-
Deep learning powered real-time identification of insects using citizen science data
Authors:
Shivani Chiranjeevi,
Mojdeh Sadaati,
Zi K Deng,
Jayanth Koushik,
Talukder Z Jubery,
Daren Mueller,
Matthew E O Neal,
Nirav Merchant,
Aarti Singh,
Asheesh K Singh,
Soumik Sarkar,
Arti Singh,
Baskar Ganapathysubramanian
Abstract:
Insect-pests significantly impact global agricultural productivity and quality. Effective management involves identifying the full insect community, including beneficial insects and harmful pests, to develop and implement integrated pest management strategies. Automated identification of insects under real-world conditions presents several challenges, including differentiating similar-looking spec…
▽ More
Insect-pests significantly impact global agricultural productivity and quality. Effective management involves identifying the full insect community, including beneficial insects and harmful pests, to develop and implement integrated pest management strategies. Automated identification of insects under real-world conditions presents several challenges, including differentiating similar-looking species, intra-species dissimilarity and inter-species similarity, several life cycle stages, camouflage, diverse imaging conditions, and variability in insect orientation. A deep-learning model, InsectNet, is proposed to address these challenges. InsectNet is endowed with five key features: (a) utilization of a large dataset of insect images collected through citizen science; (b) label-free self-supervised learning for large models; (c) improving prediction accuracy for species with a small sample size; (d) enhancing model trustworthiness; and (e) democratizing access through streamlined MLOps. This approach allows accurate identification (>96% accuracy) of over 2500 insect species, including pollinator (e.g., butterflies, bees), parasitoid (e.g., some wasps and flies), predator species (e.g., lady beetles, mantises, dragonflies) and harmful pest species (e.g., armyworms, cutworms, grasshoppers, stink bugs). InsectNet can identify invasive species, provide fine-grained insect species identification, and work effectively in challenging backgrounds. It also can abstain from making predictions when uncertain, facilitating seamless human intervention and making it a practical and trustworthy tool. InsectNet can guide citizen science data collection, especially for invasive species where early detection is crucial. Similar approaches may transform other agricultural challenges like disease detection and underscore the importance of data collection, particularly through citizen science efforts..
△ Less
Submitted 4 June, 2023;
originally announced June 2023.
-
Out-of-distribution detection algorithms for robust insect classification
Authors:
Mojdeh Saadati,
Aditya Balu,
Shivani Chiranjeevi,
Talukder Zaki Jubery,
Asheesh K Singh,
Soumik Sarkar,
Arti Singh,
Baskar Ganapathysubramanian
Abstract:
Deep learning-based approaches have produced models with good insect classification accuracy; Most of these models are conducive for application in controlled environmental conditions. One of the primary emphasis of researchers is to implement identification and classification models in the real agriculture fields, which is challenging because input images that are wildly out of the distribution (…
▽ More
Deep learning-based approaches have produced models with good insect classification accuracy; Most of these models are conducive for application in controlled environmental conditions. One of the primary emphasis of researchers is to implement identification and classification models in the real agriculture fields, which is challenging because input images that are wildly out of the distribution (e.g., images like vehicles, animals, humans, or a blurred image of an insect or insect class that is not yet trained on) can produce an incorrect insect classification. Out-of-distribution (OOD) detection algorithms provide an exciting avenue to overcome these challenge as it ensures that a model abstains from making incorrect classification prediction of non-insect and/or untrained insect class images. We generate and evaluate the performance of state-of-the-art OOD algorithms on insect detection classifiers. These algorithms represent a diversity of methods for addressing an OOD problem. Specifically, we focus on extrusive algorithms, i.e., algorithms that wrap around a well-trained classifier without the need for additional co-training. We compared three OOD detection algorithms: (i) Maximum Softmax Probability, which uses the softmax value as a confidence score, (ii) Mahalanobis distance-based algorithm, which uses a generative classification approach; and (iii) Energy-Based algorithm that maps the input data to a scalar value, called energy. We performed an extensive series of evaluations of these OOD algorithms across three performance axes: (a) \textit{Base model accuracy}: How does the accuracy of the classifier impact OOD performance? (b) How does the \textit{level of dissimilarity to the domain} impact OOD performance? and (c) \textit{Data imbalance}: How sensitive is OOD performance to the imbalance in per-class sample size?
