Formal estimation of worst case communication latency in a network on chip fi...Vinita Palaniveloo
This document discusses formal estimation of worst-case communication latency in a Network-on-Chip (NoC) using model checking. It presents a SPIN model of an NoC with routers and describes modeling packet injection rates and latency. Simulation results show average and per-router worst-case latencies increase with packet rate and NoC size. The approach verifies functional correctness and estimates worst-case latency to help identify suitable NoC architectures for applications.
Factorized Asymptotic Bayesian Inference for Latent Feature ModelsKohei Hayashi
This document presents a new method called Factorized Asymptotic Bayesian (FAB) inference for latent feature models. FAB derives a Factorized Information Criterion (FIC) for latent feature models to enable fast and accurate model selection. The FAB algorithm maximizes the FIC using an expectation-maximization approach. Experiments on artificial and real-world datasets show that FAB is faster than existing methods like variational Bayes or Indian Buffet Processes, while achieving comparable or better accuracy in estimating the number of latent features and predictive performance.
Rebuilding Factorized Information Criterion: Asymptotically Accurate Marginal...Kohei Hayashi
1) The document presents a new method called generalized factorized asymptotic Bayesian inference (gFAB) that extends previous work on factorized asymptotic Bayesian inference (FAB) to allow it to be applied to general latent variable models, not just binary latent variable models.
2) gFAB involves defining a new criterion called the generalized factorized information criterion (gFIC) that can be used for model selection. gFIC approximates the marginal likelihood and adds a penalty term involving the Hessian of the log joint distribution with respect to the model parameters.
3) gFAB can be optimized using an alternating updating procedure similar to expectation-maximization (EM) and provides an asymptotically accurate approximation to
An open source framework for processing daily satellite images (AVHRR) over l...Sajid Pareeth
An open source framework was developed to process daily satellite images from Advanced Very High Resolution Radiometer (AVHRR) sensors over the last 28 years. The framework uses open source libraries like Pytroll, Orfeo Toolbox, and GRASS GIS to read, calibrate, correct geometrically, and analyze over 22,000 daily AVHRR images. The processed data will be used to study long term warming trends of sub-alpine lakes from derived land surface temperature.
Gaze transformers use vision transformers for gaze estimation from facial images. A hybrid model combines a CNN for image features with a transformer. It outperforms pure transformer and CNN models. Ablation studies show removing self-attention or convolutional layers hurts performance. Pre-training on a large dataset helps transformers achieve state-of-the-art results, and future methods may rely more on pre-training for gaze estimation tasks.
This document discusses various sampling techniques used in research studies. It begins by defining key terms like population, sample, and sampling frame. It then describes different probability sampling methods like simple random sampling, systematic sampling, and stratified sampling. It also discusses cluster sampling and multi-stage sampling. For each method, it provides details on the procedure, merits, and limitations. The document emphasizes that the sample needs to be representative of the population and an appropriately sized sample is required to make reliable statistical inferences.
- The EYR-Global program provides network resources and expertise to international research collaborations to facilitate data-intensive research. For its 2013-2014 cycle, it selected 4 projects spanning bioinformatics, climate science, and neuroscience.
- These projects involved setting up high-bandwidth network connections between research institutions in countries like the US, UK, Netherlands, Germany, and Finland. This enabled use cases like sharing virtual machines and high-resolution climate simulations across international supercomputers.
- Lessons learned included the need for ongoing engagement with researchers, relationships with local ICT groups, and expanding the program's international partnerships to have a bigger impact. The 2015 cycle aims to build on these lessons.
A dense depth representation for vlad descriptors inFederico Magliani
The recent advances brought by deep learning allowed to improve the performance in image retrieval tasks. Through the many convolutional layers, available in a Convolutional Neural Network (CNN), it is possible to obtain a hierarchy of features from the evaluated image. At every step, the patches extracted are smaller than the previous levels and more representative. Following this idea, this paper introduces a new detector applied on the feature maps extracted from pre-trained CNN. Specifically, this approach lets to increase the number of features in order to increase the performance of the aggregation algorithms like the most famous and used VLAD embedding. The proposed approach is tested on different public datasets: Holidays, Oxford5k, Paris6k and UKB.
Formal estimation of worst case communication latency in a network on chip fi...Vinita Palaniveloo
This document discusses formal estimation of worst-case communication latency in a Network-on-Chip (NoC) using model checking. It presents a SPIN model of an NoC with routers and describes modeling packet injection rates and latency. Simulation results show average and per-router worst-case latencies increase with packet rate and NoC size. The approach verifies functional correctness and estimates worst-case latency to help identify suitable NoC architectures for applications.
Factorized Asymptotic Bayesian Inference for Latent Feature ModelsKohei Hayashi
This document presents a new method called Factorized Asymptotic Bayesian (FAB) inference for latent feature models. FAB derives a Factorized Information Criterion (FIC) for latent feature models to enable fast and accurate model selection. The FAB algorithm maximizes the FIC using an expectation-maximization approach. Experiments on artificial and real-world datasets show that FAB is faster than existing methods like variational Bayes or Indian Buffet Processes, while achieving comparable or better accuracy in estimating the number of latent features and predictive performance.
