-
Mitigating Challenges of the Space Environment for Onboard Artificial Intelligence: Design Overview of the Imaging Payload on SpIRIT
Authors:
Miguel Ortiz del Castillo,
Jonathan Morgan,
Jack McRobbie,
Clint Therakam,
Zaher Joukhadar,
Robert Mearns,
Simon Barraclough,
Richard Sinnott,
Andrew Woods,
Chris Bayliss,
Kris Ehinger,
Ben Rubinstein,
James Bailey,
Airlie Chapman,
Michele Trenti
Abstract:
Artificial intelligence (AI) and autonomous edge computing in space are emerging areas of interest to augment capabilities of nanosatellites, where modern sensors generate orders of magnitude more data than can typically be transmitted to mission control. Here, we present the hardware and software design of an onboard AI subsystem hosted on SpIRIT. The system is optimised for on-board computer vis…
▽ More
Artificial intelligence (AI) and autonomous edge computing in space are emerging areas of interest to augment capabilities of nanosatellites, where modern sensors generate orders of magnitude more data than can typically be transmitted to mission control. Here, we present the hardware and software design of an onboard AI subsystem hosted on SpIRIT. The system is optimised for on-board computer vision experiments based on visible light and long wave infrared cameras. This paper highlights the key design choices made to maximise the robustness of the system in harsh space conditions, and their motivation relative to key mission requirements, such as limited compute resources, resilience to cosmic radiation, extreme temperature variations, distribution shifts, and very low transmission bandwidths. The payload, called Loris, consists of six visible light cameras, three infrared cameras, a camera control board and a Graphics Processing Unit (GPU) system-on-module. Loris enables the execution of AI models with on-orbit fine-tuning as well as a next-generation image compression algorithm, including progressive coding. This innovative approach not only enhances the data processing capabilities of nanosatellites but also lays the groundwork for broader applications to remote sensing from space.
△ Less
Submitted 12 April, 2024;
originally announced April 2024.
-
DESERE: The 1st Workshop on Decentralised Search and Recommendation
Authors:
Mohamed Ragab,
Yury Savateev,
Wenjie Wang,
Reza Moosaei,
Thanassis Tiropanis,
Alexandra Poulovassilis,
Adriane Chapman,
Helen Oliver,
George Roussos
Abstract:
The DESERE Workshop, our First Workshop on Decentralised Search and Recommendation, offers a platform for researchers to explore and share innovative ideas on decentralised web services, mainly focusing on three major topics: (i) societal impact of decentralised systems: their effect on privacy, policy, and regulation; (ii) decentralising applications: algorithmic and performance challenges that a…
▽ More
The DESERE Workshop, our First Workshop on Decentralised Search and Recommendation, offers a platform for researchers to explore and share innovative ideas on decentralised web services, mainly focusing on three major topics: (i) societal impact of decentralised systems: their effect on privacy, policy, and regulation; (ii) decentralising applications: algorithmic and performance challenges that arise from decentralisation; and (iii) infrastructure to support decentralised systems and services: peer-to-peer networks, routing, and performance evaluation tools
△ Less
Submitted 12 March, 2024;
originally announced March 2024.
-
Friends Across Time: Multi-Scale Action Segmentation Transformer for Surgical Phase Recognition
Authors:
Bokai Zhang,
Jiayuan Meng,
Bin Cheng,
Dean Biskup,
Svetlana Petculescu,
Angela Chapman
Abstract:
Automatic surgical phase recognition is a core technology for modern operating rooms and online surgical video assessment platforms. Current state-of-the-art methods use both spatial and temporal information to tackle the surgical phase recognition task. Building on this idea, we propose the Multi-Scale Action Segmentation Transformer (MS-AST) for offline surgical phase recognition and the Multi-S…
▽ More
Automatic surgical phase recognition is a core technology for modern operating rooms and online surgical video assessment platforms. Current state-of-the-art methods use both spatial and temporal information to tackle the surgical phase recognition task. Building on this idea, we propose the Multi-Scale Action Segmentation Transformer (MS-AST) for offline surgical phase recognition and the Multi-Scale Action Segmentation Causal Transformer (MS-ASCT) for online surgical phase recognition. We use ResNet50 or EfficientNetV2-M for spatial feature extraction. Our MS-AST and MS-ASCT can model temporal information at different scales with multi-scale temporal self-attention and multi-scale temporal cross-attention, which enhances the capture of temporal relationships between frames and segments. We demonstrate that our method can achieve 95.26% and 96.15% accuracy on the Cholec80 dataset for online and offline surgical phase recognition, respectively, which achieves new state-of-the-art results. Our method can also achieve state-of-the-art results on non-medical datasets in the video action segmentation domain.
△ Less
Submitted 21 January, 2024;
originally announced January 2024.