△ Less
Submitted 2 May, 2023;
originally announced May 2023.
-
RPoA: Redefined Proof of Activity
Authors:
Sina Kamali,
Shayan Shabihi,
Mohammad Taha Fakharian,
Alireza Arbabi,
Pouriya Tajmehrabi,
Mohammad Saadati,
Behnam Bahrak
Abstract:
The consensus protocol is the core of a blockchain system which guarantees its secure and stable operation. Proof of Activity (PoA) is a consensus protocol that tries to address some of the issues pertinent to the most widely used protocols, such as Proof of Stake (PoS) and Proof of Work (PoW). However, it still needs to solve the issues regarding high energy consumption, significant resources req…
▽ More
The consensus protocol is the core of a blockchain system which guarantees its secure and stable operation. Proof of Activity (PoA) is a consensus protocol that tries to address some of the issues pertinent to the most widely used protocols, such as Proof of Stake (PoS) and Proof of Work (PoW). However, it still needs to solve the issues regarding high energy consumption, significant resources required, high mining latency, and the need for private blockchains. In this paper, we propose Redefined Proof of Activity (RPoA), a new consensus protocol that builds on top of some of the best features of the existing protocols, such as PoW, PoS, and PoA, and values active service provided by users on the network. Our approach tries to address the issues above and falls in the service-based protocols category that gives mining credit to users as they serve on the network.
△ Less
Submitted 29 November, 2022; v1 submitted 17 October, 2022;
originally announced October 2022.
-
Machine Learning Application in Health
Authors:
Ghadah Alshabana,
Marjn Sadati,
Thao Tran,
Michael Thompson,
Ashritha Chitimalla
Abstract:
Coronavirus can be transmitted through the air by close proximity to infected persons. Commercial aircraft are a likely way to both transmit the virus among passengers and move the virus between locations. The importance of learning about where and how coronavirus has entered the United States will help further our understanding of the disease. Air travelers can come from countries or areas with a…
▽ More
Coronavirus can be transmitted through the air by close proximity to infected persons. Commercial aircraft are a likely way to both transmit the virus among passengers and move the virus between locations. The importance of learning about where and how coronavirus has entered the United States will help further our understanding of the disease. Air travelers can come from countries or areas with a high rate of infection and may very well be at risk of being exposed to the virus. Therefore, as they reach the United States, the virus could easily spread. On our analysis, we utilized machine learning to determine if the number of flights into the Washington DC Metro Area had an effect on the number of cases and deaths reported in the city and surrounding area.
△ Less
Submitted 9 June, 2022;
originally announced July 2022.
-
FitAct: Error Resilient Deep Neural Networks via Fine-Grained Post-Trainable Activation Functions
Authors:
Behnam Ghavami,
Mani Sadati,
Zhenman Fang,
Lesley Shannon
Abstract:
Deep neural networks (DNNs) are increasingly being deployed in safety-critical systems such as personal healthcare devices and self-driving cars. In such DNN-based systems, error resilience is a top priority since faults in DNN inference could lead to mispredictions and safety hazards. For latency-critical DNN inference on resource-constrained edge devices, it is nontrivial to apply conventional r…
▽ More
Deep neural networks (DNNs) are increasingly being deployed in safety-critical systems such as personal healthcare devices and self-driving cars. In such DNN-based systems, error resilience is a top priority since faults in DNN inference could lead to mispredictions and safety hazards. For latency-critical DNN inference on resource-constrained edge devices, it is nontrivial to apply conventional redundancy-based fault tolerance techniques. In this paper, we propose FitAct, a low-cost approach to enhance the error resilience of DNNs by deploying fine-grained post-trainable activation functions. The main idea is to precisely bound the activation value of each individual neuron via neuron-wise bounded activation functions so that it could prevent fault propagation in the network. To avoid complex DNN model re-training, we propose to decouple the accuracy training and resilience training and develop a lightweight post-training phase to learn these activation functions with precise bound values. Experimental results on widely used DNN models such as AlexNet, VGG16, and ResNet50 demonstrate that FitAct outperforms state-of-the-art studies such as Clip-Act and Ranger in enhancing the DNN error resilience for a wide range of fault rates while adding manageable runtime and memory space overheads.
