-
Closed-form congestion control via deep symbolic regression
Authors:
Jean Martins,
Igor Almeida,
Ricardo Souza,
Silvia Lins
Abstract:
As mobile networks embrace the 5G era, the interest in adopting Reinforcement Learning (RL) algorithms to handle challenges in ultra-low-latency and high throughput scenarios increases. Simultaneously, the advent of packetized fronthaul networks imposes demanding requirements that traditional congestion control mechanisms cannot accomplish, highlighting the potential of RL-based congestion control…
▽ More
As mobile networks embrace the 5G era, the interest in adopting Reinforcement Learning (RL) algorithms to handle challenges in ultra-low-latency and high throughput scenarios increases. Simultaneously, the advent of packetized fronthaul networks imposes demanding requirements that traditional congestion control mechanisms cannot accomplish, highlighting the potential of RL-based congestion control algorithms. Although learning RL policies optimized for satisfying the stringent fronthaul requirements is feasible, the adoption of neural network models in real deployments still poses some challenges regarding real-time inference and interpretability. This paper proposes a methodology to deal with such challenges while maintaining the performance and generalization capabilities provided by a baseline RL policy. The method consists of (1) training a congestion control policy specialized in fronthaul-like networks via reinforcement learning, (2) collecting state-action experiences from the baseline, and (3) performing deep symbolic regression on the collected dataset. The proposed process overcomes the challenges related to inference-time limitations through closed-form expressions that approximate the baseline performance (link utilization, delay, and fairness) and which can be directly implemented in any programming language. Finally, we analyze the inner workings of the closed-form expressions.
△ Less
Submitted 28 March, 2024;
originally announced May 2024.
-
LR-FHSS-Sim: A Discrete-Event Simulator for LR-FHSS Networks
Authors:
Jean Michel de Souza Sant Ana,
Arliones Hoeller Jr.,
Hirley Alves,
Richard Demo Souza
Abstract:
This work presents the LR-FHSS-Sim, a free and open-source discrete-event simulator for LR-FHSS networks. We highlight the importance of network modeling for IoT coverage, especially when it is needed to capture dynamic network behaviors. Written in Python, we present the LR-FHSS-Sim main structure, procedures, and extensions. We discuss the importance of a modular code, which facilitates the crea…
▽ More
This work presents the LR-FHSS-Sim, a free and open-source discrete-event simulator for LR-FHSS networks. We highlight the importance of network modeling for IoT coverage, especially when it is needed to capture dynamic network behaviors. Written in Python, we present the LR-FHSS-Sim main structure, procedures, and extensions. We discuss the importance of a modular code, which facilitates the creation of algorithmic strategies and signal-processing techniques for LR-FHSS networks. Moreover, we showcase how to achieve results when considering different packet generation traffic patterns and with a previously published extension. Finally, we discuss our thoughts on future implementations and what can be achieved with them.
△ Less
Submitted 15 April, 2024;
originally announced April 2024.
-
Measuring Cross-lingual Transfer in Bytes
Authors:
Leandro Rodrigues de Souza,
Thales Sales Almeida,
Roberto Lotufo,
Rodrigo Nogueira
Abstract:
Multilingual pretraining has been a successful solution to the challenges posed by the lack of resources for languages. These models can transfer knowledge to target languages with minimal or no examples. Recent research suggests that monolingual models also have a similar capability, but the mechanisms behind this transfer remain unclear. Some studies have explored factors like language contamina…
▽ More
Multilingual pretraining has been a successful solution to the challenges posed by the lack of resources for languages. These models can transfer knowledge to target languages with minimal or no examples. Recent research suggests that monolingual models also have a similar capability, but the mechanisms behind this transfer remain unclear. Some studies have explored factors like language contamination and syntactic similarity. An emerging line of research suggests that the representations learned by language models contain two components: a language-specific and a language-agnostic component. The latter is responsible for transferring a more universal knowledge. However, there is a lack of comprehensive exploration of these properties across diverse target languages. To investigate this hypothesis, we conducted an experiment inspired by the work on the Scaling Laws for Transfer. We measured the amount of data transferred from a source language to a target language and found that models initialized from diverse languages perform similarly to a target language in a cross-lingual setting. This was surprising because the amount of data transferred to 10 diverse target languages, such as Spanish, Korean, and Finnish, was quite similar. We also found evidence that this transfer is not related to language contamination or language proximity, which strengthens the hypothesis that the model also relies on language-agnostic knowledge. Our experiments have opened up new possibilities for measuring how much data represents the language-agnostic representations learned during pretraining.
△ Less
Submitted 11 April, 2024;
originally announced April 2024.
-
PANDAS: Prototype-based Novel Class Discovery and Detection
Authors:
Tyler L. Hayes,
César R. de Souza,
Namil Kim,
Jiwon Kim,
Riccardo Volpi,
Diane Larlus
Abstract:
Object detectors are typically trained once and for all on a fixed set of classes. However, this closed-world assumption is unrealistic in practice, as new classes will inevitably emerge after the detector is deployed in the wild. In this work, we look at ways to extend a detector trained for a set of base classes so it can i) spot the presence of novel classes, and ii) automatically enrich its re…
▽ More
Object detectors are typically trained once and for all on a fixed set of classes. However, this closed-world assumption is unrealistic in practice, as new classes will inevitably emerge after the detector is deployed in the wild. In this work, we look at ways to extend a detector trained for a set of base classes so it can i) spot the presence of novel classes, and ii) automatically enrich its repertoire to be able to detect those newly discovered classes together with the base ones. We propose PANDAS, a method for novel class discovery and detection. It discovers clusters representing novel classes from unlabeled data, and represents old and new classes with prototypes. During inference, a distance-based classifier uses these prototypes to assign a label to each detected object instance. The simplicity of our method makes it widely applicable. We experimentally demonstrate the effectiveness of PANDAS on the VOC 2012 and COCO-to-LVIS benchmarks. It performs favorably against the state of the art for this task while being computationally more affordable.
△ Less
Submitted 30 April, 2024; v1 submitted 27 February, 2024;
originally announced February 2024.
-
Assessment of the Sparsity-Diversity Trade-offs in Active Users Detection for mMTC
Authors:
Gabriel Martins de Jesus,
Onel Luis Alcaraz Lopez,
Richard Demo Souza,
Nurul Huda Mahmood,
Markku Juntti,
Matti Latva-Aho
Abstract:
Wireless communication systems must increasingly support a multitude of machine-type communications (MTC) devices, thus calling for advanced strategies for active user detection (AUD). Recent literature has delved into AUD techniques based on compressed sensing, highlighting the critical role of signal sparsity. This study investigates the relationship between frequency diversity and signal sparsi…
▽ More
Wireless communication systems must increasingly support a multitude of machine-type communications (MTC) devices, thus calling for advanced strategies for active user detection (AUD). Recent literature has delved into AUD techniques based on compressed sensing, highlighting the critical role of signal sparsity. This study investigates the relationship between frequency diversity and signal sparsity in the AUD problem. Single-antenna users transmit multiple copies of non-orthogonal pilots across multiple frequency channels and the base station independently performs AUD in each channel using the orthogonal matching pursuit algorithm. We note that, although frequency diversity may improve the likelihood of successful reception of the signals, it may also damage the channel sparsity level, leading to important trade-offs. We show that a sparser signal significantly benefits AUD, surpassing the advantages brought by frequency diversity in scenarios with limited temporal resources and/or high numbers of receive antennas. Conversely, with longer pilots and fewer receive antennas, investing in frequency diversity becomes more impactful, resulting in a tenfold AUD performance improvement.
△ Less
Submitted 8 February, 2024;
originally announced February 2024.
-
On the Spectral Efficiency of Indoor Wireless Networks with a Rotary Uniform Linear Array
Authors:
Eduardo Noboro Tominaga,
Onel Luis Alcaraz López,
Tommy Svensson,
Richard Demo Souza,
Hirley Alves
Abstract:
Contemporary wireless communication systems rely on Multi-User Multiple-Input Multiple-Output (MU-MIMO) techniques. In such systems, each Access Point (AP) is equipped with multiple antenna elements and serves multiple devices simultaneously. Notably, traditional systems utilize fixed antennas, i.e., antennas without any movement capabilities, while the idea of movable antennas has recently gained…
▽ More
Contemporary wireless communication systems rely on Multi-User Multiple-Input Multiple-Output (MU-MIMO) techniques. In such systems, each Access Point (AP) is equipped with multiple antenna elements and serves multiple devices simultaneously. Notably, traditional systems utilize fixed antennas, i.e., antennas without any movement capabilities, while the idea of movable antennas has recently gained traction among the research community. By moving in a confined region, movable antennas are able to exploit the wireless channel variation in the continuous domain. This additional degree of freedom may enhance the quality of the wireless links, and consequently the communication performance. However, movable antennas for MU-MIMO proposed in the literature are complex, bulky, expensive and present a high power consumption. In this paper, we propose an alternative to such systems that has lower complexity and lower cost. More specifically, we propose the incorporation of rotation capabilities to APs equipped with Uniform Linear Arrays (ULAs) of antennas. We consider the uplink of an indoor scenario where the AP serves multiple devices simultaneously. The optimal rotation of the ULA is computed based on estimates of the positions of the active devices and aiming at maximizing the per-user mean achievable Spectral Efficiency (SE). Adopting a spatially correlated Rician channel model, our numerical results show that the rotation capabilities of the AP can bring substantial improvements in the SE in scenarios where the line-of-sight component of the channel vectors is strong. Moreover, our proposed system is robust against imperfect positioning estimates.
△ Less
Submitted 25 June, 2024; v1 submitted 8 February, 2024;
originally announced February 2024.