-
Supporting Better Insights of Data Science Pipelines with Fine-grained Provenance
Authors:
Adriane Chapman,
Luca Lauro,
Paolo Missier,
Riccardo Torlone
Abstract:
Successful data-driven science requires complex data engineering pipelines to clean, transform, and alter data in preparation for machine learning, and robust results can only be achieved when each step in the pipeline can be justified, and its effect on the data explained. In this framework, our aim is to provide data scientists with facilities to gain an in-depth understanding of how each step i…
▽ More
Successful data-driven science requires complex data engineering pipelines to clean, transform, and alter data in preparation for machine learning, and robust results can only be achieved when each step in the pipeline can be justified, and its effect on the data explained. In this framework, our aim is to provide data scientists with facilities to gain an in-depth understanding of how each step in the pipeline affects the data, from the raw input to training sets ready to be used for learning. Starting from an extensible set of data preparation operators commonly used within a data science setting, in this work we present a provenance management infrastructure for generating, storing, and querying very granular accounts of data transformations, at the level of individual elements within datasets whenever possible. Then, from the formal definition of a core set of data science preprocessing operators, we derive a provenance semantics embodied by a collection of templates expressed in PROV, a standard model for data provenance. Using those templates as a reference, our provenance generation algorithm generalises to any operator with observable input/output pairs. We provide a prototype implementation of an application-level provenance capture library to produce, in a semi-automatic way, complete provenance documents that account for the entire pipeline. We report on the ability of our implementations to capture provenance in real ML benchmark pipelines and over TCP-DI synthetic data. We finally show how the collected provenance can be used to answer a suite of provenance benchmark queries that underpin some common pipeline inspection questions, as expressed on the Data Science Stack Exchange.
△ Less
Submitted 27 October, 2023;
originally announced October 2023.
-
On Interpretable Approaches to Cluster, Classify and Represent Multi-Subspace Data via Minimum Lossy Coding Length based on Rate-Distortion Theory
Authors:
Kai-Liang Lu,
Avraham Chapman
Abstract:
To cluster, classify and represent are three fundamental objectives of learning from high-dimensional data with intrinsic structure. To this end, this paper introduces three interpretable approaches, i.e., segmentation (clustering) via the Minimum Lossy Coding Length criterion, classification via the Minimum Incremental Coding Length criterion and representation via the Maximal Coding Rate Reducti…
▽ More
To cluster, classify and represent are three fundamental objectives of learning from high-dimensional data with intrinsic structure. To this end, this paper introduces three interpretable approaches, i.e., segmentation (clustering) via the Minimum Lossy Coding Length criterion, classification via the Minimum Incremental Coding Length criterion and representation via the Maximal Coding Rate Reduction criterion. These are derived based on the lossy data coding and compression framework from the principle of rate distortion in information theory. These algorithms are particularly suitable for dealing with finite-sample data (allowed to be sparse or almost degenerate) of mixed Gaussian distributions or subspaces. The theoretical value and attractive features of these methods are summarized by comparison with other learning methods or evaluation criteria. This summary note aims to provide a theoretical guide to researchers (also engineers) interested in understanding 'white-box' machine (deep) learning methods.
△ Less
Submitted 20 February, 2023;
originally announced February 2023.
-
Regularizing Neural Network Training via Identity-wise Discriminative Feature Suppression
Authors:
Avraham Chapman,
Lingqiao Liu
Abstract:
It is well-known that a deep neural network has a strong fitting capability and can easily achieve a low training error even with randomly assigned class labels. When the number of training samples is small, or the class labels are noisy, networks tend to memorize patterns specific to individual instances to minimize the training error. This leads to the issue of overfitting and poor generalisatio…
▽ More
It is well-known that a deep neural network has a strong fitting capability and can easily achieve a low training error even with randomly assigned class labels. When the number of training samples is small, or the class labels are noisy, networks tend to memorize patterns specific to individual instances to minimize the training error. This leads to the issue of overfitting and poor generalisation performance. This paper explores a remedy by suppressing the network's tendency to rely on instance-specific patterns for empirical error minimisation. The proposed method is based on an adversarial training framework. It suppresses features that can be utilized to identify individual instances among samples within each class. This leads to classifiers only using features that are both discriminative across classes and common within each class. We call our method Adversarial Suppression of Identity Features (ASIF), and demonstrate the usefulness of this technique in boosting generalisation accuracy when faced with small datasets or noisy labels. Our source code is available.
△ Less
Submitted 1 October, 2022; v1 submitted 29 September, 2022;
originally announced September 2022.
-
A Polynomial-time Decentralised Algorithm for Coordinated Management of Multiple Intersections
Authors:
Tatsuya Iwase,
Sebastian Stein,
Enrico H. Gerding,
Archie Chapman
Abstract:
Autonomous intersection management has the potential to reduce road traffic congestion and energy consumption. To realize this potential, efficient algorithms are needed. However, most existing studies locally optimize one intersection at a time, and this can cause negative externalities on the traffic network as a whole. Here, we focus on coordinating multiple intersections, and formulate the pro…
▽ More
Autonomous intersection management has the potential to reduce road traffic congestion and energy consumption. To realize this potential, efficient algorithms are needed. However, most existing studies locally optimize one intersection at a time, and this can cause negative externalities on the traffic network as a whole. Here, we focus on coordinating multiple intersections, and formulate the problem as a distributed constraint optimisation problem (DCOP). We consider three utility design approaches that trade off efficiency and fairness. Our polynomial-time algorithm for coordinating multiple intersections reduces the traffic delay by about 41% compared to independent single intersection management approaches.
△ Less
Submitted 28 April, 2022;
originally announced May 2022.
