-
Energy-Efficient Seizure Detection Suitable for low-power Applications
Authors:
Julia Werner,
Bhavya Kohli,
Paul Palomero Bernardo,
Christoph Gerum,
Oliver Bringmann
Abstract:
Epilepsy is the most common, chronic, neurological disease worldwide and is typically accompanied by reoccurring seizures. Neuro implants can be used for effective treatment by suppressing an upcoming seizure upon detection. Due to the restricted size and limited battery lifetime of those medical devices, the employed approach also needs to be limited in size and have low energy requirements. We p…
▽ More
Epilepsy is the most common, chronic, neurological disease worldwide and is typically accompanied by reoccurring seizures. Neuro implants can be used for effective treatment by suppressing an upcoming seizure upon detection. Due to the restricted size and limited battery lifetime of those medical devices, the employed approach also needs to be limited in size and have low energy requirements. We present an energy-efficient seizure detection approach involving a TC-ResNet and time-series analysis which is suitable for low-power edge devices. The presented approach allows for accurate seizure detection without preceding feature extraction while considering the stringent hardware requirements of neural implants. The approach is validated using the CHB-MIT Scalp EEG Database with a 32-bit floating point model and a hardware suitable 4-bit fixed point model. The presented method achieves an accuracy of 95.28%, a sensitivity of 92.34% and an AUC score of 0.9384 on this dataset with 4-bit fixed point representation. Furthermore, the power consumption of the model is measured with the low-power AI accelerator UltraTrail, which only requires 495 nW on average. Due to this low-power consumption this classification approach is suitable for real-time seizure detection on low-power wearable devices such as neural implants.
△ Less
Submitted 19 June, 2024;
originally announced June 2024.
-
Precise localization within the GI tract by combining classification of CNNs and time-series analysis of HMMs
Authors:
Julia Werner,
Christoph Gerum,
Moritz Reiber,
Jörg Nick,
Oliver Bringmann
Abstract:
This paper presents a method to efficiently classify the gastroenterologic section of images derived from Video Capsule Endoscopy (VCE) studies by exploring the combination of a Convolutional Neural Network (CNN) for classification with the time-series analysis properties of a Hidden Markov Model (HMM). It is demonstrated that successive time-series analysis identifies and corrects errors in the C…
▽ More
This paper presents a method to efficiently classify the gastroenterologic section of images derived from Video Capsule Endoscopy (VCE) studies by exploring the combination of a Convolutional Neural Network (CNN) for classification with the time-series analysis properties of a Hidden Markov Model (HMM). It is demonstrated that successive time-series analysis identifies and corrects errors in the CNN output. Our approach achieves an accuracy of $98.04\%$ on the Rhode Island (RI) Gastroenterology dataset. This allows for precise localization within the gastrointestinal (GI) tract while requiring only approximately 1M parameters and thus, provides a method suitable for low power devices
△ Less
Submitted 11 October, 2023;
originally announced October 2023.
-
A Survey of Data Security: Practices from Cybersecurity and Challenges of Machine Learning
Authors:
Padmaksha Roy,
Jaganmohan Chandrasekaran,
Erin Lanus,
Laura Freeman,
Jeremy Werner
Abstract:
Machine learning (ML) is increasingly being deployed in critical systems. The data dependence of ML makes securing data used to train and test ML-enabled systems of utmost importance. While the field of cybersecurity has well-established practices for securing information, ML-enabled systems create new attack vectors. Furthermore, data science and cybersecurity domains adhere to their own set of s…
▽ More
Machine learning (ML) is increasingly being deployed in critical systems. The data dependence of ML makes securing data used to train and test ML-enabled systems of utmost importance. While the field of cybersecurity has well-established practices for securing information, ML-enabled systems create new attack vectors. Furthermore, data science and cybersecurity domains adhere to their own set of skills and terminologies. This survey aims to present background information for experts in both domains in topics such as cryptography, access control, zero trust architectures, homomorphic encryption, differential privacy for machine learning, and federated learning to establish shared foundations and promote advancements in data security.
△ Less
Submitted 4 December, 2023; v1 submitted 6 October, 2023;
originally announced October 2023.