-
Integration of Swin UNETR and statistical shape modeling for a semi-automated segmentation of the knee and biomechanical modeling of articular cartilage
Authors:
Reza Kakavand,
Mehrdad Palizi,
Peyman Tahghighi,
Reza Ahmadi,
Neha Gianchandani,
Samer Adeeb,
Roberto Souza,
W. Brent Edwards,
Amin Komeili
Abstract:
Simulation studies like finite element (FE) modeling provide insight into knee joint mechanics without patient experimentation. Generic FE models represent biomechanical behavior of the tissue by overlooking variations in geometry, loading, and material properties of a population. On the other hand, subject-specific models include these specifics, resulting in enhanced predictive precision. Howeve…
▽ More
Simulation studies like finite element (FE) modeling provide insight into knee joint mechanics without patient experimentation. Generic FE models represent biomechanical behavior of the tissue by overlooking variations in geometry, loading, and material properties of a population. On the other hand, subject-specific models include these specifics, resulting in enhanced predictive precision. However, creating such models is laborious and time-intensive. The present study aimed to enhance subject-specific knee joint FE modeling by incorporating a semi-automated segmentation algorithm. This segmentation was a 3D Swin UNETR for an initial segmentation of the femur and tibia, followed by a statistical shape model (SSM) adjustment to improve surface roughness and continuity. Five hundred and seven magnetic resonance images (MRIs) from the Osteoarthritis Initiative (OAI) database were used to build and validate the segmentation model. A semi-automated FE model was developed using this semi-automated segmentation. On the other hand, a manual FE model was developed through manual segmentation (i.e., the gold standard approach). Both FE models were subjected to gait loading. The predicted mechanical response of manual and semi-automated FE models were compared. In the result, our semi-automated segmentation achieved Dice similarity coefficient (DSC) over 98% for both femur and tibia. The mechanical results (max principal stress, max principal strain, fluid pressure, fibril strain, and contact area) showed no significant differences between the manual and semi-automated FE models, indicating the effectiveness of the proposed semi-automated segmentation in creating accurate knee joint FE models. ( https://data.mendeley.com/datasets/k5hdc9cz7w/1 ).
△ Less
Submitted 18 September, 2023;
originally announced December 2023.
-
Spectro-ViT: A Vision Transformer Model for GABA-edited MRS Reconstruction Using Spectrograms
Authors:
Gabriel Dias,
Rodrigo Pommot Berto,
Mateus Oliveira,
Lucas Ueda,
Sergio Dertkigil,
Paula D. P. Costa,
Amirmohammad Shamaei,
Roberto Souza,
Ashley Harris,
Leticia Rittner
Abstract:
Purpose: To investigate the use of a Vision Transformer (ViT) to reconstruct/denoise GABA-edited magnetic resonance spectroscopy (MRS) from a quarter of the typically acquired number of transients using spectrograms.
Theory and Methods: A quarter of the typically acquired number of transients collected in GABA-edited MRS scans are pre-processed and converted to a spectrogram image representation…
▽ More
Purpose: To investigate the use of a Vision Transformer (ViT) to reconstruct/denoise GABA-edited magnetic resonance spectroscopy (MRS) from a quarter of the typically acquired number of transients using spectrograms.
Theory and Methods: A quarter of the typically acquired number of transients collected in GABA-edited MRS scans are pre-processed and converted to a spectrogram image representation using the Short-Time Fourier Transform (STFT). The image representation of the data allows the adaptation of a pre-trained ViT for reconstructing GABA-edited MRS spectra (Spectro-ViT). The Spectro-ViT is fine-tuned and then tested using \textit{in vivo} GABA-edited MRS data. The Spectro-ViT performance is compared against other models in the literature using spectral quality metrics and estimated metabolite concentration values.
Results: The Spectro-ViT model significantly outperformed all other models in four out of five quantitative metrics (mean squared error, shape score, GABA+/water fit error, and full width at half maximum). The metabolite concentrations estimated (GABA+/water, GABA+/Cr, and Glx/water) were consistent with the metabolite concentrations estimated using typical GABA-edited MRS scans reconstructed with the full amount of typically collected transients.
Conclusion: The proposed Spectro-ViT model achieved state-of-the-art results in reconstructing GABA-edited MRS, and the results indicate these scans could be up to four times faster.
△ Less
Submitted 26 November, 2023;
originally announced November 2023.
-
High-Power and Safe RF Wireless Charging: Cautious Deployment and Operation
Authors:
Onel L. A. López,
Osmel M. Rosabal,
Amirhossein Azarbahram,
A. Basit Khattak,
Mehdi Monemi,
Richard D. Souza,
Petar Popovski,
Matti Latva-aho
Abstract:
The wired charging and the need for battery replacements are critical barriers to unlimited, scalable, and sustainable mobile connectivity, motivating the interest in radio frequency (RF) wireless power transfer (WPT) technology. However, the inherently low end-to-end power transfer efficiency (PTE) and health/safety-related apprehensions about the technology are critical obstacles. Indeed, RF-WPT…
▽ More
The wired charging and the need for battery replacements are critical barriers to unlimited, scalable, and sustainable mobile connectivity, motivating the interest in radio frequency (RF) wireless power transfer (WPT) technology. However, the inherently low end-to-end power transfer efficiency (PTE) and health/safety-related apprehensions about the technology are critical obstacles. Indeed, RF-WPT implementation and operation require efficient and cautious strategies and protocols, especially when targeting high-power charging, which constitutes the scope of this work. Herein, we overview the main factors affecting the end-to-end PTE of RF-WPT systems and their multiplicative effect and interdependencies. Moreover, we discuss key electromagnetic field (EMF) exposure metrics, safety limits, and approaches for efficient and EMF-aware deployment and operation. Quantitatively, we show that near-field RF charging may significantly reduce EMF exposure, and thus must be promoted. We also present our vision of a cyber-physical system for efficient and safe wireless charging, specify key components and their interrelation, and illustrate numerically the PTE attained by two modern low-power multi-antenna architectures in a simple setup. Throughout the paper, we highlight the need for high end-to-end PTE architectures and charging protocols transparently complying with EMF exposure regulations and outline relevant challenges and research directions. This work expands the vision and understanding of modern RF-WPT technology and constitutes a step towards making the technology attractive for worldwide commercial exploitation.
△ Less
Submitted 20 September, 2023;
originally announced November 2023.
-
Myths and Facts about a Career in Software Testing: A Comparison between Students' Beliefs and Professionals' Experience
Authors:
Ronnie de Souza Santos,
Luiz Fernando Capretz,
Cleyton Magalhaes,
Rodrigo Souza
Abstract:
Testing is an indispensable part of software development. However, a career in software testing is reported to be unpopular among students in computer science and related areas. This can potentially create a shortage of testers in the software industry in the future. The question is, whether the perception that undergraduate students have about software testing is accurate and whether it differs f…
▽ More
Testing is an indispensable part of software development. However, a career in software testing is reported to be unpopular among students in computer science and related areas. This can potentially create a shortage of testers in the software industry in the future. The question is, whether the perception that undergraduate students have about software testing is accurate and whether it differs from the experience reported by those who work in testing activities in the software development industry. This investigation demonstrates that a career in software testing is more exciting and rewarding, as reported by professionals working in the field, than students may believe. Therefore, in order to guarantee a workforce focused on software quality, the academy and the software industry need to work together to better inform students about software testing and its essential role in software development.
△ Less
Submitted 10 November, 2023;
originally announced November 2023.
-
Towards objective and systematic evaluation of bias in artificial intelligence for medical imaging
Authors:
Emma A. M. Stanley,
Raissa Souza,
Anthony Winder,
Vedant Gulve,
Kimberly Amador,
Matthias Wilms,
Nils D. Forkert
Abstract:
Artificial intelligence (AI) models trained using medical images for clinical tasks often exhibit bias in the form of disparities in performance between subgroups. Since not all sources of biases in real-world medical imaging data are easily identifiable, it is challenging to comprehensively assess how those biases are encoded in models, and how capable bias mitigation methods are at ameliorating…
▽ More
Artificial intelligence (AI) models trained using medical images for clinical tasks often exhibit bias in the form of disparities in performance between subgroups. Since not all sources of biases in real-world medical imaging data are easily identifiable, it is challenging to comprehensively assess how those biases are encoded in models, and how capable bias mitigation methods are at ameliorating performance disparities. In this article, we introduce a novel analysis framework for systematically and objectively investigating the impact of biases in medical images on AI models. We developed and tested this framework for conducting controlled in silico trials to assess bias in medical imaging AI using a tool for generating synthetic magnetic resonance images with known disease effects and sources of bias. The feasibility is showcased by using three counterfactual bias scenarios to measure the impact of simulated bias effects on a convolutional neural network (CNN) classifier and the efficacy of three bias mitigation strategies. The analysis revealed that the simulated biases resulted in expected subgroup performance disparities when the CNN was trained on the synthetic datasets. Moreover, reweighing was identified as the most successful bias mitigation strategy for this setup, and we demonstrated how explainable AI methods can aid in investigating the manifestation of bias in the model using this framework. Develo** fair AI models is a considerable challenge given that many and often unknown sources of biases can be present in medical imaging datasets. In this work, we present a novel methodology to objectively study the impact of biases and mitigation strategies on deep learning pipelines, which can support the development of clinical AI that is robust and responsible.
△ Less
Submitted 1 July, 2024; v1 submitted 2 November, 2023;
originally announced November 2023.
-
Studying the Effects of Sex-related Differences on Brain Age Prediction using brain MR Imaging
Authors:
Mahsa Dibaji,
Neha Gianchandani,
Akhil Nair,
Mansi Singhal,
Roberto Souza,
Mariana Bento
Abstract:
While utilizing machine learning models, one of the most crucial aspects is how bias and fairness affect model outcomes for diverse demographics. This becomes especially relevant in the context of machine learning for medical imaging applications as these models are increasingly being used for diagnosis and treatment planning. In this paper, we study biases related to sex when develo** a machine…
▽ More
While utilizing machine learning models, one of the most crucial aspects is how bias and fairness affect model outcomes for diverse demographics. This becomes especially relevant in the context of machine learning for medical imaging applications as these models are increasingly being used for diagnosis and treatment planning. In this paper, we study biases related to sex when develo** a machine learning model based on brain magnetic resonance images (MRI). We investigate the effects of sex by performing brain age prediction considering different experimental designs: model trained using only female subjects, only male subjects and a balanced dataset. We also perform evaluation on multiple MRI datasets (Calgary-Campinas(CC359) and CamCAN) to assess the generalization capability of the proposed models. We found disparities in the performance of brain age prediction models when trained on distinct sex subgroups and datasets, in both final predictions and decision making (assessed using interpretability models). Our results demonstrated variations in model generalizability across sex-specific subgroups, suggesting potential biases in models trained on unbalanced datasets. This underlines the critical role of careful experimental design in generating fair and reliable outcomes.
