-
Survey of Distributed Algorithms for Resource Allocation over Multi-Agent Systems
Authors:
Mohammadreza Doostmohammadian,
Alireza Aghasi,
Mohammad Pirani,
Ehsan Nekouei,
Houman Zarrabi,
Reza Keypour,
Apostolos I. Rikos,
Karl H. Johansson
Abstract:
Resource allocation and scheduling in multi-agent systems present challenges due to complex interactions and decentralization. This survey paper provides a comprehensive analysis of distributed algorithms for addressing the distributed resource allocation (DRA) problem over multi-agent systems. It covers a significant area of research at the intersection of optimization, multi-agent systems, and d…
▽ More
Resource allocation and scheduling in multi-agent systems present challenges due to complex interactions and decentralization. This survey paper provides a comprehensive analysis of distributed algorithms for addressing the distributed resource allocation (DRA) problem over multi-agent systems. It covers a significant area of research at the intersection of optimization, multi-agent systems, and distributed consensus-based computing. The paper begins by presenting a mathematical formulation of the DRA problem, establishing a solid foundation for further exploration. Real-world applications of DRA in various domains are examined to underscore the importance of efficient resource allocation, and relevant distributed optimization formulations are presented. The survey then delves into existing solutions for DRA, encompassing linear, nonlinear, primal-based, and dual-formulation-based approaches. Furthermore, this paper evaluates the features and properties of DRA algorithms, addressing key aspects such as feasibility, convergence rate, and network reliability. The analysis of mathematical foundations, diverse applications, existing solutions, and algorithmic properties contributes to a broader comprehension of the challenges and potential solutions for this domain.
△ Less
Submitted 28 January, 2024;
originally announced January 2024.
-
Epidemic modeling and flattening the infection curve in social networks
Authors:
Mohammadreza Doostmohammadian,
Soraya Doustmohamadian,
Najmeh Doostmohammadian,
Azam Doustmohammadian,
Houman Zarrabi,
Hamid R. Rabiee
Abstract:
The main goal of this paper is to model the epidemic and flattening the infection curve of the social networks. Flattening the infection curve implies slowing down the spread of the disease and reducing the infection rate via social-distancing, isolation (quarantine) and vaccination. The nan-pharmaceutical methods are a much simpler and efficient way to control the spread of epidemic and infection…
▽ More
The main goal of this paper is to model the epidemic and flattening the infection curve of the social networks. Flattening the infection curve implies slowing down the spread of the disease and reducing the infection rate via social-distancing, isolation (quarantine) and vaccination. The nan-pharmaceutical methods are a much simpler and efficient way to control the spread of epidemic and infection rate. By specifying a target group with high centrality for isolation and quarantine one can reach a much flatter infection curve (related to Corona for example) without adding extra costs to health services. The aim of this research is, first, modeling the epidemic and, then, giving strategies and structural algorithms for targeted vaccination or targeted non-pharmaceutical methods for reducing the peak of the viral disease and flattening the infection curve. These methods are more efficient for nan-pharmaceutical interventions as finding the target quarantine group flattens the infection curve much easier. For this purpose, a few number of particular nodes with high centrality are isolated and the infection curve is analyzed. Our research shows meaningful results for flattening the infection curve only by isolating a few number of targeted nodes in the social network. The proposed methods are independent of the type of the disease and are effective for any viral disease, e.g., Covid-19.
△ Less
Submitted 26 November, 2023;
originally announced November 2023.