-
Linking Symptom Inventories using Semantic Textual Similarity
Authors:
Eamonn Kennedy,
Shashank Vadlamani,
Hannah M Lindsey,
Kelly S Peterson,
Kristen Dams OConnor,
Kenton Murray,
Ronak Agarwal,
Houshang H Amiri,
Raeda K Andersen,
Talin Babikian,
David A Baron,
Erin D Bigler,
Karen Caeyenberghs,
Lisa Delano-Wood,
Seth G Disner,
Ekaterina Dobryakova,
Blessen C Eapen,
Rachel M Edelstein,
Carrie Esopenko,
Helen M Genova,
Elbert Geuze,
Naomi J Goodrich-Hunsaker,
Jordan Grafman,
Asta K Haberg,
Cooper B Hodges
, et al. (57 additional authors not shown)
Abstract:
An extensive library of symptom inventories has been developed over time to measure clinical symptoms, but this variety has led to several long standing issues. Most notably, results drawn from different settings and studies are not comparable, which limits reproducibility. Here, we present an artificial intelligence (AI) approach using semantic textual similarity (STS) to link symptoms and scores…
▽ More
An extensive library of symptom inventories has been developed over time to measure clinical symptoms, but this variety has led to several long standing issues. Most notably, results drawn from different settings and studies are not comparable, which limits reproducibility. Here, we present an artificial intelligence (AI) approach using semantic textual similarity (STS) to link symptoms and scores across previously incongruous symptom inventories. We tested the ability of four pre-trained STS models to screen thousands of symptom description pairs for related content - a challenging task typically requiring expert panels. Models were tasked to predict symptom severity across four different inventories for 6,607 participants drawn from 16 international data sources. The STS approach achieved 74.8% accuracy across five tasks, outperforming other models tested. This work suggests that incorporating contextual, semantic information can assist expert decision-making processes, yielding gains for both general and disease-specific clinical assessment.
△ Less
Submitted 8 September, 2023;
originally announced September 2023.
-
DAS-N2N: Machine learning Distributed Acoustic Sensing (DAS) signal denoising without clean data
Authors:
Sacha Lapins,
Antony Butcher,
J. -Michael Kendall,
Thomas S. Hudson,
Anna L. Stork,
Maximilian J. Werner,
Jemma Gunning,
Alex M. Brisbourne
Abstract:
This article presents a weakly supervised machine learning method, which we call DAS-N2N, for suppressing strong random noise in distributed acoustic sensing (DAS) recordings. DAS-N2N requires no manually produced labels (i.e., pre-determined examples of clean event signals or sections of noise) for training and aims to map random noise processes to a chosen summary statistic, such as the distribu…
▽ More
This article presents a weakly supervised machine learning method, which we call DAS-N2N, for suppressing strong random noise in distributed acoustic sensing (DAS) recordings. DAS-N2N requires no manually produced labels (i.e., pre-determined examples of clean event signals or sections of noise) for training and aims to map random noise processes to a chosen summary statistic, such as the distribution mean, median or mode, whilst retaining the true underlying signal. This is achieved by splicing (joining together) two fibres hosted within a single optical cable, recording two noisy copies of the same underlying signal corrupted by different independent realizations of random observational noise. A deep learning model can then be trained using only these two noisy copies of the data to produce a near fully-denoised copy. Once the model is trained, only noisy data from a single fibre is required. Using a dataset from a DAS array deployed on the surface of the Rutford Ice Stream in Antarctica, we demonstrate that DAS-N2N greatly suppresses incoherent noise and enhances the signal-to-noise ratios (SNR) of natural microseismic icequake events. We further show that this approach is inherently more efficient and effective than standard stop/pass band and white noise (e.g., Wiener) filtering routines, as well as a comparable self-supervised learning method based on masking individual DAS channels. Our preferred model for this task is lightweight, processing 30 seconds of data recorded at a sampling frequency of 1000 Hz over 985 channels (approx. 1 km of fiber) in $<$1 s. Due to the high noise levels in DAS recordings, efficient data-driven denoising methods, such as DAS-N2N, will prove essential to time-critical DAS earthquake detection, particularly in the case of microseismic monitoring.
△ Less
Submitted 24 November, 2023; v1 submitted 17 April, 2023;
originally announced April 2023.