-
Fair Coordination of Distributed Energy Resources with Volt-Var Control and PV Curtailment
Authors:
Daniel Gebbran,
Sleiman Mhanna,
Yiju Ma,
Archie C. Chapman,
Gregor Verbic
Abstract:
This paper presents a novel distributed optimal power flow (DOPF) method for fair distributed energy resource (DER) coordination in the context of mandated rooftop PV inverter control modes. In practice, inverter reactive power control is increasingly required by grid connection codes, which often unfairly curtail PV generation of prosumers towards the end of low-voltage feeders. Similarly, optimi…
▽ More
This paper presents a novel distributed optimal power flow (DOPF) method for fair distributed energy resource (DER) coordination in the context of mandated rooftop PV inverter control modes. In practice, inverter reactive power control is increasingly required by grid connection codes, which often unfairly curtail PV generation of prosumers towards the end of low-voltage feeders. Similarly, optimization-based DER coordination methods that aim solely for technically-efficient DER coordination do not consider the distribution of PV curtailment across customers. To address these concerns, we develop a tractable multi-objective DOPF method for optimal DER coordination that (i) curtails PV generation fairly across prosumers, and (ii) incorporates a standard piecewise-linear volt-var control reactive power control function without using integer variables. Three equity principles representing different interpretations of fairness are implemented in our coordination method; namely, egalitarian, proportional and uniform dynamic PV curtailment redistribution. The performance of our approach is demonstrated on low-voltage distribution feeders of different sizes (5, 10, 25, 50 and 100 prosumers) using two network topologies: line topology without lateral spurs and tree topology with lateral spurs. Each network considers three levels of PV penetration, giving 30 test systems in total. The results demonstrate the effectiveness of the proposed DOPF method for fair DER coordination: PV curtailment is equitably distributed among prosumers with a computational burden on par with conventional DOPF approaches. Moreover, different fairness methods result in different patterns of curtailment, which a regulator may choose between.
△ Less
Submitted 9 March, 2022;
originally announced March 2022.
-
Practical Considerations of DER Coordination with Distributed Optimal Power Flow
Authors:
Daniel Gebbran,
Sleiman Mhanna,
Archie C. Chapman,
Wibowo Hardjawana,
Branka Vucetic,
Gregor Verbic
Abstract:
The coordination of prosumer-owned, behind-the-meter distributed energy resources (DER) can be achieved using a multiperiod, distributed optimal power flow (DOPF), which satisfies network constraints and preserves the privacy of prosumers. To solve the problem in a distributed fashion, it is decomposed and solved using the alternating direction method of multipliers (ADMM), which may require many…
▽ More
The coordination of prosumer-owned, behind-the-meter distributed energy resources (DER) can be achieved using a multiperiod, distributed optimal power flow (DOPF), which satisfies network constraints and preserves the privacy of prosumers. To solve the problem in a distributed fashion, it is decomposed and solved using the alternating direction method of multipliers (ADMM), which may require many iterations between prosumers and the central entity (i.e., an aggregator). Furthermore, the computational burden is shared among the agents with different processing capacities. Therefore, computational constraints and communication requirements may make the DOPF infeasible or impractical. In this paper, part of the DOPF (some of the prosumer subproblems) is executed on a Raspberry Pi-based hardware prototype, which emulates a low processing power, edge computing device. Four important aspects are analyzed using test cases of different complexities. The first is the computation cost of executing the subproblems in the edge computing device. The second is the algorithm operation on congested electrical networks, which impacts the convergence speed of DOPF solutions. Third, the precision of the computed solution, including the trade-off between solution quality and the number of iterations, is examined. Fourth, the communication requirements for implementation across different communication networks are investigated. The above metrics are analyzed in four scenarios involving 26-bus and 51-bus networks.
△ Less
Submitted 9 March, 2022;
originally announced March 2022.
-
Provenance, Anonymisation and Data Environments: a Unifying Construction
Authors:
Muhammad Aslam Jarwar,
Adriane Chapman,
Mark Elliot,
Fatemeh Raji
Abstract:
The Anonymisation Decision-making Framework (ADF) operationalizes the risk management of data exchange between organizations, referred to as "data environments". The second edition of ADF has increased its emphasis on modeling data flows, highlighting a potential new use of provenance information to support anonymisation decision-making. In this paper, we provide a use case that showcases this fun…
▽ More
The Anonymisation Decision-making Framework (ADF) operationalizes the risk management of data exchange between organizations, referred to as "data environments". The second edition of ADF has increased its emphasis on modeling data flows, highlighting a potential new use of provenance information to support anonymisation decision-making. In this paper, we provide a use case that showcases this functionality more. Based on this use case, we identify how provenance information could be utilized within the ADF framework, and identify a currently un-met requirement which is the modeling of \textit{data environments}. We show how data environments can be implemented within the W3C PROV in four different ways. We analyze the costs and benefits of each approach, and consider another use case as a partial check for completeness. We then summarize our findings and suggest ways forward.
△ Less
Submitted 21 July, 2021;
originally announced July 2021.
-
Launching into clinical space with medspaCy: a new clinical text processing toolkit in Python
Authors:
Hannah Eyre,
Alec B Chapman,
Kelly S Peterson,
Jianlin Shi,
Patrick R Alba,
Makoto M Jones,
Tamara L Box,
Scott L DuVall,
Olga V Patterson
Abstract:
Despite impressive success of machine learning algorithms in clinical natural language processing (cNLP), rule-based approaches still have a prominent role. In this paper, we introduce medspaCy, an extensible, open-source cNLP library based on spaCy framework that allows flexible integration of rule-based and machine learning-based algorithms adapted to clinical text. MedspaCy includes a variety o…
▽ More
Despite impressive success of machine learning algorithms in clinical natural language processing (cNLP), rule-based approaches still have a prominent role. In this paper, we introduce medspaCy, an extensible, open-source cNLP library based on spaCy framework that allows flexible integration of rule-based and machine learning-based algorithms adapted to clinical text. MedspaCy includes a variety of components that meet common cNLP needs such as context analysis and mapping to standard terminologies. By utilizing spaCy's clear and easy-to-use conventions, medspaCy enables development of custom pipelines that integrate easily with other spaCy-based modules. Our toolkit includes several core components and facilitates rapid development of pipelines for clinical text.
