-
Ensembling of Distilled Models from Multi-task Teachers for Constrained Resource Language Pairs
Authors:
Amr Hendy,
Esraa A. Gad,
Mohamed Abdelghaffar,
Jailan S. ElMosalami,
Mohamed Afify,
Ahmed Y. Tawfik,
Hany Hassan Awadalla
Abstract:
This paper describes our submission to the constrained track of WMT21 shared news translation task. We focus on the three relatively low resource language pairs Bengali to and from Hindi, English to and from Hausa, and Xhosa to and from Zulu. To overcome the limitation of relatively low parallel data we train a multilingual model using a multitask objective employing both parallel and monolingual…
▽ More
This paper describes our submission to the constrained track of WMT21 shared news translation task. We focus on the three relatively low resource language pairs Bengali to and from Hindi, English to and from Hausa, and Xhosa to and from Zulu. To overcome the limitation of relatively low parallel data we train a multilingual model using a multitask objective employing both parallel and monolingual data. In addition, we augment the data using back translation. We also train a bilingual model incorporating back translation and knowledge distillation then combine the two models using sequence-to-sequence mapping. We see around 70% relative gain in BLEU point for English to and from Hausa, and around 25% relative improvements for both Bengali to and from Hindi, and Xhosa to and from Zulu compared to bilingual baselines.
△ Less
Submitted 25 November, 2021;
originally announced November 2021.
-
Characterizing Order of Convergence in the Obreshkov Method in Differential-Algebraic Equations
Authors:
Emad Gad
Abstract:
The Obreshkov method is a single-step multi-derivative method used in the numerical solution of differential equations and has been used in recent years in efficient circuit simulation. It has been shown that it can be made of arbitrary high local order of convergence while maintaining unconditional numerical stability. Nevertheless, the theoretical basis for the high order of convergence has been…
▽ More
The Obreshkov method is a single-step multi-derivative method used in the numerical solution of differential equations and has been used in recent years in efficient circuit simulation. It has been shown that it can be made of arbitrary high local order of convergence while maintaining unconditional numerical stability. Nevertheless, the theoretical basis for the high order of convergence has been known only for the special case where the underlying system of differential equations is of the ordinary type, i.e., for ordinary differential equations (ODE). On the other hand, theoretical analysis of the order of convergence for the more general case of a system consisting of differential and algebraic equations (DAE) is still lacking in the literature.
This paper presents the theoretical characterization for the local order of convergence of the Obreshkov method when used in the numerical solution of a system of DAE. The contribution presented in this paper demonstrates that, in DAE, the local order of convergence is a function of the differentiation index of the system and, under certain conditions, becomes lower than the order obtained in ODE.
△ Less
Submitted 4 February, 2021;
originally announced February 2021.
-
An Algebraic Approach for the Stability Analysis of BLDC Motor Controllers
Authors:
Emad Gad,
Julio Pimentel
Abstract:
This paper presents an algebraic technique to compute the maximum time-delay that can be accepted in the control loop of a Brushless DC Motor (BLDCM) speed controller before the closed loop response becomes unstable. Using a recently proposed time-delay stability analysis methodology, we derive accurate stability conditions for the BLDCM speed controller. The results of applying the new method sho…
▽ More
This paper presents an algebraic technique to compute the maximum time-delay that can be accepted in the control loop of a Brushless DC Motor (BLDCM) speed controller before the closed loop response becomes unstable. Using a recently proposed time-delay stability analysis methodology, we derive accurate stability conditions for the BLDCM speed controller. The results of applying the new method show that tuning the PI controller for very fast response in the order of magnitude of the BLDCM mechanical time constant cause the time-delay to significantly affect the system stability.
△ Less
Submitted 2 July, 2020;
originally announced July 2020.
-
Iterative Programming of Noisy Memory Cells
Authors:
Michal Horovitz,
Eitan Yaakobi,
Eyal En Gad,
Jehoshua Bruck
Abstract:
In this paper, we study a model, which was first presented by Bunte and Lapidoth, that mimics the programming operation of memory cells. Under this paradigm we assume that cells are programmed sequentially and individually. The programming process is modeled as transmission over a channel, while it is possible to read the cell state in order to determine its programming success, and in case of pro…
▽ More
In this paper, we study a model, which was first presented by Bunte and Lapidoth, that mimics the programming operation of memory cells. Under this paradigm we assume that cells are programmed sequentially and individually. The programming process is modeled as transmission over a channel, while it is possible to read the cell state in order to determine its programming success, and in case of programming failure, to reprogram the cell again. Reprogramming a cell can reduce the bit error rate, however this comes with the price of increasing the overall programming time and thereby affecting the writing speed of the memory. An iterative programming scheme is an algorithm which specifies the number of attempts to program each cell. Given the programming channel and constraints on the average and maximum number of attempts to program a cell, we study programming schemes which maximize the number of bits that can be reliably stored in the memory. We extend the results by Bunte and Lapidoth and study this problem when the programming channel is either the BSC, BEC, or $Z$ channel. For the BSC and the BEC our analysis is also extended for the case where the error probabilities on consecutive writes are not necessarily the same. Lastly, we also study a related model which is motivated by the synthesis process of DNA molecules.
