-
WATT: Weight Average Test-Time Adaptation of CLIP
Authors:
David Osowiechi,
Mehrdad Noori,
Gustavo Adolfo Vargas Hakim,
Moslem Yazdanpanah,
Ali Bahri,
Milad Cheraghalikhani,
Sahar Dastani,
Farzad Beizaee,
Ismail Ben Ayed,
Christian Desrosiers
Abstract:
Vision-Language Models (VLMs) such as CLIP have yielded unprecedented performance for zero-shot image classification, yet their generalization capability may still be seriously challenged when confronted to domain shifts. In response, we present Weight Average Test-Time Adaptation (WATT) of CLIP, a pioneering approach facilitating full test-time adaptation (TTA) of this VLM. Our method employs a d…
▽ More
Vision-Language Models (VLMs) such as CLIP have yielded unprecedented performance for zero-shot image classification, yet their generalization capability may still be seriously challenged when confronted to domain shifts. In response, we present Weight Average Test-Time Adaptation (WATT) of CLIP, a pioneering approach facilitating full test-time adaptation (TTA) of this VLM. Our method employs a diverse set of templates for text prompts, augmenting the existing framework of CLIP. Predictions are utilized as pseudo labels for model updates, followed by weight averaging to consolidate the learned information globally. Furthermore, we introduce a text ensemble strategy, enhancing overall test performance by aggregating diverse textual cues. Our findings underscore the efficacy of WATT in enhancing performance across diverse datasets, including CIFAR-10-C, CIFAR-10.1, CIFAR-100-C, VisDA-C, and several other challenging datasets, effectively covering a wide range of domain shifts. Notably, these enhancements are achieved without necessitating additional model transformations or trainable modules. Moreover, compared to other Test-Time Adaptation methods, our approach can operate effectively with just a single image. Highlighting the potential of innovative test-time strategies, this research emphasizes their role in fortifying the adaptability of VLMs. The implementation is available at: \url{https://github.com/Mehrdad-Noori/WATT.git}.
△ Less
Submitted 24 June, 2024; v1 submitted 19 June, 2024;
originally announced June 2024.
-
GeoMask3D: Geometrically Informed Mask Selection for Self-Supervised Point Cloud Learning in 3D
Authors:
Ali Bahri,
Moslem Yazdanpanah,
Mehrdad Noori,
Milad Cheraghalikhani,
Gustavo Adolfo Vargas Hakim,
David Osowiechi,
Farzad Beizaee,
Ismail Ben Ayed,
Christian Desrosiers
Abstract:
We introduce a pioneering approach to self-supervised learning for point clouds, employing a geometrically informed mask selection strategy called GeoMask3D (GM3D) to boost the efficiency of Masked Auto Encoders (MAE). Unlike the conventional method of random masking, our technique utilizes a teacher-student model to focus on intricate areas within the data, guiding the model's focus toward region…
▽ More
We introduce a pioneering approach to self-supervised learning for point clouds, employing a geometrically informed mask selection strategy called GeoMask3D (GM3D) to boost the efficiency of Masked Auto Encoders (MAE). Unlike the conventional method of random masking, our technique utilizes a teacher-student model to focus on intricate areas within the data, guiding the model's focus toward regions with higher geometric complexity. This strategy is grounded in the hypothesis that concentrating on harder patches yields a more robust feature representation, as evidenced by the improved performance on downstream tasks. Our method also presents a complete-to-partial feature-level knowledge distillation technique designed to guide the prediction of geometric complexity utilizing a comprehensive context from feature-level information. Extensive experiments confirm our method's superiority over State-Of-The-Art (SOTA) baselines, demonstrating marked improvements in classification, and few-shot tasks.
△ Less
Submitted 20 May, 2024;
originally announced May 2024.