△ Less
Submitted 14 June, 2021;
originally announced June 2021.
-
What Can Knowledge Bring to Machine Learning? -- A Survey of Low-shot Learning for Structured Data
Authors:
Yang Hu,
Adriane Chapman,
Guihua Wen,
Dame Wendy Hall
Abstract:
Supervised machine learning has several drawbacks that make it difficult to use in many situations. Drawbacks include: heavy reliance on massive training data, limited generalizability and poor expressiveness of high-level semantics. Low-shot Learning attempts to address these drawbacks. Low-shot learning allows the model to obtain good predictive power with very little or no training data, where…
▽ More
Supervised machine learning has several drawbacks that make it difficult to use in many situations. Drawbacks include: heavy reliance on massive training data, limited generalizability and poor expressiveness of high-level semantics. Low-shot Learning attempts to address these drawbacks. Low-shot learning allows the model to obtain good predictive power with very little or no training data, where structured knowledge plays a key role as a high-level semantic representation of human. This article will review the fundamental factors of low-shot learning technologies, with a focus on the operation of structured knowledge under different low-shot conditions. We also introduce other techniques relevant to low-shot learning. Finally, we point out the limitations of low-shot learning, the prospects and gaps of industrial applications, and future research directions.
△ Less
Submitted 11 June, 2021;
originally announced June 2021.
-
Data provenance, curation and quality in metrology
Authors:
James Cheney,
Adriane Chapman,
Joy Davidson,
Alistair Forbes
Abstract:
Data metrology -- the assessment of the quality of data -- particularly in scientific and industrial settings, has emerged as an important requirement for the UK National Physical Laboratory (NPL) and other national metrology institutes. Data provenance and data curation are key components for emerging understanding of data metrology. However, to date provenance research has had limited visibility…
▽ More
Data metrology -- the assessment of the quality of data -- particularly in scientific and industrial settings, has emerged as an important requirement for the UK National Physical Laboratory (NPL) and other national metrology institutes. Data provenance and data curation are key components for emerging understanding of data metrology. However, to date provenance research has had limited visibility to or uptake in metrology. In this work, we summarize a scoping study carried out with NPL staff and industrial participants to understand their current and future needs for provenance, curation and data quality. We then survey provenance technology and standards that are relevant to metrology. We analyse the gaps between requirements and the current state of the art.
△ Less
Submitted 16 February, 2021;
originally announced February 2021.
-
Peer-to-Peer Energy Systems for Connected Communities: A Review of Recent Advances and Emerging Challenges
Authors:
Wayes Tushar,
Chau Yuen,
Tapan Saha,
Thomas Morstyn,
Archie Chapman,
M. Jan E Alam,
Sarmad Hanif,
H. Vincent Poor
Abstract:
After a century of relative stability of the electricity industry, extensive deployment of distributed energy resources and recent advances in computation and communication technologies have changed the nature of how we consume, trade, and apply energy. The power system is facing a transition from its traditional hierarchical structure to a more deregulated model by introducing new energy distribu…
▽ More
After a century of relative stability of the electricity industry, extensive deployment of distributed energy resources and recent advances in computation and communication technologies have changed the nature of how we consume, trade, and apply energy. The power system is facing a transition from its traditional hierarchical structure to a more deregulated model by introducing new energy distribution models such as peer-to-peer sharing for connected communities. The proven effectiveness of P2P sharing in benefiting both prosumers and the grid has been demonstrated in many studies and pilot projects. However, there is still no extensive implementation of such sharing models in today's electricity markets. This paper aims to shed some light on this gap through a comprehensive overview of recent advances in the P2P energy system and an insightful discussion of the challenges that need to be addressed in order to establish P2P sharing as a viable energy management option in today's electricity market. To this end, in this article, we provide some background on different aspects of P2P sharing. Then, we discuss advances in P2P sharing through a systematic domain-based classification. We also review different pilot projects on P2P sharing across the globe. Finally, we identify and discuss a number of challenges that need to be addressed for scaling up P2P sharing in the electricity market followed by concluding remarks at the end of the paper.
△ Less
Submitted 22 November, 2020;
originally announced November 2020.
-
Graph-based Visual-Semantic Entanglement Network for Zero-shot Image Recognition
Authors:
Yang Hu,
Guihua Wen,
Adriane Chapman,
Pei Yang,
Mingnan Luo,
Yingxue Xu,
Dan Dai,
Wendy Hall
Abstract:
Zero-shot learning uses semantic attributes to connect the search space of unseen objects. In recent years, although the deep convolutional network brings powerful visual modeling capabilities to the ZSL task, its visual features have severe pattern inertia and lack of representation of semantic relationships, which leads to severe bias and ambiguity. In response to this, we propose the Graph-base…
▽ More
Zero-shot learning uses semantic attributes to connect the search space of unseen objects. In recent years, although the deep convolutional network brings powerful visual modeling capabilities to the ZSL task, its visual features have severe pattern inertia and lack of representation of semantic relationships, which leads to severe bias and ambiguity. In response to this, we propose the Graph-based Visual-Semantic Entanglement Network to conduct graph modeling of visual features, which is mapped to semantic attributes by using a knowledge graph, it contains several novel designs: 1. it establishes a multi-path entangled network with the convolutional neural network (CNN) and the graph convolutional network (GCN), which input the visual features from CNN to GCN to model the implicit semantic relations, then GCN feedback the graph modeled information to CNN features; 2. it uses attribute word vectors as the target for the graph semantic modeling of GCN, which forms a self-consistent regression for graph modeling and supervise GCN to learn more personalized attribute relations; 3. it fuses and supplements the hierarchical visual-semantic features refined by graph modeling into visual embedding. Our method outperforms state-of-the-art approaches on multiple representative ZSL datasets: AwA2, CUB, and SUN by promoting the semantic linkage modelling of visual features.