Rebuilding Factorized Information Criterion: Asymptotically Accurate Marginal...Kohei Hayashi
1) The document presents a new method called generalized factorized asymptotic Bayesian inference (gFAB) that extends previous work on factorized asymptotic Bayesian inference (FAB) to allow it to be applied to general latent variable models, not just binary latent variable models.
2) gFAB involves defining a new criterion called the generalized factorized information criterion (gFIC) that can be used for model selection. gFIC approximates the marginal likelihood and adds a penalty term involving the Hessian of the log joint distribution with respect to the model parameters.
3) gFAB can be optimized using an alternating updating procedure similar to expectation-maximization (EM) and provides an asymptotically accurate approximation to
An open source framework for processing daily satellite images (AVHRR) over l...Sajid Pareeth
An open source framework was developed to process daily satellite images from Advanced Very High Resolution Radiometer (AVHRR) sensors over the last 28 years. The framework uses open source libraries like Pytroll, Orfeo Toolbox, and GRASS GIS to read, calibrate, correct geometrically, and analyze over 22,000 daily AVHRR images. The processed data will be used to study long term warming trends of sub-alpine lakes from derived land surface temperature.
Gaze transformers use vision transformers for gaze estimation from facial images. A hybrid model combines a CNN for image features with a transformer. It outperforms pure transformer and CNN models. Ablation studies show removing self-attention or convolutional layers hurts performance. Pre-training on a large dataset helps transformers achieve state-of-the-art results, and future methods may rely more on pre-training for gaze estimation tasks.
This document discusses various sampling techniques used in research studies. It begins by defining key terms like population, sample, and sampling frame. It then describes different probability sampling methods like simple random sampling, systematic sampling, and stratified sampling. It also discusses cluster sampling and multi-stage sampling. For each method, it provides details on the procedure, merits, and limitations. The document emphasizes that the sample needs to be representative of the population and an appropriately sized sample is required to make reliable statistical inferences.
- The EYR-Global program provides network resources and expertise to international research collaborations to facilitate data-intensive research. For its 2013-2014 cycle, it selected 4 projects spanning bioinformatics, climate science, and neuroscience.
- These projects involved setting up high-bandwidth network connections between research institutions in countries like the US, UK, Netherlands, Germany, and Finland. This enabled use cases like sharing virtual machines and high-resolution climate simulations across international supercomputers.
- Lessons learned included the need for ongoing engagement with researchers, relationships with local ICT groups, and expanding the program's international partnerships to have a bigger impact. The 2015 cycle aims to build on these lessons.
A dense depth representation for vlad descriptors inFederico Magliani
The recent advances brought by deep learning allowed to improve the performance in image retrieval tasks. Through the many convolutional layers, available in a Convolutional Neural Network (CNN), it is possible to obtain a hierarchy of features from the evaluated image. At every step, the patches extracted are smaller than the previous levels and more representative. Following this idea, this paper introduces a new detector applied on the feature maps extracted from pre-trained CNN. Specifically, this approach lets to increase the number of features in order to increase the performance of the aggregation algorithms like the most famous and used VLAD embedding. The proposed approach is tested on different public datasets: Holidays, Oxford5k, Paris6k and UKB.
Application of formal methods for system level verification of finalVinita Palaniveloo
The document describes a formal modeling approach called Heterogeneous Protocol Automata (HPA) for verifying Network-on-Chip (NoC) systems. HPA can model NoC components like routers, switches, and communication interfaces, as well as properties like routing algorithms, arbitration schemes, and buffer management. The document outlines an HPA model of a sample NoC and discusses verifying properties of the model like functional correctness and absence of deadlocks through translation to the SPIN model checker.
Verolog 2019 : Multiple solving approaches applied to the Heterogeneous Vehic...Manon Bouly
Speech by Gwénaël Rault, PhD candidate in Operational Research at Mapotempo during VeRoLog 2019.
Abstract :
In the context of this presentation, we focus on Asymmetric HVRP where the shortest path between two customers nodes is vehicle dependent. Moreover, the distance matrices doesn’t verify the triangular inequality. Case which is common when we consider a real road network at the fastest with the objective to minimize the total distance. The problem in itself contains a set of multiple vehicle types with a limit number on their usage, as well as a capacity limit at the parcels number they can load to deliver at the customers nodes.
At this purpose, the instances provided by C. Duhamel and al(2011) and named New real life Duhamel–Lacomme–Prodhon_HVRP instances (DLP_HVRP), based on realistic distances between french cities, are considered as the main comparison set.