-
Discretized Distributed Optimization over Dynamic Digraphs
Authors:
Mohammadreza Doostmohammadian,
Wei Jiang,
Muwahida Liaquat,
Alireza Aghasi,
Houman Zarrabi
Abstract:
We consider a discrete-time model of continuous-time distributed optimization over dynamic directed-graphs (digraphs) with applications to distributed learning. Our optimization algorithm works over general strongly connected dynamic networks under switching topologies, e.g., in mobile multi-agent systems and volatile networks due to link failures. Compared to many existing lines of work, there is…
▽ More
We consider a discrete-time model of continuous-time distributed optimization over dynamic directed-graphs (digraphs) with applications to distributed learning. Our optimization algorithm works over general strongly connected dynamic networks under switching topologies, e.g., in mobile multi-agent systems and volatile networks due to link failures. Compared to many existing lines of work, there is no need for bi-stochastic weight designs on the links. The existing literature mostly needs the link weights to be stochastic using specific weight-design algorithms needed both at the initialization and at all times when the topology of the network changes. This paper eliminates the need for such algorithms and paves the way for distributed optimization over time-varying digraphs. We derive the bound on the gradient-tracking step-size and discrete time-step for convergence and prove dynamic stability using arguments from consensus algorithms, matrix perturbation theory, and Lyapunov theory. This work, particularly, is an improvement over existing stochastic-weight undirected networks in case of link removal or packet drops. This is because the existing literature may need to rerun time-consuming and computationally complex algorithms for stochastic design, while the proposed strategy works as long as the underlying network is weight-symmetric and balanced. The proposed optimization framework finds applications to distributed classification and learning.
△ Less
Submitted 26 March, 2024; v1 submitted 14 November, 2023;
originally announced November 2023.
-
Infection Curve Flattening via Targeted Interventions and Self-Isolation
Authors:
Mohammadreza Doostmohammadian,
Houman Zarrabi,
Azam Doustmohammadian,
Hamid R. Rabiee
Abstract:
Understanding the impact of network clustering and small-world properties on epidemic spread can be crucial in developing effective strategies for managing and controlling infectious diseases. Particularly in this work, we study the impact of these network features on targeted intervention (e.g., self-isolation and quarantine). The targeted individuals for self-isolation are based on centrality me…
▽ More
Understanding the impact of network clustering and small-world properties on epidemic spread can be crucial in developing effective strategies for managing and controlling infectious diseases. Particularly in this work, we study the impact of these network features on targeted intervention (e.g., self-isolation and quarantine). The targeted individuals for self-isolation are based on centrality measures and node influence metrics. Compared to our previous works on scale-free networks, small-world networks are considered in this paper. Small-world networks resemble real-world social and human networks. In this type of network, most nodes are not directly connected but can be reached through a few intermediaries (known as the small-worldness property). Real social networks, such as friendship networks, also exhibit this small-worldness property, where most people are connected through a relatively small number of intermediaries. We particularly study the epidemic curve flattening by centrality-based interventions/isolation over small-world networks. Our results show that high clustering while having low small-worldness (higher shortest path characteristics) implies flatter infection curves. In reality, a flatter infection curve implies that the number of new cases of a disease is spread out over a longer period of time, rather than a sharp and sudden increase in cases (a peak in epidemic). In turn, this reduces the strain on healthcare resources and helps to relieve the healthcare services.
△ Less
Submitted 19 October, 2023;
originally announced October 2023.
-
D-SVM over Networked Systems with Non-Ideal Linking Conditions
Authors:
Mohammadreza Doostmohammadian,
Alireza Aghasi,
Houman Zarrabi
Abstract:
This paper considers distributed optimization algorithms, with application in binary classification via distributed support-vector-machines (D-SVM) over multi-agent networks subject to some link nonlinearities. The agents solve a consensus-constraint distributed optimization cooperatively via continuous-time dynamics, while the links are subject to strongly sign-preserving odd nonlinear conditions…
▽ More
This paper considers distributed optimization algorithms, with application in binary classification via distributed support-vector-machines (D-SVM) over multi-agent networks subject to some link nonlinearities. The agents solve a consensus-constraint distributed optimization cooperatively via continuous-time dynamics, while the links are subject to strongly sign-preserving odd nonlinear conditions. Logarithmic quantization and clipping (saturation) are two examples of such nonlinearities. In contrast to existing literature that mostly considers ideal links and perfect information exchange over linear channels, we show how general sector-bounded models affect the convergence to the optimizer (i.e., the SVM classifier) over dynamic balanced directed networks. In general, any odd sector-bounded nonlinear mapping can be applied to our dynamics. The main challenge is to show that the proposed system dynamics always have one zero eigenvalue (associated with the consensus) and the other eigenvalues all have negative real parts. This is done by recalling arguments from matrix perturbation theory. Then, the solution is shown to converge to the agreement state under certain conditions. For example, the gradient tracking (GT) step size is tighter than the linear case by factors related to the upper/lower sector bounds. To the best of our knowledge, no existing work in distributed optimization and learning literature considers non-ideal link conditions.