△ Less
Submitted 11 June, 2021; v1 submitted 8 June, 2020;
originally announced June 2020.
-
Deep Learning for LiDAR Point Clouds in Autonomous Driving: A Review
Authors:
Ying Li,
Lingfei Ma,
Zilong Zhong,
Fei Liu,
Dongpu Cao,
Jonathan Li,
Michael A. Chapman
Abstract:
Recently, the advancement of deep learning in discriminative feature learning from 3D LiDAR data has led to rapid development in the field of autonomous driving. However, automated processing uneven, unstructured, noisy, and massive 3D point clouds is a challenging and tedious task. In this paper, we provide a systematic review of existing compelling deep learning architectures applied in LiDAR po…
▽ More
Recently, the advancement of deep learning in discriminative feature learning from 3D LiDAR data has led to rapid development in the field of autonomous driving. However, automated processing uneven, unstructured, noisy, and massive 3D point clouds is a challenging and tedious task. In this paper, we provide a systematic review of existing compelling deep learning architectures applied in LiDAR point clouds, detailing for specific tasks in autonomous driving such as segmentation, detection, and classification. Although several published research papers focus on specific topics in computer vision for autonomous vehicles, to date, no general survey on deep learning applied in LiDAR point clouds for autonomous vehicles exists. Thus, the goal of this paper is to narrow the gap in this topic. More than 140 key contributions in the recent five years are summarized in this survey, including the milestone 3D deep architectures, the remarkable deep learning applications in 3D semantic segmentation, object detection, and classification; specific datasets, evaluation metrics, and the state of the art performance. Finally, we conclude the remaining challenges and future researches.
△ Less
Submitted 19 May, 2020;
originally announced May 2020.
-
Autonomous Industrial Management via Reinforcement Learning: Self-Learning Agents for Decision-Making -- A Review
Authors:
Leonardo A. Espinosa Leal,
Magnus Westerlund,
Anthony Chapman
Abstract:
Industry has always been in the pursuit of becoming more economically efficient and the current focus has been to reduce human labour using modern technologies. Even with cutting edge technologies, which range from packaging robots to AI for fault detection, there is still some ambiguity on the aims of some new systems, namely, whether they are automated or autonomous. In this paper we indicate th…
▽ More
Industry has always been in the pursuit of becoming more economically efficient and the current focus has been to reduce human labour using modern technologies. Even with cutting edge technologies, which range from packaging robots to AI for fault detection, there is still some ambiguity on the aims of some new systems, namely, whether they are automated or autonomous. In this paper we indicate the distinctions between automated and autonomous system as well as review the current literature and identify the core challenges for creating learning mechanisms of autonomous agents. We discuss using different types of extended realities, such as digital twins, to train reinforcement learning agents to learn specific tasks through generalization. Once generalization is achieved, we discuss how these can be used to develop self-learning agents. We then introduce self-play scenarios and how they can be used to teach self-learning agents through a supportive environment which focuses on how the agents can adapt to different real-world environments.
△ Less
Submitted 20 October, 2019;
originally announced October 2019.
-
Macro-action Multi-time scale Dynamic Programming for Energy Management in Buildings with Phase Change Materials
Authors:
Zahra Rahimpour,
Gregor Verbic,
Archie C. Chapman
Abstract:
This paper focuses on energy management in buildings with phase change material (PCM), which is primarily used to improve thermal performance, but can also serve as an energy storage system. In this setting, optimal scheduling of an HVAC system is challenging because of the nonlinear and non-convex characteristics of the PCM, which makes solving the corresponding optimization problem using convent…
▽ More
This paper focuses on energy management in buildings with phase change material (PCM), which is primarily used to improve thermal performance, but can also serve as an energy storage system. In this setting, optimal scheduling of an HVAC system is challenging because of the nonlinear and non-convex characteristics of the PCM, which makes solving the corresponding optimization problem using conventional optimization techniques impractical. Instead, we use dynamic programming (DP) to deal with the nonlinear nature of the PCM. To overcome DP's curse of dimensionality, this paper proposes a novel methodology to reduce the computational burden, while maintaining the quality of the solution. Specifically, the method incorporates approaches from sequential decision making in artificial intelligence, including macro actions and multi-time scale Markov decision processes, coupled with an underlying state-space approximation to reduce the state-space and action-space size. The performance of the method is demonstrated on an energy management problem for a typical residential building located in Sydney, Australia. The results demonstrate that the proposed method performs well with a computational speed-up of up to 12,900 times compared to the direct application of DP.
△ Less
Submitted 10 December, 2019; v1 submitted 11 June, 2019;
originally announced June 2019.