The current approach use at first step a GRASP+ALNS metaheuristic, method known to provide good results in a short computation time. In a second step, a constraint programming model of the problem is used to shuffle the problem and provide an additional local search starting from the current solution. Data are exchanged iteratively in order to benefit from each solve step improvement.
The aim behind the use of multiple models is to expose the possible synergies between those methods. Multiple solve scenarios will be presented to discuss about the multiple layout available between the two previously mentioned solve steps and show their impact on the resolution.
[20240318_LabSeminar_Huy]GSTNet: Global Spatial-Temporal Network for Traffic ...thanhdowork
GSTNet is a deep learning model for traffic flow prediction that incorporates spatial and temporal information. It contains multi-resolution temporal and global correlated spatial modules. The temporal module captures short and long-term patterns, while the spatial module considers both local and non-local correlations between locations. In experiments on Beijing transportation data, GSTNet achieved more accurate predictions compared to other methods and was able to capture both short and long-term dependencies in traffic flow.
Making Pier Data Broader and Deeper: PDR Challenge and Virtual Mapping PartyKurata Takeshi
Big data can be gathered on a daily basis, but it has issues on its quality and variety. On the other hand, deep data is obtained in some special conditions such as in a lab or in a field with edge-heavy devices. It compensates for the above issues of big data, and also it can be training data for machine learning. Just like a platform of pier supported by stakes, there is structure in which big data is supported by deep data. That is why we call the combination of big and deep data "pier data." By making pier data broader and deeper, it becomes much easier to understand what is happening in the real world and also to realize Kaizen and innovation. We introduce two examples of activities on making pier data broader and deeper. First, we outline "PDR Challenge in Warehouse Picking"; a PDR (Pedestrian Dead Reckoning) performance competition which is very useful for gathering big data on behavior. Next, we discuss methodologies of how to gather and utilize pier data in "Virtual Mapping Party" which realizes map-content creation at any time and from anywhere to support navigation services for visually impaired individuals.
MobiCASE 2018
http://mobicase.org/2018/show/home
A reinforcement learning based routing protocol with qo s support for biomedi...Iffat Anjum
Contribution.
Problem Definition.
Related works.
Biomedical Sensor Networks
Reinforcement Learning
Q-learning
Design of RL-QRP
Local Information Exchange
Q-learning Implementation
Learning-Based Routing Algorithm
Performance Evaluation.
Limitation.
Presentation from NORTHMOST - a new biannual series of meetings on the topic of mathematical modelling in transport.
Hosted at its.leeds.ac.uk, NORTHMOST 01 focussed on academic research, to encourage networking and collaboration between academics interested in the methodological development of mathematical modelling applied to transport.
The focus of the meetings will alternate; NORTHMOST 02 - planned for Spring 2017 - will be led by practitioners who are modelling experts. Practitioners will give presentations, with academic researchers in the audience. In addition to giving a forum for expert practitioners to meet and share best practice, a key aim of the series is to close the gap between research and practice, establishing a feedback loop to communicate the needs of practitioners to those working in university research.
Unsupervised representation learning for gaze estimationJaey Jeong
This document summarizes a research paper on unsupervised representation learning for gaze estimation. The paper proposes an unsupervised learning framework that uses a large amount of unlabeled eye image data to learn a gaze representation. This representation is used to train a gaze redirection network and support few-shot gaze estimation with only a small number of labeled samples. The method learns the representation using a feature extractor network and differences in representations between aligned image pairs. Evaluation on three datasets shows the approach can accurately estimate gaze using as few as 10-100 labeled samples per person.
The document proposes streaming algorithms for performing Pearson's chi-square goodness-of-fit test in a streaming setting with minimal assumptions. It presents algorithms for the one-sample and two-sample continuous chi-square tests that use O(K^2log(N)√N) space, where K is the number of bins and N is the stream length. It also shows that no sublinear solution exists for the categorical chi-square test and provides a heuristic algorithm. The algorithms are validated on real and synthetic data and can detect deviations from distributions or differences between streams with low memory requirements.
This document presents a delay constrained routing algorithm for wireless sensor networks with a mobile sink. It begins with an introduction to sensor nodes, wireless sensor networks, and the challenges of routing in WSNs. It then discusses prior work on stationary and mobile sink approaches. The proposed work formulates the problem and solves it using an optimal traveling salesman tour calculation and variable sojourn time computation. Simulation results show the proposed algorithm outperforms an existing MILP approach in terms of throughput, delay, energy consumption and network lifetime.
The document discusses the State-Space Nodal (SSN) solver and its applications in real-time power system simulation. SSN allows large power systems to be simulated in real-time by reducing the number of network nodes through grouping, enabling parallelization. SSN has been used successfully for distribution grids, more electric aircraft, and super-large fusion reactor converter simulations. New developments include iterative methods for modeling switches and surge arresters in real-time.