△ Less
Submitted 17 October, 2023;
originally announced October 2023.
-
A voxel-level approach to brain age prediction: A method to assess regional brain aging
Authors:
Neha Gianchandani,
Mahsa Dibaji,
Johanna Ospel,
Fernando Vega,
Mariana Bento,
M. Ethan MacDonald,
Roberto Souza
Abstract:
Brain aging is a regional phenomenon, a facet that remains relatively under-explored within the realm of brain age prediction research using machine learning methods. Voxel-level predictions can provide localized brain age estimates that can provide granular insights into the regional aging processes. This is essential to understand the differences in aging trajectories in healthy versus diseased…
▽ More
Brain aging is a regional phenomenon, a facet that remains relatively under-explored within the realm of brain age prediction research using machine learning methods. Voxel-level predictions can provide localized brain age estimates that can provide granular insights into the regional aging processes. This is essential to understand the differences in aging trajectories in healthy versus diseased subjects. In this work, a deep learning-based multitask model is proposed for voxel-level brain age prediction from T1-weighted magnetic resonance images. The proposed model outperforms the models existing in the literature and yields valuable clinical insights when applied to both healthy and diseased populations. Regional analysis is performed on the voxel-level brain age predictions to understand aging trajectories of known anatomical regions in the brain and show that there exist disparities in regional aging trajectories of healthy subjects compared to ones with underlying neurological disorders such as Dementia and more specifically, Alzheimer's disease. Our code is available at https://github.com/nehagianchandani/Voxel-level-brain-age-prediction.
△ Less
Submitted 24 April, 2024; v1 submitted 17 October, 2023;
originally announced October 2023.
-
Energy-Aware Federated Learning with Distributed User Sampling and Multichannel ALOHA
Authors:
Rafael Valente da Silva,
Onel L. Alcaraz López,
Richard Demo Souza
Abstract:
Distributed learning on edge devices has attracted increased attention with the advent of federated learning (FL). Notably, edge devices often have limited battery and heterogeneous energy availability, while multiple rounds are required in FL for convergence, intensifying the need for energy efficiency. Energy depletion may hinder the training process and the efficient utilization of the trained…
▽ More
Distributed learning on edge devices has attracted increased attention with the advent of federated learning (FL). Notably, edge devices often have limited battery and heterogeneous energy availability, while multiple rounds are required in FL for convergence, intensifying the need for energy efficiency. Energy depletion may hinder the training process and the efficient utilization of the trained model. To solve these problems, this letter considers the integration of energy harvesting (EH) devices into a FL network with multi-channel ALOHA, while proposing a method to ensure both low energy outage probability and successful execution of future tasks. Numerical results demonstrate the effectiveness of this method, particularly in critical setups where the average energy income fails to cover the iteration cost. The method outperforms a norm based solution in terms of convergence time and battery level.
△ Less
Submitted 12 September, 2023;
originally announced September 2023.
-
Trade-Off Between Beamforming and Macro-Diversity Gains in Distributed mMIMO
Authors:
Eduardo Noboro Tominaga,
Hsuan-Jung Su,
**feng Du,
Sivarama Venkatesan,
Richard Demo Souza,
Hirley Alves
Abstract:
Industry and academia have been working towards the evolution from Centralized massive Multiple-Input Multiple-Output (CmMIMO) to Distributed mMIMO (DmMIMO) architectures. Instead of splitting a coverage area into many cells, each served by a single Base Station equipped with several antennas, the whole coverage area is jointly covered by several Access Points (AP) equipped with few or single ante…
▽ More
Industry and academia have been working towards the evolution from Centralized massive Multiple-Input Multiple-Output (CmMIMO) to Distributed mMIMO (DmMIMO) architectures. Instead of splitting a coverage area into many cells, each served by a single Base Station equipped with several antennas, the whole coverage area is jointly covered by several Access Points (AP) equipped with few or single antennas. Nevertheless, when choosing between deploying more APs with few or single antennas or fewer APs equipped with many antennas, one observes an inherent trade-off between the beamforming and macro-diversity gains that has not been investigated in the literature. Given a total number of antenna elements and total downlink power, under a channel model that takes into account a probability of Line-of-Sight (LoS) as a function of the distance between the User Equipments (UEs) and APs, our numerical results show that there exists a ``sweet spot" on the optimal number of APs and of antenna elements per AP which is a function of the physical dimensions of the coverage area.
△ Less
Submitted 10 September, 2023;
originally announced September 2023.
-
MedShapeNet -- A Large-Scale Dataset of 3D Medical Shapes for Computer Vision
Authors:
Jianning Li,
Zongwei Zhou,
Jiancheng Yang,
Antonio Pepe,
Christina Gsaxner,
Gijs Luijten,
Chongyu Qu,
Tiezheng Zhang,
Xiaoxi Chen,
Wenxuan Li,
Marek Wodzinski,
Paul Friedrich,
Kangxian Xie,
Yuan **,
Narmada Ambigapathy,
Enrico Nasca,
Naida Solak,
Gian Marco Melito,
Viet Duc Vu,
Afaque R. Memon,
Christopher Schlachta,
Sandrine De Ribaupierre,
Rajnikant Patel,
Roy Eagleson,
Xiaojun Chen
, et al. (132 additional authors not shown)
Abstract:
Prior to the deep learning era, shape was commonly used to describe the objects. Nowadays, state-of-the-art (SOTA) algorithms in medical imaging are predominantly diverging from computer vision, where voxel grids, meshes, point clouds, and implicit surface models are used. This is seen from numerous shape-related publications in premier vision conferences as well as the growing popularity of Shape…
▽ More
Prior to the deep learning era, shape was commonly used to describe the objects. Nowadays, state-of-the-art (SOTA) algorithms in medical imaging are predominantly diverging from computer vision, where voxel grids, meshes, point clouds, and implicit surface models are used. This is seen from numerous shape-related publications in premier vision conferences as well as the growing popularity of ShapeNet (about 51,300 models) and Princeton ModelNet (127,915 models). For the medical domain, we present a large collection of anatomical shapes (e.g., bones, organs, vessels) and 3D models of surgical instrument, called MedShapeNet, created to facilitate the translation of data-driven vision algorithms to medical applications and to adapt SOTA vision algorithms to medical problems. As a unique feature, we directly model the majority of shapes on the imaging data of real patients. As of today, MedShapeNet includes 23 dataset with more than 100,000 shapes that are paired with annotations (ground truth). Our data is freely accessible via a web interface and a Python application programming interface (API) and can be used for discriminative, reconstructive, and variational benchmarks as well as various applications in virtual, augmented, or mixed reality, and 3D printing. Exemplary, we present use cases in the fields of classification of brain tumors, facial and skull reconstructions, multi-class anatomy completion, education, and 3D printing. In future, we will extend the data and improve the interfaces. The project pages are: https://medshapenet.ikim.nrw/ and https://github.com/Jianningli/medshapenet-feedback
△ Less
Submitted 12 December, 2023; v1 submitted 30 August, 2023;
originally announced August 2023.
-
Reframing the Brain Age Prediction Problem to a More Interpretable and Quantitative Approach
Authors:
Neha Gianchandani,
Mahsa Dibaji,
Mariana Bento,
Ethan MacDonald,
Roberto Souza
Abstract:
Deep learning models have achieved state-of-the-art results in estimating brain age, which is an important brain health biomarker, from magnetic resonance (MR) images. However, most of these models only provide a global age prediction, and rely on techniques, such as saliency maps to interpret their results. These saliency maps highlight regions in the input image that were significant for the mod…
▽ More
Deep learning models have achieved state-of-the-art results in estimating brain age, which is an important brain health biomarker, from magnetic resonance (MR) images. However, most of these models only provide a global age prediction, and rely on techniques, such as saliency maps to interpret their results. These saliency maps highlight regions in the input image that were significant for the model's predictions, but they are hard to be interpreted, and saliency map values are not directly comparable across different samples. In this work, we reframe the age prediction problem from MR images to an image-to-image regression problem where we estimate the brain age for each brain voxel in MR images. We compare voxel-wise age prediction models against global age prediction models and their corresponding saliency maps. The results indicate that voxel-wise age prediction models are more interpretable, since they provide spatial information about the brain aging process, and they benefit from being quantitative.
△ Less
Submitted 23 August, 2023;
originally announced August 2023.
-
Towards Lightweight Data Integration using Multi-workflow Provenance and Data Observability
Authors:
Renan Souza,
Tyler J. Skluzacek,
Sean R. Wilkinson,
Maxim Ziatdinov,
Rafael Ferreira da Silva
Abstract:
Modern large-scale scientific discovery requires multidisciplinary collaboration across diverse computing facilities, including High Performance Computing (HPC) machines and the Edge-to-Cloud continuum. Integrated data analysis plays a crucial role in scientific discovery, especially in the current AI era, by enabling Responsible AI development, FAIR, Reproducibility, and User Steering. However, t…
▽ More
Modern large-scale scientific discovery requires multidisciplinary collaboration across diverse computing facilities, including High Performance Computing (HPC) machines and the Edge-to-Cloud continuum. Integrated data analysis plays a crucial role in scientific discovery, especially in the current AI era, by enabling Responsible AI development, FAIR, Reproducibility, and User Steering. However, the heterogeneous nature of science poses challenges such as dealing with multiple supporting tools, cross-facility environments, and efficient HPC execution. Building on data observability, adapter system design, and provenance, we propose MIDA: an approach for lightweight runtime Multi-workflow Integrated Data Analysis. MIDA defines data observability strategies and adaptability methods for various parallel systems and machine learning tools. With observability, it intercepts the dataflows in the background without requiring instrumentation while integrating domain, provenance, and telemetry data at runtime into a unified database ready for user steering queries. We conduct experiments showing end-to-end multi-workflow analysis integrating data from Dask and MLFlow in a real distributed deep learning use case for materials science that runs on multiple environments with up to 276 GPUs in parallel. We show near-zero overhead running up to 100,000 tasks on 1,680 CPU cores on the Summit supercomputer.
△ Less
Submitted 17 August, 2023;
originally announced August 2023.