△ Less
Submitted 13 April, 2023;
originally announced April 2023.
-
Distributed Detection and Mitigation of Biasing Attacks over Multi-Agent Networks
Authors:
Mohammadreza Doostmohammadian,
Houman Zarrabi,
Hamid R. Rabiee,
Usman A. Khan,
Themistoklis Charalambous
Abstract:
This paper proposes a distributed attack detection and mitigation technique based on distributed estimation over a multi-agent network, where the agents take partial system measurements susceptible to (possible) biasing attacks. In particular, we assume that the system is not locally observable via the measurements in the direct neighborhood of any agent. First, for performance analysis in the att…
▽ More
This paper proposes a distributed attack detection and mitigation technique based on distributed estimation over a multi-agent network, where the agents take partial system measurements susceptible to (possible) biasing attacks. In particular, we assume that the system is not locally observable via the measurements in the direct neighborhood of any agent. First, for performance analysis in the attack-free case, we show that the proposed distributed estimation is unbiased with bounded mean-square deviation in steady-state. Then, we propose a residual-based strategy to locally detect possible attacks at agents. In contrast to the deterministic thresholds in the literature assuming an upper bound on the noise support, we define the thresholds on the residuals in a probabilistic sense. After detecting and isolating the attacked agent, a system-digraph-based mitigation strategy is proposed to replace the attacked measurement with a new observationally-equivalent one to recover potential observability loss. We adopt a graph-theoretic method to classify the agents based on their measurements, to distinguish between the agents recovering the system rank-deficiency and the ones recovering output-connectivity of the system digraph. The attack detection/mitigation strategy is specifically described for each type, which is of polynomial-order complexity for large-scale applications. Illustrative simulations support our theoretical results.
△ Less
Submitted 20 September, 2021;
originally announced September 2021.
-
Privacy Assured Recovery of Compressively Sensed ECG signals
Authors:
Hadi Zanddizari,
Sreeraman Rajan,
Hassan Rabah,
Houman Zarrabi
Abstract:
Cloud computing for storing data and running complex algorithms have been steadily increasing. As connected IoT devices such as wearable ECG recorders generally have less storage and computational capacity, acquired signals get sent to a remote center for storage and possible analysis on demand. Recently, compressive sensing (CS) has been used as secure, energy-efficient method of signal sampling…
▽ More
Cloud computing for storing data and running complex algorithms have been steadily increasing. As connected IoT devices such as wearable ECG recorders generally have less storage and computational capacity, acquired signals get sent to a remote center for storage and possible analysis on demand. Recently, compressive sensing (CS) has been used as secure, energy-efficient method of signal sampling in such recorders. In this paper, we propose a secure procedure to outsource the total recovery of CS measurement to the cloud and introduce a privacy-assured signal recovery technique in the cloud. We present a fast, and lightweight encryption for secure CS recovery outsourcing that can be used in wearable devices, such as ECG Holter monitors. In the proposed technique, instead of full recovery of CS-compressed ECG signal in the cloud, to preserve privacy, an encrypted version of ECG signal is recovered by using a randomly bipolar permuted measurement matrix. The user with a key, decrypts the encrypted ECG from the cloud to obtain the original ECG signal. We demonstrate our proposed method using the ECG signals available in the MITBIH Arrhythmia Database. We also demonstrate the strength of the proposed method against partial exposure of the key.
△ Less
Submitted 22 January, 2021;
originally announced January 2021.