-
CLIPArTT: Light-weight Adaptation of CLIP to New Domains at Test Time
Authors:
Gustavo Adolfo Vargas Hakim,
David Osowiechi,
Mehrdad Noori,
Milad Cheraghalikhani,
Ali Bahri,
Moslem Yazdanpanah,
Ismail Ben Ayed,
Christian Desrosiers
Abstract:
Pre-trained vision-language models (VLMs), exemplified by CLIP, demonstrate remarkable adaptability across zero-shot classification tasks without additional training. However, their performance diminishes in the presence of domain shifts. In this study, we introduce CLIP Adaptation duRing Test-Time (CLIPArTT), a fully test-time adaptation (TTA) approach for CLIP, which involves automatic text prom…
▽ More
Pre-trained vision-language models (VLMs), exemplified by CLIP, demonstrate remarkable adaptability across zero-shot classification tasks without additional training. However, their performance diminishes in the presence of domain shifts. In this study, we introduce CLIP Adaptation duRing Test-Time (CLIPArTT), a fully test-time adaptation (TTA) approach for CLIP, which involves automatic text prompts construction during inference for their use as text supervision. Our method employs a unique, minimally invasive text prompt tuning process, wherein multiple predicted classes are aggregated into a single new text prompt, used as pseudo label to re-classify inputs in a transductive manner. Additionally, we pioneer the standardization of TTA benchmarks (e.g., TENT) in the realm of VLMs. Our findings demonstrate that, without requiring additional transformations nor new trainable modules, CLIPArTT enhances performance dynamically across non-corrupted datasets such as CIFAR-10, corrupted datasets like CIFAR-10-C and CIFAR-10.1, alongside synthetic datasets such as VisDA-C. This research underscores the potential for improving VLMs' adaptability through novel test-time strategies, offering insights for robust performance across varied datasets and environments. The code can be found at: https://github.com/dosowiechi/CLIPArTT.git
△ Less
Submitted 1 May, 2024;
originally announced May 2024.
-
NC-TTT: A Noise Contrastive Approach for Test-Time Training
Authors:
David Osowiechi,
Gustavo A. Vargas Hakim,
Mehrdad Noori,
Milad Cheraghalikhani,
Ali Bahri,
Moslem Yazdanpanah,
Ismail Ben Ayed,
Christian Desrosiers
Abstract:
Despite their exceptional performance in vision tasks, deep learning models often struggle when faced with domain shifts during testing. Test-Time Training (TTT) methods have recently gained popularity by their ability to enhance the robustness of models through the addition of an auxiliary objective that is jointly optimized with the main task. Being strictly unsupervised, this auxiliary objectiv…
▽ More
Despite their exceptional performance in vision tasks, deep learning models often struggle when faced with domain shifts during testing. Test-Time Training (TTT) methods have recently gained popularity by their ability to enhance the robustness of models through the addition of an auxiliary objective that is jointly optimized with the main task. Being strictly unsupervised, this auxiliary objective is used at test time to adapt the model without any access to labels. In this work, we propose Noise-Contrastive Test-Time Training (NC-TTT), a novel unsupervised TTT technique based on the discrimination of noisy feature maps. By learning to classify noisy views of projected feature maps, and then adapting the model accordingly on new domains, classification performance can be recovered by an important margin. Experiments on several popular test-time adaptation baselines demonstrate the advantages of our method compared to recent approaches for this task. The code can be found at:https://github.com/GustavoVargasHakim/NCTTT.git
△ Less
Submitted 12 April, 2024;
originally announced April 2024.
-
ClusT3: Information Invariant Test-Time Training
Authors:
Gustavo A. Vargas Hakim,
David Osowiechi,
Mehrdad Noori,
Milad Cheraghalikhani,
Ismail Ben Ayed,
Christian Desrosiers
Abstract:
Deep Learning models have shown remarkable performance in a broad range of vision tasks. However, they are often vulnerable against domain shifts at test-time. Test-time training (TTT) methods have been developed in an attempt to mitigate these vulnerabilities, where a secondary task is solved at training time simultaneously with the main task, to be later used as an self-supervised proxy task at…
▽ More
Deep Learning models have shown remarkable performance in a broad range of vision tasks. However, they are often vulnerable against domain shifts at test-time. Test-time training (TTT) methods have been developed in an attempt to mitigate these vulnerabilities, where a secondary task is solved at training time simultaneously with the main task, to be later used as an self-supervised proxy task at test-time. In this work, we propose a novel unsupervised TTT technique based on the maximization of Mutual Information between multi-scale feature maps and a discrete latent representation, which can be integrated to the standard training as an auxiliary clustering task. Experimental results demonstrate competitive classification performance on different popular test-time adaptation benchmarks.
