-
Collective Intelligence Outperforms Individual Talent: A Case Study in League of Legends
Authors:
Angelo Josey Caldeira,
Sajan Maharjan,
Srijoni Majumdar,
Evangelos Pournaras
Abstract:
Gaming environments are popular testbeds for studying human interactions and behaviors in complex artificial intelligence systems. Particularly, in multiplayer online battle arena (MOBA) games, individuals collaborate in virtual environments of high realism that involves real-time strategic decision-making and trade-offs on resource management, information collection and sharing, team synergy and…
▽ More
Gaming environments are popular testbeds for studying human interactions and behaviors in complex artificial intelligence systems. Particularly, in multiplayer online battle arena (MOBA) games, individuals collaborate in virtual environments of high realism that involves real-time strategic decision-making and trade-offs on resource management, information collection and sharing, team synergy and collective dynamics. This paper explores whether collective intelligence, emerging from cooperative behaviours exhibited by a group of individuals, who are not necessarily skillful but effectively engage in collaborative problem-solving tasks, exceeds individual intelligence observed within skillful individuals. This is shown via a case study in League of Legends, using machine learning algorithms and statistical methods applied to large-scale data collected for the same purpose. By modelling systematically game-specific metrics but also new game-agnostic topological and graph spectra measures of cooperative interactions, we demonstrate compelling insights about the superior performance of collective intelligence.
△ Less
Submitted 3 June, 2025;
originally announced June 2025.
-
Joint Action Language Modelling for Transparent Policy Execution
Authors:
Theodor Wulff,
Rahul Singh Maharjan,
Xinyun Chi,
Angelo Cangelosi
Abstract:
An agent's intention often remains hidden behind the black-box nature of embodied policies. Communication using natural language statements that describe the next action can provide transparency towards the agent's behavior. We aim to insert transparent behavior directly into the learning process, by transforming the problem of policy learning into a language generation problem and combining it wi…
▽ More
An agent's intention often remains hidden behind the black-box nature of embodied policies. Communication using natural language statements that describe the next action can provide transparency towards the agent's behavior. We aim to insert transparent behavior directly into the learning process, by transforming the problem of policy learning into a language generation problem and combining it with traditional autoregressive modelling. The resulting model produces transparent natural language statements followed by tokens representing the specific actions to solve long-horizon tasks in the Language-Table environment. Following previous work, the model is able to learn to produce a policy represented by special discretized tokens in an autoregressive manner. We place special emphasis on investigating the relationship between predicting actions and producing high-quality language for a transparent agent. We find that in many cases both the quality of the action trajectory and the transparent statement increase when they are generated simultaneously.
△ Less
Submitted 14 April, 2025;
originally announced April 2025.
-
Attributes-aware Visual Emotion Representation Learning
Authors:
Rahul Singh Maharjan,
Marta Romeo,
Angelo Cangelosi
Abstract:
Visual emotion analysis or recognition has gained considerable attention due to the growing interest in understanding how images can convey rich semantics and evoke emotions in human perception. However, visual emotion analysis poses distinctive challenges compared to traditional vision tasks, especially due to the intricate relationship between general visual features and the different affective…
▽ More
Visual emotion analysis or recognition has gained considerable attention due to the growing interest in understanding how images can convey rich semantics and evoke emotions in human perception. However, visual emotion analysis poses distinctive challenges compared to traditional vision tasks, especially due to the intricate relationship between general visual features and the different affective states they evoke, known as the affective gap. Researchers have used deep representation learning methods to address this challenge of extracting generalized features from entire images. However, most existing methods overlook the importance of specific emotional attributes such as brightness, colorfulness, scene understanding, and facial expressions. Through this paper, we introduce A4Net, a deep representation network to bridge the affective gap by leveraging four key attributes: brightness (Attribute 1), colorfulness (Attribute 2), scene context (Attribute 3), and facial expressions (Attribute 4). By fusing and jointly training all aspects of attribute recognition and visual emotion analysis, A4Net aims to provide a better insight into emotional content in images. Experimental results show the effectiveness of A4Net, showcasing competitive performance compared to state-of-the-art methods across diverse visual emotion datasets. Furthermore, visualizations of activation maps generated by A4Net offer insights into its ability to generalize across different visual emotion datasets.
△ Less
Submitted 9 April, 2025;
originally announced April 2025.
-
Data Sharing, Privacy and Security Considerations in the Energy Sector: A Review from Technical Landscape to Regulatory Specifications
Authors:
Shiliang Zhang,
Sabita Maharjan,
Lee Andrew Bygrave,
Shui Yu
Abstract:
Decarbonization, decentralization and digitalization are the three key elements driving the twin energy transition. The energy system is evolving to a more data driven ecosystem, leading to the need of communication and storage of large amount of data of different resolution from the prosumers and other stakeholders in the energy ecosystem. While the energy system is certainly advancing, this para…
▽ More
Decarbonization, decentralization and digitalization are the three key elements driving the twin energy transition. The energy system is evolving to a more data driven ecosystem, leading to the need of communication and storage of large amount of data of different resolution from the prosumers and other stakeholders in the energy ecosystem. While the energy system is certainly advancing, this paradigm shift is bringing in new privacy and security issues related to collection, processing and storage of data - not only from the technical dimension, but also from the regulatory perspective. Understanding data privacy and security in the evolving energy system, regarding regulatory compliance, is an immature field of research. Contextualized knowledge of how related issues are regulated is still in its infancy, and the practical and technical basis for the regulatory framework for data privacy and security is not clear. To fill this gap, this paper conducts a comprehensive review of the data-related issues for the energy system by integrating both technical and regulatory dimensions. We start by reviewing open-access data, data communication and data-processing techniques for the energy system, and use it as the basis to connect the analysis of data-related issues from the integrated perspective. We classify the issues into three categories: (i) data-sharing among energy end users and stakeholders (ii) privacy of end users, and (iii) cyber security, and then explore these issues from a regulatory perspective. We analyze the evolution of related regulations, and introduce the relevant regulatory initiatives for the categorized issues in terms of regulatory definitions, concepts, principles, rights and obligations in the context of energy systems. Finally, we provide reflections on the gaps that still exist, and guidelines for regulatory frameworks for a truly participatory energy system.
△ Less
Submitted 5 March, 2025;
originally announced March 2025.
-
Comprehensive Layer-wise Analysis of SSL Models for Audio Deepfake Detection
Authors:
Yassine El Kheir,
Youness Samih,
Suraj Maharjan,
Tim Polzehl,
Sebastian Möller
Abstract:
This paper conducts a comprehensive layer-wise analysis of self-supervised learning (SSL) models for audio deepfake detection across diverse contexts, including multilingual datasets (English, Chinese, Spanish), partial, song, and scene-based deepfake scenarios. By systematically evaluating the contributions of different transformer layers, we uncover critical insights into model behavior and perf…
▽ More
This paper conducts a comprehensive layer-wise analysis of self-supervised learning (SSL) models for audio deepfake detection across diverse contexts, including multilingual datasets (English, Chinese, Spanish), partial, song, and scene-based deepfake scenarios. By systematically evaluating the contributions of different transformer layers, we uncover critical insights into model behavior and performance. Our findings reveal that lower layers consistently provide the most discriminative features, while higher layers capture less relevant information. Notably, all models achieve competitive equal error rate (EER) scores even when employing a reduced number of layers. This indicates that we can reduce computational costs and increase the inference speed of detecting deepfakes by utilizing only a few lower layers. This work enhances our understanding of SSL models in deepfake detection, offering valuable insights applicable across varied linguistic and contextual settings. Our trained models and code are publicly available: https://github.com/Yaselley/SSL_Layerwise_Deepfake.