-
Dataset search: a survey
Authors:
Adriane Chapman,
Elena Simperl,
Laura Koesten,
George Konstantinidis,
Luis-Daniel Ibáñez-Gonzalez,
Emilia Kacprzak,
Paul Groth
Abstract:
Generating value from data requires the ability to find, access and make sense of datasets. There are many efforts underway to encourage data sharing and reuse, from scientific publishers asking authors to submit data alongside manuscripts to data marketplaces, open data portals and data communities. Google recently beta released a search service for datasets, which allows users to discover data s…
▽ More
Generating value from data requires the ability to find, access and make sense of datasets. There are many efforts underway to encourage data sharing and reuse, from scientific publishers asking authors to submit data alongside manuscripts to data marketplaces, open data portals and data communities. Google recently beta released a search service for datasets, which allows users to discover data stored in various online repositories via keyword queries. These developments foreshadow an emerging research field around dataset search or retrieval that broadly encompasses frameworks, methods and tools that help match a user data need against a collection of datasets. Here, we survey the state of the art of research and commercial systems in dataset retrieval. We identify what makes dataset search a research field in its own right, with unique challenges and methods and highlight open problems. We look at approaches and implementations from related areas dataset search is drawing upon, including information retrieval, databases, entity-centric and tabular search in order to identify possible paths to resolve these open problems as well as immediate next steps that will take the field forward.
△ Less
Submitted 3 January, 2019;
originally announced January 2019.
-
Accelerated Methods for the SOCP-relaxed Component-based Distributed Optimal Power Flow
Authors:
Sleiman Mhanna,
Archie Chapman,
Gregor Verbic
Abstract:
In light of the increased focus on distributed methods, this paper proposes two accelerated subgradient methods and an adaptive penalty parameter scheme to speed-up the convergence of ADMM on the component-based dual decomposition of the second-order cone programming (SOCP) relaxation of the OPF. This work is the first to apply an adaptive penalty parameter method along with an accelerated subgrad…
▽ More
In light of the increased focus on distributed methods, this paper proposes two accelerated subgradient methods and an adaptive penalty parameter scheme to speed-up the convergence of ADMM on the component-based dual decomposition of the second-order cone programming (SOCP) relaxation of the OPF. This work is the first to apply an adaptive penalty parameter method along with an accelerated subgradient method together in one scheme for distributed OPF. This accelerated scheme is demonstrated to reach substantial speed-ups, as high as 87%, on real-world test systems with more than 9000 buses, as well as on other difficult test cases.
△ Less
Submitted 13 August, 2018; v1 submitted 10 August, 2018;
originally announced August 2018.
-
A Component-Based Dual Decomposition Method for the OPF Problem
Authors:
Sleiman Mhanna,
Gregor Verbic,
Archie Chapman
Abstract:
This paper proposes a component-based dual decomposition of the nonconvex AC optimal power flow (OPF) problem, where the modified dual function is solved in a distributed fashion. The main contribution of this work is that is demonstrates that a distributed method with carefully tuned parameters can converge to globally optimal solutions despite the inherent nonconvexity of the problem and the abs…
▽ More
This paper proposes a component-based dual decomposition of the nonconvex AC optimal power flow (OPF) problem, where the modified dual function is solved in a distributed fashion. The main contribution of this work is that is demonstrates that a distributed method with carefully tuned parameters can converge to globally optimal solutions despite the inherent nonconvexity of the problem and the absence of theoretical guarantees of convergence. This paper is the first to conduct extensive numerical analysis resulting in the identification and tabulation of the algorithmic parameter settings that are crucial for the convergence of the method on 72 AC OPF test instances. Moreover, this work provides a deeper insight into the geometry of the modified Lagrange dual function of the OPF problem and highlights the conditions that make this function differentiable. This numerical demonstration of convergence coupled with the scalability and the privacy preserving nature of the proposed method makes it well suited for smart grid applications such as multi-period OPF with demand response (DR) and security constrained unit commitment (SCUC) with contingency constraints and multiple transmission system operators (TSOs).
△ Less
Submitted 22 August, 2017; v1 submitted 12 April, 2017;
originally announced April 2017.
-
Meraculous2: fast accurate short-read assembly of large polymorphic genomes
Authors:
Jarrod A. Chapman,
Isaac Y. Ho,
Eugene Goltsman,
Daniel S. Rokhsar
Abstract:
We present Meraculous2, an update to the Meraculous short-read assembler that includes (1) handling of allelic variation using "bubble" structures within the de Bruijn graph, (2) improved gap closing, and (3) an improved scaffolding algorithm that produces more complete assemblies without compromising scaffolding accuracy. The speed and bandwidth efficiency of the new parallel implementation have…
▽ More
We present Meraculous2, an update to the Meraculous short-read assembler that includes (1) handling of allelic variation using "bubble" structures within the de Bruijn graph, (2) improved gap closing, and (3) an improved scaffolding algorithm that produces more complete assemblies without compromising scaffolding accuracy. The speed and bandwidth efficiency of the new parallel implementation have also been substantially improved, allowing the assembly of a human genome to be accomplished in 24 hours on the JGI/NERSC Genepool system. To highlight the features of Meraculous2 we present here the assembly of the diploid human genome NA12878, and compare it with previously published assemblies of the same data using other algorithms. The Meraculous2 assemblies are shown to have better completeness, contiguity, and accuracy than other published assemblies for these data. Practical considerations including pre-assembly analyses of polymorphism and repetitiveness are described.
△ Less
Submitted 7 November, 2017; v1 submitted 2 August, 2016;
originally announced August 2016.