-
A Polystore Architecture Using Knowledge Graphs to Support Queries on Heterogeneous Data Stores
Authors:
Leonardo Guerreiro Azevedo,
Renan Francisco Santos Souza,
Elton F. de S. Soares,
Raphael M. Thiago,
Julio Cesar Cardoso Tesolin,
Ann C. Oliveira,
Marcio Ferreira Moreno
Abstract:
Modern applications commonly need to manage dataset types composed of heterogeneous data and schemas, making it difficult to access them in an integrated way. A single data store to manage heterogeneous data using a common data model is not effective in such a scenario, which results in the domain data being fragmented in the data stores that best fit their storage and access requirements (e.g., N…
▽ More
Modern applications commonly need to manage dataset types composed of heterogeneous data and schemas, making it difficult to access them in an integrated way. A single data store to manage heterogeneous data using a common data model is not effective in such a scenario, which results in the domain data being fragmented in the data stores that best fit their storage and access requirements (e.g., NoSQL, relational DBMS, or HDFS). Besides, organization workflows independently consume these fragments, and usually, there is no explicit link among the fragments that would be useful to support an integrated view. The research challenge tackled by this work is to provide the means to query heterogeneous data residing on distinct data repositories that are not explicitly connected. We propose a federated database architecture by providing a single abstract global conceptual schema to users, allowing them to write their queries, encapsulating data heterogeneity, location, and linkage by employing: (i) meta-models to represent the global conceptual schema, the remote data local conceptual schemas, and map**s among them; (ii) provenance to create explicit links among the consumed and generated data residing in separate datasets. We evaluated the architecture through its implementation as a polystore service, following a microservice architecture approach, in a scenario that simulates a real case in Oil \& Gas industry. Also, we compared the proposed architecture to a relational multidatabase system based on foreign data wrappers, measuring the user's cognitive load to write a query (or query complexity) and the query processing time. The results demonstrated that the proposed architecture allows query writing two times less complex than the one written for the relational multidatabase system, adding an excess of no more than 30% in query processing time.
△ Less
Submitted 15 March, 2024; v1 submitted 7 August, 2023;
originally announced August 2023.
-
Curricular Transfer Learning for Sentence Encoded Tasks
Authors:
Jader Martins Camboim de Sá,
Matheus Ferraroni Sanches,
Rafael Roque de Souza,
Júlio Cesar dos Reis,
Leandro Aparecido Villas
Abstract:
Fine-tuning language models in a downstream task is the standard approach for many state-of-the-art methodologies in the field of NLP. However, when the distribution between the source task and target task drifts, \textit{e.g.}, conversational environments, these gains tend to be diminished. This article proposes a sequence of pre-training steps (a curriculum) guided by "data hacking" and grammar…
▽ More
Fine-tuning language models in a downstream task is the standard approach for many state-of-the-art methodologies in the field of NLP. However, when the distribution between the source task and target task drifts, \textit{e.g.}, conversational environments, these gains tend to be diminished. This article proposes a sequence of pre-training steps (a curriculum) guided by "data hacking" and grammar analysis that allows further gradual adaptation between pre-training distributions. In our experiments, we acquire a considerable improvement from our method compared to other known pre-training approaches for the MultiWoZ task.
△ Less
Submitted 3 August, 2023;
originally announced August 2023.
-
ProvLight: Efficient Workflow Provenance Capture on the Edge-to-Cloud Continuum
Authors:
Daniel Rosendo,
Marta Mattoso,
Alexandru Costan,
Renan Souza,
Débora Pina,
Patrick Valduriez,
Gabriel Antoniu
Abstract:
Modern scientific workflows require hybrid infrastructures combining numerous decentralized resources on the IoT/Edge interconnected to Cloud/HPC systems (aka the Computing Continuum) to enable their optimized execution. Understanding and optimizing the performance of such complex Edge-to-Cloud workflows is challenging. Capturing the provenance of key performance indicators, with their related dat…
▽ More
Modern scientific workflows require hybrid infrastructures combining numerous decentralized resources on the IoT/Edge interconnected to Cloud/HPC systems (aka the Computing Continuum) to enable their optimized execution. Understanding and optimizing the performance of such complex Edge-to-Cloud workflows is challenging. Capturing the provenance of key performance indicators, with their related data and processes, may assist in understanding and optimizing workflow executions. However, the capture overhead can be prohibitive, particularly in resource-constrained devices, such as the ones on the IoT/Edge.To address this challenge, based on a performance analysis of existing systems, we propose ProvLight, a tool to enable efficient provenance capture on the IoT/Edge. We leverage simplified data models, data compression and grou**, and lightweight transmission protocols to reduce overheads. We further integrate ProvLight into the E2Clab framework to enable workflow provenance capture across the Edge-to-Cloud Continuum. This integration makes E2Clab a promising platform for the performance optimization of applications through reproducible experiments.We validate ProvLight at a large scale with synthetic workloads on 64 real-life IoT/Edge devices in the FIT IoT LAB testbed. Evaluations show that ProvLight outperforms state-of-the-art systems like ProvLake and DfAnalyzer in resource-constrained devices. ProvLight is 26 -- 37x faster to capture and transmit provenance data; uses 5 -- 7x less CPU; 2x less memory; transmits 2x less data; and consumes 2 -- 2.5x less energy. ProvLight and E2Clab are available as open-source tools.
△ Less
Submitted 20 July, 2023;
originally announced July 2023.
-
Low-Complexity Dynamic Directional Modulation: Vulnerability and Information Leakage
Authors:
Pedro E. Gória Silva,
Adam Narbudowicz,
Nicola Marchetti,
Pedro H. J. Nardelli,
Rausley A. A. de Souza,
Jules M. Moualeu
Abstract:
In this paper, the privacy of wireless transmissions is improved through the use of an efficient technique termed dynamic directional modulation (DDM), and is subsequently assessed in terms of the measure of information leakage. Recently, a variation of DDM termed low-power dynamic directional modulation (LPDDM) has attracted significant attention as a prominent secure transmission method due to i…
▽ More
In this paper, the privacy of wireless transmissions is improved through the use of an efficient technique termed dynamic directional modulation (DDM), and is subsequently assessed in terms of the measure of information leakage. Recently, a variation of DDM termed low-power dynamic directional modulation (LPDDM) has attracted significant attention as a prominent secure transmission method due to its ability to further improve the privacy of wireless communications. Roughly speaking, this modulation operates by randomly selecting the transmitting antenna from an antenna array whose radiation pattern is well known. Thereafter, the modulator adjusts the constellation phase so as to ensure that only the legitimate receiver recovers the information. To begin with, we highlight some privacy boundaries inherent to the underlying system. In addition, we propose features that the antenna array must meet in order to increase the privacy of a wireless communication system. Last, we adopt a uniform circular monopole antenna array with equiprobable transmitting antennas in order to assess the impact of DDM on the information leakage. It is shown that the bit error rate, while being a useful metric in the evaluation of wireless communication systems, does not provide the full information about the vulnerability of the underlying system.
△ Less
Submitted 31 May, 2023;
originally announced May 2023.
-
Semantic-Functional Communications in Cyber-Physical Systems
Authors:
Pedro E. Goria Silva,
Pedro H. J. Nardelli,
Arthur S. de Sena,
Harun Siljak,
Niko Nevaranta,
Nicola Marchetti,
Rausley A. A. de Souza
Abstract:
This paper explores the use of semantic knowledge inherent in the cyber-physical system (CPS) under study in order to minimize the use of explicit communication, which refers to the use of physical radio resources to transmit potentially informative data. It is assumed that the acquired data have a function in the system, usually related to its state estimation, which may trigger control actions.…
▽ More
This paper explores the use of semantic knowledge inherent in the cyber-physical system (CPS) under study in order to minimize the use of explicit communication, which refers to the use of physical radio resources to transmit potentially informative data. It is assumed that the acquired data have a function in the system, usually related to its state estimation, which may trigger control actions. We propose that a semantic-functional approach can leverage the semantic-enabled implicit communication while guaranteeing that the system maintains functionality under the required performance. We illustrate the potential of this proposal through simulations of a swarm of drones jointly performing remote sensing in a given area. Our numerical results demonstrate that the proposed method offers the best design option regarding the ability to accomplish a previously established task -- remote sensing in the addressed case -- while minimising the use of radio resources by controlling the trade-offs that jointly determine the CPS performance and its effectiveness in the use of resources. In this sense, we establish a fundamental relationship between energy, communication, and functionality considering a given end application.
△ Less
Submitted 31 May, 2023;
originally announced May 2023.
-
An Efficient Machine Learning-based Channel Prediction Technique for OFDM Sub-Bands
Authors:
Pedro E. G. Silva,
Jules M. Moualeu,
Pedro H. Nardelli,
Rausley A. A. de Souza
Abstract:
The acquisition of accurate channel state information (CSI) is of utmost importance since it provides performance improvement of wireless communication systems. However, acquiring accurate CSI, which can be done through channel estimation or channel prediction, is an intricate task due to the complexity of the time-varying and frequency selectivity of the wireless environment. To this end, we prop…
▽ More
The acquisition of accurate channel state information (CSI) is of utmost importance since it provides performance improvement of wireless communication systems. However, acquiring accurate CSI, which can be done through channel estimation or channel prediction, is an intricate task due to the complexity of the time-varying and frequency selectivity of the wireless environment. To this end, we propose an efficient machine learning (ML)-based technique for channel prediction in orthogonal frequency-division multiplexing (OFDM) sub-bands. The novelty of the proposed approach lies in the training of channel fading samples used to estimate future channel behaviour in selective fading.
△ Less
Submitted 31 May, 2023;
originally announced May 2023.
-
Age-of-Information Dependent Random Access in NOMA-Aided Multiple-Relay Slotted ALOHA
Authors:
Gabriel Germino Martins de Jesus,
João Luiz Rebelatto,
Richard Demo Souza,
Onel Luis Alcaraz López
Abstract:
We propose and evaluate the performance of a Non-Orthogonal Multiple Access (NOMA) dual-hop multiple relay (MR) network from an information freshness perspective using the Age of Information (AoI) metric. More specifically, we consider an age dependent (AD) policy, named as AD-NOMA- MR, in which users only transmit, with a given probability, after they reach a certain age threshold. The packets se…
▽ More
We propose and evaluate the performance of a Non-Orthogonal Multiple Access (NOMA) dual-hop multiple relay (MR) network from an information freshness perspective using the Age of Information (AoI) metric. More specifically, we consider an age dependent (AD) policy, named as AD-NOMA- MR, in which users only transmit, with a given probability, after they reach a certain age threshold. The packets sent by the users are potentially received by the relays, and then forwarded to a common sink in a NOMA fashion by randomly selecting one of the available power levels, and multiple packets are received if all selected levels are unique. We derive analytical expressions for the average AoI of AD-NOMA-MR. Through numerical and simulation results, we show that the proposed policy can improve the average AoI up to 76.6% when compared to a previously proposed AD Orthogonal Multiple Access MR policy.
