-
Federated Learning for Wireless Applications: A Prototype
Authors:
Varun Laxman Muttepawar,
Arjun Mehra,
Zubair Shaban,
Ranjitha Prasad,
Harshan Jagadeesh
Abstract:
Wireless embedded edge devices are ubiquitous in our daily lives, enabling them to gather immense data via onboard sensors and mobile applications. This offers an amazing opportunity to train machine learning (ML) models in the realm of wireless devices for decision-making. Training ML models in a wireless setting necessitates transmitting datasets collected at the edge to a cloud parameter server…
▽ More
Wireless embedded edge devices are ubiquitous in our daily lives, enabling them to gather immense data via onboard sensors and mobile applications. This offers an amazing opportunity to train machine learning (ML) models in the realm of wireless devices for decision-making. Training ML models in a wireless setting necessitates transmitting datasets collected at the edge to a cloud parameter server, which is infeasible due to bandwidth constraints, security, and privacy issues. To tackle these challenges, Federated Learning (FL) has emerged as a distributed optimization approach to the decentralization of the model training process. In this work, we present a novel prototype to examine FL's effectiveness over bandwidth-constrained wireless channels. Through a novel design consisting of Zigbee and NI USRP devices, we propose a configuration that allows clients to broadcast synergistically local ML model updates to a central server to obtain a generalized global model. We assess the efficacy of this prototype using metrics such as global model accuracy and time complexity under varying conditions of transmission power, data heterogeneity and local learning.
△ Less
Submitted 13 December, 2023;
originally announced December 2023.
-
Medication abortion via digital health in the United States: a systematic scoping review
Authors:
Fekede Asefa Kumsa,
Rameshwari Prasad,
Arash Shaban-Nejad
Abstract:
Digital health, including telemedicine, has increased access to abortion care. The convenience, flexibility of appointment times, and ensured privacy to abortion users may make abortion services via telemedicine preferable. This scoping review systematically mapped studies conducted on abortion services via telemedicine, including their effectiveness and acceptability for abortion users and provid…
▽ More
Digital health, including telemedicine, has increased access to abortion care. The convenience, flexibility of appointment times, and ensured privacy to abortion users may make abortion services via telemedicine preferable. This scoping review systematically mapped studies conducted on abortion services via telemedicine, including their effectiveness and acceptability for abortion users and providers. All published papers included abortion services via telemedicine in the United States were considered. Articles were searched in PubMed, CINAHL, and Google Scholar databases in September 2022. The findings were synthesized narratively, and the PRISMA-ScR guidelines were used to report this study. Out of 757 retrieved articles, 33 articles were selected based on the inclusion criteria. These studies were published between 2011 and 2022, with 24 published in the last 3 years. The study found that telemedicine increased access to abortion care in the United States, especially for people in remote areas or those worried about stigma from in-person visits. The effectiveness of abortion services via telemedicine was comparable to in-clinic visits, with 6% or fewer abortions requiring surgical intervention. Both care providers and abortion seekers expressed positive perceptions of telemedicine-based abortion services. However, abortion users reported mixed emotions, with some preferring in-person visits. The most common reasons for choosing telemedicine included the distance to the abortion clinic, convenience, privacy, cost, flexibility of appointment times, and state laws imposing waiting periods or restrictive policies. Telemedicine offered a preferable option for abortion seekers and providers. The feasibility of accessing abortion services via telemedicine in low-resource settings needs further investigation.
△ Less
Submitted 18 July, 2023;
originally announced December 2023.
-
Seeing is Believing: A Federated Learning Based Prototype to Detect Wireless Injection Attacks
Authors:
Aadil Hussain,
Nitheesh Gundapu,
Sarang Drugkar,
Suraj Kiran,
J. Harshan,
Ranjitha Prasad
Abstract:
Reactive injection attacks are a class of security threats in wireless networks wherein adversaries opportunistically inject spoofing packets in the frequency band of a client thereby forcing the base-station to deploy impersonation-detection methods. Towards circumventing such threats, we implement secret-key based physical-layer signalling methods at the clients which allow the base-stations to…
▽ More
Reactive injection attacks are a class of security threats in wireless networks wherein adversaries opportunistically inject spoofing packets in the frequency band of a client thereby forcing the base-station to deploy impersonation-detection methods. Towards circumventing such threats, we implement secret-key based physical-layer signalling methods at the clients which allow the base-stations to deploy machine learning (ML) models on their in-phase and quadrature samples at the baseband for attack detection. Using Adalm Pluto based software defined radios to implement the secret-key based signalling methods, we show that robust ML models can be designed at the base-stations. However, we also point out that, in practice, insufficient availability of training datasets at the base-stations can make these methods ineffective. Thus, we use a federated learning framework in the backhaul network, wherein a group of base-stations that need to protect their clients against reactive injection threats collaborate to refine their ML models by ensuring privacy on their datasets. Using a network of XBee devices to implement the backhaul network, experimental results on our federated learning setup shows significant enhancements in the detection accuracy, thus presenting wireless security as an excellent use-case for federated learning in 6G networks and beyond.
△ Less
Submitted 11 November, 2023;
originally announced November 2023.
-
QoS-aware Scheduling in 5G Wireless Base Stations
Authors:
Reshma Prasad,
Albert Sunny
Abstract:
5G and beyond networks are expected to support flows with varied \emph{Quality-of-Service (QoS)} requirements under unpredictable traffic conditions. Consequently, designing policies ensuring optimal system utilization in such networks is challenging. Given this, we formulate a long-term time-averaged scheduling problem that minimizes a weighted function of packets dropped by the 5G wireless base…
▽ More
5G and beyond networks are expected to support flows with varied \emph{Quality-of-Service (QoS)} requirements under unpredictable traffic conditions. Consequently, designing policies ensuring optimal system utilization in such networks is challenging. Given this, we formulate a long-term time-averaged scheduling problem that minimizes a weighted function of packets dropped by the 5G wireless base station. We then present two policies for this problem. The first is a delay-guaranteed near-optimal policy, and the second is a delay-guaranteed sub-optimal policy that provides flow isolation. We perform extensive simulations to understand the performance of these policies. Further, we study these policies in the presence of a closed-loop flow rate-control mechanism.
△ Less
Submitted 17 October, 2023;
originally announced October 2023.
-
Open Gimbal: A 3 Degrees of Freedom Open Source Sensing and Testing Platform for Nano and Micro UAVs
Authors:
Suryansh Sharma,
Tristan Dijkstra,
R. Venkatesha Prasad
Abstract:
Testing the aerodynamics of micro- and nano-UAVs without actually flying is highly challenging. To address this issue, we introduce Open Gimbal, a specially designed 3 Degrees of Freedom platform that caters to the unique requirements of micro- and nano-UAVs. This platform allows for unrestricted and free rotational motion, enabling comprehensive experimentation and evaluation of these UAVs. Our a…
▽ More
Testing the aerodynamics of micro- and nano-UAVs without actually flying is highly challenging. To address this issue, we introduce Open Gimbal, a specially designed 3 Degrees of Freedom platform that caters to the unique requirements of micro- and nano-UAVs. This platform allows for unrestricted and free rotational motion, enabling comprehensive experimentation and evaluation of these UAVs. Our approach focuses on simplicity and accessibility. We developed an open-source, 3D printable electro-mechanical design that has minimal size and low complexity. This design facilitates easy replication and customization, making it widely accessible to researchers and developers. Addressing the challenges of sensing flight dynamics at a small scale, we have devised an integrated wireless batteryless sensor subsystem. Our innovative solution eliminates the need for complex wiring and instead uses wireless power transfer for sensor data reception. To validate the effectiveness of open gimbal, we thoroughly evaluate and test its communication link and sensing performance using a typical nano-quadrotor. Through comprehensive testing, we verify the reliability and accuracy of open gimbal in real-world scenarios. These advancements provide valuable tools and insights for researchers and developers working with mUAVs and nUAVs, contributing to the progress of this rapidly evolving field.
△ Less
Submitted 4 October, 2023;
originally announced October 2023.
-
BEAVIS: Balloon Enabled Aerial Vehicle for IoT and Sensing
Authors:
Suryansh Sharma,
Ashutosh Simha,
R. Venkatesha Prasad,
Shubham Deshmukh,
Kavin B. Saravanan,
Ravi Ramesh,
Luca Mottola
Abstract:
UAVs are becoming versatile and valuable platforms for various applications. However, the main limitation is their flying time. We present BEAVIS, a novel aerial robotic platform striking an unparalleled trade-off between the manoeuvrability of drones and the long lasting capacity of blimps. BEAVIS scores highly in applications where drones enjoy unconstrained mobility yet suffer from limited life…
▽ More
UAVs are becoming versatile and valuable platforms for various applications. However, the main limitation is their flying time. We present BEAVIS, a novel aerial robotic platform striking an unparalleled trade-off between the manoeuvrability of drones and the long lasting capacity of blimps. BEAVIS scores highly in applications where drones enjoy unconstrained mobility yet suffer from limited lifetime. A nonlinear flight controller exploiting novel, unexplored, aerodynamic phenomena to regulate the ambient pressure and enable all translational and yaw degrees of freedom is proposed without direct actuation in the vertical direction. BEAVIS has built-in rotor fault detection and tolerance. We explain the design and the necessary background in detail. We verify the dynamics of BEAVIS and demonstrate its distinct advantages, such as agility, over existing platforms including the degrees of freedom akin to a drone with 11.36x increased lifetime. We exemplify the potential of BEAVIS to become an invaluable platform for many applications.
△ Less
Submitted 2 August, 2023;
originally announced August 2023.