△ Less
Submitted 27 December, 2021;
originally announced December 2021.
-
BDFA: A Blind Data Adversarial Bit-flip Attack on Deep Neural Networks
Authors:
Behnam Ghavami,
Mani Sadati,
Mohammad Shahidzadeh,
Zhenman Fang,
Lesley Shannon
Abstract:
Adversarial bit-flip attack (BFA) on Neural Network weights can result in catastrophic accuracy degradation by flip** a very small number of bits. A major drawback of prior bit flip attack techniques is their reliance on test data. This is frequently not possible for applications that contain sensitive or proprietary data. In this paper, we propose Blind Data Adversarial Bit-flip Attack (BDFA),…
▽ More
Adversarial bit-flip attack (BFA) on Neural Network weights can result in catastrophic accuracy degradation by flip** a very small number of bits. A major drawback of prior bit flip attack techniques is their reliance on test data. This is frequently not possible for applications that contain sensitive or proprietary data. In this paper, we propose Blind Data Adversarial Bit-flip Attack (BDFA), a novel technique to enable BFA without any access to the training or testing data. This is achieved by optimizing for a synthetic dataset, which is engineered to match the statistics of batch normalization across different layers of the network and the targeted label. Experimental results show that BDFA could decrease the accuracy of ResNet50 significantly from 75.96\% to 13.94\% with only 4 bits flips.
△ Less
Submitted 6 January, 2022; v1 submitted 6 December, 2021;
originally announced December 2021.
-
A Method to use Nonlinear Dynamics in a Whisker Sensor for Terrain Identification by Mobile Robots
Authors:
Zhenhua Yu,
S. M. Hadi Sadati,
Hasitha Wegiriya,
Peter Childs,
Thrishantha Nanayakkara
Abstract:
This paper shows analytical and experimental evidence of using the vibration dynamics of a compliant whisker for accurate terrain classification during steady state motion of a mobile robot. A Hall effect sensor was used to measure whisker vibrations due to perturbations from the ground. Analytical results predict that the whisker vibrations will have a dominant frequency at the vertical perturbat…
▽ More
This paper shows analytical and experimental evidence of using the vibration dynamics of a compliant whisker for accurate terrain classification during steady state motion of a mobile robot. A Hall effect sensor was used to measure whisker vibrations due to perturbations from the ground. Analytical results predict that the whisker vibrations will have a dominant frequency at the vertical perturbation frequency of the mobile robot sandwiched by two other less dominant but distinct frequency components. These frequency components may come from bifurcation of vibration frequency due to nonlinear interaction dynamics at steady state. Experimental results also exhibit distinct dominant frequency components unique to the speed of the robot and the terrain roughness. This nonlinear dynamic feature is used in a deep multi-layer perceptron neural network to classify terrains. We achieved 85.6\% prediction success rate for seven flat terrain surfaces with different textures.
△ Less
Submitted 4 August, 2021;
originally announced August 2021.
-
An Enterprise Architecture Framework for E-learning
Authors:
Abbas Najafizadeh,
Maryam Saadati,
S. Mahdi Jamei,
S. Shervin Ostadzadeh
Abstract:
With a trend toward becoming more and more information and communication based, learning services and processes were also evolved. E-learning comprises all forms of electronically supported learning and teaching. The information and communication systems serve as a fundamental role to implement these learning processes. In the typical information-driven organizations, the E-learning is part of a m…
▽ More
With a trend toward becoming more and more information and communication based, learning services and processes were also evolved. E-learning comprises all forms of electronically supported learning and teaching. The information and communication systems serve as a fundamental role to implement these learning processes. In the typical information-driven organizations, the E-learning is part of a much larger platform for applications and data that extends across the Internet and intranet/extranet. In this respect, E-learning has brought about an inevitable tendency to lunge towards organizing their information based activities in a comprehensive way. Building an Enterprise Architecture (EA) undoubtedly serves as a fundamental concept to accomplish this goal. In this paper, we propose an EA for E-learning information systems. The presented framework helps developers to design and justify completely integrated learning and teaching processes and information systems which results in improved pedagogical success rate.