△ Less
Submitted 7 February, 2025; v1 submitted 5 February, 2025;
originally announced February 2025.
-
DERs-Aided Blackstart and Load Restoration Framework for Distribution Systems Considering Synchronization and Frequency Security Constraints
Authors:
Salish Maharjan,
Cong Bai,
Han Wang,
Yiyun Yao,
Fei Ding,
Zhaoyu Wang
Abstract:
Extreme weather events have led to long-duration outages in the distribution system (DS), necessitating novel approaches to blackstart and restore the system. Existing blackstart solutions utilize blackstart units to establish multiple microgrids, sequentially energize non-blackstart units, and restore loads. However, these approaches often result in isolated microgrids. In DER-aided blackstart, t…
▽ More
Extreme weather events have led to long-duration outages in the distribution system (DS), necessitating novel approaches to blackstart and restore the system. Existing blackstart solutions utilize blackstart units to establish multiple microgrids, sequentially energize non-blackstart units, and restore loads. However, these approaches often result in isolated microgrids. In DER-aided blackstart, the continuous operation of these microgrids is uncertain due to the finite energy capacity of commonly used blackstart units, such as battery energy storage (BES)-based grid-forming inverters (GFMIs). To address this issue, this article proposes a holistic blackstart and restoration framework that incorporates synchronization between microgrids and the entire DS with the transmission grid (TG). To support synchronization, we leveraged virtual synchronous generator-based control for GFMIs to estimate their frequency response to load pick-up events using only initial/final quasi-steady-state points. Subsequently, a synchronization switching condition was developed to model synchronizing switches, aligning them seamlessly with a linearized branch flow problem. Finally, we designed a bottom-up blackstart and restoration framework that considers the switching structure of the DS, energizing/synchronizing switches, DERs with grid-following inverters, and BES-based GFMIs with frequency security constraints. The proposed framework is validated in IEEE-123-bus system, considering cases with two and four GFMIs under various TG recovery instants.
△ Less
Submitted 10 November, 2024;
originally announced November 2024.
-
From Concrete to Abstract: A Multimodal Generative Approach to Abstract Concept Learning
Authors:
Haodong Xie,
Rahul Singh Maharjan,
Federico Tavella,
Angelo Cangelosi
Abstract:
Understanding and manipulating concrete and abstract concepts is fundamental to human intelligence. Yet, they remain challenging for artificial agents. This paper introduces a multimodal generative approach to high order abstract concept learning, which integrates visual and categorical linguistic information from concrete ones. Our model initially grounds subordinate level concrete concepts, comb…
▽ More
Understanding and manipulating concrete and abstract concepts is fundamental to human intelligence. Yet, they remain challenging for artificial agents. This paper introduces a multimodal generative approach to high order abstract concept learning, which integrates visual and categorical linguistic information from concrete ones. Our model initially grounds subordinate level concrete concepts, combines them to form basic level concepts, and finally abstracts to superordinate level concepts via the grounding of basic-level concepts. We evaluate the model language learning ability through language-to-visual and visual-to-language tests with high order abstract concepts. Experimental results demonstrate the proficiency of the model in both language understanding and language naming tasks.
△ Less
Submitted 3 October, 2024;
originally announced October 2024.
-
Probing X-ray Timing and Spectral Variability in the Blazar PKS 2155-304 Over a Decade of XMM-Newton Observations
Authors:
Gopal Bhatta,
Suvas C. Chaudhary,
Niraj Dhital,
Tek P. Adhikari,
Maksym Mohorian,
Radim Pánis,
Raghav Neupane,
Yogesh Singh Maharjan
Abstract:
Blazars, a class of active galactic nuclei (AGN) powered by supermassive black holes, are known for their remarkable variability across multiple timescales and wavelengths. Despite significant advancements in our understanding of AGN central engines, thanks to both ground- and space-based telescopes, the details of the mechanisms driving this variability remain elusive. The primary objective of th…
▽ More
Blazars, a class of active galactic nuclei (AGN) powered by supermassive black holes, are known for their remarkable variability across multiple timescales and wavelengths. Despite significant advancements in our understanding of AGN central engines, thanks to both ground- and space-based telescopes, the details of the mechanisms driving this variability remain elusive. The primary objective of this study is to constrain the X-ray variability properties of the TeV blazar PKS 2155-304. We conducted a comprehensive X-ray spectral and timing analysis, focusing on both long-term and intra-day variability (IDV), using data from 22 epochs of {\it XMM-Newton} observations collected over 15 years (2000 to 2014). For the timing analysis, we estimated the fractional variability, variability amplitude, minimum variability timescales, flux distribution, and power spectral density. In the spectral analysis, we fitted the X-ray spectra using power-law, log-parabola, and broken power-law models to determine the best-fitting parameters. We observed moderate IDV in the majority of the light curves. Seven out of the 22 observations showed a clear bimodal flux distribution, indicating the presence of two distinct flux states. Our analysis revealed a variable power spectral slope. Most hardness ratio plots did not show significant variation with flux, except for two observations, where the hardness ratio changed considerably with flux. The fitted X-ray spectra favored the broken power law model for the majority of observations, indicating break in the spectral profiles. The findings of this work shed light on the IDV of blazars, providing insights into the non-thermal jet processes that drive the observed flux variations.
△ Less
Submitted 1 February, 2025; v1 submitted 2 October, 2024;
originally announced October 2024.
-
Noise-Free Explanation for Driving Action Prediction
Authors:
Hongbo Zhu,
Theodor Wulff,
Rahul Singh Maharjan,
Jinpei Han,
Angelo Cangelosi
Abstract:
Although attention mechanisms have achieved considerable progress in Transformer-based architectures across various Artificial Intelligence (AI) domains, their inner workings remain to be explored. Existing explainable methods have different emphases but are rather one-sided. They primarily analyse the attention mechanisms or gradient-based attribution while neglecting the magnitudes of input feat…
▽ More
Although attention mechanisms have achieved considerable progress in Transformer-based architectures across various Artificial Intelligence (AI) domains, their inner workings remain to be explored. Existing explainable methods have different emphases but are rather one-sided. They primarily analyse the attention mechanisms or gradient-based attribution while neglecting the magnitudes of input feature values or the skip-connection module. Moreover, they inevitably bring spurious noisy pixel attributions unrelated to the model's decision, hindering humans' trust in the spotted visualization result. Hence, we propose an easy-to-implement but effective way to remedy this flaw: Smooth Noise Norm Attention (SNNA). We weigh the attention by the norm of the transformed value vector and guide the label-specific signal with the attention gradient, then randomly sample the input perturbations and average the corresponding gradients to produce noise-free attribution. Instead of evaluating the explanation method on the binary or multi-class classification tasks like in previous works, we explore the more complex multi-label classification scenario in this work, i.e., the driving action prediction task, and trained a model for it specifically. Both qualitative and quantitative evaluation results show the superiority of SNNA compared to other SOTA attention-based explainable methods in generating a clearer visual explanation map and ranking the input pixel importance.