△ Less
Submitted 10 January, 2019;
originally announced January 2019.
-
Scalable Block-Wise Product BCH Codes
Authors:
Yingquan Wu,
Eyal En Gad
Abstract:
In this paper we comprehensively investigate block-wise product (BWP) BCH codes, wherein raw data is arranged in the form of block-wise matrix and each row and column BCH codes intersect on one data block. We first devise efficient BCH decoding algorithms, including reduced-1-bit decoding, extra-1-bit list decoding, and extra-2-bit list decoding. We next present a systematic construction of BWP-BC…
▽ More
In this paper we comprehensively investigate block-wise product (BWP) BCH codes, wherein raw data is arranged in the form of block-wise matrix and each row and column BCH codes intersect on one data block. We first devise efficient BCH decoding algorithms, including reduced-1-bit decoding, extra-1-bit list decoding, and extra-2-bit list decoding. We next present a systematic construction of BWP-BCH codes upon given message and parity lengths that takes into account for performance, implementation and scalability, rather than focusing on a regularly defined BWP-BCH code. It can easily accommodate different message length or parity length at minimal changes. It employs extended BCH codes instead of BCH codes to reduce miscorrection rate and an inner RS code to lower error floor. We also describe a high-speed scalable encoder. We finally present a novel iterative decoding algorithm which is divided into three phases. The first phase iteratively applies reduced BCH correction capabilities to correct lightly corrupted rows/columns while suppressing miscorrection, until the process stalls. The second phase iteratively decodes up to the designed correction capabilities, until the process stalls. The last phase iteratively applies the proposed list decoding in a novel manner which effectively determines the correct candidate. The key idea is to use cross decoding upon each list candidate to pick the candidate which enables the maximum number of successful cross decoding. Our simulations show that the proposed algorithm provides a significant performance boost compared to the state-of-the-art algorithms.
△ Less
Submitted 17 December, 2018;
originally announced December 2018.
-
Active Learning On Weighted Graphs Using Adaptive And Non-adaptive Approaches
Authors:
Eyal En Gad,
Akshay Gadde,
A. Salman Avestimehr,
Antonio Ortega
Abstract:
This paper studies graph-based active learning, where the goal is to reconstruct a binary signal defined on the nodes of a weighted graph, by sampling it on a small subset of the nodes. A new sampling algorithm is proposed, which sequentially selects the graph nodes to be sampled, based on an aggressive search for the boundary of the signal over the graph. The algorithm generalizes a recent method…
▽ More
This paper studies graph-based active learning, where the goal is to reconstruct a binary signal defined on the nodes of a weighted graph, by sampling it on a small subset of the nodes. A new sampling algorithm is proposed, which sequentially selects the graph nodes to be sampled, based on an aggressive search for the boundary of the signal over the graph. The algorithm generalizes a recent method for sampling nodes in unweighted graphs. The generalization improves the sampling performance using the information gained from the available graph weights. An analysis of the number of samples required by the proposed algorithm is provided, and the gain over the unweighted method is further demonstrated in simulations. Additionally, the proposed method is compared with an alternative state of-the-art method, which is based on the graph's spectral properties. It is shown that the proposed method significantly outperforms the spectral sampling method, if the signal needs to be predicted with high accuracy. On the other hand, if a higher level of inaccuracy is tolerable, then the spectral method outperforms the proposed aggressive search method. Consequently, we propose a hybrid method, which is shown to combine the advantages of both approaches.
△ Less
Submitted 18 May, 2016;
originally announced May 2016.