△ Less
Submitted 18 April, 2023;
originally announced April 2023.
-
Performance Analysis of Centralized and Distributed Massive MIMO for MTC
Authors:
Eduardo Noboro Tominaga,
Onel Luiz Alcaraz López,
Hirley Alves,
Richard Demo Souza,
Leonardo Terças
Abstract:
Massive Multiple-Input Multiple-Output (mMIMO) is one of the essential technologies introduced by the Fifth Generation (5G) of wireless communication systems. However, although mMIMO provides many benefits for wireless communications, it cannot ensure uniform wireless coverage and suffers from inter-cell interference inherent to the traditional cellular network paradigm. Therefore, industry and ac…
▽ More
Massive Multiple-Input Multiple-Output (mMIMO) is one of the essential technologies introduced by the Fifth Generation (5G) of wireless communication systems. However, although mMIMO provides many benefits for wireless communications, it cannot ensure uniform wireless coverage and suffers from inter-cell interference inherent to the traditional cellular network paradigm. Therefore, industry and academia are working on the evolution from conventional Centralized mMIMO (CmMIMO) to Distributed mMIMO (DmMIMO) architectures for the Sixth Generation (6G) of wireless networks. Under this new paradigm, several Access Points (APs) are distributed in the coverage area, and all jointly cooperate to serve the active devices. Aiming at Machine-Type Communication (MTC) use cases, we compare the performance of CmMIMO and different DmMIMO deployments in an indoor industrial scenario considering regular and alarm traffic patterns for MTC. Our simulation results show that DmMIMO's performance is often superior to CmMIMO. However, the traditional CmMIMO can outperform DmMIMO when the devices' channels are highly correlated.
△ Less
Submitted 11 April, 2023;
originally announced April 2023.
-
Human-AI Co-Creation Approach to Find Forever Chemicals Replacements
Authors:
Juliana Jansen Ferreira,
Vinícius Segura,
Joana G. R. Souza,
Gabriel D. J. Barbosa,
João Gallas,
Renato Cerqueira,
Dmitry Zubarev
Abstract:
Generative models are a powerful tool in AI for material discovery. We are designing a software framework that supports a human-AI co-creation process to accelerate finding replacements for the ``forever chemicals''-- chemicals that enable our modern lives, but are harmful to the environment and the human health. Our approach combines AI capabilities with the domain-specific tacit knowledge of sub…
▽ More
Generative models are a powerful tool in AI for material discovery. We are designing a software framework that supports a human-AI co-creation process to accelerate finding replacements for the ``forever chemicals''-- chemicals that enable our modern lives, but are harmful to the environment and the human health. Our approach combines AI capabilities with the domain-specific tacit knowledge of subject matter experts to accelerate the material discovery. Our co-creation process starts with the interaction between the subject matter experts and a generative model that can generate new molecule designs. In this position paper, we discuss our hypothesis that these subject matter experts can benefit from a more iterative interaction with the generative model, asking for smaller samples and ``guiding'' the exploration of the discovery space with their knowledge.
△ Less
Submitted 11 April, 2023;
originally announced April 2023.
-
Workflows Community Summit 2022: A Roadmap Revolution
Authors:
Rafael Ferreira da Silva,
Rosa M. Badia,
Venkat Bala,
Debbie Bard,
Peer-Timo Bremer,
Ian Buckley,
Silvina Caino-Lores,
Kyle Chard,
Carole Goble,
Shantenu Jha,
Daniel S. Katz,
Daniel Laney,
Manish Parashar,
Frederic Suter,
Nick Tyler,
Thomas Uram,
Ilkay Altintas,
Stefan Andersson,
William Arndt,
Juan Aznar,
Jonathan Bader,
Bartosz Balis,
Chris Blanton,
Kelly Rosa Braghetto,
Aharon Brodutch
, et al. (80 additional authors not shown)
Abstract:
Scientific workflows have become integral tools in broad scientific computing use cases. Science discovery is increasingly dependent on workflows to orchestrate large and complex scientific experiments that range from execution of a cloud-based data preprocessing pipeline to multi-facility instrument-to-edge-to-HPC computational workflows. Given the changing landscape of scientific computing and t…
▽ More
Scientific workflows have become integral tools in broad scientific computing use cases. Science discovery is increasingly dependent on workflows to orchestrate large and complex scientific experiments that range from execution of a cloud-based data preprocessing pipeline to multi-facility instrument-to-edge-to-HPC computational workflows. Given the changing landscape of scientific computing and the evolving needs of emerging scientific applications, it is paramount that the development of novel scientific workflows and system functionalities seek to increase the efficiency, resilience, and pervasiveness of existing systems and applications. Specifically, the proliferation of machine learning/artificial intelligence (ML/AI) workflows, need for processing large scale datasets produced by instruments at the edge, intensification of near real-time data processing, support for long-term experiment campaigns, and emergence of quantum computing as an adjunct to HPC, have significantly changed the functional and operational requirements of workflow systems. Workflow systems now need to, for example, support data streams from the edge-to-cloud-to-HPC enable the management of many small-sized files, allow data reduction while ensuring high accuracy, orchestrate distributed services (workflows, instruments, data movement, provenance, publication, etc.) across computing and user facilities, among others. Further, to accelerate science, it is also necessary that these systems implement specifications/standards and APIs for seamless (horizontal and vertical) integration between systems and applications, as well as enabling the publication of workflows and their associated products according to the FAIR principles. This document reports on discussions and findings from the 2022 international edition of the Workflows Community Summit that took place on November 29 and 30, 2022.
△ Less
Submitted 31 March, 2023;
originally announced April 2023.
-
From Images to Features: Unbiased Morphology Classification via Variational Auto-Encoders and Domain Adaptation
Authors:
Quanfeng Xu,
Shiyin Shen,
Rafael S. de Souza,
Mi Chen,
Renhao Ye,
Yumei She,
Zhu Chen,
Emille E. O. Ishida,
Alberto Krone-Martins,
Rupesh Durgesh
Abstract:
We present a novel approach for the dimensionality reduction of galaxy images by leveraging a combination of variational auto-encoders (VAE) and domain adaptation (DA). We demonstrate the effectiveness of this approach using a sample of low redshift galaxies with detailed morphological type labels from the Galaxy-Zoo DECaLS project. We show that 40-dimensional latent variables can effectively repr…
▽ More
We present a novel approach for the dimensionality reduction of galaxy images by leveraging a combination of variational auto-encoders (VAE) and domain adaptation (DA). We demonstrate the effectiveness of this approach using a sample of low redshift galaxies with detailed morphological type labels from the Galaxy-Zoo DECaLS project. We show that 40-dimensional latent variables can effectively reproduce most morphological features in galaxy images. To further validate the effectiveness of our approach, we utilised a classical random forest (RF) classifier on the 40-dimensional latent variables to make detailed morphology feature classifications. This approach performs similarly to a direct neural network application on galaxy images. We further enhance our model by tuning the VAE network via DA using galaxies in the overlap** footprint of DECaLS and BASS+MzLS, enabling the unbiased application of our model to galaxy images in both surveys. We observed that DA led to even better morphological feature extraction and classification performance. Overall, this combination of VAE and DA can be applied to achieve image dimensionality reduction, defect image identification, and morphology classification in large optical surveys.
△ Less
Submitted 13 October, 2023; v1 submitted 15 March, 2023;
originally announced March 2023.
-
Element-Wise Attention Layers: an option for optimization
Authors:
Giovanni Araujo Bacochina,
Rodrigo Clemente Thom de Souza
Abstract:
The use of Attention Layers has become a trend since the popularization of the Transformer-based models, being the key element for many state-of-the-art models that have been developed through recent years. However, one of the biggest obstacles in implementing these architectures - as well as many others in Deep Learning Field - is the enormous amount of optimizing parameters they possess, which m…
▽ More
The use of Attention Layers has become a trend since the popularization of the Transformer-based models, being the key element for many state-of-the-art models that have been developed through recent years. However, one of the biggest obstacles in implementing these architectures - as well as many others in Deep Learning Field - is the enormous amount of optimizing parameters they possess, which make its use conditioned on the availability of robust hardware. In this paper, it's proposed a new method of attention mechanism that adapts the Dot-Product Attention, which uses matrices multiplications, to become element-wise through the use of arrays multiplications. To test the effectiveness of such approach, two models (one with a VGG-like architecture and one with the proposed method) have been trained in a classification task using Fashion MNIST and CIFAR10 datasets. Each model has been trained for 10 epochs in a single Tesla T4 GPU from Google Colaboratory. The results show that this mechanism allows for an accuracy of 92% of the VGG-like counterpart in Fashion MNIST dataset, while reducing the number of parameters in 97%. For CIFAR10, the accuracy is still equivalent to 60% of the VGG-like counterpart while using 50% less parameters.
△ Less
Submitted 10 February, 2023;
originally announced February 2023.
-
MonoByte: A Pool of Monolingual Byte-level Language Models
Authors:
Hugo Abonizio,
Leandro Rodrigues de Souza,
Roberto Lotufo,
Rodrigo Nogueira
Abstract:
The zero-shot cross-lingual ability of models pretrained on multilingual and even monolingual corpora has spurred many hypotheses to explain this intriguing empirical result. However, due to the costs of pretraining, most research uses public models whose pretraining methodology, such as the choice of tokenization, corpus size, and computational budget, might differ drastically. When researchers p…
▽ More
The zero-shot cross-lingual ability of models pretrained on multilingual and even monolingual corpora has spurred many hypotheses to explain this intriguing empirical result. However, due to the costs of pretraining, most research uses public models whose pretraining methodology, such as the choice of tokenization, corpus size, and computational budget, might differ drastically. When researchers pretrain their own models, they often do so under a constrained budget, and the resulting models might underperform significantly compared to SOTA models. These experimental differences led to various inconsistent conclusions about the nature of the cross-lingual ability of these models. To help further research on the topic, we released 10 monolingual byte-level models rigorously pretrained under the same configuration with a large compute budget (equivalent to 420 days on a V100) and corpora that are 4 times larger than the original BERT's. Because they are tokenizer-free, the problem of unseen token embeddings is eliminated, thus allowing researchers to try a wider range of cross-lingual experiments in languages with different scripts. Additionally, we release two models pretrained on non-natural language texts that can be used in sanity-check experiments. Experiments on QA and NLI tasks show that our monolingual models achieve competitive performance to the multilingual one, and hence can be served to strengthen our understanding of cross-lingual transferability in language models.