-
Distributed Sensing, Computing, Communication, and Control Fabric: A Unified Service-Level Architecture for 6G
Authors:
Dejan Vukobratović,
Nikolaos Bartzoudis,
Mona Ghassemian,
Firooz Saghezchi,
Peizheng Li,
Adnan Aijaz,
Ricardo Martinez,
Xueli An,
Ranga Rao Venkatesha Prasad,
Helge Lüders,
Shahid Mumtaz
Abstract:
With the advent of the multimodal immersive communication system, people can interact with each other using multiple devices for sensing, communication and/or control either onsite or remotely. As a breakthrough concept, a distributed sensing, computing, communications, and control (DS3C) fabric is introduced in this paper for provisioning 6G services in multi-tenant environments in a unified mann…
▽ More
With the advent of the multimodal immersive communication system, people can interact with each other using multiple devices for sensing, communication and/or control either onsite or remotely. As a breakthrough concept, a distributed sensing, computing, communications, and control (DS3C) fabric is introduced in this paper for provisioning 6G services in multi-tenant environments in a unified manner. The DS3C fabric can be further enhanced by natively incorporating intelligent algorithms for network automation and managing networking, computing, and sensing resources efficiently to serve vertical use cases with extreme and/or conflicting requirements. As such, the paper proposes a novel end-to-end 6G system architecture with enhanced intelligence spanning across different network, computing, and business domains, identifies vertical use cases and presents an overview of the relevant standardization and pre-standardization landscape.
△ Less
Submitted 18 July, 2023;
originally announced July 2023.
-
CLIMAX: An exploration of Classifier-Based Contrastive Explanations
Authors:
Praharsh Nanavati,
Ranjitha Prasad
Abstract:
Explainable AI is an evolving area that deals with understanding the decision making of machine learning models so that these models are more transparent, accountable, and understandable for humans. In particular, post-hoc model-agnostic interpretable AI techniques explain the decisions of a black-box ML model for a single instance locally, without the knowledge of the intrinsic nature of the ML m…
▽ More
Explainable AI is an evolving area that deals with understanding the decision making of machine learning models so that these models are more transparent, accountable, and understandable for humans. In particular, post-hoc model-agnostic interpretable AI techniques explain the decisions of a black-box ML model for a single instance locally, without the knowledge of the intrinsic nature of the ML model. Despite their simplicity and capability in providing valuable insights, existing approaches fail to deliver consistent and reliable explanations. Moreover, in the context of black-box classifiers, existing approaches justify the predicted class, but these methods do not ensure that the explanation scores strongly differ as compared to those of another class. In this work we propose a novel post-hoc model agnostic XAI technique that provides contrastive explanations justifying the classification of a black box classifier along with a reasoning as to why another class was not predicted. Our method, which we refer to as CLIMAX which is short for Contrastive Label-aware Influence-based Model Agnostic XAI, is based on local classifiers . In order to ensure model fidelity of the explainer, we require the perturbations to be such that it leads to a class-balanced surrogate dataset. Towards this, we employ a label-aware surrogate data generation method based on random oversampling and Gaussian Mixture Model sampling. Further, we propose influence subsampling in order to retaining effective samples and hence ensure sample complexity. We show that we achieve better consistency as compared to baselines such as LIME, BayLIME, and SLIME. We also depict results on textual and image based datasets, where we generate contrastive explanations for any black-box classification model where one is able to only query the class probabilities for an instance of interest.
△ Less
Submitted 2 July, 2023;
originally announced July 2023.
-
Cook-Gen: Robust Generative Modeling of Cooking Actions from Recipes
Authors:
Revathy Venkataramanan,
Kaushik Roy,
Kanak Raj,
Renjith Prasad,
Yuxin Zi,
Vignesh Narayanan,
Amit Sheth
Abstract:
As people become more aware of their food choices, food computation models have become increasingly popular in assisting people in maintaining healthy eating habits. For example, food recommendation systems analyze recipe instructions to assess nutritional contents and provide recipe recommendations. The recent and remarkable successes of generative AI methods, such as auto-regressive large langua…
▽ More
As people become more aware of their food choices, food computation models have become increasingly popular in assisting people in maintaining healthy eating habits. For example, food recommendation systems analyze recipe instructions to assess nutritional contents and provide recipe recommendations. The recent and remarkable successes of generative AI methods, such as auto-regressive large language models, can lead to robust methods for a more comprehensive understanding of recipes for healthy food recommendations beyond surface-level nutrition content assessments. In this study, we explore the use of generative AI methods to extend current food computation models, primarily involving the analysis of nutrition and ingredients, to also incorporate cooking actions (e.g., add salt, fry the meat, boil the vegetables, etc.). Cooking actions are notoriously hard to model using statistical learning methods due to irregular data patterns - significantly varying natural language descriptions for the same action (e.g., marinate the meat vs. marinate the meat and leave overnight) and infrequently occurring patterns (e.g., add salt occurs far more frequently than marinating the meat). The prototypical approach to handling irregular data patterns is to increase the volume of data that the model ingests by orders of magnitude. Unfortunately, in the cooking domain, these problems are further compounded with larger data volumes presenting a unique challenge that is not easily handled by simply scaling up. In this work, we propose novel aggregation-based generative AI methods, Cook-Gen, that reliably generate cooking actions from recipes, despite difficulties with irregular data patterns, while also outperforming Large Language Models and other strong baselines.
△ Less
Submitted 1 June, 2023;
originally announced June 2023.
-
Metaheuristic for Hub-Spoke Facility Location Problem: Application to Indian E-commerce Industry
Authors:
Aakash Sachdeva,
Bhupinder Singh,
Rahul Prasad,
Nakshatra Goel,
Ronit Mondal,
Jatin Munjal,
Abhishek Bhatnagar,
Manjeet Dahiya
Abstract:
Indian e-commerce industry has evolved over the last decade and is expected to grow over the next few years. The focus has now shifted to turnaround time (TAT) due to the emergence of many third-party logistics providers and higher customer expectations. The key consideration for delivery providers is to balance their overall operating costs while meeting the promised TAT to their customers. E-com…
▽ More
Indian e-commerce industry has evolved over the last decade and is expected to grow over the next few years. The focus has now shifted to turnaround time (TAT) due to the emergence of many third-party logistics providers and higher customer expectations. The key consideration for delivery providers is to balance their overall operating costs while meeting the promised TAT to their customers. E-commerce delivery partners operate through a network of facilities whose strategic locations help to run the operations efficiently. In this work, we identify the locations of hubs throughout the country and their corresponding mapping with the distribution centers. The objective is to minimize the total network costs with TAT adherence. We use Genetic Algorithm and leverage business constraints to reduce the solution search space and hence the solution time. The results indicate an improvement of 9.73% in TAT compliance compared with the current scenario.
△ Less
Submitted 16 December, 2022;
originally announced December 2022.
-
Over-The-Air Clustered Wireless Federated Learning
Authors:
Ayush Madhan-Sohini,
Divin Dominic,
Nazreen Shah,
Ranjitha Prasad
Abstract:
Privacy and bandwidth constraints have led to the use of federated learning (FL) in wireless systems, where training a machine learning (ML) model is accomplished collaboratively without sharing raw data. While using bandwidth-constrained uplink wireless channels, over-the-air (OTA) FL is preferred since the clients can transmit parameter updates simultaneously to a server. A powerful server may n…
▽ More
Privacy and bandwidth constraints have led to the use of federated learning (FL) in wireless systems, where training a machine learning (ML) model is accomplished collaboratively without sharing raw data. While using bandwidth-constrained uplink wireless channels, over-the-air (OTA) FL is preferred since the clients can transmit parameter updates simultaneously to a server. A powerful server may not be available for parameter aggregation due to increased latency and server failures. In the absence of a powerful server, decentralised strategy is employed where clients communicate with their neighbors to obtain a consensus ML model while incurring huge communication cost. In this work, we propose the OTA semi-decentralised clustered wireless FL (CWFL) and CWFL-Prox algorithms, which is communication efficient as compared to the decentralised FL strategy, while the parameter updates converge to global minima as O(1/T) for each cluster. Using the MNIST and CIFAR10 datasets, we demonstrate the accuracy performance of CWFL is comparable to the central-server based COTAF and proximal constraint based methods, while beating single-client based ML model by vast margins in accuracy.
△ Less
Submitted 17 October, 2023; v1 submitted 7 November, 2022;
originally announced November 2022.
-
Covy: An AI-powered Robot with a Compound Vision System for Detecting Breaches in Social Distancing
Authors:
Serge Saaybi,
Amjad Yousef Majid,
R Venkatesha Prasad,
Anis Koubaa,
Chris Verhoeven
Abstract:
This paper introduces a compound vision system that enables robots to localize people up to 15m away using a cheap camera. And, it proposes a robust navigation stack that combines Deep Reinforcement Learning (DRL) and a probabilistic localization method. To test the efficacy of these systems, we prototyped a low-cost mobile robot that we call Covy. Covy can be used for applications such as promoti…
▽ More
This paper introduces a compound vision system that enables robots to localize people up to 15m away using a cheap camera. And, it proposes a robust navigation stack that combines Deep Reinforcement Learning (DRL) and a probabilistic localization method. To test the efficacy of these systems, we prototyped a low-cost mobile robot that we call Covy. Covy can be used for applications such as promoting social distancing during pandemics or estimating the density of a crowd. We evaluated Covy's performance through extensive sets of experiments both in simulated and realistic environments. Our results show that Covy's compound vision algorithm doubles the range of the used depth camera, and its hybrid navigation stack is more robust than a pure DRL-based one.
△ Less
Submitted 23 August, 2022; v1 submitted 14 July, 2022;
originally announced July 2022.
-
SapientML: Synthesizing Machine Learning Pipelines by Learning from Human-Written Solutions
Authors:
Ripon K. Saha,
Akira Ura,
Sonal Mahajan,
Chenguang Zhu,
Linyi Li,
Yang Hu,
Hiroaki Yoshida,
Sarfraz Khurshid,
Mukul R. Prasad
Abstract:
Automatic machine learning, or AutoML, holds the promise of truly democratizing the use of machine learning (ML), by substantially automating the work of data scientists. However, the huge combinatorial search space of candidate pipelines means that current AutoML techniques, generate sub-optimal pipelines, or none at all, especially on large, complex datasets. In this work we propose an AutoML te…
▽ More
Automatic machine learning, or AutoML, holds the promise of truly democratizing the use of machine learning (ML), by substantially automating the work of data scientists. However, the huge combinatorial search space of candidate pipelines means that current AutoML techniques, generate sub-optimal pipelines, or none at all, especially on large, complex datasets. In this work we propose an AutoML technique SapientML, that can learn from a corpus of existing datasets and their human-written pipelines, and efficiently generate a high-quality pipeline for a predictive task on a new dataset. To combat the search space explosion of AutoML, SapientML employs a novel divide-and-conquer strategy realized as a three-stage program synthesis approach, that reasons on successively smaller search spaces. The first stage uses a machine-learned model to predict a set of plausible ML components to constitute a pipeline. In the second stage, this is then refined into a small pool of viable concrete pipelines using syntactic constraints derived from the corpus and the machine-learned model. Dynamically evaluating these few pipelines, in the third stage, provides the best solution. We instantiate SapientML as part of a fully automated tool-chain that creates a cleaned, labeled learning corpus by mining Kaggle, learns from it, and uses the learned models to then synthesize pipelines for new predictive tasks. We have created a training corpus of 1094 pipelines spanning 170 datasets, and evaluated SapientML on a set of 41 benchmark datasets, including 10 new, large, real-world datasets from Kaggle, and against 3 state-of-the-art AutoML tools and 2 baselines. Our evaluation shows that SapientML produces the best or comparable accuracy on 27 of the benchmarks while the second best tool fails to even produce a pipeline on 9 of the instances.