-
Automatic Facial Skin Feature Detection for Everyone
Authors:
Qian Zheng,
Ankur Purwar,
Heng Zhao,
Guang Liang Lim,
Ling Li,
Debasish Behera,
Qian Wang,
Min Tan,
Rizhao Cai,
Jennifer Werner,
Dennis Sng,
Maurice van Steensel,
Weisi Lin,
Alex C Kot
Abstract:
Automatic assessment and understanding of facial skin condition have several applications, including the early detection of underlying health problems, lifestyle and dietary treatment, skin-care product recommendation, etc. Selfies in the wild serve as an excellent data resource to democratize skin quality assessment, but suffer from several data collection challenges.The key to guaranteeing an ac…
▽ More
Automatic assessment and understanding of facial skin condition have several applications, including the early detection of underlying health problems, lifestyle and dietary treatment, skin-care product recommendation, etc. Selfies in the wild serve as an excellent data resource to democratize skin quality assessment, but suffer from several data collection challenges.The key to guaranteeing an accurate assessment is accurate detection of different skin features. We present an automatic facial skin feature detection method that works across a variety of skin tones and age groups for selfies in the wild. To be specific, we annotate the locations of acne, pigmentation, and wrinkle for selfie images with different skin tone colors, severity levels, and lighting conditions. The annotation is conducted in a two-phase scheme with the help of a dermatologist to train volunteers for annotation. We employ Unet++ as the network architecture for feature detection. This work shows that the two-phase annotation scheme can robustly detect the accurate locations of acne, pigmentation, and wrinkle for selfie images with different ethnicities, skin tone colors, severity levels, age groups, and lighting conditions.
△ Less
Submitted 30 March, 2022;
originally announced March 2022.
-
Lightweight and interpretable neural modeling of an audio distortion effect using hyperconditioned differentiable biquads
Authors:
Shahan Nercessian,
Andy Sarroff,
Kurt James Werner
Abstract:
In this work, we propose using differentiable cascaded biquads to model an audio distortion effect. We extend trainable infinite impulse response (IIR) filters to the hyperconditioned case, in which a transformation is learned to directly map external parameters of the distortion effect to its internal filter and gain parameters, along with activations necessary to ensure filter stability. We prop…
▽ More
In this work, we propose using differentiable cascaded biquads to model an audio distortion effect. We extend trainable infinite impulse response (IIR) filters to the hyperconditioned case, in which a transformation is learned to directly map external parameters of the distortion effect to its internal filter and gain parameters, along with activations necessary to ensure filter stability. We propose a novel, efficient training scheme of IIR filters by means of a Fourier transform. Our models have significantly fewer parameters and reduced complexity relative to more traditional black-box neural audio effect modeling methodologies using finite impulse response filters. Our smallest, best-performing model adequately models a BOSS MT-2 pedal at 44.1 kHz, using a total of 40 biquads and only 210 parameters. Its model parameters are interpretable, can be related back to the original analog audio circuit, and can even be intuitively altered by machine learning non-specialists after model training. Quantitative and qualitative results illustrate the effectiveness of the proposed method.
△ Less
Submitted 15 March, 2021;
originally announced March 2021.
-
COVID-19 Contact-Tracing Mobile Apps: Evaluation and Assessment for Decision Makers
Authors:
Ramesh Raskar,
Greg Nadeau,
John Werner,
Rachel Barbar,
Ashley Mehra,
Gabriel Harp,
Markus Leopoldseder,
Bryan Wilson,
Derrick Flakoll,
Praneeth Vepakomma,
Deepti Pahwa,
Robson Beaudry,
Emelin Flores,
Maciej Popielarz,
Akanksha Bhatia,
Andrea Nuzzo,
Matt Gee,
Jay Summet,
Rajeev Surati,
Bikram Khastgir,
Francesco Maria Benedetti,
Kristen Vilcans,
Sienna Leis,
Khahlil Louisy
Abstract:
A number of groups, from governments to non-profits, have quickly acted to innovate the contact-tracing process: they are designing, building, and launching contact-tracing apps in response to the COVID-19 crisis. A diverse range of approaches exist, creating challenging choices for officials looking to implement contact-tracing technology in their community and raising concerns about these choice…
▽ More
A number of groups, from governments to non-profits, have quickly acted to innovate the contact-tracing process: they are designing, building, and launching contact-tracing apps in response to the COVID-19 crisis. A diverse range of approaches exist, creating challenging choices for officials looking to implement contact-tracing technology in their community and raising concerns about these choices among citizens asked to participate in contact tracing. We are frequently asked how to evaluate and differentiate between the options for contact-tracing applications. Here, we share the questions we ask about app features and plans when reviewing the many contact-tracing apps appearing on the global stage.