△ Less
Submitted 27 September, 2022; v1 submitted 22 September, 2022;
originally announced September 2022.
-
Key Factors of Wireless Real-Time Networks -- From Dependability to Timeliness
Authors:
Jeferson L. R. Souza,
Frank Siqueira
Abstract:
Offering support for real-time communications on top of a wireless network infrastructure is both a hot topic and still an open challenge. Wireless networks are not on the same level of safety, dependability, and timeliness observed in the wired realm, but they are evolving towards it. Instead of focusing on the results that need to be delivered, the key factors of wireless real-time networks are…
▽ More
Offering support for real-time communications on top of a wireless network infrastructure is both a hot topic and still an open challenge. Wireless networks are not on the same level of safety, dependability, and timeliness observed in the wired realm, but they are evolving towards it. Instead of focusing on the results that need to be delivered, the key factors of wireless real-time networks are on the foundation of the network operation, defining their capability of being dependable, safe, and timely on their roots. IEEE 802.15.4 and ISA100.11a are part of this context, which we show how to be strengthened. From dealing with network inaccessibility to touching the needs of reliable communication protocols to ensure the safe and sound exchange of information, this white paper describes how we can go from dependability to timeliness. This is achieved by visiting the roots of the network operation for securing the provided communication service as a dependable, safe, and timely asset for industrial automation.
Keywords: Dependability, Safety, Timeliness, Resilience, Real-Time Wireless Networks, Industrial Automation.
△ Less
Submitted 29 June, 2022;
originally announced June 2022.
-
Roadblocks to Attracting Students to Software Testing Careers: Comparisons of Replicated Studies
Authors:
Rodrigo E. C. Souza,
Ronnie E. de Souza Santos,
Luiz Fernando Capretz,
Marlon A. S. de Sousa,
Cleyton V. C. de Magalhaes
Abstract:
Context. Recently, a family of studies highlighted the unpopularity of software testing careers among undergraduate students in software engineering and computer science courses. The original study and its replications explored the perception of students in universities in four countries (Cana-da, China, India, and Malaysia), and indicated that most students do not consider a career in software te…
▽ More
Context. Recently, a family of studies highlighted the unpopularity of software testing careers among undergraduate students in software engineering and computer science courses. The original study and its replications explored the perception of students in universities in four countries (Cana-da, China, India, and Malaysia), and indicated that most students do not consider a career in software testing as an option after graduation. This scenario represents a problem for the software industry since the lack of skilled testing professionals might decrease the quality of software projects and increase the number of unsuccessful projects. Goal. The present study aims to replicate, in Brazil, the studies conducted in the other four countries to establish comparisons and support the development of strategies to improve the visibility and importance of software testing among undergraduate students across the globe. Method. We followed the same protocol in the original study to collect data using a questionnaire and analyzed the answers using descriptive statistics and qualitative data analysis. Results. Our findings indicate similarities among the results obtained in Brazil in comparison to those obtained from other countries. We observed that students are not motivated to follow a testing career in the software industry based on a belief that testing activities lack challenges and opportunities for continuous learning. Conclusions. In summary, students seem to be interested in learning more about software testing. However, the lack of discussions about the theme in software development courses, as well as the limited offer of courses focused on software quality at the university level reduce the visibility of this area, which causes a decrease in the interest in this career.
△ Less
Submitted 15 June, 2022;
originally announced June 2022.
-
qrpca: A Package for Fast Principal Component Analysis with GPU Acceleration
Authors:
Rafael S. de Souza,
Xu Quanfeng,
Shiyin Shen,
Chen Peng,
Zihao Mu
Abstract:
We present qrpca, a fast and scalable QR-decomposition principal component analysis package. The software, written in both R and python languages, makes use of torch for internal matrix computations, and enables GPU acceleration, when available. qrpca provides similar functionalities to prcomp (R) and sklearn (python) packages respectively. A benchmark test shows that qrpca can achieve computation…
▽ More
We present qrpca, a fast and scalable QR-decomposition principal component analysis package. The software, written in both R and python languages, makes use of torch for internal matrix computations, and enables GPU acceleration, when available. qrpca provides similar functionalities to prcomp (R) and sklearn (python) packages respectively. A benchmark test shows that qrpca can achieve computational speeds 10-20 $\times$ faster for large dimensional matrices than default implementations, and is at least twice as fast for a standard decomposition of spectral data cubes. The qrpca source code is made freely available to the community.
△ Less
Submitted 6 September, 2022; v1 submitted 14 June, 2022;
originally announced June 2022.
-
Energy-Efficient Wake-Up Signalling for Machine-Type Devices Based on Traffic-Aware Long-Short Term Memory Prediction
Authors:
David E. Ruíz-Guirola,
Carlos A. Rodríguez-López,
Samuel Montejo-Sánchez,
Richard Demo Souza,
Onel L. A. López,
Hirley Alves
Abstract:
Reducing energy consumption is a pressing issue in low-power machine-type communication (MTC) networks. In this regard, the Wake-up Signal (WuS) technology, which aims to minimize the energy consumed by the radio interface of the machine-type devices (MTDs), stands as a promising solution. However, state-of-the-art WuS mechanisms use static operational parameters, so they cannot efficiently adapt…
▽ More
Reducing energy consumption is a pressing issue in low-power machine-type communication (MTC) networks. In this regard, the Wake-up Signal (WuS) technology, which aims to minimize the energy consumed by the radio interface of the machine-type devices (MTDs), stands as a promising solution. However, state-of-the-art WuS mechanisms use static operational parameters, so they cannot efficiently adapt to the system dynamics. To overcome this, we design a simple but efficient neural network to predict MTC traffic patterns and configure WuS accordingly. Our proposed forecasting WuS (FWuS) leverages an accurate long-short term memory (LSTM)- based traffic prediction that allows extending the sleep time of MTDs by avoiding frequent page monitoring occasions in idle state. Simulation results show the effectiveness of our approach. The traffic prediction errors are shown to be below 4%, being false alarm and miss-detection probabilities respectively below 8.8% and 1.3%. In terms of energy consumption reduction, FWuS can outperform the best benchmark mechanism in up to 32%. Finally, we certify the ability of FWuS to dynamically adapt to traffic density changes, promoting low-power MTC scalability
△ Less
Submitted 13 June, 2022;
originally announced June 2022.
-
A framework for robotic arm pose estimation and movement prediction based on deep and extreme learning models
Authors:
Iago Richard Rodrigues,
Marrone Dantas,
Assis Oliveira Filho,
Gibson Barbosa,
Daniel Bezerra,
Ricardo Souza,
Maria Valéria Marquezini,
Patricia Takako Endo,
Judith Kelner,
Djamel H. Sadok
Abstract:
Human-robot collaboration has gained a notable prominence in Industry 4.0, as the use of collaborative robots increases efficiency and productivity in the automation process. However, it is necessary to consider the use of mechanisms that increase security in these environments, as the literature reports that risk situations may exist in the context of human-robot collaboration. One of the strateg…
▽ More
Human-robot collaboration has gained a notable prominence in Industry 4.0, as the use of collaborative robots increases efficiency and productivity in the automation process. However, it is necessary to consider the use of mechanisms that increase security in these environments, as the literature reports that risk situations may exist in the context of human-robot collaboration. One of the strategies that can be adopted is the visual recognition of the collaboration environment using machine learning techniques, which can automatically identify what is happening in the scene and what may happen in the future. In this work, we are proposing a new framework that is capable of detecting robotic arm keypoints commonly used in Industry 4.0. In addition to detecting, the proposed framework is able to predict the future movement of these robotic arms, thus providing relevant information that can be considered in the recognition of the human-robot collaboration scenario. The proposed framework is based on deep and extreme learning machine techniques. Results show that the proposed framework is capable of detecting and predicting with low error, contributing to the mitigation of risks in human-robot collaboration.
△ Less
Submitted 27 May, 2022;
originally announced May 2022.
-
Coordinated Pilot Transmissions for Detecting the Signal Sparsity Level in a Massive IoT Network under Rayleigh Fading
Authors:
Onel L. A. López,
Glauber Brante,
Richard D. Souza,
Markku Juntti,
Matti Latva-aho
Abstract:
Grant-free protocols exploiting compressed sensing (CS) multi-user detection (MUD) are appealing for solving the random access problem in massive machine-type communications (mMTC) with sporadic device activity. Such protocols would greatly benefit from a prior deterministic knowledge of the sparsity level, i.e., instantaneous number of simultaneously active devices $K$. Aiming at this, herein we…
▽ More
Grant-free protocols exploiting compressed sensing (CS) multi-user detection (MUD) are appealing for solving the random access problem in massive machine-type communications (mMTC) with sporadic device activity. Such protocols would greatly benefit from a prior deterministic knowledge of the sparsity level, i.e., instantaneous number of simultaneously active devices $K$. Aiming at this, herein we introduce a framework relying on coordinated pilot transmissions (CPT) over a short phase at the beginning of the transmission block for detecting $K$ in mMTC scenarios under Rayleigh fading. CPT can be implemented either as: i) U-CPT, which exploits only uplink transmissions, or A-CPT, which includes also downlink transmissions for channel state information (CSI) acquisition that resolve fading uncertainty. We discuss two specific implementations of A-CPT: ii) A-CPT-F, which implements CSI-based phase corrections while leveraging the same statistical inverse power control used by U-CPT, and iii) A-CPT-D, which implements a dynamic CSI-based inverse power control, although it requires some active devices to remain in silence if their corresponding channels are too faded. We derive a signal sparsity level detector for each CPT mechanism by relaxing the original integer detection/classification problem to an estimation problem in the continuous real domain followed by a rounding operation. We show that the variance of the relaxed estimator increases with $K^2$ and $K$ when operating with U-CPT and A-CPT mechanisms, respectively. The distribution of the estimators under U-CPT, A-CPT-F and A-CPT-D is found to follow an exponential, Gaussian, and Student's $t-$like distribution, respectively. Analyses evince the superiority of A-CPT-D, which is also corroborated via numerical results. We reveal several interesting trade-offs and highlight potential research directions.