-
An Optimal Load Balanced Resource Allocation Scheme for Heterogeneous Wireless Networks based on Big Data Technology
Authors:
Abbas Mirzaei,
Morteza Barari,
Houman Zarrabi
Abstract:
An important issue in heterogeneous wireless networks is how to optimally utilize various radio resources. While many methods have been proposed for managing radio resources in each network, these methods are not suitable for heterogeneous wireless networks. In this study, a new management method is proposed which provides acceptable service quality and roaming rate, reduces the cost of the servic…
▽ More
An important issue in heterogeneous wireless networks is how to optimally utilize various radio resources. While many methods have been proposed for managing radio resources in each network, these methods are not suitable for heterogeneous wireless networks. In this study, a new management method is proposed which provides acceptable service quality and roaming rate, reduces the cost of the service, and utilizes big data technology for its operation. In our proposed scheme, by considering various parameters such as the type of the service, the information related to the location of the user, the movement direction of the user, the cost of the service, and a number of other statistical measures, the most suitable technology for radio access will be selected. It is expected that besides improving the decision making accuracy in selecting the radio access technology and the balanced distribution of network resources, the proposed method provides lower roaming and lower probability of stopping roaming requests entering the network. By considering the various service classes and various quality of service requirements regarding delay, vibration and so on, this can be useful in optimal implementation of heterogeneous wireless networks.
△ Less
Submitted 7 January, 2021;
originally announced January 2021.
-
BlessMark: A Blind Diagnostically-Lossless Watermarking Framework for Medical Applications Based on Deep Neural Networks
Authors:
Hamidreza Zarrabi,
Ali Emami,
Pejman Khadivi,
Nader Karimi,
Shadrokh Samavi
Abstract:
Nowadays, with the development of public network usage, medical information is transmitted throughout the hospitals. The watermarking system can help for the confidentiality of medical information distributed over the internet. In medical images, regions-of-interest (ROI) contain diagnostic information. The watermark should be embedded only into non-regions-of-interest (NROI) to keep diagnostic in…
▽ More
Nowadays, with the development of public network usage, medical information is transmitted throughout the hospitals. The watermarking system can help for the confidentiality of medical information distributed over the internet. In medical images, regions-of-interest (ROI) contain diagnostic information. The watermark should be embedded only into non-regions-of-interest (NROI) to keep diagnostic information without distortion. Recently, ROI based watermarking has attracted the attention of the medical research community. The ROI map can be used as an embedding key for improving confidentiality protection purposes. However, in most existing works, the ROI map that is used for the embedding process must be sent as side-information along with the watermarked image. This side information is a disadvantage and makes the extraction process non-blind. Also, most existing algorithms do not recover NROI of the original cover image after the extraction of the watermark. In this paper, we propose a framework for blind diagnostically-lossless watermarking, which iteratively embeds only into NROI. The significance of the proposed framework is in satisfying the confidentiality of the patient information through a blind watermarking system, while it preserves diagnostic/medical information of the image throughout the watermarking process. A deep neural network is used to recognize the ROI map in the embedding, extraction, and recovery processes. In the extraction process, the same ROI map of the embedding process is recognized without requiring any additional information. Hence, the watermark is blindly extracted from the NROI.
△ Less
Submitted 11 May, 2020; v1 submitted 1 November, 2019;
originally announced November 2019.
-
Gland Segmentation in Histopathology Images Using Deep Networks and Handcrafted Features
Authors:
Safiyeh Rezaei,
Ali Emami,
Hamidreza Zarrabi,
Shima Rafiei,
Kayvan Najarian,
Nader Karimi,
Shadrokh Samavi,
S. M. Reza Soroushmehr
Abstract:
Histopathology images contain essential information for medical diagnosis and prognosis of cancerous disease. Segmentation of glands in histopathology images is a primary step for analysis and diagnosis of an unhealthy patient. Due to the widespread application and the great success of deep neural networks in intelligent medical diagnosis and histopathology, we propose a modified version of LinkNe…
▽ More
Histopathology images contain essential information for medical diagnosis and prognosis of cancerous disease. Segmentation of glands in histopathology images is a primary step for analysis and diagnosis of an unhealthy patient. Due to the widespread application and the great success of deep neural networks in intelligent medical diagnosis and histopathology, we propose a modified version of LinkNet for gland segmentation and recognition of malignant cases. We show that using specific handcrafted features such as invariant local binary pattern drastically improves the system performance. The experimental results demonstrate the competency of the proposed system against state-of-the-art methods. We achieved the best results in testing on section B images of the Warwick-QU dataset and obtained comparable results on section A images.