△ Less
Submitted 3 June, 2020;
originally announced June 2020.
-
Apps Gone Rogue: Maintaining Personal Privacy in an Epidemic
Authors:
Ramesh Raskar,
Isabel Schunemann,
Rachel Barbar,
Kristen Vilcans,
Jim Gray,
Praneeth Vepakomma,
Suraj Kapa,
Andrea Nuzzo,
Rajiv Gupta,
Alex Berke,
Dazza Greenwood,
Christian Keegan,
Shriank Kanaparti,
Robson Beaudry,
David Stansbury,
Beatriz Botero Arcila,
Rishank Kanaparti,
Vitor Pamplona,
Francesco M Benedetti,
Alina Clough,
Riddhiman Das,
Kaushal Jain,
Khahlil Louisy,
Greg Nadeau,
Steve Penrod
, et al. (7 additional authors not shown)
Abstract:
Containment, the key strategy in quickly halting an epidemic, requires rapid identification and quarantine of the infected individuals, determination of whom they have had close contact with in the previous days and weeks, and decontamination of locations the infected individual has visited. Achieving containment demands accurate and timely collection of the infected individual's location and cont…
▽ More
Containment, the key strategy in quickly halting an epidemic, requires rapid identification and quarantine of the infected individuals, determination of whom they have had close contact with in the previous days and weeks, and decontamination of locations the infected individual has visited. Achieving containment demands accurate and timely collection of the infected individual's location and contact history. Traditionally, this process is labor intensive, susceptible to memory errors, and fraught with privacy concerns. With the recent almost ubiquitous availability of smart phones, many people carry a tool which can be utilized to quickly identify an infected individual's contacts during an epidemic, such as the current 2019 novel Coronavirus crisis. Unfortunately, the very same first-generation contact tracing tools have been used to expand mass surveillance, limit individual freedoms and expose the most private details about individuals. We seek to outline the different technological approaches to mobile-phone based contact-tracing to date and elaborate on the opportunities and the risks that these technologies pose to individuals and societies. We describe advanced security enhancing approaches that can mitigate these risks and describe trade-offs one must make when developing and deploying any mass contact-tracing technology. With this paper, our aim is to continue to grow the conversation regarding contact-tracing for epidemic and pandemic containment and discuss opportunities to advance this space. We invite feedback and discussion.
△ Less
Submitted 21 December, 2022; v1 submitted 19 March, 2020;
originally announced March 2020.
-
Speech Dereverberation and Noise Reduction for both diffusive noise field and point noise source in Binaural Hearing Aids: Preliminary Version
Authors:
Johnny Werner,
Marcio H. Costa
Abstract:
The multichannel Wiener filter (MWF) and its variations have been extensively applied to binaural hearing aids. However, its major drawback is the distortion of the binaural cues of the residual noise, changing the original acoustic scenario, which is of paramount importance for hearing impaired people. The MWF-IC method was previously proposed for joint speech dereverberation and noise reduction,…
▽ More
The multichannel Wiener filter (MWF) and its variations have been extensively applied to binaural hearing aids. However, its major drawback is the distortion of the binaural cues of the residual noise, changing the original acoustic scenario, which is of paramount importance for hearing impaired people. The MWF-IC method was previously proposed for joint speech dereverberation and noise reduction, preserving the interaural coherence (IC) of diffuse noise fields. In this work, we propose a new variation of the MWF-IC for both speech dereverberation and noise reduction, which preserves the original spatial characteristics of the residual noise for either diffuse fields or point sources. Objective measures and preliminary psychoacoustic experiments indicate the proposed method is capable of perceptually preserving the original spatialization of both types of noise, without significant performance loss in both speech dereverberation and noise reduction.
△ Less
Submitted 9 November, 2019;
originally announced November 2019.