-
Tight LP Approximations for the Optimal Power Flow Problem
Authors:
Sleiman Mhanna,
Gregor Verbic,
Archie Chapman
Abstract:
DC power flow approximations are ubiquitous in the electricity industry. However, these linear approximations fail to capture important physical aspects of power flow, such as the reactive power and voltage magnitude, which are crucial in many applications to ensure voltage stability and AC solution feasibility. This paper proposes two LP approximations of the AC optimal power flow problem, founde…
▽ More
DC power flow approximations are ubiquitous in the electricity industry. However, these linear approximations fail to capture important physical aspects of power flow, such as the reactive power and voltage magnitude, which are crucial in many applications to ensure voltage stability and AC solution feasibility. This paper proposes two LP approximations of the AC optimal power flow problem, founded on tight polyhedral approximations of the SOC constraints, in the aim of retaining the good lower bounds of the SOCP relaxation and relishing the computational efficiency of LP solvers. The high accuracy of the two LP approximations is corroborated by rigorous computational evaluations on systems with up to 9241 buses and different operating conditions. The computational efficiency of the two proposed LP models is shown to be comparable to, if not better than, that of the SOCP models in most instances. This performance is ideal for MILP extensions of these LP models since MILP is computationally more efficient than MIQCP.
△ Less
Submitted 15 March, 2016; v1 submitted 1 March, 2016;
originally announced March 2016.
-
A Fast Distributed Algorithm for Large-Scale Demand Response Aggregation
Authors:
Sleiman Mhanna,
Archie Chapman,
Gregor Verbic
Abstract:
A major challenge to implementing residential demand response is that of aligning the objectives of many households, each of which aims to minimize its payments and maximize its comfort level, while balancing this with the objectives of an aggregator that aims to minimize the cost of electricity purchased in a pooled wholesale market. This paper presents a fast distributed algorithm for aggregatin…
▽ More
A major challenge to implementing residential demand response is that of aligning the objectives of many households, each of which aims to minimize its payments and maximize its comfort level, while balancing this with the objectives of an aggregator that aims to minimize the cost of electricity purchased in a pooled wholesale market. This paper presents a fast distributed algorithm for aggregating a large number of households with a mixture of discrete and continuous energy levels. A distinctive feature of the method in this paper is that the nonconvex DR problem is decomposed in terms of households as opposed to devices, which allows incorporating more intricate couplings between energy storage devices, appliances and distributed energy resources. The proposed method is a fast distributed algorithm applied to the double smoothed dual function of the adopted DR model. The method is tested on systems with up to 2560 households, each with 10 devices on average. The proposed algorithm is designed to terminate in 60 iterations irrespective of system size, which can be ideal for an on-line version of this problem. Moreover, numerical results show that with minimal parameter tuning, the algorithm exhibits a very similar convergence behavior throughout the studied systems and converges to near-optimal solutions, which corroborates its scalability.
△ Less
Submitted 1 March, 2016;
originally announced March 2016.
-
Online Distributed Optimization on Dynamic Networks
Authors:
Saghar Hosseini,
Airlie Chapman,
Mehran Mesbahi
Abstract:
This paper presents a distributed optimization scheme over a network of agents in the presence of cost uncertainties and over switching communication topologies. Inspired by recent advances in distributed convex optimization, we propose a distributed algorithm based on a dual sub-gradient averaging. The objective of this algorithm is to minimize a cost function cooperatively. Furthermore, the algo…
▽ More
This paper presents a distributed optimization scheme over a network of agents in the presence of cost uncertainties and over switching communication topologies. Inspired by recent advances in distributed convex optimization, we propose a distributed algorithm based on a dual sub-gradient averaging. The objective of this algorithm is to minimize a cost function cooperatively. Furthermore, the algorithm changes the weights on the communication links in the network to adapt to varying reliability of neighboring agents. A convergence rate analysis as a function of the underlying network topology is then presented, followed by simulation results for representative classes of sensor networks.
△ Less
Submitted 22 December, 2014;
originally announced December 2014.
-
Online Distributed ADMM on Networks
Authors:
Saghar Hosseini,
Airlie Chapman,
Mehran Mesbahi
Abstract:
This paper examines online distributed Alternating Direction Method of Multipliers (ADMM). The goal is to distributively optimize a global objective function over a network of decision makers under linear constraints. The global objective function is composed of convex cost functions associated with each agent. The local cost functions, on the other hand, are assumed to have been decomposed into t…
▽ More
This paper examines online distributed Alternating Direction Method of Multipliers (ADMM). The goal is to distributively optimize a global objective function over a network of decision makers under linear constraints. The global objective function is composed of convex cost functions associated with each agent. The local cost functions, on the other hand, are assumed to have been decomposed into two distinct convex functions, one of which is revealed to the decision makers over time and one known a priori. In addition, the agents must achieve consensus on the global variable that relates to the private local variables via linear constraints. In this work, we extend online ADMM to a distributed setting based on dual-averaging and distributed gradient descent. We then propose a performance metric for such online distributed algorithms and explore the performance of the sequence of decisions generated by the algorithm as compared with the best fixed decision in hindsight. This performance metric is called the social regret. A sub-linear upper bound on the social regret of the proposed algorithm is then obtained that underscores the role of the underlying network topology and certain condition measures associated with the linear constraints. The online distributed ADMM algorithm is then applied to a formation acquisition problem demonstrating the application of the proposed setup in distributed robotics.
△ Less
Submitted 2 October, 2015; v1 submitted 22 December, 2014;
originally announced December 2014.