△ Less
Submitted 18 October, 2023;
originally announced October 2023.
-
TFS-ViT: Token-Level Feature Stylization for Domain Generalization
Authors:
Mehrdad Noori,
Milad Cheraghalikhani,
Ali Bahri,
Gustavo A. Vargas Hakim,
David Osowiechi,
Ismail Ben Ayed,
Christian Desrosiers
Abstract:
Standard deep learning models such as convolutional neural networks (CNNs) lack the ability of generalizing to domains which have not been seen during training. This problem is mainly due to the common but often wrong assumption of such models that the source and target data come from the same i.i.d. distribution. Recently, Vision Transformers (ViTs) have shown outstanding performance for a broad…
▽ More
Standard deep learning models such as convolutional neural networks (CNNs) lack the ability of generalizing to domains which have not been seen during training. This problem is mainly due to the common but often wrong assumption of such models that the source and target data come from the same i.i.d. distribution. Recently, Vision Transformers (ViTs) have shown outstanding performance for a broad range of computer vision tasks. However, very few studies have investigated their ability to generalize to new domains. This paper presents a first Token-level Feature Stylization (TFS-ViT) approach for domain generalization, which improves the performance of ViTs to unseen data by synthesizing new domains. Our approach transforms token features by mixing the normalization statistics of images from different domains. We further improve this approach with a novel strategy for attention-aware stylization, which uses the attention maps of class (CLS) tokens to compute and mix normalization statistics of tokens corresponding to different image regions. The proposed method is flexible to the choice of backbone model and can be easily applied to any ViT-based architecture with a negligible increase in computational complexity. Comprehensive experiments show that our approach is able to achieve state-of-the-art performance on five challenging benchmarks for domain generalization, and demonstrate its ability to deal with different types of domain shifts. The implementation is available at: https://github.com/Mehrdad-Noori/TFS-ViT_Token-level_Feature_Stylization.
△ Less
Submitted 16 March, 2024; v1 submitted 27 March, 2023;
originally announced March 2023.
-
TTTFlow: Unsupervised Test-Time Training with Normalizing Flow
Authors:
David Osowiechi,
Gustavo A. Vargas Hakim,
Mehrdad Noori,
Milad Cheraghalikhani,
Ismail Ben Ayed,
Christian Desrosiers
Abstract:
A major problem of deep neural networks for image classification is their vulnerability to domain changes at test-time. Recent methods have proposed to address this problem with test-time training (TTT), where a two-branch model is trained to learn a main classification task and also a self-supervised task used to perform test-time adaptation. However, these techniques require defining a proxy tas…
▽ More
A major problem of deep neural networks for image classification is their vulnerability to domain changes at test-time. Recent methods have proposed to address this problem with test-time training (TTT), where a two-branch model is trained to learn a main classification task and also a self-supervised task used to perform test-time adaptation. However, these techniques require defining a proxy task specific to the target application. To tackle this limitation, we propose TTTFlow: a Y-shaped architecture using an unsupervised head based on Normalizing Flows to learn the normal distribution of latent features and detect domain shifts in test examples. At inference, kee** the unsupervised head fixed, we adapt the model to domain-shifted examples by maximizing the log likelihood of the Normalizing Flow. Our results show that our method can significantly improve the accuracy with respect to previous works.
△ Less
Submitted 20 October, 2022;
originally announced October 2022.
-
Zero-Shot Open-Book Question Answering
Authors:
Sia Gholami,
Mehdi Noori
Abstract:
Open book question answering is a subset of question answering tasks where the system aims to find answers in a given set of documents (open-book) and common knowledge about a topic. This article proposes a solution for answering natural language questions from a corpus of Amazon Web Services (AWS) technical documents with no domain-specific labeled data (zero-shot). These questions can have yes-n…
▽ More
Open book question answering is a subset of question answering tasks where the system aims to find answers in a given set of documents (open-book) and common knowledge about a topic. This article proposes a solution for answering natural language questions from a corpus of Amazon Web Services (AWS) technical documents with no domain-specific labeled data (zero-shot). These questions can have yes-no-none answers, short answers, long answers, or any combination of the above. This solution comprises a two-step architecture in which a retriever finds the right document and an extractor finds the answers in the retrieved document. We are introducing a new test dataset for open-book QA based on real customer questions on AWS technical documentation. After experimenting with several information retrieval systems and extractor models based on extractive language models, the solution attempts to find the yes-no-none answers and text answers in the same pass. The model is trained on the The Stanford Question Answering Dataset - SQuAD (Rajpurkaret al., 2016) and Natural Questions (Kwiatkowski et al., 2019) datasets. We were able to achieve 49% F1 and 39% exact match score (EM) end-to-end with no domain-specific training.