△ Less
Submitted 8 July, 2024;
originally announced July 2024.
-
Fair Voting Outcomes with Impact and Novelty Compromises? Unraveling Biases in Electing Participatory Budgeting Winners
Authors:
Sajan Maharjan,
Srijoni Majumdar,
Evangelos Pournaras
Abstract:
Participatory budgeting, as a paradigm for democratic innovations, engages citizens in the distribution of a public budget to projects, which they propose and vote for implementation. So far, voting algorithms have been proposed and studied in social choice literature to elect projects that are popular, while others prioritize on a proportional representation of voters' preferences, for instance,…
▽ More
Participatory budgeting, as a paradigm for democratic innovations, engages citizens in the distribution of a public budget to projects, which they propose and vote for implementation. So far, voting algorithms have been proposed and studied in social choice literature to elect projects that are popular, while others prioritize on a proportional representation of voters' preferences, for instance, the rule of equal shares. However, the anticipated impact and novelty in the broader society by the winning projects, as selected by different algorithms, remains totally under-explored, lacking both a universal theory of impact for voting and a rigorous unifying framework for impact and novelty assessments. This paper tackles this grand challenge towards new axiomatic foundations for designing effective and fair voting methods. This is via new and striking insights derived from a large-scale analysis of biases over 345 real-world voting outcomes, characterized for the first time by a novel portfolio of impact and novelty metrics. We find strong causal evidence that equal shares comes with impact loss in several infrastructural projects of different cost levels that have been so far over-represented. However, it also comes with a novel, yet over-represented, impact gain in welfare, education and culture. We discuss broader implications of these results and how impact loss can be mitigated at the stage of campaign design and project ideation.
△ Less
Submitted 29 October, 2024; v1 submitted 8 May, 2024;
originally announced May 2024.
-
3D Volumetric Super-Resolution in Radiology Using 3D RRDB-GAN
Authors:
Juhyung Ha,
Nian Wang,
Surendra Maharjan,
Xuhong Zhang
Abstract:
This study introduces the 3D Residual-in-Residual Dense Block GAN (3D RRDB-GAN) for 3D super-resolution for radiology imagery. A key aspect of 3D RRDB-GAN is the integration of a 2.5D perceptual loss function, which contributes to improved volumetric image quality and realism. The effectiveness of our model was evaluated through 4x super-resolution experiments across diverse datasets, including Mi…
▽ More
This study introduces the 3D Residual-in-Residual Dense Block GAN (3D RRDB-GAN) for 3D super-resolution for radiology imagery. A key aspect of 3D RRDB-GAN is the integration of a 2.5D perceptual loss function, which contributes to improved volumetric image quality and realism. The effectiveness of our model was evaluated through 4x super-resolution experiments across diverse datasets, including Mice Brain MRH, OASIS, HCP1200, and MSD-Task-6. These evaluations, encompassing both quantitative metrics like LPIPS and FID and qualitative assessments through sample visualizations, demonstrate the models effectiveness in detailed image analysis. The 3D RRDB-GAN offers a significant contribution to medical imaging, particularly by enriching the depth, clarity, and volumetric detail of medical images. Its application shows promise in enhancing the interpretation and analysis of complex medical imagery from a comprehensive 3D perspective.
△ Less
Submitted 6 February, 2024;
originally announced February 2024.
-
Privacy-preserving transactive energy systems: Key topics and open research challenges
Authors:
Daniel Gerbi Duguma,
Juliana Zhang,
Meysam Aboutalebi,
Shiliang Zhang,
Catherine Banet,
Cato Bjørkli,
Chinmayi Baramashetru,
Frank Eliassen,
Hui Zhang,
Jonathan Muringani,
Josef Noll,
Knut Inge Fostervold,
Lars Böcker,
Lee Andrew Bygrave,
Matin Bagherpour,
Maunya Doroudi Moghadam,
Olaf Owe,
Poushali Sengupta,
Roman Vitenberg,
Sabita Maharjan,
Thiago Garrett,
Yushuai Li,
Zhengyu Shan
Abstract:
This manuscript aims to formalize and conclude the discussions initiated during the PriTEM workshop 22-23 March 2023. We present important ideas and discussion topics in the context of transactive energy systems. Moreover, the conclusions from the discussions articulate potential aspects to be explored in future studies on transactive energy management. Particularly, these conclusions cover resear…
▽ More
This manuscript aims to formalize and conclude the discussions initiated during the PriTEM workshop 22-23 March 2023. We present important ideas and discussion topics in the context of transactive energy systems. Moreover, the conclusions from the discussions articulate potential aspects to be explored in future studies on transactive energy management. Particularly, these conclusions cover research topics in energy technology and energy informatics, energy law, data law, energy market and socio-psychology that are relevant to the seamless integration of renewable energy resources and the transactive energy systems-in smart microgrids-focusing on distributed frameworks such as peer-to-peer (P2P) energy trading. We clarify issues, identify barriers, and suggest possible solutions to open questions in diversified topics, such as block-chain interoperability, consumer privacy and data sharing, and participation incentivization. Furthermore, we also elaborate challenges associated with cross-disciplinary collaboration and coordination for transactive energy systems, and enumerate the lessons learned from our work so far.
△ Less
Submitted 17 December, 2023;
originally announced December 2023.
-
Monaural Multi-Speaker Speech Separation Using Efficient Transformer Model
Authors:
S. Rijal,
R. Neupane,
S. P. Mainali,
S. K. Regmi,
S. Maharjan
Abstract:
Cocktail party problem is the scenario where it is difficult to separate or distinguish individual speaker from a mixed speech from several speakers. There have been several researches going on in this field but the size and complexity of the model is being traded off with the accuracy and robustness of speech separation. "Monaural multi-speaker speech separation" presents a speech-separation mode…
▽ More
Cocktail party problem is the scenario where it is difficult to separate or distinguish individual speaker from a mixed speech from several speakers. There have been several researches going on in this field but the size and complexity of the model is being traded off with the accuracy and robustness of speech separation. "Monaural multi-speaker speech separation" presents a speech-separation model based on the Transformer architecture and its efficient forms. The model has been trained with the LibriMix dataset containing diverse speakers' utterances. The model separates 2 distinct speaker sources from a mixed audio input. The developed model approaches the reduction in computational complexity of the speech separation model, with minimum tradeoff with the performance of prevalent speech separation model and it has shown significant movement towards that goal. This project foresees, a rise in contribution towards the ongoing research in the field of speech separation with computational efficiency at its core.
△ Less
Submitted 29 July, 2023;
originally announced August 2023.