-
Knapsack based Optimal Policies for Budget-Limited Multi-Armed Bandits
Authors:
Long Tran-Thanh,
Archie Chapman,
Alex Rogers,
Nicholas R. Jennings
Abstract:
In budget-limited multi-armed bandit (MAB) problems, the learner's actions are costly and constrained by a fixed budget. Consequently, an optimal exploitation policy may not be to pull the optimal arm repeatedly, as is the case in other variants of MAB, but rather to pull the sequence of different arms that maximises the agent's total reward within the budget. This difference from existing MABs me…
▽ More
In budget-limited multi-armed bandit (MAB) problems, the learner's actions are costly and constrained by a fixed budget. Consequently, an optimal exploitation policy may not be to pull the optimal arm repeatedly, as is the case in other variants of MAB, but rather to pull the sequence of different arms that maximises the agent's total reward within the budget. This difference from existing MABs means that new approaches to maximising the total reward are required. Given this, we develop two pulling policies, namely: (i) KUBE; and (ii) fractional KUBE. Whereas the former provides better performance up to 40% in our experimental settings, the latter is computationally less expensive. We also prove logarithmic upper bounds for the regret of both policies, and show that these bounds are asymptotically optimal (i.e. they only differ from the best possible regret by a constant factor).
△ Less
Submitted 9 April, 2012;
originally announced April 2012.
-
Automated Planning in Repeated Adversarial Games
Authors:
Enrique Munoz de Cote,
Archie C. Chapman,
Adam M. Sykulski,
Nicholas R. Jennings
Abstract:
Game theory's prescriptive power typically relies on full rationality and/or self-play interactions. In contrast, this work sets aside these fundamental premises and focuses instead on heterogeneous autonomous interactions between two or more agents. Specifically, we introduce a new and concise representation for repeated adversarial (constant-sum) games that highlight the necessary features that…
▽ More
Game theory's prescriptive power typically relies on full rationality and/or self-play interactions. In contrast, this work sets aside these fundamental premises and focuses instead on heterogeneous autonomous interactions between two or more agents. Specifically, we introduce a new and concise representation for repeated adversarial (constant-sum) games that highlight the necessary features that enable an automated planing agent to reason about how to score above the game's Nash equilibrium, when facing heterogeneous adversaries. To this end, we present TeamUP, a model-based RL algorithm designed for learning and planning such an abstraction. In essence, it is somewhat similar to R-max with a cleverly engineered reward shaping that treats exploration as an adversarial optimization problem. In practice, it attempts to find an ally with which to tacitly collude (in more than two-player games) and then collaborates on a joint plan of actions that can consistently score a high utility in adversarial repeated games. We use the inaugural Lemonade Stand Game Tournament to demonstrate the effectiveness of our approach, and find that TeamUP is the best performing agent, demoting the Tournament's actual winning strategy into second place. In our experimental analysis, we show hat our strategy successfully and consistently builds collaborations with many different heterogeneous (and sometimes very sophisticated) adversaries.
△ Less
Submitted 15 March, 2012;
originally announced March 2012.
-
Filtered Fictitious Play for Perturbed Observation Potential Games and Decentralised POMDPs
Authors:
Archie C. Chapman,
Simon A. Williamson,
Nicholas R. Jennings
Abstract:
Potential games and decentralised partially observable MDPs (Dec-POMDPs) are two commonly used models of multi-agent interaction, for static optimisation and sequential decisionmaking settings, respectively. In this paper we introduce filtered fictitious play for solving repeated potential games in which each player's observations of others' actions are perturbed by random noise, and use this algo…
▽ More
Potential games and decentralised partially observable MDPs (Dec-POMDPs) are two commonly used models of multi-agent interaction, for static optimisation and sequential decisionmaking settings, respectively. In this paper we introduce filtered fictitious play for solving repeated potential games in which each player's observations of others' actions are perturbed by random noise, and use this algorithm to construct an online learning method for solving Dec-POMDPs. Specifically, we prove that noise in observations prevents standard fictitious play from converging to Nash equilibrium in potential games, which also makes fictitious play impractical for solving Dec-POMDPs. To combat this, we derive filtered fictitious play, and provide conditions under which it converges to a Nash equilibrium in potential games with noisy observations. We then use filtered fictitious play to construct a solver for Dec-POMDPs, and demonstrate our new algorithm's performance in a box pushing problem. Our results show that we consistently outperform the state-of-the-art Dec-POMDP solver by an average of 100% across the range of noise in the observation function.
△ Less
Submitted 14 February, 2012;
originally announced February 2012.
-
Surrogate Parenthood: Protected and Informative Graphs
Authors:
Barbara Blaustein,
Adriane Chapman,
Len Seligman,
M. David Allen,
Arnon Rosenthal
Abstract:
Many applications, including provenance and some analyses of social networks, require path-based queries over graph-structured data. When these graphs contain sensitive information, paths may be broken, resulting in uninformative query results. This paper presents innovative techniques that give users more informative graph query results; the techniques leverage a common industry practice of provi…
▽ More
Many applications, including provenance and some analyses of social networks, require path-based queries over graph-structured data. When these graphs contain sensitive information, paths may be broken, resulting in uninformative query results. This paper presents innovative techniques that give users more informative graph query results; the techniques leverage a common industry practice of providing what we call surrogates: alternate, less sensitive versions of nodes and edges releasable to a broader community. We describe techniques for interposing surrogate nodes and edges to protect sensitive graph components, while maximizing graph connectivity and giving users as much information as possible. In this work, we formalize the problem of creating a protected account G' of a graph G. We provide a utility measure to compare the informativeness of alternate protected accounts and an opacity measure for protected accounts, which indicates the likelihood that an attacker can recreate the topology of the original graph from the protected account. We provide an algorithm to create a maximally useful protected account of a sensitive graph, and show through evaluation with the PLUS prototype that using surrogates and protected accounts adds value for the user, with no significant impact on the time required to generate results for graph queries.
△ Less
Submitted 17 June, 2011;
originally announced June 2011.