△ Less
Submitted 22 November, 2021;
originally announced November 2021.
-
Influence of image noise on crack detection performance of deep convolutional neural networks
Authors:
Riccardo Chianese,
Andy Nguyen,
Vahidreza Gharehbaghi,
Thiru Aravinthan,
Mohammad Noori
Abstract:
Development of deep learning techniques to analyse image data is an expansive and emerging field. The benefits of tracking, identifying, measuring, and sorting features of interest from image data has endless applications for saving cost, time, and improving safety. Much research has been conducted on classifying cracks from image data using deep convolutional neural networks; however, minimal res…
▽ More
Development of deep learning techniques to analyse image data is an expansive and emerging field. The benefits of tracking, identifying, measuring, and sorting features of interest from image data has endless applications for saving cost, time, and improving safety. Much research has been conducted on classifying cracks from image data using deep convolutional neural networks; however, minimal research has been conducted to study the efficacy of network performance when noisy images are used. This paper will address the problem and is dedicated to investigating the influence of image noise on network accuracy. The methods used incorporate a benchmark image data set, which is purposely deteriorated with two types of noise, followed by treatment with image enhancement pre-processing techniques. These images, including their native counterparts, are then used to train and validate two different networks to study the differences in accuracy and performance. Results from this research reveal that noisy images have a moderate to high impact on the network's capability to accurately classify images despite the application of image pre-processing. A new index has been developed for finding the most efficient method for classification in terms of computation timing and accuracy. Consequently, AlexNet was selected as the most efficient model based on the proposed index.
△ Less
Submitted 3 November, 2021;
originally announced November 2021.
-
Fast Federated Learning by Balancing Communication Trade-Offs
Authors:
Milad Khademi Nori,
Sangseok Yun,
Il-Min Kim
Abstract:
Federated Learning (FL) has recently received a lot of attention for large-scale privacy-preserving machine learning. However, high communication overheads due to frequent gradient transmissions decelerate FL. To mitigate the communication overheads, two main techniques have been studied: (i) local update of weights characterizing the trade-off between communication and computation and (ii) gradie…
▽ More
Federated Learning (FL) has recently received a lot of attention for large-scale privacy-preserving machine learning. However, high communication overheads due to frequent gradient transmissions decelerate FL. To mitigate the communication overheads, two main techniques have been studied: (i) local update of weights characterizing the trade-off between communication and computation and (ii) gradient compression characterizing the trade-off between communication and precision. To the best of our knowledge, studying and balancing those two trade-offs jointly and dynamically while considering their impacts on convergence has remained unresolved even though it promises significantly faster FL. In this paper, we first formulate our problem to minimize learning error with respect to two variables: local update coefficients and sparsity budgets of gradient compression who characterize trade-offs between communication and computation/precision, respectively. We then derive an upper bound of the learning error in a given wall-clock time considering the interdependency between the two variables. Based on this theoretical analysis, we propose an enhanced FL scheme, namely Fast FL (FFL), that jointly and dynamically adjusts the two variables to minimize the learning error. We demonstrate that FFL consistently achieves higher accuracies faster than similar schemes existing in the literature.
△ Less
Submitted 23 May, 2021;
originally announced May 2021.