-
Balancing Explainability-Accuracy of Complex Models
Authors:
Poushali Sengupta,
Yan Zhang,
Sabita Maharjan,
Frank Eliassen
Abstract:
Explainability of AI models is an important topic that can have a significant impact in all domains and applications from autonomous driving to healthcare. The existing approaches to explainable AI (XAI) are mainly limited to simple machine learning algorithms, and the research regarding the explainability-accuracy tradeoff is still in its infancy especially when we are concerned about complex mac…
▽ More
Explainability of AI models is an important topic that can have a significant impact in all domains and applications from autonomous driving to healthcare. The existing approaches to explainable AI (XAI) are mainly limited to simple machine learning algorithms, and the research regarding the explainability-accuracy tradeoff is still in its infancy especially when we are concerned about complex machine learning techniques like neural networks and deep learning (DL). In this work, we introduce a new approach for complex models based on the co-relation impact which enhances the explainability considerably while also ensuring the accuracy at a high level. We propose approaches for both scenarios of independent features and dependent features. In addition, we study the uncertainty associated with features and output. Furthermore, we provide an upper bound of the computation complexity of our proposed approach for the dependent features. The complexity bound depends on the order of logarithmic of the number of observations which provides a reliable result considering the higher dimension of dependent feature space with a smaller number of observations.
△ Less
Submitted 23 May, 2023;
originally announced May 2023.
-
Robust Model Predictive Techno-Economic Control of Active Distribution Networks
Authors:
Salish Maharjan,
Prashant Tiwari,
Rui Cheng,
Zhaoyu Wang
Abstract:
Stochastic controllers are perceived as a promising solution for techno-economic operation of distribution networks having higher generation uncertainties at large penetration of renewables. These controllers are supported by forecasters capable of predicting generation uncertainty by means of lower/upper bounds rather than by probability density function (PDF). Hence, the stochastic controller as…
▽ More
Stochastic controllers are perceived as a promising solution for techno-economic operation of distribution networks having higher generation uncertainties at large penetration of renewables. These controllers are supported by forecasters capable of predicting generation uncertainty by means of lower/upper bounds rather than by probability density function (PDF). Hence, the stochastic controller assumes a suitable PDF for scenario creation and optimization, requiring validation of the assumption. To effectively bridge the forecaster's capability and resolve the assumption issues, the paper proposes a robust model prediction-based techno-economic controller, which essentially utilizes only the lower/upper bounds of the forecast, eliminating the necessity of PDF. Both discrete and continuous control resources such as tap-changers and DERs are utilized for regulating the lower/upper bounds of the network states and robustly minimizing the cost of energy import. The proposed controller is implemented for UKGDS network and validated by comparing performance at various confidence levels of lower/upper bound forecast.
△ Less
Submitted 5 May, 2023;
originally announced May 2023.
-
Generalized Analytical Estimation of Sensitivity Matrices in Unbalanced Distribution Networks
Authors:
Salish Maharjan,
Rui Cheng,
Zhaoyu Wang
Abstract:
Fast and accurate estimation of sensitivity matrices is significant for the enhancement of distribution system modeling and automation. Analytical estimations have mainly focused on voltage magnitude sensitivity to active/reactive power injections for unbalance networks with Wye-connected loads and neglecting DERs' smart inverter functionality. Hence, this paper enhances the scope of analytical es…
▽ More
Fast and accurate estimation of sensitivity matrices is significant for the enhancement of distribution system modeling and automation. Analytical estimations have mainly focused on voltage magnitude sensitivity to active/reactive power injections for unbalance networks with Wye-connected loads and neglecting DERs' smart inverter functionality. Hence, this paper enhances the scope of analytical estimation of sensitivity matrices for unbalanced networks with 1-phase, 2-phase, and 3-phase Delta/Wye-connected loads, DERs with smart inverter functionality, and substation/line step-voltage regulators (SVR). A composite bus model comprising of DER, Delta- and Wye-connected load is proposed to represent a generic distribution bus, which can be simplified to load, PV, or voltage-controlled bus as required. The proposed matrix-based analytical method consolidates voltage magnitude and angle sensitivity to active/reactive power injection and tap-position of all SVRs into a single algorithm. Extensive case studies on IEEE networks show the accuracy and wide scope of the proposed algorithm compared to the existing benchmark method.
△ Less
Submitted 19 April, 2023;
originally announced April 2023.
-
Scalable Prompt Generation for Semi-supervised Learning with Language Models
Authors:
Yuhang Zhou,
Suraj Maharjan,
Beiye Liu
Abstract:
Prompt-based learning methods in semi-supervised learning (SSL) settings have been shown to be effective on multiple natural language understanding (NLU) datasets and tasks in the literature. However, manually designing multiple prompts and verbalizers requires domain knowledge and human effort, making it difficult and expensive to scale across different datasets. In this paper, we propose two met…
▽ More
Prompt-based learning methods in semi-supervised learning (SSL) settings have been shown to be effective on multiple natural language understanding (NLU) datasets and tasks in the literature. However, manually designing multiple prompts and verbalizers requires domain knowledge and human effort, making it difficult and expensive to scale across different datasets. In this paper, we propose two methods to automatically design multiple prompts and integrate automatic verbalizer in SSL settings without sacrificing performance. The first method uses various demonstration examples with learnable continuous prompt tokens to create diverse prompt models. The second method uses a varying number of soft prompt tokens to encourage language models to learn different prompts. For the verbalizer, we use the prototypical verbalizer to replace the manual one. In summary, we obtained the best average accuracy of 73.2% (a relative improvement of 2.52% over even the previous state-of-the-art SSL method with manual prompts and verbalizers) in different few-shot learning settings.
△ Less
Submitted 18 February, 2023;
originally announced February 2023.
-
Automatic Self-Adaptive Local Voltage Control Under Limited Reactive Power
Authors:
Rui Cheng,
Naihao Shi,
Salish Maharjan,
Zhaoyu Wang
Abstract:
The increasing proliferation of distributed energy resources has posed new challenges to Volt/VAr control problems in distribution networks. To this end, this paper proposes an automatic self-adaptive local voltage control (ASALVC) by locally controlling VAr outputs of distributed energy resources. In this ASALVC strategy, each bus agent can locally and dynamically adjust its voltage droop functio…
▽ More
The increasing proliferation of distributed energy resources has posed new challenges to Volt/VAr control problems in distribution networks. To this end, this paper proposes an automatic self-adaptive local voltage control (ASALVC) by locally controlling VAr outputs of distributed energy resources. In this ASALVC strategy, each bus agent can locally and dynamically adjust its voltage droop function in accordance with time-varying system changes. The voltage droop function is associated with the bus-specific time-varying slope and intercept, which can be locally updated, merely based on local voltage measurements, without requiring communication. Stability, convergence, and optimality properties of this local voltage control are analytically established. In addition, the online implementation of ASALVC is further proposed to address the real-time system changes by adjusting VAr outputs of DERs online. Numerical test cases are performed to validate and demonstrate the effectiveness and superiority of ASALVC.