-
Active Learning for Community Detection in Stochastic Block Models
Authors:
Akshay Gadde,
Eyal En Gad,
Salman Avestimehr,
Antonio Ortega
Abstract:
The stochastic block model (SBM) is an important generative model for random graphs in network science and machine learning, useful for benchmarking community detection (or clustering) algorithms. The symmetric SBM generates a graph with $2n$ nodes which cluster into two equally sized communities. Nodes connect with probability $p$ within a community and $q$ across different communities. We consid…
▽ More
The stochastic block model (SBM) is an important generative model for random graphs in network science and machine learning, useful for benchmarking community detection (or clustering) algorithms. The symmetric SBM generates a graph with $2n$ nodes which cluster into two equally sized communities. Nodes connect with probability $p$ within a community and $q$ across different communities. We consider the case of $p=a\ln (n)/n$ and $q=b\ln (n)/n$. In this case, it was recently shown that recovering the community membership (or label) of every node with high probability (w.h.p.) using only the graph is possible if and only if the Chernoff-Hellinger (CH) divergence $D(a,b)=(\sqrt{a}-\sqrt{b})^2 \geq 1$. In this work, we study if, and by how much, community detection below the clustering threshold (i.e. $D(a,b)<1$) is possible by querying the labels of a limited number of chosen nodes (i.e., active learning). Our main result is to show that, under certain conditions, sampling the labels of a vanishingly small fraction of nodes (a number sub-linear in $n$) is sufficient for exact community detection even when $D(a,b)<1$. Furthermore, we provide an efficient learning algorithm which recovers the community memberships of all nodes w.h.p. as long as the number of sampled points meets the sufficient condition. We also show that recovery is not possible if the number of observed labels is less than $n^{1-D(a,b)}$. The validity of our results is demonstrated through numerical experiments.
△ Less
Submitted 8 May, 2016;
originally announced May 2016.
-
Rewriting Flash Memories by Message Passing
Authors:
Eyal En Gad,
Wentao Huang,
Yue Li,
Jehoshua Bruck
Abstract:
This paper constructs WOM codes that combine rewriting and error correction for mitigating the reliability and the endurance problems in flash memory. We consider a rewriting model that is of practical interest to flash applications where only the second write uses WOM codes. Our WOM code construction is based on binary erasure quantization with LDGM codes, where the rewriting uses message passing…
▽ More
This paper constructs WOM codes that combine rewriting and error correction for mitigating the reliability and the endurance problems in flash memory. We consider a rewriting model that is of practical interest to flash applications where only the second write uses WOM codes. Our WOM code construction is based on binary erasure quantization with LDGM codes, where the rewriting uses message passing and has potential to share the efficient hardware implementations with LDPC codes in practice. We show that the coding scheme achieves the capacity of the rewriting model. Extensive simulations show that the rewriting performance of our scheme compares favorably with that of polar WOM code in the rate region where high rewriting success probability is desired. We further augment our coding schemes with error correction capability. By drawing a connection to the conjugate code pairs studied in the context of quantum error correction, we develop a general framework for constructing error-correction WOM codes. Under this framework, we give an explicit construction of WOM codes whose codewords are contained in BCH codes.
△ Less
Submitted 31 January, 2015;
originally announced February 2015.
-
Asymmetric Error Correction and Flash-Memory Rewriting using Polar Codes
Authors:
Eyal En Gad,
Yue Li,
Joerg Kliewer,
Michael Langberg,
Anxiao Jiang,
Jehoshua Bruck
Abstract:
We propose efficient coding schemes for two communication settings: 1. asymmetric channels, and 2. channels with an informed encoder. These settings are important in non-volatile memories, as well as optical and broadcast communication. The schemes are based on non-linear polar codes, and they build on and improve recent work on these settings. In asymmetric channels, we tackle the exponential sto…
▽ More
We propose efficient coding schemes for two communication settings: 1. asymmetric channels, and 2. channels with an informed encoder. These settings are important in non-volatile memories, as well as optical and broadcast communication. The schemes are based on non-linear polar codes, and they build on and improve recent work on these settings. In asymmetric channels, we tackle the exponential storage requirement of previously known schemes, that resulted from the use of large Boolean functions. We propose an improved scheme, that achieves the capacity of asymmetric channels with polynomial computational complexity and storage requirement.
The proposed non-linear scheme is then generalized to the setting of channel coding with an informed encoder, using a multicoding technique. We consider specific instances of the scheme for flash memories, that incorporate error-correction capabilities together with rewriting. Since the considered codes are non-linear, they eliminate the requirement of previously known schemes (called polar write-once-memory codes) for shared randomness between the encoder and the decoder. Finally, we mention that the multicoding scheme is also useful for broadcast communication in Marton's region, improving upon previous schemes for this setting.
△ Less
Submitted 28 December, 2015; v1 submitted 13 October, 2014;
originally announced October 2014.