-
Distributed Storage Allocations for Optimal Service Rates
Authors:
Pei Peng,
Moslem Noori,
Emina Soljanin
Abstract:
Redundant storage maintains the performance of distributed systems under various forms of uncertainty. This paper considers the uncertainty in node access and download service. We consider two access models under two download service models. In one access model, a user can access each node with a fixed probability, and in the other, a user can access a random fixed-size subset of nodes. We conside…
▽ More
Redundant storage maintains the performance of distributed systems under various forms of uncertainty. This paper considers the uncertainty in node access and download service. We consider two access models under two download service models. In one access model, a user can access each node with a fixed probability, and in the other, a user can access a random fixed-size subset of nodes. We consider two download service models. In the first (small file) model, the randomness associated with the file size is negligible. In the second (large file) model, randomness is associated with both the file size and the system's operations. We focus on the service rate of the system. For a fixed redundancy level, the systems' service rate is determined by the allocation of coded chunks over the storage nodes. We consider quasi-uniform allocations, where coded content is uniformly spread among a subset of nodes. The question we address asks what the size of this subset (spreading) should be. We show that in the small file model, concentrating the coded content to a minimum-size subset is universally optimal. For the large file model, the optimal spreading depends on the system parameters. These conclusions hold for both access models.
△ Less
Submitted 5 August, 2021; v1 submitted 8 February, 2021;
originally announced February 2021.
-
Quantum Multiple Kernel Learning
Authors:
Seyed Shakib Vedaie,
Moslem Noori,
Jaspreet S. Oberoi,
Barry C. Sanders,
Ehsan Zahedinejad
Abstract:
Kernel methods play an important role in machine learning applications due to their conceptual simplicity and superior performance on numerous machine learning tasks. Expressivity of a machine learning model, referring to the ability of the model to approximate complex functions, has a significant influence on its performance in these tasks. One approach to enhancing the expressivity of kernel mac…
▽ More
Kernel methods play an important role in machine learning applications due to their conceptual simplicity and superior performance on numerous machine learning tasks. Expressivity of a machine learning model, referring to the ability of the model to approximate complex functions, has a significant influence on its performance in these tasks. One approach to enhancing the expressivity of kernel machines is to combine multiple individual kernels to arrive at a more expressive combined kernel. This approach is referred to as multiple kernel learning (MKL). In this work, we propose an MKL method we refer to as quantum MKL, which combines multiple quantum kernels. Our method leverages the power of deterministic quantum computing with one qubit (DQC1) to estimate the combined kernel for a set of classically intractable individual quantum kernels. The combined kernel estimation is achieved without explicitly computing each individual kernel, while still allowing for the tuning of individual kernels in order to achieve better expressivity. Our simulations on two binary classification problems---one performed on a synthetic dataset and the other on a German credit dataset---demonstrate the superiority of the quantum MKL method over single quantum kernel machines.
△ Less
Submitted 19 November, 2020;
originally announced November 2020.
-
Attention-Guided Version of 2D UNet for Automatic Brain Tumor Segmentation
Authors:
Mehrdad Noori,
Ali Bahri,
Karim Mohammadi
Abstract:
Gliomas are the most common and aggressive among brain tumors, which cause a short life expectancy in their highest grade. Therefore, treatment assessment is a key stage to enhance the quality of the patients' lives. Recently, deep convolutional neural networks (DCNNs) have achieved a remarkable performance in brain tumor segmentation, but this task is still difficult owing to high varying intensi…
▽ More
Gliomas are the most common and aggressive among brain tumors, which cause a short life expectancy in their highest grade. Therefore, treatment assessment is a key stage to enhance the quality of the patients' lives. Recently, deep convolutional neural networks (DCNNs) have achieved a remarkable performance in brain tumor segmentation, but this task is still difficult owing to high varying intensity and appearance of gliomas. Most of the existing methods, especially UNet-based networks, integrate low-level and high-level features in a naive way, which may result in confusion for the model. Moreover, most approaches employ 3D architectures to benefit from 3D contextual information of input images. These architectures contain more parameters and computational complexity than 2D architectures. On the other hand, using 2D models causes not to benefit from 3D contextual information of input images. In order to address the mentioned issues, we design a low-parameter network based on 2D UNet in which we employ two techniques. The first technique is an attention mechanism, which is adopted after concatenation of low-level and high-level features. This technique prevents confusion for the model by weighting each of the channels adaptively. The second technique is the Multi-View Fusion. By adopting this technique, we can benefit from 3D contextual information of input images despite using a 2D model. Experimental results demonstrate that our method performs favorably against 2017 and 2018 state-of-the-art methods.
△ Less
Submitted 4 April, 2020;
originally announced April 2020.