△ Less
Submitted 1 May, 2022;
originally announced May 2022.
-
A Novel Approach for Optimum-Path Forest Classification Using Fuzzy Logic
Authors:
Renato W. R. de Souza,
João V. C. de Oliveira,
Leandro A. Passos,
Wei** Ding,
João P. Papa,
Victor Hugo C. de Albuquerque
Abstract:
In the past decades, fuzzy logic has played an essential role in many research areas. Alongside, graph-based pattern recognition has shown to be of great importance due to its flexibility in partitioning the feature space using the background from graph theory. Some years ago, a new framework for both supervised, semi-supervised, and unsupervised learning named Optimum-Path Forest (OPF) was propos…
▽ More
In the past decades, fuzzy logic has played an essential role in many research areas. Alongside, graph-based pattern recognition has shown to be of great importance due to its flexibility in partitioning the feature space using the background from graph theory. Some years ago, a new framework for both supervised, semi-supervised, and unsupervised learning named Optimum-Path Forest (OPF) was proposed with competitive results in several applications, besides comprising a low computational burden. In this paper, we propose the Fuzzy Optimum-Path Forest, an improved version of the standard OPF classifier that learns the samples' membership in an unsupervised fashion, which are further incorporated during supervised training. Such information is used to identify the most relevant training samples, thus improving the classification step. Experiments conducted over twelve public datasets highlight the robustness of the proposed approach, which behaves similarly to standard OPF in worst-case scenarios.
△ Less
Submitted 13 April, 2022;
originally announced April 2022.
-
A novel semantic-functional approach for multiuser event-trigger communication
Authors:
Pedro E. Gória Silva,
Plínio S. Dester,
Harun Siljak,
Nicola Marchetti,
Pedro H. J. Nardelli,
Rausley A. A. de Souza
Abstract:
This work introduces a new perspective for physical media sharing in multiuser communication by jointly considering (i) the meaning of the transmitted message and (ii) its function at the end user. Specifically, we have defined a scenario where multiple users (sensors) are continuously transmitting their own states concerning a predetermined event. On the receiver side there is an alarm monitoring…
▽ More
This work introduces a new perspective for physical media sharing in multiuser communication by jointly considering (i) the meaning of the transmitted message and (ii) its function at the end user. Specifically, we have defined a scenario where multiple users (sensors) are continuously transmitting their own states concerning a predetermined event. On the receiver side there is an alarm monitoring system, whose function is to decide whether such a predetermined event has happened in a certain time period and, if yes, in which user. The media access control protocol proposed constitutes an alternative approach to the conventional physical layer methods, because the receiver does not decode the received waveform directly; rather, the relative position of the absence or presence of energy within a multidimensional resource space carries the (semantic) information. The protocol introduced here provides high efficiency in multiuser networks that operate with event-triggered sampling by enabling a constructive reconstruction of transmission collisions. We have demonstrated that the proposed method leads to a better event transmission efficiency than conventional methods like TDMA and slotted ALOHA. Remarkably, the proposed method achieves 100\% efficiency and 0\% error probability in almost all the studied cases, while consistently outperforming TDMA and slotted ALOHA.
△ Less
Submitted 3 May, 2023; v1 submitted 7 April, 2022;
originally announced April 2022.
-
A Survey on RGB-D Datasets
Authors:
Alexandre Lopes,
Roberto Souza,
Helio Pedrini
Abstract:
RGB-D data is essential for solving many problems in computer vision. Hundreds of public RGB-D datasets containing various scenes, such as indoor, outdoor, aerial, driving, and medical, have been proposed. These datasets are useful for different applications and are fundamental for addressing classic computer vision tasks, such as monocular depth estimation. This paper reviewed and categorized ima…
▽ More
RGB-D data is essential for solving many problems in computer vision. Hundreds of public RGB-D datasets containing various scenes, such as indoor, outdoor, aerial, driving, and medical, have been proposed. These datasets are useful for different applications and are fundamental for addressing classic computer vision tasks, such as monocular depth estimation. This paper reviewed and categorized image datasets that include depth information. We gathered 203 datasets that contain accessible data and grouped them into three categories: scene/objects, body, and medical. We also provided an overview of the different types of sensors, depth applications, and we examined trends and future directions of the usage and creation of datasets containing depth data, and how they can be applied to investigate the development of generalizable machine learning models in the monocular depth estimation field.
△ Less
Submitted 8 August, 2022; v1 submitted 15 January, 2022;
originally announced January 2022.
-
Towards Understanding Quality Challenges of the Federated Learning for Neural Networks: A First Look from the Lens of Robustness
Authors:
Amin Eslami Abyane,
Derui Zhu,
Roberto Souza,
Lei Ma,
Hadi Hemmati
Abstract:
Federated learning (FL) is a distributed learning paradigm that preserves users' data privacy while leveraging the entire dataset of all participants. In FL, multiple models are trained independently on the clients and aggregated centrally to update a global model in an iterative process. Although this approach is excellent at preserving privacy, FL still suffers from quality issues such as attack…
▽ More
Federated learning (FL) is a distributed learning paradigm that preserves users' data privacy while leveraging the entire dataset of all participants. In FL, multiple models are trained independently on the clients and aggregated centrally to update a global model in an iterative process. Although this approach is excellent at preserving privacy, FL still suffers from quality issues such as attacks or byzantine faults. Recent attempts have been made to address such quality challenges on the robust aggregation techniques for FL. However, the effectiveness of state-of-the-art (SOTA) robust FL techniques is still unclear and lacks a comprehensive study. Therefore, to better understand the current quality status and challenges of these SOTA FL techniques in the presence of attacks and faults, we perform a large-scale empirical study to investigate the SOTA FL's quality from multiple angles of attacks, simulated faults (via mutation operators), and aggregation (defense) methods. In particular, we study FL's performance on the image classification tasks and use DNNs as our model type. Furthermore, we perform our study on two generic image datasets and one real-world federated medical image dataset. We also investigate the effect of the proportion of affected clients and the dataset distribution factors on the robustness of FL. After a large-scale analysis with 496 configurations, we find that most mutators on each user have a negligible effect on the final model in the generic datasets, and only one of them is effective in the medical dataset. Furthermore, we show that model poisoning attacks are more effective than data poisoning attacks. Moreover, choosing the most robust FL aggregator depends on the attacks and datasets. Finally, we illustrate that a simple ensemble of aggregators achieves a more robust solution than any single aggregator and is the best choice in 75% of the cases.
△ Less
Submitted 9 January, 2023; v1 submitted 4 January, 2022;
originally announced January 2022.
-
On the ability of monolingual models to learn language-agnostic representations
Authors:
Leandro Rodrigues de Souza,
Rodrigo Nogueira,
Roberto Lotufo
Abstract:
Pretrained multilingual models have become a de facto default approach for zero-shot cross-lingual transfer. Previous work has shown that these models are able to achieve cross-lingual representations when pretrained on two or more languages with shared parameters. In this work, we provide evidence that a model can achieve language-agnostic representations even when pretrained on a single language…
▽ More
Pretrained multilingual models have become a de facto default approach for zero-shot cross-lingual transfer. Previous work has shown that these models are able to achieve cross-lingual representations when pretrained on two or more languages with shared parameters. In this work, we provide evidence that a model can achieve language-agnostic representations even when pretrained on a single language. That is, we find that monolingual models pretrained and finetuned on different languages achieve competitive performance compared to the ones that use the same target language. Surprisingly, the models show a similar performance on a same task regardless of the pretraining language. For example, models pretrained on distant languages such as German and Portuguese perform similarly on English tasks.
△ Less
Submitted 25 October, 2021; v1 submitted 4 September, 2021;
originally announced September 2021.
-
A Survey on Software Engineering Practices in Brazilian Startups
Authors:
Renata Souza,
Orges Cico,
Ivan Machado
Abstract:
Today's significant technological advancement allows early-stage software startups to build and launch innovative products quickly on the market. However, many of them die in the early years of their path due to market conditions, ignorance of customer needs, lack of resources, or focus, such as the misuse of well-established practices. The study's motivation is to analyze software engineering pra…
▽ More
Today's significant technological advancement allows early-stage software startups to build and launch innovative products quickly on the market. However, many of them die in the early years of their path due to market conditions, ignorance of customer needs, lack of resources, or focus, such as the misuse of well-established practices. The study's motivation is to analyze software engineering practices in startups from a practitioner's perspective. Our objective was to identify practices and tools the startups employ in their daily routines. We carried out an expert survey study with 140 software developers involved in software startups from different domains. The results show that startups in the initial and validation phases select practices and tools on an ad-hoc basis and based on the development team's prior knowledge. When they move into the growth phase, they recognize that they could have adopted better practices beforehand to support product scaling with a more mature team. The results also indicated that support tools are selected based on their integration with other tools and their ability to automate operational activities.
△ Less
Submitted 31 July, 2021;
originally announced August 2021.
-
Exploring the Non-Overlap** Visibility Regions in XL-MIMO Random Access Protocol
Authors:
José Carlos Marinello Filho,
Glauber Brante,
Richard Demo Souza,
Taufik Abrão
Abstract:
The recent extra-large scale massive multiple-input multiple-output (XL-MIMO) systems are seen as a promising technology for providing very high data rates in increased user-density scenarios. Spatial non-stationarities and visibility regions (VRs) appear across the XL-MIMO array since its large dimension is of the same order as the distances to the user-equipments (UEs). Due to the increased dens…
▽ More
The recent extra-large scale massive multiple-input multiple-output (XL-MIMO) systems are seen as a promising technology for providing very high data rates in increased user-density scenarios. Spatial non-stationarities and visibility regions (VRs) appear across the XL-MIMO array since its large dimension is of the same order as the distances to the user-equipments (UEs). Due to the increased density of UEs in typical applications of XL-MIMO systems and the scarcity of pilots, the design of random access (RA) protocols and scheduling algorithms become challenging. In this paper, we propose a joint RA and scheduling protocol, namely non-overlap** VR XL- MIMO (NOVR-XL) RA protocol, which takes advantage of the different VRs of the UEs for improving RA performance, besides seeking UEs with non-overlap** VRs to be scheduled in the same payload data pilot resource. Our results reveal that the proposed scheme achieves significant gains in terms of sum rate compared with traditional RA schemes, as well as reducing access latency and improving connectivity performance as a whole.