△ Less
Submitted 1 October, 2022; v1 submitted 18 June, 2022;
originally announced June 2022.
-
Low-latency Federated Learning and Blockchain for Edge Association in Digital Twin empowered 6G Networks
Authors:
Yunlong Lu,
Xiaohong Huang,
Ke Zhang,
Sabita Maharjan,
Yan Zhang
Abstract:
Emerging technologies such as digital twins and 6th Generation mobile networks (6G) have accelerated the realization of edge intelligence in Industrial Internet of Things (IIoT). The integration of digital twin and 6G bridges the physical system with digital space and enables robust instant wireless connectivity. With increasing concerns on data privacy, federated learning has been regarded as a p…
▽ More
Emerging technologies such as digital twins and 6th Generation mobile networks (6G) have accelerated the realization of edge intelligence in Industrial Internet of Things (IIoT). The integration of digital twin and 6G bridges the physical system with digital space and enables robust instant wireless connectivity. With increasing concerns on data privacy, federated learning has been regarded as a promising solution for deploying distributed data processing and learning in wireless networks. However, unreliable communication channels, limited resources, and lack of trust among users, hinder the effective application of federated learning in IIoT. In this paper, we introduce the Digital Twin Wireless Networks (DTWN) by incorporating digital twins into wireless networks, to migrate real-time data processing and computation to the edge plane. Then, we propose a blockchain empowered federated learning framework running in the DTWN for collaborative computing, which improves the reliability and security of the system, and enhances data privacy. Moreover, to balance the learning accuracy and time cost of the proposed scheme, we formulate an optimization problem for edge association by jointly considering digital twin association, training data batch size, and bandwidth allocation. We exploit multi-agent reinforcement learning to find an optimal solution to the problem. Numerical results on real-world dataset show that the proposed scheme yields improved efficiency and reduced cost compared to benchmark learning method.
△ Less
Submitted 16 November, 2020;
originally announced November 2020.
-
Deep Reinforcement Learning and Permissioned Blockchain for Content Caching in Vehicular Edge Computing and Networks
Authors:
Yueyue Dai,
Du Xu,
Ke Zhang,
Sabita Maharjan,
Yan Zhang
Abstract:
Vehicular Edge Computing (VEC) is a promising paradigm to enable huge amount of data and multimedia content to be cached in proximity to vehicles. However, high mobility of vehicles and dynamic wireless channel condition make it challenge to design an optimal content caching policy. Further, with much sensitive personal information, vehicles may be not willing to caching their contents to an untru…
▽ More
Vehicular Edge Computing (VEC) is a promising paradigm to enable huge amount of data and multimedia content to be cached in proximity to vehicles. However, high mobility of vehicles and dynamic wireless channel condition make it challenge to design an optimal content caching policy. Further, with much sensitive personal information, vehicles may be not willing to caching their contents to an untrusted caching provider. Deep Reinforcement Learning (DRL) is an emerging technique to solve the problem with high-dimensional and time-varying features. Permission blockchain is able to establish a secure and decentralized peer-to-peer transaction environment. In this paper, we integrate DRL and permissioned blockchain into vehicular networks for intelligent and secure content caching. We first propose a blockchain empowered distributed content caching framework where vehicles perform content caching and base stations maintain the permissioned blockchain. Then, we exploit the advanced DRL approach to design an optimal content caching scheme with taking mobility into account. Finally, we propose a new block verifier selection method, Proof-of-Utility (PoU), to accelerate block verification process. Security analysis shows that our proposed blockchain empowered content caching can achieve security and privacy protection. Numerical results based on a real dataset from Uber indicate that the DRL-inspired content caching scheme significantly outperforms two benchmark policies.
△ Less
Submitted 19 November, 2020; v1 submitted 17 November, 2020;
originally announced November 2020.
-
Edge Intelligence for Energy-efficient Computation Offloading and Resource Allocation in 5G Beyond
Authors:
Yueyue Dai,
Ke Zhang,
Sabita Maharjan,
Yan Zhang
Abstract:
5G beyond is an end-edge-cloud orchestrated network that can exploit heterogeneous capabilities of the end devices, edge servers, and the cloud and thus has the potential to enable computation-intensive and delay-sensitive applications via computation offloading. However, in multi user wireless networks, diverse application requirements and the possibility of various radio access modes for communi…
▽ More
5G beyond is an end-edge-cloud orchestrated network that can exploit heterogeneous capabilities of the end devices, edge servers, and the cloud and thus has the potential to enable computation-intensive and delay-sensitive applications via computation offloading. However, in multi user wireless networks, diverse application requirements and the possibility of various radio access modes for communication among devices make it challenging to design an optimal computation offloading scheme. In addition, having access to complete network information that includes variables such as wireless channel state, and available bandwidth and computation resources, is a major issue. Deep Reinforcement Learning (DRL) is an emerging technique to address such an issue with limited and less accurate network information. In this paper, we utilize DRL to design an optimal computation offloading and resource allocation strategy for minimizing system energy consumption. We first present a multi-user end-edge-cloud orchestrated network where all devices and base stations have computation capabilities. Then, we formulate the joint computation offloading and resource allocation problem as a Markov Decision Process (MDP) and propose a new DRL algorithm to minimize system energy consumption. Numerical results based on a real-world dataset demonstrate that the proposed DRL-based algorithm significantly outperforms the benchmark policies in terms of system energy consumption. Extensive simulations show that learning rate, discount factor, and number of devices have considerable influence on the performance of the proposed algorithm.
△ Less
Submitted 17 November, 2020; v1 submitted 17 November, 2020;
originally announced November 2020.
-
Deep Reinforcement Learning for Stochastic Computation Offloading in Digital Twin Networks
Authors:
Yueyue Dai,
Ke Zhang,
Sabita Maharjan,
Yan Zhang
Abstract:
The rapid development of Industrial Internet of Things (IIoT) requires industrial production towards digitalization to improve network efficiency. Digital Twin is a promising technology to empower the digital transformation of IIoT by creating virtual models of physical objects. However, the provision of network efficiency in IIoT is very challenging due to resource-constrained devices, stochastic…
▽ More
The rapid development of Industrial Internet of Things (IIoT) requires industrial production towards digitalization to improve network efficiency. Digital Twin is a promising technology to empower the digital transformation of IIoT by creating virtual models of physical objects. However, the provision of network efficiency in IIoT is very challenging due to resource-constrained devices, stochastic tasks, and resources heterogeneity. Distributed resources in IIoT networks can be efficiently exploited through computation offloading to reduce energy consumption while enhancing data processing efficiency. In this paper, we first propose a new paradigm Digital Twin Networks (DTN) to build network topology and the stochastic task arrival model in IIoT systems. Then, we formulate the stochastic computation offloading and resource allocation problem to minimize the long-term energy efficiency. As the formulated problem is a stochastic programming problem, we leverage Lyapunov optimization technique to transform the original problem into a deterministic per-time slot problem. Finally, we present Asynchronous Actor-Critic (AAC) algorithm to find the optimal stochastic computation offloading policy. Illustrative results demonstrate that our proposed scheme is able to significantly outperforms the benchmarks.