-
DFNet: Discriminative feature extraction and integration network for salient object detection
Authors:
Mehrdad Noori,
Sina Mohammadi,
Sina Ghofrani Majelan,
Ali Bahri,
Mohammad Havaei
Abstract:
Despite the powerful feature extraction capability of Convolutional Neural Networks, there are still some challenges in saliency detection. In this paper, we focus on two aspects of challenges: i) Since salient objects appear in various sizes, using single-scale convolution would not capture the right size. Moreover, using multi-scale convolutions without considering their importance may confuse t…
▽ More
Despite the powerful feature extraction capability of Convolutional Neural Networks, there are still some challenges in saliency detection. In this paper, we focus on two aspects of challenges: i) Since salient objects appear in various sizes, using single-scale convolution would not capture the right size. Moreover, using multi-scale convolutions without considering their importance may confuse the model. ii) Employing multi-level features helps the model use both local and global context. However, treating all features equally results in information redundancy. Therefore, there needs to be a mechanism to intelligently select which features in different levels are useful. To address the first challenge, we propose a Multi-scale Attention Guided Module. This module not only extracts multi-scale features effectively but also gives more attention to more discriminative feature maps corresponding to the scale of the salient object. To address the second challenge, we propose an Attention-based Multi-level Integrator Module to give the model the ability to assign different weights to multi-level feature maps. Furthermore, our Sharpening Loss function guides our network to output saliency maps with higher certainty and less blurry salient objects, and it has far better performance than the Cross-entropy loss. For the first time, we adopt four different backbones to show the generalization of our method. Experiments on five challenging datasets prove that our method achieves the state-of-the-art performance. Our approach is fast as well and can run at a real-time speed.
△ Less
Submitted 3 April, 2020;
originally announced April 2020.
-
CAGNet: Content-Aware Guidance for Salient Object Detection
Authors:
Sina Mohammadi,
Mehrdad Noori,
Ali Bahri,
Sina Ghofrani Majelan,
Mohammad Havaei
Abstract:
Beneficial from Fully Convolutional Neural Networks (FCNs), saliency detection methods have achieved promising results. However, it is still challenging to learn effective features for detecting salient objects in complicated scenarios, in which i) non-salient regions may have "salient-like" appearance; ii) the salient objects may have different-looking regions. To handle these complex scenarios,…
▽ More
Beneficial from Fully Convolutional Neural Networks (FCNs), saliency detection methods have achieved promising results. However, it is still challenging to learn effective features for detecting salient objects in complicated scenarios, in which i) non-salient regions may have "salient-like" appearance; ii) the salient objects may have different-looking regions. To handle these complex scenarios, we propose a Feature Guide Network which exploits the nature of low-level and high-level features to i) make foreground and background regions more distinct and suppress the non-salient regions which have "salient-like" appearance; ii) assign foreground label to different-looking salient regions. Furthermore, we utilize a Multi-scale Feature Extraction Module (MFEM) for each level of abstraction to obtain multi-scale contextual information. Finally, we design a loss function which outperforms the widely-used Cross-entropy loss. By adopting four different pre-trained models as the backbone, we prove that our method is very general with respect to the choice of the backbone model. Experiments on five challenging datasets demonstrate that our method achieves the state-of-the-art performance in terms of different evaluation metrics. Additionally, our approach contains fewer parameters than the existing ones, does not need any post-processing, and runs fast at a real-time speed of 28 FPS when processing a 480 x 480 image.
△ Less
Submitted 4 April, 2020; v1 submitted 29 November, 2019;
originally announced November 2019.
-
Storage Allocation for Multi-Class Distributed Data Storage Systems
Authors:
Koosha Pourtahmasi Roshandeh,
Moslem Noori,
Masoud Ardakani,
Chintha Tellambura
Abstract:
Distributed storage systems (DSSs) provide a scalable solution for reliably storing massive amounts of data coming from various sources. Heterogeneity of these data sources often means different data classes (types) exist in a DSS, each needing a different level of quality of service (QoS). As a result, efficient data storage and retrieval processes that satisfy various QoS requirements are needed…
▽ More
Distributed storage systems (DSSs) provide a scalable solution for reliably storing massive amounts of data coming from various sources. Heterogeneity of these data sources often means different data classes (types) exist in a DSS, each needing a different level of quality of service (QoS). As a result, efficient data storage and retrieval processes that satisfy various QoS requirements are needed. This paper studies storage allocation, meaning how data of different classes must be spread over the set of storage nodes of a DSS. More specifically, assuming a probabilistic access to the storage nodes, we aim at maximizing the weighted sum of the probability of successful data recovery of data classes, when for each class a minimum QoS (probability of successful recovery) is guaranteed. Solving this optimization problem for a general setup is intractable. Thus, we find the optimal storage allocation when the data of each class is spread minimally over the storage nodes, i.e. minimal spreading allocation (MSA). Using upper bounds on the performance of the optimal storage allocation, we show that the optimal MSA allocation approaches the optimal performance in many practical cases. Computer simulations are also presented to better illustrate the results.