△ Less
Submitted 31 August, 2019;
originally announced September 2019.
-
Brain Tumor Segmentation Using Deep Learning by Type Specific Sorting of Images
Authors:
Zahra Sobhaninia,
Safiyeh Rezaei,
Alireza Noroozi,
Mehdi Ahmadi,
Hamidreza Zarrabi,
Nader Karimi,
Ali Emami,
Shadrokh Samavi
Abstract:
Recently deep learning has been playing a major role in the field of computer vision. One of its applications is the reduction of human judgment in the diagnosis of diseases. Especially, brain tumor diagnosis requires high accuracy, where minute errors in judgment may lead to disaster. For this reason, brain tumor segmentation is an important challenge for medical purposes. Currently several metho…
▽ More
Recently deep learning has been playing a major role in the field of computer vision. One of its applications is the reduction of human judgment in the diagnosis of diseases. Especially, brain tumor diagnosis requires high accuracy, where minute errors in judgment may lead to disaster. For this reason, brain tumor segmentation is an important challenge for medical purposes. Currently several methods exist for tumor segmentation but they all lack high accuracy. Here we present a solution for brain tumor segmenting by using deep learning. In this work, we studied different angles of brain MR images and applied different networks for segmentation. The effect of using separate networks for segmentation of MR images is evaluated by comparing the results with a single network. Experimental evaluations of the networks show that Dice score of 0.73 is achieved for a single network and 0.79 in obtained for multiple networks.
△ Less
Submitted 20 September, 2018;
originally announced September 2018.
-
Reversible Image Watermarking for Health Informatics Systems Using Distortion Compensation in Wavelet Domain
Authors:
Hamidreza Zarrabi,
Mohsen Hajabdollahi,
S. M. Reza Soroushmehr,
Nader Karimi,
Shadrokh Samavi,
Kayvan Najarian
Abstract:
Reversible image watermarking guaranties restoration of both original cover and watermark logo from the watermarked image. Capacity and distortion of the image under reversible watermarking are two important parameters. In this study a reversible watermarking is investigated with focusing on increasing the embedding capacity and reducing the distortion in medical images. Integer wavelet transform…
▽ More
Reversible image watermarking guaranties restoration of both original cover and watermark logo from the watermarked image. Capacity and distortion of the image under reversible watermarking are two important parameters. In this study a reversible watermarking is investigated with focusing on increasing the embedding capacity and reducing the distortion in medical images. Integer wavelet transform is used for embedding where in each iteration, one watermark bit is embedded in one transform coefficient. We devise a novel approach that when a coefficient is modified in an iteration, the produced distortion is compensated in the next iteration. This distortion compensation method would result in low distortion rate. The proposed method is tested on four types of medical images including MRI of brain, cardiac MRI, MRI of breast, and intestinal polyp images. Using a one-level wavelet transform, maximum capacity of 1.5 BPP is obtained. Experimental results demonstrate that the proposed method is superior to the state-of-the-art works in terms of capacity and distortion.
△ Less
Submitted 21 February, 2018;
originally announced February 2018.