△ Less
Submitted 19 April, 2022; v1 submitted 18 February, 2022;
originally announced February 2022.
-
Providing Real-time Assistance for Repairing Runtime Exceptions using Stack Overflow Posts
Authors:
Sonal Mahajan,
Mukul R. Prasad
Abstract:
Runtime Exceptions (REs) are an important class of bugs that occur frequently during code development. Traditional Automatic Program Repair (APR) tools are of limited use in this "in-development" use case, since they require a test-suite to be available as a patching oracle. Thus, developers typically tend to manually resolve their in-development REs, often by referring to technical forums, such a…
▽ More
Runtime Exceptions (REs) are an important class of bugs that occur frequently during code development. Traditional Automatic Program Repair (APR) tools are of limited use in this "in-development" use case, since they require a test-suite to be available as a patching oracle. Thus, developers typically tend to manually resolve their in-development REs, often by referring to technical forums, such as Stack Overflow (SO). To automate this manual process we extend our previous work, MAESTRO, to provide real-time assistance to developers for repairing Java REs by recommending a relevant patch-suggesting SO post and synthesizing a repair patch from this post to fix the RE in the developer's code. MAESTRO exploits a library of Runtime Exception Patterns (REPs) semi-automatically mined from SO posts, through a relatively inexpensive, one-time, incremental process. An REP is an abstracted sequence of statements that triggers a given RE. REPs are used to index SO posts, retrieve a post most relevant to the RE instance exhibited by a developer's code and then mediate the process of extracting a concrete repair from the SO post, abstracting out post-specific details, and concretizing the repair to the developer's buggy code. We evaluate MAESTRO on a published RE benchmark comprised of 78 instances. MAESTRO is able to generate a correct repair patch at the top position in 27% of the cases, within the top-3 in 40% of the cases and overall return a useful artifact in 81% of the cases. Further, the use of REPs proves instrumental to all aspects of MAESTRO's performance, from ranking and searching of SO posts to synthesizing patches from a given post. In particular, 45% of correct patches generated by MAESTRO could not be produced by a baseline technique not using REPs, even when provided with MAESTRO's SO-post ranking. MAESTRO is also fast, needing around 1 second, on average, to generate its output.
△ Less
Submitted 9 February, 2022;
originally announced February 2022.
-
Elixir: Effective object-oriented program repair
Authors:
Ripon K. Saha,
Yingjun Lyu,
Hiroaki Yoshida,
Mukul R. Prasad
Abstract:
This work is motivated by the pervasive use of method invocations in object-oriented (OO) programs, and indeed their prevalence in patches of OO-program bugs. We propose a generate-and-validate repair technique, called ELIXIR designed to be able to generate such patches. ELIXIR aggressively uses method calls, on par with local variables, fields, or constants, to construct more expressive repair-ex…
▽ More
This work is motivated by the pervasive use of method invocations in object-oriented (OO) programs, and indeed their prevalence in patches of OO-program bugs. We propose a generate-and-validate repair technique, called ELIXIR designed to be able to generate such patches. ELIXIR aggressively uses method calls, on par with local variables, fields, or constants, to construct more expressive repair-expressions, that go into synthesizing patches. The ensuing enlargement of the repair space, on account of the wider use of method calls, is effectively tackled by using a machine-learnt model to rank concrete repairs. The machine-learnt model relies on four features derived from the program context, i.e., the code surrounding the potential repair location, and the bug report. We implement ELIXIR and evaluate it on two datasets, the popular Defects4J dataset and a new dataset Bugs.jar created by us, and against 2 baseline versions of our technique, and 5 other techniques representing the state of the art in program repair. Our evaluation shows that ELIXIR is able to increase the number of correctly repaired bugs in Defects4J by 85% (from 14 to 26) and by 57% in Bugs.jar (from 14 to 22), while also significantly out-performing other state-of-the-art repair techniques including ACS, HD-Repair, NOPOL, PAR, and jGenProg.
△ Less
Submitted 20 December, 2021;
originally announced December 2021.
-
Towards Enabling High-Five Over WiFi
Authors:
Vineet Gokhale,
Mohamad Eid,
Kees Kroep,
R. Venkatesha Prasad,
Vijay Rao
Abstract:
The next frontier for immersive applications is enabling sentience over the Internet. Tactile Internet (TI) envisages transporting skills by providing Ultra-Low Latency (ULL) communications for transporting touch senses. In this work, we focus our study on the first/last mile communication, where the future generation WiFi-7 is pitched as the front-runner for ULL applications. We discuss a few can…
▽ More
The next frontier for immersive applications is enabling sentience over the Internet. Tactile Internet (TI) envisages transporting skills by providing Ultra-Low Latency (ULL) communications for transporting touch senses. In this work, we focus our study on the first/last mile communication, where the future generation WiFi-7 is pitched as the front-runner for ULL applications. We discuss a few candidate features of WiFi-7 and highlight its major pitfalls with respect to ULL communication. Further, through a specific implementation of WiFi-7 (vanilla WiFi-7) in our custom simulator, we demonstrate the impact of one of the pitfalls - standard practice of using jitter buffer in conjunction with frame aggregation - on TI communication. To circumvent this, we propose Non-Buffered Scheme (NoBuS) - a simple MAC layer enhancement for enabling TI applications on WiFi-7. NoBuS trades off packet loss for latency enabling swift synchronization between the master and controlled domains. Our findings reveal that employing NoBuS yields a significant improvement in RMSE of TI signals. Further, we show that the worst-case WiFi latency with NoBuS is 3.72 ms - an order of magnitude lower than vanilla WiFi-7 even under highly congested network conditions.
△ Less
Submitted 2 November, 2021;
originally announced November 2021.
-
DAGSurv: Directed Acyclic Graph Based Survival Analysis Using Deep Neural Networks
Authors:
Ansh Kumar Sharma,
Rahul Kukreja,
Ranjitha Prasad,
Shilpa Rao
Abstract:
Causal structures for observational survival data provide crucial information regarding the relationships between covariates and time-to-event. We derive motivation from the information theoretic source coding argument, and show that incorporating the knowledge of the directed acyclic graph (DAG) can be beneficial if suitable source encoders are employed. As a possible source encoder in this conte…
▽ More
Causal structures for observational survival data provide crucial information regarding the relationships between covariates and time-to-event. We derive motivation from the information theoretic source coding argument, and show that incorporating the knowledge of the directed acyclic graph (DAG) can be beneficial if suitable source encoders are employed. As a possible source encoder in this context, we derive a variational inference based conditional variational autoencoder for causal structured survival prediction, which we refer to as DAGSurv. We illustrate the performance of DAGSurv on low and high-dimensional synthetic datasets, and real-world datasets such as METABRIC and GBSG. We demonstrate that the proposed method outperforms other survival analysis baselines such as Cox Proportional Hazards, DeepSurv and Deephit, which are oblivious to the underlying causal relationship between data entities.
△ Less
Submitted 2 November, 2021;
originally announced November 2021.
-
Deep Reinforcement Learning Versus Evolution Strategies: A Comparative Survey
Authors:
Amjad Yousef Majid,
Serge Saaybi,
Tomas van Rietbergen,
Vincent Francois-Lavet,
R Venkatesha Prasad,
Chris Verhoeven
Abstract:
Deep Reinforcement Learning (DRL) and Evolution Strategies (ESs) have surpassed human-level control in many sequential decision-making problems, yet many open challenges still exist. To get insights into the strengths and weaknesses of DRL versus ESs, an analysis of their respective capabilities and limitations is provided. After presenting their fundamental concepts and algorithms, a comparison i…
▽ More
Deep Reinforcement Learning (DRL) and Evolution Strategies (ESs) have surpassed human-level control in many sequential decision-making problems, yet many open challenges still exist. To get insights into the strengths and weaknesses of DRL versus ESs, an analysis of their respective capabilities and limitations is provided. After presenting their fundamental concepts and algorithms, a comparison is provided on key aspects such as scalability, exploration, adaptation to dynamic environments, and multi-agent learning. Then, the benefits of hybrid algorithms that combine concepts from DRL and ESs are highlighted. Finally, to have an indication about how they compare in real-world applications, a survey of the literature for the set of applications they support is provided.
△ Less
Submitted 28 September, 2021;
originally announced October 2021.
-
Q&A MAESTRO: Q&A Post Recommendation for Fixing Java Runtime Exceptions
Authors:
Yusuke Kimura,
Takumi Akazaki,
Shinji Kikuchi,
Sonal Mahajan,
Mukul R. Prasad
Abstract:
Programmers often use Q&A sites (e.g., Stack Overflow) to understand a root cause of program bugs. Runtime exceptions is one of such important class of bugs that is actively discussed on Stack Overflow. However, it may be difficult for beginner programmers to come up with appropriate keywords for search. Moreover, they need to switch their attentions between IDE and browser, and it is time-consumi…
▽ More
Programmers often use Q&A sites (e.g., Stack Overflow) to understand a root cause of program bugs. Runtime exceptions is one of such important class of bugs that is actively discussed on Stack Overflow. However, it may be difficult for beginner programmers to come up with appropriate keywords for search. Moreover, they need to switch their attentions between IDE and browser, and it is time-consuming. To overcome these difficulties, we proposed a method, ``Q&A MAESTRO'', to find suitable Q&A posts automatically for Java runtime exception by utilizing structure information of codes described in programming Q&A website. In this paper, we describe a usage scenario of IDE-plugin, the architecture and user interface of the implementation, and results of user studies. A video is available at https://youtu.be/4X24jJrMUVw. A demo software is available at https://github.com/FujitsuLaboratories/Q-A-MAESTRO.