△ Less
Submitted 23 January, 2017;
originally announced January 2017.
-
Maximizing Data Rate for Multiway Relay Channels with Pairwise Transmission Strategy
Authors:
Reza Rafie Borujeny,
Moslem Noori,
Masoud Ardakani
Abstract:
In a multiway relay channel (MWRC), pairwise transmission strategy can be used to reduce the computational complexity at the relay and the users without sacrificing the data rate, significantly. The performance of such pairwise strategies, however, is affected by the way that the users are paired to transmit. In this paper, we study the effect of pairing on the common rate and sum rate of an MWRC…
▽ More
In a multiway relay channel (MWRC), pairwise transmission strategy can be used to reduce the computational complexity at the relay and the users without sacrificing the data rate, significantly. The performance of such pairwise strategies, however, is affected by the way that the users are paired to transmit. In this paper, we study the effect of pairing on the common rate and sum rate of an MWRC with functional-decode-forward (FDF) relaying strategy where users experience asymmetric channel conditions. To this end, we first develop a graphical model for an MWRC with pairwise transmission strategy. Using this model, we then find the maximum achievable common rate and sum rate as well as the user pairings that achieve these rates. This marks the ultimate performance of FDF relaying in an MWRC setup. Further, we show that the rate enhancement achieved through the optimal user pairing becomes less pronounced at higher SNRs. Using computer simulations, the performance of the optimal pairing is compared with those of other proposed pairings in the literature.
△ Less
Submitted 29 August, 2016;
originally announced August 2016.
-
On the Capacity Region of ALOHA Protocol for the Internet of Things
Authors:
Moslem Noori,
Samira Rahimian,
Masoud Ardakani
Abstract:
Accommodating the needs of a large number of diverse users in the Internet of Things (IoT), notably managing how the users access the common channel, has posed unique challenges to the network designers. In this paper, we study a heterogeneous IoT network consisting of multiple classes of users who may have different service requirements. For this network, we consider the application of irregular…
▽ More
Accommodating the needs of a large number of diverse users in the Internet of Things (IoT), notably managing how the users access the common channel, has posed unique challenges to the network designers. In this paper, we study a heterogeneous IoT network consisting of multiple classes of users who may have different service requirements. For this network, we consider the application of irregular repetition slotted ALOHA (IRSA) that is shown to offer large throughput for single-class networks. Then, we focus on finding the network performance boundaries by studying the set of feasible throughput values for each class, called the capacity region. To this end, we first introduce the concept of dual network of a multi-class network meaning a homogeneous network with the same number of users. We then prove that finding the capacity region of the assumed multi-class network boils down to finding the maximum achievable throughput of its dual network. Using this finding, we then discuss how any given point of the capacity region can be achieved. Further, a delay performance study is conducted to evaluate the average and maximum packet transmission delay experienced by the users of each class.
△ Less
Submitted 27 May, 2016;
originally announced May 2016.
-
On Storage Allocation for Maximum Service Rate in Distributed Storage Systems
Authors:
Moslem Noori,
Emina Soljanin,
Masoud Ardakani
Abstract:
Storage allocation affects important performance measures of distributed storage systems. Most previous studies on the storage allocation consider its effect separately either on the success of the data recovery or on the service rate (time) where it is assumed that no access failure happens in the system. In this paper, we go one step further and incorporate the access model and the success of da…
▽ More
Storage allocation affects important performance measures of distributed storage systems. Most previous studies on the storage allocation consider its effect separately either on the success of the data recovery or on the service rate (time) where it is assumed that no access failure happens in the system. In this paper, we go one step further and incorporate the access model and the success of data recovery into the service rate analysis. In particular, we focus on quasi-uniform storage allocation and provide a service rate analysis for both fixed-size and probabilistic access models at the nodes. Using this analysis, we then show that for the case of exponential waiting time distribution at individuals storage nodes, minimal spreading allocation results in the highest system service rate for both access models. This means that for a given storage budget, replication provides a better service rate than a coded storage solution.