Presentation on machine learning and materials science at Computing in Engineering Forum 2018, Machine Ground Interaction Consortium (MaGIC) 2018, Wisconsin, Madison, December 4, 2018
Assessment Model for Opportunistic RoutingWaldir Moreira
The authors propose a taxonomy and universal evaluation framework to assess opportunistic routing algorithms. They classify existing routing solutions and identify common performance metrics like delivery probability, cost, and delay. An evaluation of Epidemic, PROPHET, and BubbleRap routing under different mobility models shows that Epidemic and PROPHET have higher delivery rates but also greater costs and delays than BubbleRap. The proposed taxonomy and evaluation framework aim to provide a fair and standardized way to compare opportunistic routing algorithms.
Deep learning based gaze detection system for automobile drivers using nir ca...Jaey Jeong
This document summarizes a research paper on developing a deep learning-based gaze detection system for automobile drivers using an NIR camera sensor. The system uses a CNN model to classify the driver's gaze into 17 zones based on facial images. Experimental results show the system achieved over 90% accuracy on both internal and open datasets, outperforming previous methods. The proposed method provides an effective way to monitor driver distraction without compromising safety.
The MSc defense ceremony was held on 6-7-2017 in Mansoura University, Faculty of Engineering. This presentation is shared to help MSc students in Faculty of Engineering prepare their thesis presentation and ease their tension before their presentation time
The document summarizes Kyle Ingersoll's master's thesis defense presentation on vision-based multiple target tracking using recursive RANSAC (R-RANSAC). The presentation covers an overview of the R-RANSAC approach, improvements made to R-RANSAC including different data association methods and handling of highly maneuverable objects. It also compares R-RANSAC to other multiple target tracking filters and discusses potential improvements like incorporating tracker-sensor feedback and machine learning.
Local modeling in regression and time series predictionGianluca Bontempi
The document discusses global modeling versus local modeling approaches for regression and time series prediction problems. Global modeling fits a single analytical function to all input data, while local modeling performs separate fits to subsets of nearby data points. The document outlines the local modeling approach using lazy learning, which stores all training data and performs local fits when making predictions for new query points. It then applies lazy learning techniques to problems in regression, time series prediction, and feature selection.
Modeling the Chlorophyll-a from Sea Surface Reflectance in West Africa by Dee...gerogepatton
Deep learning provide successful applications in many fields. Recently, machines learning are involved for oceans remote sensing applications. In this study, we use and compare about eight (8) deep learning estimators
for retrieval of a mainly pigment of phytoplankton. Depending on the water case and the multiple instruments simultaneously observing the earth on a variety of platforms, several algorithm are used to estimate the chlolophyll-a from marine eflectance.By using a long-term multi-sensor time-series of satellite ocean-colour data, as MODIS, SeaWifs, VIIRS, MERIS, etc…, we make a unique deep network model able to establish a relationship between sea surface reflectance and chlorophyll-a from any measurement satellite sensor over West
Africa. These data fusion take into account the bias between case water and instruments. We construct several chlorophyll-a concentration prediction deep learning based models, compare them and therefore use the best for our study. Results obtained for accuracy training and test are quite good. The mean absolute error are very low and vary between 0,07 to 0,13 mg/m3.
Sustainability: Actors, Behavior, and Transparency
Part 1: A Graph-based Perspective to Footprint Assessment
Part 2: SmartPacket - Redistributing the Routing Intelligence among Network Components in SDNs
Part 3: Profiling without ‘Profiling’ – Use Case of a Federated Approach to Resource Management in Smart House
Part 4: A Multi-Entity Input Output (MEIO) Approach to Sustainability - Water-Energy-GHG (WEG) Footprint Statements
Part 5 (Afternoon): Dynamic Network Topology-on-Demand for SDNs Using Failure-resilience Generalized Topologies of Physical Underlay
Application of formal methods for system level verification of finalVinita Palaniveloo
The document describes a formal modeling approach called Heterogeneous Protocol Automata (HPA) for verifying Network-on-Chip (NoC) systems. HPA can model NoC components like routers, switches, and communication interfaces, as well as properties like routing algorithms, arbitration schemes, and buffer management. The document outlines an HPA model of a sample NoC and discusses verifying properties of the model like functional correctness and absence of deadlocks through translation to the SPIN model checker.
Verolog 2019 : Multiple solving approaches applied to the Heterogeneous Vehic...Manon Bouly
Speech by Gwénaël Rault, PhD candidate in Operational Research at Mapotempo during VeRoLog 2019.
Abstract :
In the context of this presentation, we focus on Asymmetric HVRP where the shortest path between two customers nodes is vehicle dependent. Moreover, the distance matrices doesn’t verify the triangular inequality. Case which is common when we consider a real road network at the fastest with the objective to minimize the total distance. The problem in itself contains a set of multiple vehicle types with a limit number on their usage, as well as a capacity limit at the parcels number they can load to deliver at the customers nodes.
At this purpose, the instances provided by C. Duhamel and al(2011) and named New real life Duhamel–Lacomme–Prodhon_HVRP instances (DLP_HVRP), based on realistic distances between french cities, are considered as the main comparison set.