△ Less
Submitted 7 May, 2021;
originally announced May 2021.
-
Movie Recommender Systems: Implementation and Performance Evaluation
Authors:
Mojdeh Saadati,
Syed Shihab,
Mohammed Shaiqur Rahman
Abstract:
Over the years, explosive growth in the number of items in the catalog of e-commerce businesses, such as Amazon, Netflix, Pandora, etc., have warranted the development of recommender systems to guide consumers towards their desired products based on their preferences and tastes. Some of the popular approaches for building recommender systems, for mining user, derived input datasets, are: content-b…
▽ More
Over the years, explosive growth in the number of items in the catalog of e-commerce businesses, such as Amazon, Netflix, Pandora, etc., have warranted the development of recommender systems to guide consumers towards their desired products based on their preferences and tastes. Some of the popular approaches for building recommender systems, for mining user, derived input datasets, are: content-based systems, collaborative filtering, latent-factor systems using Singular Value Decomposition (SVD), and Restricted Boltzmann Machines (RBM). In this project, user-user collaborative filtering, item-item collaborative filtering, content-based recommendation, SVD, and neural networks were chosen for implementation in Python to predict the user ratings of unwatched movies for each user, and their performances were evaluated and compared.
△ Less
Submitted 15 September, 2019;
originally announced September 2019.
-
Adjustment Criteria for Recovering Causal Effects from Missing Data
Authors:
Mojdeh Saadati,
** Tian
Abstract:
Confounding bias, missing data, and selection bias are three common obstacles to valid causal inference in the data sciences. Covariate adjustment is the most pervasive technique for recovering casual effects from confounding bias. In this paper, we introduce a covariate adjustment formulation for controlling confounding bias in the presence of missing-not-at-random data and develop a necessary an…
▽ More
Confounding bias, missing data, and selection bias are three common obstacles to valid causal inference in the data sciences. Covariate adjustment is the most pervasive technique for recovering casual effects from confounding bias. In this paper, we introduce a covariate adjustment formulation for controlling confounding bias in the presence of missing-not-at-random data and develop a necessary and sufficient condition for recovering causal effects using the adjustment. We also introduce an adjustment formulation for controlling both confounding and selection biases in the presence of missing data and develop a necessary and sufficient condition for valid adjustment. Furthermore, we present an algorithm that lists all valid adjustment sets and an algorithm that finds a valid adjustment set containing the minimum number of variables, which are useful for researchers interested in selecting adjustment sets with desired properties.
△ Less
Submitted 15 September, 2019; v1 submitted 2 July, 2019;
originally announced July 2019.
-
The Application of Imperialist Competitive Algorithm for Fuzzy Random Portfolio Selection Problem
Authors:
Mir Ehsan Hesam Sadati,
Jamshid Bagherzadeh Mohasefi
Abstract:
This paper presents an implementation of the Imperialist Competitive Algorithm (ICA) for solving the fuzzy random portfolio selection problem where the asset returns are represented by fuzzy random variables. Portfolio Optimization is an important research field in modern finance. By using the necessity-based model, fuzzy random variables reformulate to the linear programming and ICA will be desig…
▽ More
This paper presents an implementation of the Imperialist Competitive Algorithm (ICA) for solving the fuzzy random portfolio selection problem where the asset returns are represented by fuzzy random variables. Portfolio Optimization is an important research field in modern finance. By using the necessity-based model, fuzzy random variables reformulate to the linear programming and ICA will be designed to find the optimum solution. To show the efficiency of the proposed method, a numerical example illustrates the whole idea on implementation of ICA for fuzzy random portfolio selection problem.
△ Less
Submitted 19 February, 2014;
originally announced February 2014.