△ Less
Submitted 17 November, 2020; v1 submitted 17 November, 2020;
originally announced November 2020.
-
Edge Intelligence Empowered UAVs for Automated Wind Farm Monitoring in Smart Grids
Authors:
Hwei-Ming Chung,
Sabita Maharjan,
Yan Zhang,
Frank Eliassen,
Tingting Yuan
Abstract:
With the exploitation of wind power, more turbines will be deployed at remote areas possibly with harsh working conditions (e.g., offshore wind farm). The adverse working environment may lead to massive operating and maintenance costs of turbines. Deploying unmanned aerial vehicles (UAVs) for turbine inspection is considered as a viable alternative to manual inspections. An important objective of…
▽ More
With the exploitation of wind power, more turbines will be deployed at remote areas possibly with harsh working conditions (e.g., offshore wind farm). The adverse working environment may lead to massive operating and maintenance costs of turbines. Deploying unmanned aerial vehicles (UAVs) for turbine inspection is considered as a viable alternative to manual inspections. An important objective of automated UAV inspection is to minimize the flight time of the UAVs to inspect all the turbines. A first contribution of this paper is thus formulating an optimization problem to compute the optimal routes for turbine inspection satisfying the above goal. On the other hand, the limited computational capability on UAVs can be used to increase the power generation of wind turbine. Power generation from the turbines can be optimized by controlling the yaw angle of the turbines. Forecasting wind conditions such as wind speed and wind direction is crucial for solving both optimization problems. Therefore, UAVs can utilize their limited computational capability to perform wind forecasting. In this way, UAVs form edge intelligence in offshore wind farm. With the forecasted wind conditions, we design two algorithms to solve the formulated problems, and then evaluate the proposed methods with realworld data. The results reveal that the proposed methods offer an improvement of 44% of the power generation from the turbine compared to hour-ahead forecasting and 25% reduction of the flight time of the UAVs compared to the chosen baseline method.
△ Less
Submitted 23 September, 2020;
originally announced September 2020.
-
C1 at SemEval-2020 Task 9: SentiMix: Sentiment Analysis for Code-Mixed Social Media Text using Feature Engineering
Authors:
Laksh Advani,
Clement Lu,
Suraj Maharjan
Abstract:
In today's interconnected and multilingual world, code-mixing of languages on social media is a common occurrence. While many Natural Language Processing (NLP) tasks like sentiment analysis are mature and well designed for monolingual text, techniques to apply these tasks to code-mixed text still warrant exploration. This paper describes our feature engineering approach to sentiment analysis in co…
▽ More
In today's interconnected and multilingual world, code-mixing of languages on social media is a common occurrence. While many Natural Language Processing (NLP) tasks like sentiment analysis are mature and well designed for monolingual text, techniques to apply these tasks to code-mixed text still warrant exploration. This paper describes our feature engineering approach to sentiment analysis in code-mixed social media text for SemEval-2020 Task 9: SentiMix. We tackle this problem by leveraging a set of hand-engineered lexical, sentiment, and metadata features to design a classifier that can disambiguate between "positive", "negative" and "neutral" sentiment. With this model, we are able to obtain a weighted F1 score of 0.65 for the "Hinglish" task and 0.63 for the "Spanglish" tasks
△ Less
Submitted 8 August, 2020;
originally announced August 2020.
-
IoT Based Smart Home using Blynk Framework
Authors:
Bharat Bohara,
Sunil Maharjan,
Bibek Raj Shrestha
Abstract:
The project discussed in this paper is targeted at solving sundry problems faced by Nepalese people in their daily life. It is designed to control and monitor appliances via smartphone using Wi-Fi as communication protocol and raspberry pi as private server. All the appliances and sensors are connected to the internet via NodeMcu microcontroller, which serves as the gateway to the internet. Even i…
▽ More
The project discussed in this paper is targeted at solving sundry problems faced by Nepalese people in their daily life. It is designed to control and monitor appliances via smartphone using Wi-Fi as communication protocol and raspberry pi as private server. All the appliances and sensors are connected to the internet via NodeMcu microcontroller, which serves as the gateway to the internet. Even if the user goes offline, the system is designed to switch to automated state controlling the appliances automatically as per the sensors readings. Also, the data are logged on to the server for future data mining. The core system of this project is adopted from the Blynk framework.
△ Less
Submitted 27 July, 2020;
originally announced July 2020.
-
Distributed Deep Reinforcement Learning for Intelligent Load Scheduling in Residential Smart Grids
Authors:
Hwei-Ming Chung,
Sabita Maharjan,
Yan Zhang,
Frank Eliassen
Abstract:
The power consumption of households has been constantly growing over the years. To cope with this growth, intelligent management of the consumption profile of the households is necessary, such that the households can save the electricity bills, and the stress to the power grid during peak hours can be reduced. However, implementing such a method is challenging due to the existence of randomness in…
▽ More
The power consumption of households has been constantly growing over the years. To cope with this growth, intelligent management of the consumption profile of the households is necessary, such that the households can save the electricity bills, and the stress to the power grid during peak hours can be reduced. However, implementing such a method is challenging due to the existence of randomness in the electricity price and the consumption of the appliances. To address this challenge, we employ a model-free method for the households which works with limited information about the uncertain factors. More specifically, the interactions between households and the power grid can be modeled as a non-cooperative stochastic game, where the electricity price is viewed as a stochastic variable. To search for the Nash equilibrium (NE) of the game, we adopt a method based on distributed deep reinforcement learning. Also, the proposed method can preserve the privacy of the households. We then utilize real-world data from Pecan Street Inc., which contains the power consumption profile of more than 1; 000 households, to evaluate the performance of the proposed method. In average, the results reveal that we can achieve around 12% reduction on peak-to-average ratio (PAR) and 11% reduction on load variance. With this approach, the operation cost of the power grid and the electricity cost of the households can be reduced.
△ Less
Submitted 29 June, 2020;
originally announced June 2020.
-
Intelligent Charging Management of Electric Vehicles Considering Dynamic User Behavior and Renewable Energy: A Stochastic Game Approach
Authors:
Hwei-Ming Chung,
Sabita Maharjan,
Yan Zhang,
Frank Eliassen
Abstract:
Uncoordinated charging of a rapidly growing number of electric vehicles (EVs) and the uncertainty associated with renewable energy resources may constitute a critical issue for the electric mobility (E-Mobility) in the transportation system especially during peak hours. To overcome this dire scenario, we introduce a stochastic game to study the complex interactions between the power grid and charg…
▽ More
Uncoordinated charging of a rapidly growing number of electric vehicles (EVs) and the uncertainty associated with renewable energy resources may constitute a critical issue for the electric mobility (E-Mobility) in the transportation system especially during peak hours. To overcome this dire scenario, we introduce a stochastic game to study the complex interactions between the power grid and charging stations. In this context, existing studies have not taken into account the dynamics of customers' preference on charging parameters. In reality, however, the choice of the charging parameters may vary over time, as the customers may change their charging preferences. We model this behavior of customers with another stochastic game. Moreover, we define a quality of service (QoS) index to reflect how the charging process influences customers' choices on charging parameters. We also develop an online algorithm to reach the Nash equilibria for both stochastic games. Then, we utilize real data from the California Independent System Operator (CAISO) to evaluate the performance of our proposed algorithm. The results reveal that the electricity cost with the proposed method can result in a saving of about 20% compared to the benchmark method, while also yielding a higher QoS in terms of charging and waiting time. Our results can be employed as guidelines for charging service providers to make efficient decisions under uncertainty relative to power generation of renewable energy.