The current approach use at first step a GRASP+ALNS metaheuristic, method known to provide good results in a short computation time. In a second step, a constraint programming model of the problem is used to shuffle the problem and provide an additional local search starting from the current solution. Data are exchanged iteratively in order to benefit from each solve step improvement.
The aim behind the use of multiple models is to expose the possible synergies between those methods. Multiple solve scenarios will be presented to discuss about the multiple layout available between the two previously mentioned solve steps and show their impact on the resolution.
[20240318_LabSeminar_Huy]GSTNet: Global Spatial-Temporal Network for Traffic ...thanhdowork
GSTNet is a deep learning model for traffic flow prediction that incorporates spatial and temporal information. It contains multi-resolution temporal and global correlated spatial modules. The temporal module captures short and long-term patterns, while the spatial module considers both local and non-local correlations between locations. In experiments on Beijing transportation data, GSTNet achieved more accurate predictions compared to other methods and was able to capture both short and long-term dependencies in traffic flow.
Making Pier Data Broader and Deeper: PDR Challenge and Virtual Mapping PartyKurata Takeshi
Big data can be gathered on a daily basis, but it has issues on its quality and variety. On the other hand, deep data is obtained in some special conditions such as in a lab or in a field with edge-heavy devices. It compensates for the above issues of big data, and also it can be training data for machine learning. Just like a platform of pier supported by stakes, there is structure in which big data is supported by deep data. That is why we call the combination of big and deep data "pier data." By making pier data broader and deeper, it becomes much easier to understand what is happening in the real world and also to realize Kaizen and innovation. We introduce two examples of activities on making pier data broader and deeper. First, we outline "PDR Challenge in Warehouse Picking"; a PDR (Pedestrian Dead Reckoning) performance competition which is very useful for gathering big data on behavior. Next, we discuss methodologies of how to gather and utilize pier data in "Virtual Mapping Party" which realizes map-content creation at any time and from anywhere to support navigation services for visually impaired individuals.
MobiCASE 2018
http://mobicase.org/2018/show/home
A reinforcement learning based routing protocol with qo s support for biomedi...Iffat Anjum
Contribution.
Problem Definition.
Related works.
Biomedical Sensor Networks
Reinforcement Learning
Q-learning
Design of RL-QRP
Local Information Exchange
Q-learning Implementation
Learning-Based Routing Algorithm
Performance Evaluation.
Limitation.
Presentation from NORTHMOST - a new biannual series of meetings on the topic of mathematical modelling in transport.
Hosted at its.leeds.ac.uk, NORTHMOST 01 focussed on academic research, to encourage networking and collaboration between academics interested in the methodological development of mathematical modelling applied to transport.
The focus of the meetings will alternate; NORTHMOST 02 - planned for Spring 2017 - will be led by practitioners who are modelling experts. Practitioners will give presentations, with academic researchers in the audience. In addition to giving a forum for expert practitioners to meet and share best practice, a key aim of the series is to close the gap between research and practice, establishing a feedback loop to communicate the needs of practitioners to those working in university research.
Unsupervised representation learning for gaze estimationJaey Jeong
This document summarizes a research paper on unsupervised representation learning for gaze estimation. The paper proposes an unsupervised learning framework that uses a large amount of unlabeled eye image data to learn a gaze representation. This representation is used to train a gaze redirection network and support few-shot gaze estimation with only a small number of labeled samples. The method learns the representation using a feature extractor network and differences in representations between aligned image pairs. Evaluation on three datasets shows the approach can accurately estimate gaze using as few as 10-100 labeled samples per person.
The document proposes streaming algorithms for performing Pearson's chi-square goodness-of-fit test in a streaming setting with minimal assumptions. It presents algorithms for the one-sample and two-sample continuous chi-square tests that use O(K^2log(N)√N) space, where K is the number of bins and N is the stream length. It also shows that no sublinear solution exists for the categorical chi-square test and provides a heuristic algorithm. The algorithms are validated on real and synthetic data and can detect deviations from distributions or differences between streams with low memory requirements.
This document presents a delay constrained routing algorithm for wireless sensor networks with a mobile sink. It begins with an introduction to sensor nodes, wireless sensor networks, and the challenges of routing in WSNs. It then discusses prior work on stationary and mobile sink approaches. The proposed work formulates the problem and solves it using an optimal traveling salesman tour calculation and variable sojourn time computation. Simulation results show the proposed algorithm outperforms an existing MILP approach in terms of throughput, delay, energy consumption and network lifetime.
The document discusses the State-Space Nodal (SSN) solver and its applications in real-time power system simulation. SSN allows large power systems to be simulated in real-time by reducing the number of network nodes through grouping, enabling parallelization. SSN has been used successfully for distribution grids, more electric aircraft, and super-large fusion reactor converter simulations. New developments include iterative methods for modeling switches and surge arresters in real-time.