-
Joint Device Positioning and Clock Synchronization in 5G Ultra-Dense Networks
Authors:
Mike Koivisto,
Mário Costa,
Janis Werner,
Kari Heiska,
Jukka Talvitie,
Kari Leppänen,
Visa Koivunen,
Mikko Valkama
Abstract:
In this article, we address the prospects and key enabling technologies for highly efficient and accurate device positioning and tracking in 5G radio access networks. Building on the premises of ultra-dense networks as well as on the adoption of multicarrier waveforms and antenna arrays in the access nodes (ANs), we first formulate extended Kalman filter (EKF)-based solutions for computationally e…
▽ More
In this article, we address the prospects and key enabling technologies for highly efficient and accurate device positioning and tracking in 5G radio access networks. Building on the premises of ultra-dense networks as well as on the adoption of multicarrier waveforms and antenna arrays in the access nodes (ANs), we first formulate extended Kalman filter (EKF)-based solutions for computationally efficient joint estimation and tracking of the time of arrival (ToA) and direction of arrival (DoA) of the user nodes (UNs) using uplink reference signals. Then, a second EKF stage is proposed in order to fuse the individual DoA/ToA estimates from one or several ANs into a UN position estimate. Since all the processing takes place at the network side, the computing complexity and energy consumption at the UN side are kept to a minimum. The cascaded EKFs proposed in this article also take into account the unavoidable relative clock offsets between UNs and ANs, such that reliable clock synchronization of the access-link is obtained as a valuable by-product. The proposed cascaded EKF scheme is then revised and extended to more general and challenging scenarios where not only the UNs have clock offsets against the network time, but also the ANs themselves are not mutually synchronized in time. Finally, comprehensive performance evaluations of the proposed solutions on a realistic 5G network setup, building on the METIS project based outdoor Madrid map model together with complete ray tracing based propagation modeling, are provided. The obtained results clearly demonstrate that by using the developed methods, sub-meter scale positioning and tracking accuracy of moving devices is indeed technically feasible in future 5G radio access networks operating at sub-6GHz frequencies, despite the realistic assumptions related to clock offsets and potentially even under unsynchronized network elements.
△ Less
Submitted 24 November, 2016; v1 submitted 12 April, 2016;
originally announced April 2016.
-
Analysis and Augmented Spatial Processing for Uplink OFDMA MU-MIMO Receiver with Transceiver I/Q Imbalance and External Interference
Authors:
Aki Hakkarainen,
Janis Werner,
Kapil R. Dandekar,
Mikko Valkama
Abstract:
We address receiver (RX) signal processing in MIMO systems under in-phase/quadrature (I/Q) imbalance, which causes cross-talk of mirror-subcarriers in OFDM systems. We extend the typically reported single-user studies to uplink OFDMA-based multiuser MIMO, with simultaneous user multiplexing in frequency and spatial domains. We also incorporate multiple external interferers, for modeling challengin…
▽ More
We address receiver (RX) signal processing in MIMO systems under in-phase/quadrature (I/Q) imbalance, which causes cross-talk of mirror-subcarriers in OFDM systems. We extend the typically reported single-user studies to uplink OFDMA-based multiuser MIMO, with simultaneous user multiplexing in frequency and spatial domains. We also incorporate multiple external interferers, for modeling challenging conditions in heterogeneous networks. In the signal processing developments, we exploit the augmented subcarrier processing, which processes each subcarrier jointly with its counterpart at the image subcarrier, and jointly across RX antennas. Furthermore, we derive an augmented LMMSE RX. The novel approach integrates the I/Q imbalance mitigation, interference suppression and data stream separation into a single processing stage, thus avoiding a separate transceiver calibration. Our numerical results show the signal-to-interference-plus-noise ratio and symbol-error rate of an arbitrary data stream after RX processing as a function of different system parameters. The per-subcarrier processing is shown to suffer heavily under I/Q imbalances, and being particularly sensitive to external interferers, whereas the augmented method provides efficient data stream separation and interference suppression. Finally, we extend the studies to massive MIMO framework and show that the per-subcarrier processing still suffers from performance degradation, whereas the augmented approach can fully exploit the array gain.
△ Less
Submitted 25 February, 2016; v1 submitted 2 July, 2014;
originally announced July 2014.