△ Less
Submitted 23 August, 2021;
originally announced August 2021.
-
Select Wisely and Explain: Active Learning and Probabilistic Local Post-hoc Explainability
Authors:
Aditya Saini,
Ranjitha Prasad
Abstract:
Albeit the tremendous performance improvements in designing complex artificial intelligence (AI) systems in data-intensive domains, the black-box nature of these systems leads to the lack of trustworthiness. Post-hoc interpretability methods explain the prediction of a black-box ML model for a single instance, and such explanations are being leveraged by domain experts to diagnose the underlying b…
▽ More
Albeit the tremendous performance improvements in designing complex artificial intelligence (AI) systems in data-intensive domains, the black-box nature of these systems leads to the lack of trustworthiness. Post-hoc interpretability methods explain the prediction of a black-box ML model for a single instance, and such explanations are being leveraged by domain experts to diagnose the underlying biases of these models. Despite their efficacy in providing valuable insights, existing approaches fail to deliver consistent and reliable explanations. In this paper, we propose an active learning-based technique called UnRAvEL (Uncertainty driven Robust Active Learning Based Locally Faithful Explanations), which consists of a novel acquisition function that is locally faithful and uses uncertainty-driven sampling based on the posterior distribution on the probabilistic locality using Gaussian process regression(GPR). We present a theoretical analysis of UnRAvEL by treating it as a local optimizer and analyzing its regret in terms of instantaneous regrets over a global optimizer. We demonstrate the efficacy of the local samples generated by UnRAvEL by incorporating different kernels such as the Matern and linear kernels in GPR. Through a series of experiments, we show that UnRAvEL outperforms the baselines with respect to stability and local fidelity on several real-world models and datasets. We show that UnRAvEL is an efficient surrogate dataset generator by deriving importance scores on this surrogate dataset using sparse linear models. We also showcase the sample efficiency and flexibility of the developed framework on the Imagenet dataset using a pre-trained ResNet model.
△ Less
Submitted 22 April, 2022; v1 submitted 16 August, 2021;
originally announced August 2021.
-
Energy Efficient Data Recovery from Corrupted LoRa Frames
Authors:
Niloofar Yazdani,
Nikolaos Kouvelas,
R Venkatesha Prasad,
Daniel E. Lucani
Abstract:
High frame-corruption is widely observed in Long Range Wide Area Networks (LoRaWAN) due to the coexistence with other networks in ISM bands and an Aloha-like MAC layer. LoRa's Forward Error Correction (FEC) mechanism is often insufficient to retrieve corrupted data. In fact, real-life measurements show that at least one-fourth of received transmissions are corrupted. When more frames are dropped,…
▽ More
High frame-corruption is widely observed in Long Range Wide Area Networks (LoRaWAN) due to the coexistence with other networks in ISM bands and an Aloha-like MAC layer. LoRa's Forward Error Correction (FEC) mechanism is often insufficient to retrieve corrupted data. In fact, real-life measurements show that at least one-fourth of received transmissions are corrupted. When more frames are dropped, LoRa nodes usually switch over to higher spreading factors (SF), thus increasing transmission times and increasing the required energy. This paper introduces ReDCoS, a novel coding technique at the application layer that improves recovery of corrupted LoRa frames, thus reducing the overall transmission time and energy invested by LoRa nodes by several-fold. ReDCoS utilizes lightweight coding techniques to pre-encode the transmitted data. Therefore, the inbuilt Cyclic Redundancy Check (CRC) that follows is computed based on an already encoded data. At the receiver, we use both the CRC and the coded data to recover data from a corrupted frame beyond the built-in Error Correcting Code (ECC). We compare the performance of ReDCoS to (I) the standard FEC of vanilla-LoRaWAN, and to (ii) RS coding applied as ECC to the data of LoRaWAN. The results indicated a 54x and 13.5x improvement of decoding ratio, respectively, when 20 data symbols were sent. Furthermore, we evaluated ReDCoS on-field using LoRa SX1261 transceivers showing that it outperformed RS-coding by factor of at least 2x (and up to 6x) in terms of the decoding ratio while consuming 38.5% less energy per correctly received transmission.
△ Less
Submitted 19 July, 2021;
originally announced July 2021.
-
ETVO: Effectively Measuring Tactile Internet with Experimental Validation
Authors:
H. J. C. Kroep,
V. Gokhale,
J. Verburg,
R. Venkatesha Prasad
Abstract:
The next frontier in communications is teleoperation -- manipulation and control of remote environments with feedback. Compared to conventional networked applications, teleoperation poses widely different requirements, ultra-low latency (ULL) is primary. Realizing ULL communication demands significant redesign of conventional networking techniques, and the network infrastructure envisioned for ach…
▽ More
The next frontier in communications is teleoperation -- manipulation and control of remote environments with feedback. Compared to conventional networked applications, teleoperation poses widely different requirements, ultra-low latency (ULL) is primary. Realizing ULL communication demands significant redesign of conventional networking techniques, and the network infrastructure envisioned for achieving this is termed as Tactile Internet (TI). The design of the network infrastructure and meaningful performance metrics are crucial for seamless TI communication. However, existing performance metrics fall severely short of comprehensively characterizing TI performance. We take the first step towards bridging this gap. We take Dynamic Time Warping(DTW) as the basis of our work and identify necessary changes for characterizing TI performance. Through substantial refinements to DTW, we design Effective Time- and Value-Offset (ETVO) -- a new method for measuring the fine-grained performance of TI systems. Through an in-depth objective analysis, we demonstrate the improvements of ETVO over DTW. Through human-in-the-loop subjective experiments, we demonstrate how and why existing QoS and QoE methods fall short of estimating the TI session performance accurately. Using subjective experiments, we demonstrate the behavior of the proposed metrics, their ability to match theoretically derived performance, and finally their ability to reflect user satisfaction in a practical setting. The results are highly encouraging.
△ Less
Submitted 12 July, 2021;
originally announced July 2021.
-
Path-Aware OMP Algorithms for Provenance Recovery in Wireless Networks
Authors:
Shilpi Mishra,
J. Harshan,
Ranjitha Prasad
Abstract:
Low-latency provenance embedding methods have received traction in vehicular networks for their ability to track the footprint of information flow. One such known method is based on Bloom filters wherein the nodes that forward the packets appropriately choose a certain number of hash functions to embed their signatures in a shared space in the packet. Although Bloom filter methods can achieve the…
▽ More
Low-latency provenance embedding methods have received traction in vehicular networks for their ability to track the footprint of information flow. One such known method is based on Bloom filters wherein the nodes that forward the packets appropriately choose a certain number of hash functions to embed their signatures in a shared space in the packet. Although Bloom filter methods can achieve the required accuracy level in provenance recovery, they are known to incur higher processing delay since higher number of hash functions are needed to meet the accuracy level. Motivated by this behaviour, we identify a regime of delay-constraints within which new provenance embedding methods must be proposed as Bloom filter methods are no longer applicable. To fill this research gap, we present network-coded edge embedding (NCEE) protocols that facilitate low-latency routing of packets in vehicular network applications. First, we show that the problem of designing provenance recovery methods for the NCEE protocol is equivalent to the celebrated problem of compressed sensing, however, with additional constraints of path formation on the solution. Subsequently, we present a family of path-aware orthogonal matching pursuit algorithms that jointly incorporates the sparsity and path constraints. Through extensive simulation results, we show that our algorithms enjoy low-complexity implementation, and also improve the path recovery performance when compared to path-agnostic counterparts.
△ Less
Submitted 12 September, 2021; v1 submitted 26 May, 2021;
originally announced May 2021.
-
Intent Features for Rich Natural Language Understanding
Authors:
Brian Lester,
Sagnik Ray Choudhury,
Rashmi Prasad,
Srinivas Bangalore
Abstract:
Complex natural language understanding modules in dialog systems have a richer understanding of user utterances, and thus are critical in providing a better user experience. However, these models are often created from scratch, for specific clients and use cases, and require the annotation of large datasets. This encourages the sharing of annotated data across multiple clients. To facilitate this…
▽ More
Complex natural language understanding modules in dialog systems have a richer understanding of user utterances, and thus are critical in providing a better user experience. However, these models are often created from scratch, for specific clients and use cases, and require the annotation of large datasets. This encourages the sharing of annotated data across multiple clients. To facilitate this we introduce the idea of intent features: domain and topic agnostic properties of intents that can be learned from the syntactic cues only, and hence can be shared. We introduce a new neural network architecture, the Global-Local model, that shows significant improvement over strong baselines for identifying these features in a deployed, multi-intent natural language understanding module, and, more generally, in a classification setting where a part of an utterance has to be classified utilizing the whole context.
△ Less
Submitted 21 April, 2021; v1 submitted 17 April, 2021;
originally announced April 2021.
-
FEEL: Fast, Energy-Efficient Localization for Autonomous Indoor Vehicles
Authors:
Vineet Gokhale,
Gerardo Moyers Barrera,
R. Venkatesha Prasad
Abstract:
Autonomous vehicles have created a sensation in both outdoor and indoor applications. The famous indoor use-case is process automation inside a warehouse using Autonomous Indoor Vehicles (AIV). These vehicles need to locate themselves not only with an accuracy of a few centimetres but also within a few milliseconds in an energy-efficient manner. Due to these challenges, localization is a holy grai…
▽ More
Autonomous vehicles have created a sensation in both outdoor and indoor applications. The famous indoor use-case is process automation inside a warehouse using Autonomous Indoor Vehicles (AIV). These vehicles need to locate themselves not only with an accuracy of a few centimetres but also within a few milliseconds in an energy-efficient manner. Due to these challenges, localization is a holy grail. In this paper, we propose FEEL - an indoor localization system that uses a fusion of three low-energy sensors: IMU, UWB, and radar. We provide detailed software and hardware architecture of FEEL. Further, we propose Adaptive Sensing Algorithm (ASA) for opportunistically minimizing energy consumption of FEEL by adjusting the sensing frequency to the dynamics of the physical environment. Our extensive performance evaluation over diverse test settings reveal that FEEL provides a localization accuracy of <7cm with ultra-low latency of around 3ms. Further, ASA yields up to 20% energy saving with only a marginal trade-off in accuracy.