-
Rank-Modulation Rewrite Coding for Flash Memories
Authors:
Eyal En Gad,
Eitan Yaakobi,
Anxiao,
Jiang,
Jehoshua Bruck
Abstract:
The current flash memory technology focuses on the cost minimization of its static storage capacity. However, the resulting approach supports a relatively small number of program-erase cycles. This technology is effective for consumer devices (e.g., smartphones and cameras) where the number of program-erase cycles is small. However, it is not economical for enterprise storage systems that require…
▽ More
The current flash memory technology focuses on the cost minimization of its static storage capacity. However, the resulting approach supports a relatively small number of program-erase cycles. This technology is effective for consumer devices (e.g., smartphones and cameras) where the number of program-erase cycles is small. However, it is not economical for enterprise storage systems that require a large number of lifetime writes. The proposed approach in this paper for alleviating this problem consists of the efficient integration of two key ideas: (i) improving reliability and endurance by representing the information using relative values via the rank modulation scheme and (ii) increasing the overall (lifetime) capacity of the flash device via rewriting codes, namely, performing multiple writes per cell before erasure. This paper presents a new coding scheme that combines rank modulation with rewriting. The key benefits of the new scheme include: (i) the ability to store close to 2 bits per cell on each write with minimal impact on the lifetime of the memory, and (ii) efficient encoding and decoding algorithms that make use of capacity-achieving write-once-memory (WOM) codes that were proposed recently.
△ Less
Submitted 30 December, 2014; v1 submitted 3 December, 2013;
originally announced December 2013.
-
Repair-Optimal MDS Array Codes over GF(2)
Authors:
Eyal En Gad,
Robert Mateescu,
Filip Blagojevic,
Cyril Guyot,
Zvonimir Bandic
Abstract:
Maximum-distance separable (MDS) array codes with high rate and an optimal repair property were introduced recently. These codes could be applied in distributed storage systems, where they minimize the communication and disk access required for the recovery of failed nodes. However, the encoding and decoding algorithms of the proposed codes use arithmetic over finite fields of order greater than 2…
▽ More
Maximum-distance separable (MDS) array codes with high rate and an optimal repair property were introduced recently. These codes could be applied in distributed storage systems, where they minimize the communication and disk access required for the recovery of failed nodes. However, the encoding and decoding algorithms of the proposed codes use arithmetic over finite fields of order greater than 2, which could result in a complex implementation.
In this work, we present a construction of 2-parity MDS array codes, that allow for optimal repair of a failed information node using XOR operations only. The reduction of the field order is achieved by allowing more parity bits to be updated when a single information bit is being changed by the user.
△ Less
Submitted 17 February, 2013;
originally announced February 2013.
-
Compressed Encoding for Rank Modulation
Authors:
Eyal En Gad,
Anxiao,
Jiang,
Jehoshua Bruck
Abstract:
Rank modulation has been recently proposed as a scheme for storing information in flash memories. While rank modulation has advantages in improving write speed and endurance, the current encoding approach is based on the "push to the top" operation that is not efficient in the general case. We propose a new encoding procedure where a cell level is raised to be higher than the minimal necessary sub…
▽ More
Rank modulation has been recently proposed as a scheme for storing information in flash memories. While rank modulation has advantages in improving write speed and endurance, the current encoding approach is based on the "push to the top" operation that is not efficient in the general case. We propose a new encoding procedure where a cell level is raised to be higher than the minimal necessary subset - instead of all - of the other cell levels. This new procedure leads to a significantly more compressed (lower charge levels) encoding. We derive an upper bound for a family of codes that utilize the proposed encoding procedure, and consider code constructions that achieve that bound for several special cases.
△ Less
Submitted 12 August, 2011;
originally announced August 2011.
-
Generalized Gray Codes for Local Rank Modulation
Authors:
Eyal En Gad,
Michael Langberg,
Moshe Schwartz,
Jehoshua Bruck
Abstract:
We consider the local rank-modulation scheme in which a sliding window going over a sequence of real-valued variables induces a sequence of permutations. Local rank-modulation is a generalization of the rank-modulation scheme, which has been recently suggested as a way of storing information in flash memory. We study Gray codes for the local rank-modulation scheme in order to simulate conventional…
▽ More
We consider the local rank-modulation scheme in which a sliding window going over a sequence of real-valued variables induces a sequence of permutations. Local rank-modulation is a generalization of the rank-modulation scheme, which has been recently suggested as a way of storing information in flash memory. We study Gray codes for the local rank-modulation scheme in order to simulate conventional multi-level flash cells while retaining the benefits of rank modulation. Unlike the limited scope of previous works, we consider code constructions for the entire range of parameters including the code length, sliding window size, and overlap between adjacent windows. We show our constructed codes have asymptotically-optimal rate. We also provide efficient encoding, decoding, and next-state algorithms.
△ Less
Submitted 1 March, 2011;
originally announced March 2011.