-
Adaptive Reversible Watermarking Based on Linear Prediction for Medical Videos
Authors:
Hamidreza Zarrabi,
Ali Emami,
Nader Karimi,
Shadrokh Samavi
Abstract:
Reversible video watermarking can guarantee that the watermark logo and the original frame can be recovered from the watermarked frame without any distortion. Although reversible video watermarking has successfully been applied in multimedia, its application has not been extensively explored in medical videos. Reversible watermarking in medical videos is still a challenging problem. The existing r…
▽ More
Reversible video watermarking can guarantee that the watermark logo and the original frame can be recovered from the watermarked frame without any distortion. Although reversible video watermarking has successfully been applied in multimedia, its application has not been extensively explored in medical videos. Reversible watermarking in medical videos is still a challenging problem. The existing reversible video watermarking algorithms, which are based on error prediction expansion, use motion vectors for prediction. In this study, we propose an adaptive reversible watermarking method for medical videos. We suggest using temporal correlations for improving the prediction accuracy. Hence, two temporal neighbor pixels in upcoming frames are used alongside the four spatial rhombus neighboring pixels to minimize the prediction error. To the best of our knowledge, this is the first time this method is applied to medical videos. The method helps to protect patients' personal and medical information by watermarking, i.e., increase the security of Health Information Systems (HIS). Experimental results demonstrate the high quality of the proposed watermarking method based on PSNR metric and a large capacity for data hiding in medical videos.
△ Less
Submitted 28 May, 2018; v1 submitted 8 January, 2018;
originally announced January 2018.
-
Distributed Estimation Recovery under Sensor Failure
Authors:
Mohammadreza Doostmohammadian,
Hamid R. Rabiee,
Houman Zarrabi,
Usman A. Khan
Abstract:
Single time-scale distributed estimation of dynamic systems via a network of sensors/estimators is addressed in this letter. In single time-scale distributed estimation, the two fusion steps, consensus and measurement exchange, are implemented only once, in contrast to, e.g., a large number of consensus iterations at every step of the system dynamics. We particularly discuss the problem of failure…
▽ More
Single time-scale distributed estimation of dynamic systems via a network of sensors/estimators is addressed in this letter. In single time-scale distributed estimation, the two fusion steps, consensus and measurement exchange, are implemented only once, in contrast to, e.g., a large number of consensus iterations at every step of the system dynamics. We particularly discuss the problem of failure in the sensor/estimator network and how to recover for distributed estimation by adding new sensor measurements from equivalent states. We separately discuss the recovery for two types of sensors, namely αand βsensors. We propose polynomial order algorithms to find equivalent state nodes in graph representation of system to recover for distributed observability. The polynomial order solution is particularly significant for large-scale systems.
△ Less
Submitted 12 September, 2017;
originally announced September 2017.
-
Observational Equivalence in System Estimation: Contractions in Complex Networks
Authors:
Mohammadreza Doostmohammadian,
Hamid R. Rabiee,
Houman Zarrabi,
Usman Khan
Abstract:
Observability of complex systems/networks is the focus of this paper, which is shown to be closely related to the concept of contraction. Indeed, for observable network tracking it is necessary/sufficient to have one node in each contraction measured. Therefore, nodes in a contraction are equivalent to recover for loss of observability, implying that contraction size is a key factor for observabil…
▽ More
Observability of complex systems/networks is the focus of this paper, which is shown to be closely related to the concept of contraction. Indeed, for observable network tracking it is necessary/sufficient to have one node in each contraction measured. Therefore, nodes in a contraction are equivalent to recover for loss of observability, implying that contraction size is a key factor for observability recovery. Here, using a polynomial order contraction detection algorithm, we analyze the distribution of contractions, studying its relation with key network properties. Our results show that contraction size is related to network clustering coefficient and degree heterogeneity. Particularly, in networks with power-law degree distribution, if the clustering coefficient is high there are less contractions with smaller size on average. The implication is that estimation/tracking of such systems requires less number of measurements, while their observational recovery is more restrictive in case of sensor failure. Further, in Small-World networks higher degree heterogeneity implies that there are more contractions with smaller size on average. Therefore, the estimation of representing system requires more measurements, and also the recovery of measurement failure is more limited. These results imply that one can tune the properties of synthetic networks to alleviate their estimation/observability recovery.
△ Less
Submitted 12 September, 2017;
originally announced September 2017.