jiménez,
Monica Muñoz,
Francisco Javier Molina Romero,
Maria del Pilar Marcos Rabal
, et al. (7 additional authors not shown)
Abstract:
When develo** tools for automated cortical segmentation, the ability to produce topologically correct segmentations is important in order to compute geometrically valid morphometry measures. In practice, accurate cortical segmentation is challenged by image artifacts and the highly convoluted anatomy of the cortex itself. To address this, we propose a novel deep learning-based cortical segmentat…
▽ More
When develo** tools for automated cortical segmentation, the ability to produce topologically correct segmentations is important in order to compute geometrically valid morphometry measures. In practice, accurate cortical segmentation is challenged by image artifacts and the highly convoluted anatomy of the cortex itself. To address this, we propose a novel deep learning-based cortical segmentation method in which prior knowledge about the geometry of the cortex is incorporated into the network during the training process. We design a loss function which uses the theory of Laplace's equation applied to the cortex to locally penalize unresolved boundaries between tightly folded sulci. Using an ex vivo MRI dataset of human medial temporal lobe specimens, we demonstrate that our approach outperforms baseline segmentation networks, both quantitatively and qualitatively.
△ Less
Submitted 3 March, 2023; v1 submitted 1 March, 2023;
originally announced March 2023.
-
Discerning the painter's hand: machine learning on surface topography
Authors:
F. Ji,
M. S. McMaster,
S. Schwab,
G. Singh,
L. N. Smith,
S. Adhikari,
M. O'Dwyer,
F. Sayed,
A. Ingrisano,
D. Yoder,
E. S. Bolman,
I. T. Martin,
M. Hinczewski,
K. D. Singer
Abstract:
Attribution of paintings is a critical problem in art history. This study extends machine learning analysis to surface topography of painted works. A controlled study of positive attribution was designed with paintings produced by a class of art students. The paintings were scanned using a confocal optical profilometer to produce surface data. The surface data were divided into virtual patches and…
▽ More
Attribution of paintings is a critical problem in art history. This study extends machine learning analysis to surface topography of painted works. A controlled study of positive attribution was designed with paintings produced by a class of art students. The paintings were scanned using a confocal optical profilometer to produce surface data. The surface data were divided into virtual patches and used to train an ensemble of convolutional neural networks (CNNs) for attribution. Over a range of patch sizes from 0.5 to 60 mm, the resulting attribution was found to be 60 to 96% accurate, and, when comparing regions of different color, was nearly twice as accurate as CNNs using color images of the paintings. Remarkably, short length scales, as small as twice a bristle diameter, were the key to reliably distinguishing among artists. These results show promise for real-world attribution, particularly in the case of workshop practice.
△ Less
Submitted 13 June, 2021;
originally announced June 2021.
-
Living in the Physics and Machine Learning Interplay for Earth Observation
Authors:
Gustau Camps-Valls,
Daniel H. Svendsen,
Jordi Cortés-Andrés,
Álvaro Moreno-Martínez,
Adrián Pérez-Suay,
Jose Adsuara,
Irene Martín,
Maria Piles,
Jordi Muñoz-Marí,
Luca Martino
Abstract:
Most problems in Earth sciences aim to do inferences about the system, where accurate predictions are just a tiny part of the whole problem. Inferences mean understanding variables relations, deriving models that are physically interpretable, that are simple parsimonious, and mathematically tractable. Machine learning models alone are excellent approximators, but very often do not respect the most…
▽ More
Most problems in Earth sciences aim to do inferences about the system, where accurate predictions are just a tiny part of the whole problem. Inferences mean understanding variables relations, deriving models that are physically interpretable, that are simple parsimonious, and mathematically tractable. Machine learning models alone are excellent approximators, but very often do not respect the most elementary laws of physics, like mass or energy conservation, so consistency and confidence are compromised. In this paper, we describe the main challenges ahead in the field, and introduce several ways to live in the Physics and machine learning interplay: to encode differential equations from data, constrain data-driven models with physics-priors and dependence constraints, improve parameterizations, emulate physical models, and blend data-driven and process-based models. This is a collective long-term AI agenda towards develo** and applying algorithms capable of discovering knowledge in the Earth system.
△ Less
Submitted 18 October, 2020;
originally announced October 2020.
-
Meeting the traffic requirements of residential users in the next decade with current FTTH standards: how much? how long?
Authors:
José Alberto Hernández,
Rafael Sánchez,
Ignacio Martín,
David Larrabeiti
Abstract:
Traffic demand in the access has grown in the last years, and service providers need to upgrade their infrastructure to the latest access standards. While fiber has become the preferred technology of choice in access networks, there are many fibre access technologies available in the market. This poses a challenging question to operators not always easy to answer: how to upgrade? what technology a…
▽ More
Traffic demand in the access has grown in the last years, and service providers need to upgrade their infrastructure to the latest access standards. While fiber has become the preferred technology of choice in access networks, there are many fibre access technologies available in the market. This poses a challenging question to operators not always easy to answer: how to upgrade? what technology and for how long it will cope with the demands? In this paper we model the traffic forecast in the access for the next decade and analyze possible upgrade scenarios of fibre access networks, concluding which of the NG-PON flavors could better fit the demand.
△ Less
Submitted 31 October, 2018;
originally announced October 2018.
-
Android Malware Characterization using Metadata and Machine Learning Techniques
Authors:
Ignacio Martín,
José Alberto Hernández,
Alfonso Muñoz,
Antonio Guzmán
Abstract:
Android Malware has emerged as a consequence of the increasing popularity of smartphones and tablets. While most previous work focuses on inherent characteristics of Android apps to detect malware, this study analyses indirect features and meta-data to identify patterns in malware applications. Our experiments show that: (1) the permissions used by an application offer only moderate performance re…
▽ More
Android Malware has emerged as a consequence of the increasing popularity of smartphones and tablets. While most previous work focuses on inherent characteristics of Android apps to detect malware, this study analyses indirect features and meta-data to identify patterns in malware applications. Our experiments show that: (1) the permissions used by an application offer only moderate performance results; (2) other features publicly available at Android Markets are more relevant in detecting malware, such as the application developer and certificate issuer, and (3) compact and efficient classifiers can be constructed for the early detection of malware applications prior to code inspection or sandboxing.
△ Less
Submitted 12 December, 2017;
originally announced December 2017.
-
On labeling Android malware signatures using minhashing and further classification with Structural Equation Models
Authors:
Ignacio Martín,
José Alberto Hernández,
Sergio de los Santos
Abstract:
Multi-scanner Antivirus systems provide insightful information on the nature of a suspect application; however there is often a lack of consensus and consistency between different Anti-Virus engines. In this article, we analyze more than 250 thousand malware signatures generated by 61 different Anti-Virus engines after analyzing 82 thousand different Android malware applications. We identify 41 di…
▽ More
Multi-scanner Antivirus systems provide insightful information on the nature of a suspect application; however there is often a lack of consensus and consistency between different Anti-Virus engines. In this article, we analyze more than 250 thousand malware signatures generated by 61 different Anti-Virus engines after analyzing 82 thousand different Android malware applications. We identify 41 different malware classes grouped into three major categories, namely Adware, Harmful Threats and Unknown or Generic signatures. We further investigate the relationships between such 41 classes using community detection algorithms from graph theory to identify similarities between them; and we finally propose a Structure Equation Model to identify which Anti-Virus engines are more powerful at detecting each macro-category. As an application, we show how such models can help in identifying whether Unknown malware applications are more likely to be of Harmful or Adware type.
△ Less
Submitted 13 September, 2017;
originally announced September 2017.