△ Less
Submitted 1 February, 2021;
originally announced February 2021.
-
Photo2CAD: Automated 3D solid reconstruction from 2D drawings using OpenCV
Authors:
Ajay B. Harish,
Abhishek Rajendra Prasad
Abstract:
This study showcases the utilisation of OpenCV for extracting features from photos of 2D engineering drawings. These features are then employed to reconstruct 3D CAD models in SCAD format and generate 3D point cloud data similar to LIDAR scans. Many historical mechanical, aerospace, and civil engineering designs exist only as drawings, lacking software-generated CAD or BIM models. While 2D to 3D c…
▽ More
This study showcases the utilisation of OpenCV for extracting features from photos of 2D engineering drawings. These features are then employed to reconstruct 3D CAD models in SCAD format and generate 3D point cloud data similar to LIDAR scans. Many historical mechanical, aerospace, and civil engineering designs exist only as drawings, lacking software-generated CAD or BIM models. While 2D to 3D conversion itself is not novel, the novelty of this work is in the usage of simple photos rather than scans or electronic documentation of 2D drawings. The method can also use scanned drawing data. While the approach is effective for simple shapes, it currently does not address hidden lines in CAD drawings. The Python Jupyter notebook codes developed for this purpose are accessible through GitHub.
△ Less
Submitted 8 September, 2023; v1 submitted 11 January, 2021;
originally announced January 2021.
-
B-SMALL: A Bayesian Neural Network approach to Sparse Model-Agnostic Meta-Learning
Authors:
Anish Madan,
Ranjitha Prasad
Abstract:
There is a growing interest in the learning-to-learn paradigm, also known as meta-learning, where models infer on new tasks using a few training examples. Recently, meta-learning based methods have been widely used in few-shot classification, regression, reinforcement learning, and domain adaptation. The model-agnostic meta-learning (MAML) algorithm is a well-known algorithm that obtains model par…
▽ More
There is a growing interest in the learning-to-learn paradigm, also known as meta-learning, where models infer on new tasks using a few training examples. Recently, meta-learning based methods have been widely used in few-shot classification, regression, reinforcement learning, and domain adaptation. The model-agnostic meta-learning (MAML) algorithm is a well-known algorithm that obtains model parameter initialization at meta-training phase. In the meta-test phase, this initialization is rapidly adapted to new tasks by using gradient descent. However, meta-learning models are prone to overfitting since there are insufficient training tasks resulting in over-parameterized models with poor generalization performance for unseen tasks. In this paper, we propose a Bayesian neural network based MAML algorithm, which we refer to as the B-SMALL algorithm. The proposed framework incorporates a sparse variational loss term alongside the loss function of MAML, which uses a sparsifying approximated KL divergence as a regularizer. We demonstrate the performance of B-MAML using classification and regression tasks, and highlight that training a sparsifying BNN using MAML indeed improves the parameter footprint of the model while performing at par or even outperforming the MAML approach. We also illustrate applicability of our approach in distributed sensor networks, where sparsity and meta-learning can be beneficial.
△ Less
Submitted 1 January, 2021;
originally announced January 2021.
-
CAMTA: Causal Attention Model for Multi-touch Attribution
Authors:
Sachin Kumar,
Garima Gupta,
Ranjitha Prasad,
Arnab Chatterjee,
Lovekesh Vig,
Gautam Shroff
Abstract:
Advertising channels have evolved from conventional print media, billboards and radio advertising to online digital advertising (ad), where the users are exposed to a sequence of ad campaigns via social networks, display ads, search etc. While advertisers revisit the design of ad campaigns to concurrently serve the requirements emerging out of new ad channels, it is also critical for advertisers t…
▽ More
Advertising channels have evolved from conventional print media, billboards and radio advertising to online digital advertising (ad), where the users are exposed to a sequence of ad campaigns via social networks, display ads, search etc. While advertisers revisit the design of ad campaigns to concurrently serve the requirements emerging out of new ad channels, it is also critical for advertisers to estimate the contribution from touch-points (view, clicks, converts) on different channels, based on the sequence of customer actions. This process of contribution measurement is often referred to as multi-touch attribution (MTA). In this work, we propose CAMTA, a novel deep recurrent neural network architecture which is a casual attribution mechanism for user-personalised MTA in the context of observational data. CAMTA minimizes the selection bias in channel assignment across time-steps and touchpoints. Furthermore, it utilizes the users' pre-conversion actions in a principled way in order to predict pre-channel attribution. To quantitatively benchmark the proposed MTA model, we employ the real world Criteo dataset and demonstrate the superior performance of CAMTA with respect to prediction accuracy as compared to several baselines. In addition, we provide results for budget allocation and user-behaviour modelling on the predicted channel attribution.
△ Less
Submitted 16 February, 2021; v1 submitted 21 December, 2020;
originally announced December 2020.
-
A Fast Algorithm for Heart Disease Prediction using Bayesian Network Model
Authors:
Mistura Muibideen,
Rajesh Prasad
Abstract:
Cardiovascular disease is the number one cause of death all over the world. Data mining can help to retrieve valuable knowledge from available data from the health sector. It helps to train a model to predict patients' health which will be faster as compared to clinical experimentation. Various implementation of machine learning algorithms such as Logistic Regression, K-Nearest Neighbor, Naive Bay…
▽ More
Cardiovascular disease is the number one cause of death all over the world. Data mining can help to retrieve valuable knowledge from available data from the health sector. It helps to train a model to predict patients' health which will be faster as compared to clinical experimentation. Various implementation of machine learning algorithms such as Logistic Regression, K-Nearest Neighbor, Naive Bayes (NB), Support Vector Machine, etc. have been applied on Cleveland heart datasets but there has been a limit to modeling using Bayesian Network (BN). This research applied BN modeling to discover the relationship between 14 relevant attributes of the Cleveland heart data collected from The UCI repository. The aim is to check how the dependency between attributes affects the performance of the classifier. The BN produces a reliable and transparent graphical representation between the attributes with the ability to predict new scenarios. The model has an accuracy of 85%. It was concluded that the model outperformed the NB classifier which has an accuracy of 80%.
△ Less
Submitted 17 December, 2020;
originally announced December 2020.
-
Empirical Performance Analysis of Conventional Deep Learning Models for Recognition of Objects in 2-D Images
Authors:
Sangeeta Satish Rao,
Nikunj Phutela,
V R Badri Prasad
Abstract:
Artificial Neural Networks, an essential part of Deep Learning, are derived from the structure and functionality of the human brain. It has a broad range of applications ranging from medical analysis to automated driving. Over the past few years, deep learning techniques have improved drastically - models can now be customized to a much greater extent by varying the network architecture, network p…
▽ More
Artificial Neural Networks, an essential part of Deep Learning, are derived from the structure and functionality of the human brain. It has a broad range of applications ranging from medical analysis to automated driving. Over the past few years, deep learning techniques have improved drastically - models can now be customized to a much greater extent by varying the network architecture, network parameters, among others. We have varied parameters like learning rate, filter size, the number of hidden layers, stride size and the activation function among others to analyze the performance of the model and thus produce a model with the highest performance. The model classifies images into 3 categories, namely, cars, faces and aeroplanes.
△ Less
Submitted 12 November, 2020;
originally announced November 2020.
-
Global Sentiment Analysis Of COVID-19 Tweets Over Time
Authors:
Muvazima Mansoor,
Kirthika Gurumurthy,
Anantharam R U,
V R Badri Prasad
Abstract:
The Coronavirus pandemic has affected the normal course of life. People around the world have taken to social media to express their opinions and general emotions regarding this phenomenon that has taken over the world by storm. The social networking site, Twitter showed an unprecedented increase in tweets related to the novel Coronavirus in a very short span of time. This paper presents the globa…
▽ More
The Coronavirus pandemic has affected the normal course of life. People around the world have taken to social media to express their opinions and general emotions regarding this phenomenon that has taken over the world by storm. The social networking site, Twitter showed an unprecedented increase in tweets related to the novel Coronavirus in a very short span of time. This paper presents the global sentiment analysis of tweets related to Coronavirus and how the sentiment of people in different countries has changed over time. Furthermore, to determine the impact of Coronavirus on daily aspects of life, tweets related to Work From Home (WFH) and Online Learning were scraped and the change in sentiment over time was observed. In addition, various Machine Learning models such as Long Short Term Memory (LSTM) and Artificial Neural Networks (ANN) were implemented for sentiment classification and their accuracies were determined. Exploratory data analysis was also performed for a dataset providing information about the number of confirmed cases on a per-day basis in a few of the worst-hit countries to provide a comparison between the change in sentiment with the change in cases since the start of this pandemic till June 2020.
△ Less
Submitted 10 November, 2020; v1 submitted 27 October, 2020;
originally announced October 2020.
-
Micro-CT Synthesis and Inner Ear Super Resolution via Generative Adversarial Networks and Bayesian Inference
Authors:
Hongwei Li,
Rameshwara G. N. Prasad,
Anjany Sekuboyina,
Chen Niu,
Siwei Bai,
Werner Hemmert,
Bjoern Menze
Abstract:
Existing medical image super-resolution methods rely on pairs of low- and high- resolution images to learn a mapping in a fully supervised manner. However, such image pairs are often not available in clinical practice. In this paper, we address super-resolution problem in a real-world scenario using unpaired data and synthesize linearly \textbf{eight times} higher resolved Micro-CT images of tempo…
▽ More
Existing medical image super-resolution methods rely on pairs of low- and high- resolution images to learn a mapping in a fully supervised manner. However, such image pairs are often not available in clinical practice. In this paper, we address super-resolution problem in a real-world scenario using unpaired data and synthesize linearly \textbf{eight times} higher resolved Micro-CT images of temporal bone structure, which is embedded in the inner ear. We explore cycle-consistency generative adversarial networks for super-resolution task and equip the translation approach with Bayesian inference. We further introduce \emph{Hu Moment distance} the evaluation metric to quantify the shape of the temporal bone. We evaluate our method on a public inner ear CT dataset and have seen both visual and quantitative improvement over state-of-the-art deep-learning-based methods. In addition, we perform a multi-rater visual evaluation experiment and find that trained experts consistently rate the proposed method the highest quality scores among all methods. Furthermore, we are able to quantify uncertainty in the unpaired translation task and the uncertainty map can provide structural information of the temporal bone.