△ Less
Submitted 19 July, 2021;
originally announced July 2021.
-
Network-Coded Cooperative LoRa Network with D2D Communication
Authors:
L. H. O. Alves,
J. L. Rebelatto,
R. D. Souza,
G. Brante
Abstract:
We evaluate the outage probability and the energy efficiency (EE) of a LoRa network when the end-devices (EDs) are capable of exchanging messages with a device-to-device (D2D) technology. Our proposal is to assess the performance of the network when operating under the concept of network-coded cooperation (NCC), where the EDs are capable of transmitting linear combinations of more than one frame (…
▽ More
We evaluate the outage probability and the energy efficiency (EE) of a LoRa network when the end-devices (EDs) are capable of exchanging messages with a device-to-device (D2D) technology. Our proposal is to assess the performance of the network when operating under the concept of network-coded cooperation (NCC), where the EDs are capable of transmitting linear combinations of more than one frame (including frames of another ED), performed over a non-binary finite field. We consider both connection and collision probabilities when modelling the outage probability of an ED, as well as a realistic power consumption model to evaluate the EE. Our results indicate that the proposed scheme, which we refer to as NCC-LoRa, provides considerable gains in terms of both outage probability and EE when compared to a regular LoRa network, even when considering the additional consumption of D2D communication.
△ Less
Submitted 7 December, 2021; v1 submitted 6 July, 2021;
originally announced July 2021.
-
Context-aware Execution Migration Tool for Data Science Jupyter Notebooks on Hybrid Clouds
Authors:
Renato L. F. Cunha,
Lucas V. Real,
Renan Souza,
Bruno Silva,
Marco A. S. Netto
Abstract:
Interactive computing notebooks, such as Jupyter notebooks, have become a popular tool for develo** and improving data-driven models. Such notebooks tend to be executed either in the user's own machine or in a cloud environment, having drawbacks and benefits in both approaches. This paper presents a solution developed as a Jupyter extension that automatically selects which cells, as well as in w…
▽ More
Interactive computing notebooks, such as Jupyter notebooks, have become a popular tool for develo** and improving data-driven models. Such notebooks tend to be executed either in the user's own machine or in a cloud environment, having drawbacks and benefits in both approaches. This paper presents a solution developed as a Jupyter extension that automatically selects which cells, as well as in which scenarios, such cells should be migrated to a more suitable platform for execution. We describe how we reduce the execution state of the notebook to decrease migration time and we explore the knowledge of user interactivity patterns with the notebook to determine which blocks of cells should be migrated. Using notebooks from Earth science (remote sensing), image recognition, and hand written digit identification (machine learning), our experiments show notebook state reductions of up to 55x and migration decisions leading to performance gains of up to 3.25x when the user interactivity with the notebook is taken into consideration.
△ Less
Submitted 30 June, 2021;
originally announced July 2021.
-
Massive Wireless Energy Transfer with Multiple Power Beacons for very large Internet of Things
Authors:
Osmel Martínez Rosabal,
Onel L. Alcaraz López,
Hirley Alves,
Richard D. Souza,
Samuel Montejo-Sánchez
Abstract:
The Internet of Things (IoT) comprises an increasing number of low-power and low-cost devices that autonomously interact with the surrounding environment. As a consequence of their popularity, future IoT deployments will be massive, which demands energy-efficient systems to extend their lifetime and improve the user experience. Radio frequency wireless energy transfer has the potential of powering…
▽ More
The Internet of Things (IoT) comprises an increasing number of low-power and low-cost devices that autonomously interact with the surrounding environment. As a consequence of their popularity, future IoT deployments will be massive, which demands energy-efficient systems to extend their lifetime and improve the user experience. Radio frequency wireless energy transfer has the potential of powering massive IoT networks, thus eliminating the need for frequent battery replacement by using the so-called power beacons (PBs). In this paper, we provide a framework for minimizing the sum transmit power of the PBs using devices' positions information and their current battery state. Our strategy aims to reduce the PBs' power consumption and to mitigate the possible impact of the electromagnetic radiation on human health. We also present analytical insights for the case of very distant clusters and evaluate their applicability. Numerical results show that our proposed framework reduces the outage probability as the number of PBs and/or the energy demands increase.
△ Less
Submitted 24 June, 2021;
originally announced June 2021.
-
Massive MIMO with Radio Stripes for Indoor Wireless Energy Transfer
Authors:
Onel L. A. López,
Dileep Kumar,
Richard Demo Souza,
Petar Popovski,
Antti Tölli,
Matti Latva-aho
Abstract:
Radio frequency wireless energy transfer (WET) is a promising solution for powering autonomous Internet of Things (IoT) deployments. In this work, we leverage energy beamforming for powering multiple user equipments (UEs) with stringent energy harvesting (EH) demands in an indoor distributed massive multiple-input multiple-output system. Based on semi-definite programming, successive convex approx…
▽ More
Radio frequency wireless energy transfer (WET) is a promising solution for powering autonomous Internet of Things (IoT) deployments. In this work, we leverage energy beamforming for powering multiple user equipments (UEs) with stringent energy harvesting (EH) demands in an indoor distributed massive multiple-input multiple-output system. Based on semi-definite programming, successive convex approximation (SCA), and maximum ratio transmission (MRT) techniques, we derive optimal and sub-optimal precoders aimed at minimizing the radio stripes' transmit power while exploiting information of the power transfer efficiency of the EH circuits at the UEs. Moreover, we propose an analytical framework to assess and control the electromagnetic field (EMF) radiation exposure in the considered indoor scenario. Numerical results show that i) the EMF radiation exposure can be more easily controlled at higher frequencies at the cost of a higher transmit power consumption, ii) training is not a very critical factor for the considered indoor system, iii) MRT/SCA-based precoders are particularly appealing when serving a small number of UEs, thus, especially suitable for implementation in a time domain multiple access (TDMA) scheduling framework, and iv) TDMA is more efficient than spatial domain multiple access (SDMA) when serving a relatively small number of UEs. Results suggest that additional boosting performance strategies are needed to increase the overall system efficiency, thus making the technology viable in practice.
△ Less
Submitted 28 February, 2022; v1 submitted 23 June, 2021;
originally announced June 2021.
-
Workflows Community Summit: Advancing the State-of-the-art of Scientific Workflows Management Systems Research and Development
Authors:
Rafael Ferreira da Silva,
Henri Casanova,
Kyle Chard,
Tainã Coleman,
Dan Laney,
Dong Ahn,
Shantenu Jha,
Dorran Howell,
Stian Soiland-Reys,
Ilkay Altintas,
Douglas Thain,
Rosa Filgueira,
Yadu Babuji,
Rosa M. Badia,
Bartosz Balis,
Silvina Caino-Lores,
Scott Callaghan,
Frederik Coppens,
Michael R. Crusoe,
Kaushik De,
Frank Di Natale,
Tu M. A. Do,
Bjoern Enders,
Thomas Fahringer,
Anne Fouilloux
, et al. (33 additional authors not shown)
Abstract:
Scientific workflows are a cornerstone of modern scientific computing, and they have underpinned some of the most significant discoveries of the last decade. Many of these workflows have high computational, storage, and/or communication demands, and thus must execute on a wide range of large-scale platforms, from large clouds to upcoming exascale HPC platforms. Workflows will play a crucial role i…
▽ More
Scientific workflows are a cornerstone of modern scientific computing, and they have underpinned some of the most significant discoveries of the last decade. Many of these workflows have high computational, storage, and/or communication demands, and thus must execute on a wide range of large-scale platforms, from large clouds to upcoming exascale HPC platforms. Workflows will play a crucial role in the data-oriented and post-Moore's computing landscape as they democratize the application of cutting-edge research techniques, computationally intensive methods, and use of new computing platforms. As workflows continue to be adopted by scientific projects and user communities, they are becoming more complex. Workflows are increasingly composed of tasks that perform computations such as short machine learning inference, multi-node simulations, long-running machine learning model training, amongst others, and thus increasingly rely on heterogeneous architectures that include CPUs but also GPUs and accelerators. The workflow management system (WMS) technology landscape is currently segmented and presents significant barriers to entry due to the hundreds of seemingly comparable, yet incompatible, systems that exist. Another fundamental problem is that there are conflicting theoretical bases and abstractions for a WMS. Systems that use the same underlying abstractions can likely be translated between, which is not the case for systems that use different abstractions. More information: https://workflowsri.org/summits/technical
△ Less
Submitted 9 June, 2021;
originally announced June 2021.
-
A cost-benefit analysis of cross-lingual transfer methods
Authors:
Guilherme Moraes Rosa,
Luiz Henrique Bonifacio,
Leandro Rodrigues de Souza,
Roberto Lotufo,
Rodrigo Nogueira
Abstract:
An effective method for cross-lingual transfer is to fine-tune a bilingual or multilingual model on a supervised dataset in one language and evaluating it on another language in a zero-shot manner. Translating examples at training time or inference time are also viable alternatives. However, there are costs associated with these methods that are rarely addressed in the literature. In this work, we…
▽ More
An effective method for cross-lingual transfer is to fine-tune a bilingual or multilingual model on a supervised dataset in one language and evaluating it on another language in a zero-shot manner. Translating examples at training time or inference time are also viable alternatives. However, there are costs associated with these methods that are rarely addressed in the literature. In this work, we analyze cross-lingual methods in terms of their effectiveness (e.g., accuracy), development and deployment costs, as well as their latencies at inference time. Our experiments on three tasks indicate that the best cross-lingual method is highly task-dependent. Finally, by combining zero-shot and translation methods, we achieve the state-of-the-art in two of the three datasets used in this work. Based on these results, we question the need for manually labeled training data in a target language. Code and translated datasets are available at https://github.com/unicamp-dl/cross-lingual-analysis
△ Less
Submitted 14 December, 2021; v1 submitted 14 May, 2021;
originally announced May 2021.