Presentation on machine learning and materials science at Computing in Engineering Forum 2018, Machine Ground Interaction Consortium (MaGIC) 2018, Wisconsin, Madison, December 4, 2018
Assessment Model for Opportunistic RoutingWaldir Moreira
The authors propose a taxonomy and universal evaluation framework to assess opportunistic routing algorithms. They classify existing routing solutions and identify common performance metrics like delivery probability, cost, and delay. An evaluation of Epidemic, PROPHET, and BubbleRap routing under different mobility models shows that Epidemic and PROPHET have higher delivery rates but also greater costs and delays than BubbleRap. The proposed taxonomy and evaluation framework aim to provide a fair and standardized way to compare opportunistic routing algorithms.
Deep learning based gaze detection system for automobile drivers using nir ca...Jaey Jeong
This document summarizes a research paper on developing a deep learning-based gaze detection system for automobile drivers using an NIR camera sensor. The system uses a CNN model to classify the driver's gaze into 17 zones based on facial images. Experimental results show the system achieved over 90% accuracy on both internal and open datasets, outperforming previous methods. The proposed method provides an effective way to monitor driver distraction without compromising safety.
The MSc defense ceremony was held on 6-7-2017 in Mansoura University, Faculty of Engineering. This presentation is shared to help MSc students in Faculty of Engineering prepare their thesis presentation and ease their tension before their presentation time
The document summarizes Kyle Ingersoll's master's thesis defense presentation on vision-based multiple target tracking using recursive RANSAC (R-RANSAC). The presentation covers an overview of the R-RANSAC approach, improvements made to R-RANSAC including different data association methods and handling of highly maneuverable objects. It also compares R-RANSAC to other multiple target tracking filters and discusses potential improvements like incorporating tracker-sensor feedback and machine learning.
Local modeling in regression and time series predictionGianluca Bontempi
The document discusses global modeling versus local modeling approaches for regression and time series prediction problems. Global modeling fits a single analytical function to all input data, while local modeling performs separate fits to subsets of nearby data points. The document outlines the local modeling approach using lazy learning, which stores all training data and performs local fits when making predictions for new query points. It then applies lazy learning techniques to problems in regression, time series prediction, and feature selection.
Modeling the Chlorophyll-a from Sea Surface Reflectance in West Africa by Dee...gerogepatton
Deep learning provide successful applications in many fields. Recently, machines learning are involved for oceans remote sensing applications. In this study, we use and compare about eight (8) deep learning estimators
for retrieval of a mainly pigment of phytoplankton. Depending on the water case and the multiple instruments simultaneously observing the earth on a variety of platforms, several algorithm are used to estimate the chlolophyll-a from marine eflectance.By using a long-term multi-sensor time-series of satellite ocean-colour data, as MODIS, SeaWifs, VIIRS, MERIS, etc…, we make a unique deep network model able to establish a relationship between sea surface reflectance and chlorophyll-a from any measurement satellite sensor over West
Africa. These data fusion take into account the bias between case water and instruments. We construct several chlorophyll-a concentration prediction deep learning based models, compare them and therefore use the best for our study. Results obtained for accuracy training and test are quite good. The mean absolute error are very low and vary between 0,07 to 0,13 mg/m3.
Sustainability: Actors, Behavior, and Transparency
Part 1: A Graph-based Perspective to Footprint Assessment
Part 2: SmartPacket - Redistributing the Routing Intelligence among Network Components in SDNs
Part 3: Profiling without ‘Profiling’ – Use Case of a Federated Approach to Resource Management in Smart House
Part 4: A Multi-Entity Input Output (MEIO) Approach to Sustainability - Water-Energy-GHG (WEG) Footprint Statements
Part 5 (Afternoon): Dynamic Network Topology-on-Demand for SDNs Using Failure-resilience Generalized Topologies of Physical Underlay
Similar to Improving Genetic Algorithm (GA) based NoC mapping algorithm using a formal model (20)
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
Improving Genetic Algorithm (GA) based NoC mapping algorithm using a formal model
1. Vinitha A Palaniveloo Jude Angelo Ambrose
Arcot Sowmya
School of Computer Science and Engineering
The University of New South Wales
Sydney, Australia
Improving GA-based NoC mapping
algorithms using a formal model
7/10/2014 The University of New South Wales 1
2. Outline
• Introduction
• Background and Related work
• Case study: Application of formal model to
evaluate NMAP algorithm
• NoC mapping using formal NoC model and
Genetic Algorithm (GA)
• Results
• Conclusion
7/10/2014 The University of New South Wales 2
3. 7/10/2014 The University of New South Wales 3
Network on Chip
Application
Tasks
Application Mapping
SWITCH
ROUTING
I/P O/P
NETWORK INTERFACE
PROCESSING
ELEMENT MEMORY
Router
PE – Processing Element
MEM - Memory
Network on Chip (NoC)
4. NoC Mapping
7/10/2014 The University of New South Wales 4
Mapping algorithms aim at mapping
applications onto the NoC platform, while
optimizing certain metrics of interest such as
energy, performance,…
𝑛𝑃𝑟 =
𝑛!