△ Less
Submitted 4 February, 2021; v1 submitted 27 October, 2020;
originally announced October 2020.
-
Recommending Stack Overflow Posts for Fixing Runtime Exceptions using Failure Scenario Matching
Authors:
Sonal Mahajan,
Negarsadat Abolhassani,
Mukul R. Prasad
Abstract:
Using online Q&A forums, such as Stack Overflow (SO), for guidance to resolve program bugs, among other development issues, is commonplace in modern software development practice. Runtime exceptions (RE) is one such important class of bugs that is actively discussed on SO. In this work we present a technique and prototype tool called MAESTRO that can automatically recommend an SO post that is most…
▽ More
Using online Q&A forums, such as Stack Overflow (SO), for guidance to resolve program bugs, among other development issues, is commonplace in modern software development practice. Runtime exceptions (RE) is one such important class of bugs that is actively discussed on SO. In this work we present a technique and prototype tool called MAESTRO that can automatically recommend an SO post that is most relevant to a given Java RE in a developer's code. MAESTRO compares the exception-generating program scenario in the developer's code with that discussed in an SO post and returns the post with the closest match. To extract and compare the exception scenario effectively, MAESTRO first uses the answer code snippets in a post to implicate a subset of lines in the post's question code snippet as responsible for the exception and then compares these lines with the developer's code in terms of their respective Abstract Program Graph (APG) representations. The APG is a simplified and abstracted derivative of an abstract syntax tree, proposed in this work, that allows an effective comparison of the functionality embodied in the high-level program structure, while discarding many of the low-level syntactic or semantic differences. We evaluate MAESTRO on a benchmark of 78 instances of Java REs extracted from the top 500 Java projects on GitHub and show that MAESTRO can return either a highly relevant or somewhat relevant SO post corresponding to the exception instance in 71% of the cases, compared to relevant posts returned in only 8% - 44% instances, by four competitor tools based on state-of-the-art techniques. We also conduct a user experience study of MAESTRO with 10 Java developers, where the participants judge MAESTRO reporting a highly relevant or somewhat relevant post in 80% of the instances. In some cases the post is judged to be even better than the one manually found by the participant.
△ Less
Submitted 21 September, 2020;
originally announced September 2020.
-
A study of vowel nasalization using instantaneous spectra
Authors:
RaviShankar Prasad,
B. Yegnanarayana
Abstract:
Nasalization of vowels is a phenomenon where oral and nasal tracts participate simultaneously for the production of speech. Acoustic coupling of oral and nasal tracts results in a complex production system, which is subjected to a continuous changes owing to glottal activity. Identification of the duration of nasalization in vowels, and the extent of coupling of oral and nasal tracts, is a challen…
▽ More
Nasalization of vowels is a phenomenon where oral and nasal tracts participate simultaneously for the production of speech. Acoustic coupling of oral and nasal tracts results in a complex production system, which is subjected to a continuous changes owing to glottal activity. Identification of the duration of nasalization in vowels, and the extent of coupling of oral and nasal tracts, is a challenging task. The present research focuses on the changes in instantaneous vocal tract system response to study the effects of co--articulatory load of nasals on vowels. The dominant resonance frequency (DRF) contour derived from the spectra illustrates the contribution of oral and nasal resonances during nasalization. The extent of coupling determines the dominance of these resonances during glottal open and closed phases. A higher extent leads to more decay of energy for the oral resonances, and hence the vowel spectra exhibits a dominant nasal resonance. A comparison of the proposed parameters is made with the previously suggested measures. Several examples of segments of vowels in the context of nasal consonants for English language for both male and female speakers of English are used to illustrate different aspects of the proposed analysis method.
△ Less
Submitted 14 September, 2020;
originally announced September 2020.
-
Hi-CI: Deep Causal Inference in High Dimensions
Authors:
Ankit Sharma,
Garima Gupta,
Ranjitha Prasad,
Arnab Chatterjee,
Lovekesh Vig,
Gautam Shroff
Abstract:
We address the problem of counterfactual regression using causal inference (CI) in observational studies consisting of high dimensional covariates and high cardinality treatments. Confounding bias, which leads to inaccurate treatment effect estimation, is attributed to covariates that affect both treatments and outcome. The presence of high-dimensional co-variates exacerbates the impact of bias as…
▽ More
We address the problem of counterfactual regression using causal inference (CI) in observational studies consisting of high dimensional covariates and high cardinality treatments. Confounding bias, which leads to inaccurate treatment effect estimation, is attributed to covariates that affect both treatments and outcome. The presence of high-dimensional co-variates exacerbates the impact of bias as it is harder to isolate and measure the impact of these confounders. In the presence of high-cardinality treatment variables, CI is rendered ill-posed due to the increase in the number of counterfactual outcomes to be predicted. We propose Hi-CI, a deep neural network (DNN) based framework for estimating causal effects in the presence of large number of covariates, and high-cardinal and continuous treatment variables. The proposed architecture comprises of a decorrelation network and an outcome prediction network. In the decorrelation network, we learn a data representation in lower dimensions as compared to the original covariates and addresses confounding bias alongside. Subsequently, in the outcome prediction network, we learn an embedding of high-cardinality and continuous treatments, jointly with the data representation. We demonstrate the efficacy of causal effect prediction of the proposed Hi-CI network using synthetic and real-world NEWS datasets.
△ Less
Submitted 9 April, 2021; v1 submitted 22 August, 2020;
originally announced August 2020.
-
Changing Clusters of Indian States with respect to number of Cases of COVID-19 using incrementalKMN Method
Authors:
Rabinder Kumar Prasad,
Rosy Sarmah,
Subrata Chakraborty
Abstract:
The novel Coronavirus (COVID-19) incidence in India is currently experiencing exponential rise but with apparent spatial variation in growth rate and doubling time rate. We classify the states into five clusters with low to the high-risk category and study how the different states moved from one cluster to the other since the onset of the first case on $30^{th}$ January 2020 till the end of unlock…
▽ More
The novel Coronavirus (COVID-19) incidence in India is currently experiencing exponential rise but with apparent spatial variation in growth rate and doubling time rate. We classify the states into five clusters with low to the high-risk category and study how the different states moved from one cluster to the other since the onset of the first case on $30^{th}$ January 2020 till the end of unlock 1 that is $30^{th}$ June 2020. We have implemented a new clustering technique called the incrementalKMN (Prasad, R. K., Sarmah, R., Chakraborty, S.(2019))
△ Less
Submitted 12 July, 2020;
originally announced July 2020.
-
MultiMBNN: Matched and Balanced Causal Inference with Neural Networks
Authors:
Ankit Sharma,
Garima Gupta,
Ranjitha Prasad,
Arnab Chatterjee,
Lovekesh Vig,
Gautam Shroff
Abstract:
Causal inference (CI) in observational studies has received a lot of attention in healthcare, education, ad attribution, policy evaluation, etc. Confounding is a typical hazard, where the context affects both, the treatment assignment and response. In a multiple treatment scenario, we propose the neural network based MultiMBNN, where we overcome confounding by employing generalized propensity scor…
▽ More
Causal inference (CI) in observational studies has received a lot of attention in healthcare, education, ad attribution, policy evaluation, etc. Confounding is a typical hazard, where the context affects both, the treatment assignment and response. In a multiple treatment scenario, we propose the neural network based MultiMBNN, where we overcome confounding by employing generalized propensity score based matching, and learning balanced representations. We benchmark the performance on synthetic and real-world datasets using PEHE, and mean absolute percentage error over ATE as metrics. MultiMBNN outperforms the state-of-the-art algorithms for CI such as TARNet and Perfect Match (PM).
△ Less
Submitted 14 August, 2021; v1 submitted 28 April, 2020;
originally announced April 2020.
-
Compact recurrent neural networks for acoustic event detection on low-energy low-complexity platforms
Authors:
Gianmarco Cerutti,
Rahul Prasad,
Alessio Brutti,
Elisabetta Farella
Abstract:
Outdoor acoustic events detection is an exciting research field but challenged by the need for complex algorithms and deep learning techniques, typically requiring many computational, memory, and energy resources. This challenge discourages IoT implementation, where an efficient use of resources is required. However, current embedded technologies and microcontrollers have increased their capabilit…
▽ More
Outdoor acoustic events detection is an exciting research field but challenged by the need for complex algorithms and deep learning techniques, typically requiring many computational, memory, and energy resources. This challenge discourages IoT implementation, where an efficient use of resources is required. However, current embedded technologies and microcontrollers have increased their capabilities without penalizing energy efficiency. This paper addresses the application of sound event detection at the edge, by optimizing deep learning techniques on resource-constrained embedded platforms for the IoT. The contribution is two-fold: firstly, a two-stage student-teacher approach is presented to make state-of-the-art neural networks for sound event detection fit on current microcontrollers; secondly, we test our approach on an ARM Cortex M4, particularly focusing on issues related to 8-bits quantization. Our embedded implementation can achieve 68% accuracy in recognition on Urbansound8k, not far from state-of-the-art performance, with an inference time of 125 ms for each second of the audio stream, and power consumption of 5.5 mW in just 34.3 kB of RAM.
△ Less
Submitted 29 January, 2020;
originally announced January 2020.