△ Less
Submitted 29 June, 2020;
originally announced June 2020.
-
Placement and Routing Optimization for Automated Inspection with UAVs: A Study in Offshore Wind Farm
Authors:
Hwei-Ming Chung,
Sabita Maharjan,
Yan Zhang,
Frank Eliassen,
Kai Strunz
Abstract:
Wind power is a clean and widely deployed alternative to reducing our dependence on fossil fuel power generation. Under this trend, more turbines will be installed in wind farms. However, the inspection of the turbines in an offshore wind farm is a challenging task because of the harsh environment (e.g., rough sea, strong wind, and so on) that leads to high risk for workers who need to work at con…
▽ More
Wind power is a clean and widely deployed alternative to reducing our dependence on fossil fuel power generation. Under this trend, more turbines will be installed in wind farms. However, the inspection of the turbines in an offshore wind farm is a challenging task because of the harsh environment (e.g., rough sea, strong wind, and so on) that leads to high risk for workers who need to work at considerable height. Also, inspecting increasing number of turbines requires long man hours. In this regard, unmanned aerial vehicles (UAVs) can play an important role for automated inspection of the turbines for the operator, thus reducing the inspection time, man hours, and correspondingly the risk for the workers. In this case, the optimal number of UAVs enough to inspect all turbines in the wind farm is a crucial parameter. In addition, finding the optimal path for the UAVs' routes for inspection is also important and is equally challenging. In this paper, we formulate a placement optimization problem to minimize the number of UAVs in the wind farm and a routing optimization problem to minimize the inspection time. Wind has an impact on the flying range and the flying speed of UAVs, which is taken into account for both problems. The formulated problems are NP-hard. We therefore design heuristic algorithms to find solutions to both problems, and then analyze the complexity of the proposed algorithms. The data of the Walney wind farm are then utilized to evaluate the performance of the proposed algorithms. Simulation results clearly show that the proposed methods can obtain the optimal routing path for UAVs during the inspection.
△ Less
Submitted 17 June, 2020; v1 submitted 15 June, 2020;
originally announced June 2020.
-
Student Engagement Detection Using Emotion Analysis, Eye Tracking and Head Movement with Machine Learning
Authors:
Prabin Sharma,
Shubham Joshi,
Subash Gautam,
Sneha Maharjan,
Salik Ram Khanal,
Manuel Cabral Reis,
João Barroso,
Vítor Manuel de Jesus Filipe
Abstract:
With the increase of distance learning, in general, and e-learning, in particular, having a system capable of determining the engagement of students is of primordial importance, and one of the biggest challenges, both for teachers, researchers and policy makers. Here, we present a system to detect the engagement level of the students. It uses only information provided by the typical built-in web-c…
▽ More
With the increase of distance learning, in general, and e-learning, in particular, having a system capable of determining the engagement of students is of primordial importance, and one of the biggest challenges, both for teachers, researchers and policy makers. Here, we present a system to detect the engagement level of the students. It uses only information provided by the typical built-in web-camera present in a laptop computer, and was designed to work in real time. We combine information about the movements of the eyes and head, and facial emotions to produce a concentration index with three classes of engagement: "very engaged", "nominally engaged" and "not engaged at all". The system was tested in a typical e-learning scenario, and the results show that it correctly identifies each period of time where students were "very engaged", "nominally engaged" and "not engaged at all". Additionally, the results also show that the students with best scores also have higher concentration indexes.
△ Less
Submitted 23 March, 2023; v1 submitted 18 September, 2019;
originally announced September 2019.
-
Performance Analysis of Spatial and Transform Filters for Efficient Image Noise Reduction
Authors:
Santosh Paudel,
Ajay Kumar Shrestha,
Pradip Singh Maharjan,
Rameshwar Rijal
Abstract:
During the acquisition of an image from its source, noise always becomes an integral part of it. Various algorithms have been used in past to denoise the images. Image denoising still has scope for improvement. Visual information transmitted in the form of digital images has become a considerable method of communication in the modern age, but the image obtained after the transmission is often corr…
▽ More
During the acquisition of an image from its source, noise always becomes an integral part of it. Various algorithms have been used in past to denoise the images. Image denoising still has scope for improvement. Visual information transmitted in the form of digital images has become a considerable method of communication in the modern age, but the image obtained after the transmission is often corrupted due to noise. In this paper, we review the existing denoising algorithms such as filtering approach and wavelets based approach and then perform their comparative study with bilateral filters. We use different noise models to describe additive and multiplicative noise in an image. Based on the samples of degraded pixel neighbourhoods as inputs, the output of an efficient filtering approach has shown a better image denoising performance. This yields promising qualitative and quantitative results of the degraded noisy images in terms of Peak Signal to Noise Ratio, Mean Square Error and Universal Quality Identifier.
△ Less
Submitted 13 September, 2019;
originally announced September 2019.
-
Vehicular Edge Computing and Networking: A Survey
Authors:
Lei Liu,
Chen Chen,
Qingqi Pei,
Sabita Maharjan,
Yan Zhang
Abstract:
As one key enabler of Intelligent Transportation System (ITS), Vehicular Ad Hoc Network (VANET) has received remarkable interest from academia and industry. The emerging vehicular applications and the exponential growing data have naturally led to the increased needs of communication, computation and storage resources, and also to strict performance requirements on response time and network bandwi…
▽ More
As one key enabler of Intelligent Transportation System (ITS), Vehicular Ad Hoc Network (VANET) has received remarkable interest from academia and industry. The emerging vehicular applications and the exponential growing data have naturally led to the increased needs of communication, computation and storage resources, and also to strict performance requirements on response time and network bandwidth. In order to deal with these challenges, Mobile Edge Computing (MEC) is regarded as a promising solution. MEC pushes powerful computational and storage capacities from the remote cloud to the edge of networks in close proximity of vehicular users, which enables low latency and reduced bandwidth consumption. Driven by the benefits of MEC, many efforts have been devoted to integrating vehicular networks into MEC, thereby forming a novel paradigm named as Vehicular Edge Computing (VEC). In this paper, we provide a comprehensive survey of state-of-art research on VEC. First of all, we provide an overview of VEC, including the introduction, architecture, key enablers, advantages, challenges as well as several attractive application scenarios. Then, we describe several typical research topics where VEC is applied. After that, we present a careful literature review on existing research work in VEC by classification. Finally, we identify open research issues and discuss future research directions.
△ Less
Submitted 25 July, 2019;
originally announced August 2019.