𝑛 − 𝑟 !
Size Number of
Permutations
6 720
9 362880
16 2.09227x1013
25 1.55112x1025
Application
NoC
Infrastructure
Communication
scheme
5. Open Problems in Application
mapping
7/10/2014 The University of New South Wales 5
• Simulation too expensive to use in optimization
loop of mapping algorithms, so analytical
models used for performance evaluation
• Analytical models usually abstract architecture
specific details, not robust
• Instead, propose use of formal NoC model
mapping- contains details of Architecture,
Communication scheme and Application
6. Types of Mapping Algorithms
7/10/2014 The University of New South Wales 6
Mapping
algorithms
Static
Exact
mapping
Greedy
placement
Iterative
placement
Search based
mapping
Mapping
heuristics
Genetic
algorithms
Dynamic
7. Genetic Algorithms
7/10/2014 The University of New South Wales 7
• Genetic algorithms (GA) uses global
search heuristics
• Particular class of evolutionary
algorithms that use techniques
inspired by evolutionary biology-
inheritance, mutation, selection and
crossover (also called recombination)
8. Genetic Algorithms
7/10/2014 The University of New South Wales 8
Initialize Population
Check constraints ?
Evaluate Fitness
Select Survivors
Output Results
Vary Individuals
Yes
No
Reproduction
Crossover
Mutation
9. Crossover Operator
7/10/2014 The University of New South Wales 9
• Crossover
– Generating offspring from two selected parents
• Single point crossover
• Two point crossover (Multi point crossover)
• Uniform crossover
• Example:
– Parent 1: X X | X X X X X
– Parent 2: Y Y | Y Y Y Y Y
– Offspring 1: X X Y Y Y Y Y
– Offspring 2: Y Y X X X X X
Crossover is explorative, it makes a big jump to an area somewhere “in between” two
(parents)
10. Mutation Operator
7/10/2014 The University of New South Wales 10
Mutation
• Generating new offspring from single parent
by setting probability of mutation.
• Maintaining the diversity of the individuals
• Can “generate” new genes
• Example:
– Parent 1: X Y Y Y Y X Y
– Parent 2: X X X Y Y Y X
– Offspring 1: X Y Y X Y Y X
– Offspring 2: Y X X Y X X Y
Mutation is exploitative, it creates random small diversions, thereby staying near the parent
11. Fitness function
7/10/2014 The University of New South Wales 11
Fitness function
f(x)
Individuals Ranked
T1 T2 T3 T4 T5 T6
T6 T2 T3 T1 T5 T4
T1 T3 T6 T4 T5 T2
T5 T2 T3 T4 T1 T6
T4 T2 T5 T3 T1 T6
T6 T2 T3 T4 T5 T1
T1 T2 T3 T4 T5 T6
T6 T2 T3 T1 T5 T4
T1 T3 T6 T4 T5 T2
T5 T2 T3 T4 T1 T6
T4 T2 T5 T3 T1 T6
T6 T2 T3 T4 T5 T1
M1
M2
M3
M4
M5
M6
M5
M1
M2
M6
M3
M4
Fitness Function
• Analytical model
• Formal model
12. Analytical model for Latency Estimation
7/10/2014 The University of New South Wales 12
Latency : Time for packet to traverse network
• Latency = Hop Count+ Contention latency
– Contention latency: impacted by traffic loads and
buffers in the router, computed using probabilistic
models or queuing theory
– Hop Count: number of links traversed between
source and destination, depends on routing
algorithm, which can be computed analytically for
deterministic routing algorithms
13. Formal NoC model
7/10/2014 The University of New South Wales 13
P8
receive_R8?
inject_pkt_R8 ()
switch_R8 ()
arbitrate_R8 ()
sink_pkt_R8 ()
transmit_R8!
P0
receive_R0?
inject_pkt_R0 ()
switch_R0 ()
arbitrate_R0 ()
sink_pkt_R0 ()
transmit_R0!
receive_R8?
inject_pkt_R8 ()
switch_R8 ()
arbitrate_R8 ()
sink_pkt_R8 ()
transmit_R8!
P0
receive_R0?
inject_pkt_R0 ()
switch_R0 ()
arbitrate_R0 ()
sink_pkt_R0 ()
transmit_R0!