-
Setting the Yardstick: A Quantitative Metric for Effectively Measuring Tactile Internet
Authors:
J. P. Verburg,
H. J. C. Kroep,
V. Gokhale,
R. Venkatesha Prasad,
V. Rao
Abstract:
The next frontier in communications is teleoperation -- manipulation and control of remote environments. Compared to conventional networked applications, teleoperation poses widely different requirements, ultra-low latency (ULL) being the primary one. Teleoperation, along with a host of other applications requiring ULL communication, is termed as Tactile Internet (TI). A significant redesign of co…
▽ More
The next frontier in communications is teleoperation -- manipulation and control of remote environments. Compared to conventional networked applications, teleoperation poses widely different requirements, ultra-low latency (ULL) being the primary one. Teleoperation, along with a host of other applications requiring ULL communication, is termed as Tactile Internet (TI). A significant redesign of conventional networking techniques is necessary to realize TI applications. Further, these advancements can be evaluated only when meaningful performance metrics are available. However, existing TI performance metrics fall severely short of comprehensively characterizing TI performance. In this paper, we take the first step towards bridging this gap. To this end, we propose a method that captures the fine-grained performance of TI in terms of delay and precision. We take Dynamic Time Warping (DTW) as the basis of our work and identify whether it is sufficient in characterizing TI systems. We refine DTW by developing a framework called Effective Time- and Value-Offset (ETVO) that extracts fine-grained time and value offsets between input and output signals of TI. Using ETVO, we present two quantitative metrics for TI -- Effective Delay-Derivative (EDD) and Effective Root Mean Square Error. Through rigorous experiments conducted on a realistic TI setup, we demonstrate the potential of the proposed metrics to precisely characterize TI interactions.
△ Less
Submitted 27 January, 2020; v1 submitted 6 January, 2020;
originally announced January 2020.
-
MetaCI: Meta-Learning for Causal Inference in a Heterogeneous Population
Authors:
Ankit Sharma,
Garima Gupta,
Ranjitha Prasad,
Arnab Chatterjee,
Lovekesh Vig,
Gautam Shroff
Abstract:
Performing inference on data obtained through observational studies is becoming extremely relevant due to the widespread availability of data in fields such as healthcare, education, retail, etc. Furthermore, this data is accrued from multiple homogeneous subgroups of a heterogeneous population, and hence, generalizing the inference mechanism over such data is essential. We propose the MetaCI fram…
▽ More
Performing inference on data obtained through observational studies is becoming extremely relevant due to the widespread availability of data in fields such as healthcare, education, retail, etc. Furthermore, this data is accrued from multiple homogeneous subgroups of a heterogeneous population, and hence, generalizing the inference mechanism over such data is essential. We propose the MetaCI framework with the goal of answering counterfactual questions in the context of causal inference (CI), where the factual observations are obtained from several homogeneous subgroups. While the CI network is designed to generalize from factual to counterfactual distribution in order to tackle covariate shift, MetaCI employs the meta-learning paradigm to tackle the shift in data distributions between training and test phase due to the presence of heterogeneity in the population, and due to drifts in the target distribution, also known as concept shift. We benchmark the performance of the MetaCI algorithm using the mean absolute percentage error over the average treatment effect as the metric, and demonstrate that meta initialization has significant gains compared to randomly initialized networks, and other methods.
△ Less
Submitted 17 February, 2021; v1 submitted 9 December, 2019;
originally announced December 2019.
-
Variational Student: Learning Compact and Sparser Networks in Knowledge Distillation Framework
Authors:
Srinidhi Hegde,
Ranjitha Prasad,
Ramya Hebbalaguppe,
Vishwajith Kumar
Abstract:
The holy grail in deep neural network research is porting the memory- and computation-intensive network models on embedded platforms with a minimal compromise in model accuracy. To this end, we propose a novel approach, termed as Variational Student, where we reap the benefits of compressibility of the knowledge distillation (KD) framework, and sparsity inducing abilities of variational inference…
▽ More
The holy grail in deep neural network research is porting the memory- and computation-intensive network models on embedded platforms with a minimal compromise in model accuracy. To this end, we propose a novel approach, termed as Variational Student, where we reap the benefits of compressibility of the knowledge distillation (KD) framework, and sparsity inducing abilities of variational inference (VI) techniques. Essentially, we build a sparse student network, whose sparsity is induced by the variational parameters found via optimizing a loss function based on VI, leveraging the knowledge learnt by an accurate but complex pre-trained teacher network. Further, for sparsity enhancement, we also employ a Block Sparse Regularizer on a concatenated tensor of teacher and student network weights. We demonstrate that the marriage of KD and the VI techniques inherits compression properties from the KD framework, and enhances levels of sparsity from the VI approach, with minimal compromise in the model accuracy. We benchmark our results on LeNet MLP and VGGNet (CNN) and illustrate a memory footprint reduction of 64x and 213x on these MLP and CNN variants, respectively, without a need to retrain the teacher network. Furthermore, in the low data regime, we observed that our method outperforms state-of-the-art Bayesian techniques in terms of accuracy.
△ Less
Submitted 26 October, 2019;
originally announced October 2019.
-
Reinforcing Edge Computing with Multipath TCP Enabled Mobile Device Clouds
Authors:
Venkatraman Balasubramanian,
Kees Kroep,
Kishor Chandra Joshi,
R. Venkatesha Prasad
Abstract:
In recent years, enormous growth has been witnessed in the computational and storage capabilities of mobile devices. However, much of this computational and storage capabilities are not always fully used. On the other hand, popularity of mobile edge computing which aims to replace the traditional centralized powerful cloud with multiple edge servers is rapidly growing. In particular, applications…
▽ More
In recent years, enormous growth has been witnessed in the computational and storage capabilities of mobile devices. However, much of this computational and storage capabilities are not always fully used. On the other hand, popularity of mobile edge computing which aims to replace the traditional centralized powerful cloud with multiple edge servers is rapidly growing. In particular, applications having strict latency requirements can be best served by the mobile edge clouds due to a reduced round-trip delay. In this paper we propose a Multi-Path TCP (MPTCP) enabled mobile device cloud (MDC) as a replacement to the existing TCP based or D2D device cloud techniques, as it effectively makes use of the available bandwidth by providing much higher throughput as well as ensures robust wireless connectivity. We investigate the congestion in mobile-device cloud formation resulting mainly due to the message passing for service providing nodes at the time of discovery, service continuity and formation of cloud composition. We propose a user space agent called congestion handler that enable offloading of packets from one sub-flow to the other under link quality constraints. Further, we discuss the benefits of this design and perform preliminary analysis of the system.
△ Less
Submitted 30 October, 2019; v1 submitted 12 September, 2019;
originally announced September 2019.
-
Adaptive Beamwidth Selection for Contention Based Access Periods in Millimeter Wave WLANs
Authors:
Kishor Chandra,
R. Venkatesha Prasad,
I. G. M. M. Niemegeers,
Abdur R. Biswas
Abstract:
60GHz wireless local area networks (WLANs) standards (e.g., IEEE 802.11ad and IEEE 802.15.3c) employ hybrid MAC protocols consisting of contention based access using CSMA/CA as well as dedicated service periods using time division multiple access (TDMA). To provide the channel access in the contention part of the protocol, quasi omni (QO) antenna patterns are defined which span over the particular…
▽ More
60GHz wireless local area networks (WLANs) standards (e.g., IEEE 802.11ad and IEEE 802.15.3c) employ hybrid MAC protocols consisting of contention based access using CSMA/CA as well as dedicated service periods using time division multiple access (TDMA). To provide the channel access in the contention part of the protocol, quasi omni (QO) antenna patterns are defined which span over the particular spatial directions and cover a limited area around access points. In this paper, we propose an algorithm to determine the beamwidth of each QO level. The proposed algorithm takes into account the spatial distribution of nodes to allocate the beamwidth of each QO level in an adaptive fashion in order to maximizes the channel utilization and satisfy the required link budget criterion. Since the proposed algorithm minimizes the collisions, it also minimizes the average time required to transmit total packets in a QO level. Proposed algorithm improves the average channel utilization up to 20-30% and reduces the time required to transmit total packets up to 40-50% for the given network parameters.
△ Less
Submitted 9 September, 2019;
originally announced September 2019.
-
Performance Analysis of IEEE 802.11ad MAC Protocol
Authors:
Kishor Chandra,
R. Venkatesha Prasad,
Ignas Niemegeers
Abstract:
IEEE 802.11ad specifies a hybrid medium access control (MAC) protocol consisting of contention as well as noncontention-based channel access mechanisms. Further, it also employs directional antennas to compensate for the high freespace path loss observed in 60GHz frequency band. Therefore, it significantly differs from other IEEE 802.11(b/g/n/ac) MAC protocols and thus requires new methods to anal…
▽ More
IEEE 802.11ad specifies a hybrid medium access control (MAC) protocol consisting of contention as well as noncontention-based channel access mechanisms. Further, it also employs directional antennas to compensate for the high freespace path loss observed in 60GHz frequency band. Therefore, it significantly differs from other IEEE 802.11(b/g/n/ac) MAC protocols and thus requires new methods to analyze its performance. In this paper, we propose a new analytical model for performance analysis of IEEE 802.11ad employing a threedimensional Markov chain considering all the features of IEEE 802.11ad medium access mechanisms including the presence of non-contention access and the different number of sectors due to the use of directional antennas. We show that the number of sectors has a high impact on the network throughput. We also show that the MAC packet delay is significantly affected by the duration of the contention period. Our results indicate that a suitable choice of the number of sectors and contention period can illustriously improve the channel utilization and MAC delay performance.
△ Less
Submitted 9 September, 2019;
originally announced September 2019.
-
Association, Blockage and Handoffs in IEEE 802.11ad based 60GHz Picocells- A Closer Look
Authors:
Kishor Chandra Joshi,
Rizqi Hersyandika,
R. Venkatesha Prasad
Abstract:
The link misalignment and high susceptibility to blockages are the biggest hurdles in realizing 60GHz based wireless local area networks (WLANs). However, much of the previous studies investigating 60GHz alignment and blockage issues do not provide an accurate quantitative evaluation from the perspective of WLANs. In this paper, we present an in-depth quantitative evaluation of commodity IEEE 802.…
▽ More
The link misalignment and high susceptibility to blockages are the biggest hurdles in realizing 60GHz based wireless local area networks (WLANs). However, much of the previous studies investigating 60GHz alignment and blockage issues do not provide an accurate quantitative evaluation from the perspective of WLANs. In this paper, we present an in-depth quantitative evaluation of commodity IEEE 802.11ad devices by forming a 60GHz WLAN with two docking stations mimicking as access points (APs). Through extensive experiments, we provide important insights about directional coverage pattern of antennas, communication range and co-channel interference and blockages. We are able to measure the IEEE 802.11ad link alignment and association overheads in absolute time units. With a very high accuracy (96-97%), our blockage characterization can differentiate between temporary and permanent blockages caused by humans in the indoor environment, which is a key insight. Utilizing our blockage characterization, we also demonstrate intelligent handoff to alternate APs using consumergrade IEEE 802.11ad devices. Our blockage-induced handoff experiments provide important insights that would be helpful in integrating millimeter wave based WLANs into future wireless networks.