△ Less
Submitted 11 May, 2016;
originally announced May 2016.
-
On the Achievable Rates of Pairwise Multiway Relay Channels
Authors:
Reza Rafie Borujeny,
Moslem Noori,
Masoud Ardakani
Abstract:
In this paper, we study the effect of users' transmission ordering on the common rate and sum rate of pairwise multiway relay channels (MWRCs) with functional-decode-forward strategy. To this end, we first develop a graphical model for the data transmission in a pairwise MWRC. Using this model, we then find the optimal orderings that achieve the maximum common rate and sum rate of the system. The…
▽ More
In this paper, we study the effect of users' transmission ordering on the common rate and sum rate of pairwise multiway relay channels (MWRCs) with functional-decode-forward strategy. To this end, we first develop a graphical model for the data transmission in a pairwise MWRC. Using this model, we then find the optimal orderings that achieve the maximum common rate and sum rate of the system. The achieved maximum common and sum rate are also found. Moreover, we show that the performance gap between optimal orderings and a random ordering vanishes when SNR increases. Computer simulations are presented for better illustration of the results.
△ Less
Submitted 18 June, 2014;
originally announced June 2014.
-
Low-Latency Data Sharing in Erasure Multi-Way Relay Channels
Authors:
Moslem Noori,
Hossein Bagheri,
Masoud Ardakani
Abstract:
We consider an erasure multi-way relay channel (EMWRC) in which several users share their data through a relay over erasure links. Assuming no feedback channel between the users and the relay, we first identify the challenges for designing a data sharing scheme over an EMWRC. Then, to overcome these challenges, we propose practical low-latency and low-complexity data sharing schemes based on fount…
▽ More
We consider an erasure multi-way relay channel (EMWRC) in which several users share their data through a relay over erasure links. Assuming no feedback channel between the users and the relay, we first identify the challenges for designing a data sharing scheme over an EMWRC. Then, to overcome these challenges, we propose practical low-latency and low-complexity data sharing schemes based on fountain coding. Later, we introduce the notion of end-to-end erasure rate (EEER) and analytically derive it for the proposed schemes. EEER is then used to calculate the achievable rate and transmission overhead of the proposed schemes. Using EEER and computer simulations, the achievable rates and transmission overhead of our proposed schemes are compared with the ones of one-way relaying. This comparison implies that when the number of users and the channel erasure rates are not large, our proposed schemes outperform one-way relaying. We also find an upper bound on the achievable rates of EMWRC and observe that depending on the number of users and channel erasure rates, our proposed solutions can perform very close to this bound.
△ Less
Submitted 30 July, 2013; v1 submitted 5 November, 2012;
originally announced November 2012.
-
A Probability Model for Lifetime of Wireless Sensor Networks
Authors:
Moslem Noori,
Masoud Ardakani
Abstract:
Considering a wireless sensor network whose nodes are distributed randomly over a given area, a probability model for the network lifetime is provided. Using this model and assuming that packet generation follows a Poisson distribution, an analytical expression for the complementary cumulative density function (ccdf) of the lifetime is obtained. Using this ccdf, one can accurately find the proba…
▽ More
Considering a wireless sensor network whose nodes are distributed randomly over a given area, a probability model for the network lifetime is provided. Using this model and assuming that packet generation follows a Poisson distribution, an analytical expression for the complementary cumulative density function (ccdf) of the lifetime is obtained. Using this ccdf, one can accurately find the probability that the network achieves a given lifetime. It is also shown that when the number of sensors, $N$, is large, with an error exponentially decaying with $N$, one can predict whether or not a certain lifetime can be achieved. The results of this work are obtained for both multi-hop and single-hop wireless sensor networks and are verified with computer simulation. The approaches of this paper are shown to be applicable to other packet generation models and the effect of the area shape is also investigated.
△ Less
Submitted 28 September, 2007;
originally announced October 2007.