P1 P8
Pt0 = P0 || P1 || P2 || P3 || P4 || P5 || P6 || P7 || P8
Pt0 = P0 . P1 . P2 . P3 . P4 . P5 . P6 . P7 . P8
Estimating worst-case latency of NoC formally
(by model checking)
- posing latency as reachability problem
14. GA Algorithms Termination Criteria
7/10/2014 The University of New South Wales 14
The generational process repeated until
termination condition reached
Common terminating conditions are:
• A solution is found that satisfies minimum criteria
• Fixed number of generations reached
• Manual inspection
• Any Combinations of the above
15. Case study: NMAP algorithm & DSP
Filter Application
ARM Filter
FFT IFFT
Display
Memory
200
600
200200 200
Source Destination Rate
Memory ARM 200
Filter ARM 600
Filter FFT 200
Filter IFFT 200
ARM Filter 600
ARM Display 200
FFT Filter 200
IFFT Filter 200
[1] Mapping and Physical Planning of Networks-on-Chip Architectures with Quality-of-Service Guarantees
7/10/2014 The University of New South Wales 15
Peak link bandwidth as 1000MB/S
200MB/s – 20% packet injection rate
- translates to one packet every 5 clock cycles
600MB/s – 60% packet injection rate
- translates to one packet every 2 clock cycles
16. Solution by NMAP Algorithm [1]
0 1 2
3 4 5
Memory
FFT
Filter
ARM
IFFT
Display
7/10/2014 The University of New South Wales 16
Estimated worst-case latency using the formal model : 3.375 cycles
17. Exploration of mapping space by brute force
Modules
MAP
93
MAP
95
MAP
271
MAP
276
MAP
391
MAP
396
MAP
699
MAP
701
Memory R0 R0 R3 R5 R3 R5 R2 R2
Filter R5 R4 R1 R1 R1 R1 R4 R4
IFFT R3 R5 R0 R0 R2 R2 R3 R5
FFT R4 R3 R2 R2 R0 R0 R5 R3
ARM R1 R1 R4 R4 R4 R4 R1 R1
Display R2 R2 R5 R3 R5 R3 R0 R0
Mapping proposed in [1] is MAPPING 391 in out model, highlighted
above, it has minimum average worst case latency
7/10/2014 The University of New South Wales 17
Mapping with worst-case latency of 3.375 cycles
Total number of solutions = 8
18. • It is not possible to perform exhaustive search for
large NoCs
– 3x2 took 17min 42 sec
– 3x3 took 6.5 days (148.62 hours)
• Results of different mapping algorithms developed
for the same constraint may be different
• Mapping algorithms may find only a near optimal
solution
• Mapping algorithms may find more than one
mapping solution
Discussion
7/10/2014 The University of New South Wales 18
19. Evaluate possibility of using formal model to
enable mapping algorithms to find better optimal
solution
Proposal
7/10/2014 The University of New South Wales 19
Popular static
mapping
approaches
Mapping
heuristics
Genetic
Algorithms based
mapping
Using analytical
model
Using formal
model
20. Sample Applications
7/10/2014 The University of New South Wales 20
Application NoC Size Total traces
APP1 3x2 8
APP2 3x3 13
APP3 4x4 25
APP4 5x5 38
APP5 10x10 150
APP6 20x20 600
APP7 30x30 1349
21. Population size and Generation size
7/10/2014 The University of New South Wales 21
Algorithm termination condition:
• Population size = 100
• Generation size = 10
WHY?
• APP1 & APP2 => always finds at least one optimal solution
• APP3 & APP4 => output solution is not significantly improved
by increasing population and generation size
Offspring generated using two types of genetic operators:
• random mutation operator R
• single point crossover operator S
23. Result
Application WCL
(Heuristic)
WCL
(R_FM)
WCL
(S_FM)
WCL
(R_AM)
WCL
(S_AM)
APP1 3.375 3.375 3.375 3.375 3.375
APP2 4.0 3.84 3.84 4.384 4.3
APP3 7.91 5.32 5.44 5.56 5.56
APP4 27.1 6.6 7.4 7.89 8.31
APP5 35.54 20.2 20.7 25.14 29.55
APP6 210.72 86.45 80.4 121.515 112.47
APP7 295.65 203.8 222.1 395.47 271.38
7/10/2014 The University of New South Wales 23
24. Discussion of Mapping Results
• GA based mapping algorithm generally finds better
optimal solutions than the mapping heuristic,
especially as the size of the application increases
• all the GA-based algorithms perform equally well for
smaller applications [APP1...APP4]
• GA + formal is better than GA + analytical for larger
applications [APP5...APP7]
• With random mutation R, GA + formal has WCL 20%
lower than GA + analytical
• With single point crossover S, GA + formal has WCL
13% lower than GA + analytical
7/10/2014 The University of New South Wales 24
26. Execution Time
• GA + formal takes longer to compute,
compared with GA + analytical
• Random mutation R introduces more
diversity in the population, and the solution
converges to an optimal solution more quickly.
But single point crossover S is faster to
compute
7/10/2014 The University of New South Wales 26
27. Conclusion
7/10/2014 The University of New South Wales 27
• Formal models can be applied to solve NoC
design problem in addition to functional
verification
• Formal NoC models may be enhanced to
estimate other QoS parameters such as
energy, power and throughput, resulting in a
good generic performance model