△ Less
Submitted 9 September, 2019;
originally announced September 2019.
-
Analyzing the Trade-offs in Using Millimeter Wave Directional Links for High Data Rate Tactile Internet Applications
Authors:
Kishor Chandra Joshi,
Solmaz Niknam,
R. Venkatesha Prasad,
Balasubramaniam Natarajan
Abstract:
Ultra-low latency and high reliability communications are the two defining characteristics of Tactile Internet (TI). Nevertheless, some TI applications would also require high data-rate transfer of audio-visual information to complement the haptic data. Using Millimeter wave (mmWave) communications is an attractive choice for high datarate TI applications due to the availability of large bandwidth…
▽ More
Ultra-low latency and high reliability communications are the two defining characteristics of Tactile Internet (TI). Nevertheless, some TI applications would also require high data-rate transfer of audio-visual information to complement the haptic data. Using Millimeter wave (mmWave) communications is an attractive choice for high datarate TI applications due to the availability of large bandwidth in the mmWave bands. Moreover, mmWave radio access is also advantageous to attain the airinterface-diversity required for high reliability in TI systems as mmWave signal propagation significantly differs to sub-6GHz propagation. However, the use of narrow beamwidth in mmWave systems makes them susceptible to link misalignment-induced unreliability and high access latency. In this paper, we analyze the trade-offs between high gain of narrow beamwidth antennas and corresponding susceptibility to misalignment in mmWave links. To alleviate the effects of random antenna misalignment, we propose a beamwidth-adaptation scheme that significantly stabilize the link throughput performance.
△ Less
Submitted 9 September, 2019;
originally announced September 2019.
-
A Precise and Expressive Lattice-theoretical Framework for Efficient Network Verification
Authors:
Alex Horn,
Ali Kheradmand,
Mukul R. Prasad
Abstract:
Network verification promises to detect errors, such as black holes and forwarding loops, by logically analyzing the control or data plane. To do so efficiently, the state-of-the-art (e.g., Veriflow) partitions packet headers with identical forwarding behavior into the same packet equivalence class (PEC).
Recently, Yang and Lam showed how to construct the minimal set of PECs, called atomic predi…
▽ More
Network verification promises to detect errors, such as black holes and forwarding loops, by logically analyzing the control or data plane. To do so efficiently, the state-of-the-art (e.g., Veriflow) partitions packet headers with identical forwarding behavior into the same packet equivalence class (PEC).
Recently, Yang and Lam showed how to construct the minimal set of PECs, called atomic predicates. Their construction uses Binary Decision Diagrams (BDDs). However, BDDs have been shown to incur significant overhead per packet header bit, performing poorly when analyzing large-scale data centers. The overhead of atomic predicates prompted ddNF to devise a specialized data structure of Ternary Bit Vectors (TBV) instead.
However, TBVs are strictly less expressive than BDDs. Moreover, unlike atomic predicates, ddNF's set of PECs is not minimal. We show that ddNF's non-minimality is due to empty PECs. In addition, empty PECs are shown to trigger wrong analysis results. This reveals an inherent tension between precision, expressiveness and performance in formal network verification.
Our paper resolves this tension through a new lattice-theoretical PEC-construction algorithm, #PEC, that advances the field as follows: (i) #PEC can encode more kinds of forwarding rules (e.g., ip-tables) than ddNF and Veriflow, (ii) #PEC verifies a wider class of errors (e.g., shadowed rules) than ddNF, and (iii) on a broad range of real-world datasets, #PEC is 10X faster than atomic predicates. By achieving precision, expressiveness and performance, this paper answers a longstanding quest that has spanned three generations of formal network analysis techniques.
△ Less
Submitted 23 August, 2019;
originally announced August 2019.
-
Harnessing Evolution for Multi-Hunk Program Repair
Authors:
Seemanta Saha,
Ripon K. Saha,
Mukul R. Prasad
Abstract:
Despite significant advances in automatic program repair (APR)techniques over the past decade, practical deployment remains an elusive goal. One of the important challenges in this regard is the general inability of current APR techniques to produce patches that require edits in multiple locations, i.e., multi-hunk patches. In this work, we present a novel APR technique that generalizes single-hun…
▽ More
Despite significant advances in automatic program repair (APR)techniques over the past decade, practical deployment remains an elusive goal. One of the important challenges in this regard is the general inability of current APR techniques to produce patches that require edits in multiple locations, i.e., multi-hunk patches. In this work, we present a novel APR technique that generalizes single-hunk repair techniques to include an important class of multi-hunk bugs, namely bugs that may require applying a substantially similar patch at a number of locations. We term such sets of repair locations as evolutionary siblings - similar looking code, instantiated in similar contexts, that are expected to undergo similar changes. At the heart of our proposed method is an analysis to accurately identify a set of evolutionary siblings, for a given bug. This analysis leverages three distinct sources of information, namely the test-suite spectrum, a novel code similarity analysis, and the revision history of the project. The discovered siblings are then simultaneously repaired in a similar fashion. We instantiate this technique in a tool called Hercules and demonstrate that it is able to correctly fix 49 bugs in the Defects4J dataset, the highest of any individual APR technique to date. This includes 15 multi-hunk bugs and overall 13 bugs which have not been fixed by any other technique so far.
△ Less
Submitted 20 June, 2019;
originally announced June 2019.
-
Advancing the State of the Art in Open Domain Dialog Systems through the Alexa Prize
Authors:
Chandra Khatri,
Behnam Hedayatnia,
Anu Venkatesh,
Jeff Nunn,
Yi Pan,
Qing Liu,
Han Song,
Anna Gottardi,
Sanjeev Kwatra,
Sanju Pancholi,
Ming Cheng,
Qinglang Chen,
Lauren Stubel,
Karthik Gopalakrishnan,
Kate Bland,
Raefer Gabriel,
Arindam Mandal,
Dilek Hakkani-Tur,
Gene Hwang,
Nate Michel,
Eric King,
Rohit Prasad
Abstract:
Building open domain conversational systems that allow users to have engaging conversations on topics of their choice is a challenging task. Alexa Prize was launched in 2016 to tackle the problem of achieving natural, sustained, coherent and engaging open-domain dialogs. In the second iteration of the competition in 2018, university teams advanced the state of the art by using context in dialog mo…
▽ More
Building open domain conversational systems that allow users to have engaging conversations on topics of their choice is a challenging task. Alexa Prize was launched in 2016 to tackle the problem of achieving natural, sustained, coherent and engaging open-domain dialogs. In the second iteration of the competition in 2018, university teams advanced the state of the art by using context in dialog models, leveraging knowledge graphs for language understanding, handling complex utterances, building statistical and hierarchical dialog managers, and leveraging model-driven signals from user responses. The 2018 competition also included the provision of a suite of tools and models to the competitors including the CoBot (conversational bot) toolkit, topic and dialog act detection models, conversation evaluators, and a sensitive content detection model so that the competing teams could focus on building knowledge-rich, coherent and engaging multi-turn dialog systems. This paper outlines the advances developed by the university teams as well as the Alexa Prize team to achieve the common goal of advancing the science of Conversational AI. We address several key open-ended problems such as conversational speech recognition, open domain natural language understanding, commonsense reasoning, statistical dialog management, and dialog evaluation. These collaborative efforts have driven improved experiences by Alexa users to an average rating of 3.61, the median duration of 2 mins 18 seconds, and average turns to 14.6, increases of 14%, 92%, 54% respectively since the launch of the 2018 competition. For conversational speech recognition, we have improved our relative Word Error Rate by 55% and our relative Entity Error Rate by 34% since the launch of the Alexa Prize. Socialbots improved in quality significantly more rapidly in 2018, in part due to the release of the CoBot toolkit.
△ Less
Submitted 27 December, 2018;
originally announced December 2018.
-
Employing p-CSMA on a LoRa Network Simulator
Authors:
Nikos Kouvelas,
Vijay Rao,
R. R. Venkatesha Prasad
Abstract:
Low-Power Wide-Area Networks (LPWANs) emerged to cover the needs of Internet of Things (IoT)-devices for operational longevity and long operating range. Among LPWANs, Long Range (LoRa) WAN has been the most promising; an upcoming IoT protocol, already adopted by big mobile operators like KPN and TTN. With LoRaWANs, IoT-devices transmit data to their corresponding gateways over many kilometers in a…
▽ More
Low-Power Wide-Area Networks (LPWANs) emerged to cover the needs of Internet of Things (IoT)-devices for operational longevity and long operating range. Among LPWANs, Long Range (LoRa) WAN has been the most promising; an upcoming IoT protocol, already adopted by big mobile operators like KPN and TTN. With LoRaWANs, IoT-devices transmit data to their corresponding gateways over many kilometers in a single hop and with 1% duty-cycle. However, in a LoRa network, any device claims the channel for data-transmission without performing channel-sensing or synchronization with other devices. This increases humongously the number of collisions of information-packets when the number of IoT-devices that are connected per gateway increases.
To improve the utilization of the channel, we propose the application of persistent-Carrier Sense Multiple Access (p-CSMA) protocols on the MAC layer of LoRaWANs. In this manuscript, we report on the initial design of a p-CSMA component for the simulation of LoRa networks in ns3. In particular, the classes adding p-CSMA functionality to the IoT-devices are presented. Additionally, the dependencies and relations between these classes and an existing LoRaWAN module on which they apply are detailed. Further, we evaluate this new p-CSMA LoRaWAN module in terms of Packet Reception Ratio (PRR) by simulating LoRa networks. The current report is the first step in the creation of a holistic p-CSMA module, directed to support network-researchers and connoisseurs in simulating all aspects of LoRa networks in ns3.
△ Less
Submitted 30 May, 2018;
originally announced May 2018.