-
A Multi-task Approach for Named Entity Recognition in Social Media Data
Authors:
Gustavo Aguilar,
Suraj Maharjan,
Adrian Pastor López-Monroy,
Thamar Solorio
Abstract:
Named Entity Recognition for social media data is challenging because of its inherent noisiness. In addition to improper grammatical structures, it contains spelling inconsistencies and numerous informal abbreviations. We propose a novel multi-task approach by employing a more general secondary task of Named Entity (NE) segmentation together with the primary task of fine-grained NE categorization.…
▽ More
Named Entity Recognition for social media data is challenging because of its inherent noisiness. In addition to improper grammatical structures, it contains spelling inconsistencies and numerous informal abbreviations. We propose a novel multi-task approach by employing a more general secondary task of Named Entity (NE) segmentation together with the primary task of fine-grained NE categorization. The multi-task neural network architecture learns higher order feature representations from word and character sequences along with basic Part-of-Speech tags and gazetteer information. This neural network acts as a feature extractor to feed a Conditional Random Fields classifier. We were able to obtain the first position in the 3rd Workshop on Noisy User-generated Text (WNUT-2017) with a 41.86% entity F1-score and a 40.24% surface F1-score.
△ Less
Submitted 10 June, 2019;
originally announced June 2019.
-
A Study on the Characteristics of Douyin Short Videos and Implications for Edge Caching
Authors:
Zhuang Chen,
Qian He,
Zhifei Mao,
Hwei-Ming Chung,
Sabita Maharjan
Abstract:
Douyin, internationally known as TikTok, has become one of the most successful short-video platforms. To maintain its popularity, Douyin has to provide better Quality of Experience (QoE) to its growing user base. Understanding the characteristics of Douyin videos is thus critical to its service improvement and system design. In this paper, we present an initial study on the fundamental characteris…
▽ More
Douyin, internationally known as TikTok, has become one of the most successful short-video platforms. To maintain its popularity, Douyin has to provide better Quality of Experience (QoE) to its growing user base. Understanding the characteristics of Douyin videos is thus critical to its service improvement and system design. In this paper, we present an initial study on the fundamental characteristics of Douyin videos based on a dataset of over 260 thousand short videos collected across three months. The characteristics of Douyin videos are found to be significantly different from traditional online videos, ranging from video bitrate, size, to popularity. In particular, the distributions of the bitrate and size of videos follow Weibull distribution. We further observe that the most popular Douyin videos follow Zifp's law on video popularity, but the rest of the videos do not. We also investigate the correlation between popularity metrics used for Douyin videos. It is found that the correlation between the number of views and the number of likes are strong, while other correlations are relatively low. Finally, by using a case study, we demonstrate that the above findings can provide important guidance on designing an efficient edge caching system.
△ Less
Submitted 29 March, 2019;
originally announced March 2019.
-
Folksonomication: Predicting Tags for Movies from Plot Synopses Using Emotion Flow Encoded Neural Network
Authors:
Sudipta Kar,
Suraj Maharjan,
Thamar Solorio
Abstract:
Folksonomy of movies covers a wide range of heterogeneous information about movies, like the genre, plot structure, visual experiences, soundtracks, metadata, and emotional experiences from watching a movie. Being able to automatically generate or predict tags for movies can help recommendation engines improve retrieval of similar movies, and help viewers know what to expect from a movie in advanc…
▽ More
Folksonomy of movies covers a wide range of heterogeneous information about movies, like the genre, plot structure, visual experiences, soundtracks, metadata, and emotional experiences from watching a movie. Being able to automatically generate or predict tags for movies can help recommendation engines improve retrieval of similar movies, and help viewers know what to expect from a movie in advance. In this work, we explore the problem of creating tags for movies from plot synopses. We propose a novel neural network model that merges information from synopses and emotion flows throughout the plots to predict a set of tags for movies. We compare our system with multiple baselines and found that the addition of emotion flows boosts the performance of the network by learning ~18\% more tags than a traditional machine learning system.
△ Less
Submitted 14 August, 2018;
originally announced August 2018.
-
Joint Offloading and Resource Allocation in Vehicular Edge Computing and Networks
Authors:
Yueyue Dai,
Du Xu,
Sabita Maharjan,
Yan Zhang
Abstract:
The emergence of computation intensive on-vehicle applications poses a significant challenge to provide the required computation capacity and maintain high performance. Vehicular Edge Computing (VEC) is a new computing paradigm with a high potential to improve vehicular services by offloading computation-intensive tasks to the VEC servers. Nevertheless, as the computation resource of each VEC serv…
▽ More
The emergence of computation intensive on-vehicle applications poses a significant challenge to provide the required computation capacity and maintain high performance. Vehicular Edge Computing (VEC) is a new computing paradigm with a high potential to improve vehicular services by offloading computation-intensive tasks to the VEC servers. Nevertheless, as the computation resource of each VEC server is limited, offloading may not be efficient if all vehicles select the same VEC server to offload their tasks. To address this problem, in this paper, we propose offloading with resource allocation. We incorporate the communication and computation to derive the task processing delay. We formulate the problem as a system utility maximization problem, and then develop a low-complexity algorithm to jointly optimize offloading decision and resource allocation. Numerical results demonstrate the superior performance of our Joint Optimization of Selection and Computation (JOSC) algorithm compared to state of the art solutions.
△ Less
Submitted 23 July, 2018;
originally announced July 2018.
-
Letting Emotions Flow: Success Prediction by Modeling the Flow of Emotions in Books
Authors:
Suraj Maharjan,
Sudipta Kar,
Manuel Montes-y-Gomez,
Fabio A. Gonzalez,
Thamar Solorio
Abstract:
Books have the power to make us feel happiness, sadness, pain, surprise, or sorrow. An author's dexterity in the use of these emotions captivates readers and makes it difficult for them to put the book down. In this paper, we model the flow of emotions over a book using recurrent neural networks and quantify its usefulness in predicting success in books. We obtained the best weighted F1-score of 6…
▽ More
Books have the power to make us feel happiness, sadness, pain, surprise, or sorrow. An author's dexterity in the use of these emotions captivates readers and makes it difficult for them to put the book down. In this paper, we model the flow of emotions over a book using recurrent neural networks and quantify its usefulness in predicting success in books. We obtained the best weighted F1-score of 69% for predicting books' success in a multitask setting (simultaneously predicting success and genre of books).
△ Less
Submitted 24 May, 2018; v1 submitted 24 May, 2018;
originally announced May 2018.
-
MPST: A Corpus of Movie Plot Synopses with Tags
Authors:
Sudipta Kar,
Suraj Maharjan,
A. Pastor López-Monroy,
Thamar Solorio
Abstract:
Social tagging of movies reveals a wide range of heterogeneous information about movies, like the genre, plot structure, soundtracks, metadata, visual and emotional experiences. Such information can be valuable in building automatic systems to create tags for movies. Automatic tagging systems can help recommendation engines to improve the retrieval of similar movies as well as help viewers to know…
▽ More
Social tagging of movies reveals a wide range of heterogeneous information about movies, like the genre, plot structure, soundtracks, metadata, visual and emotional experiences. Such information can be valuable in building automatic systems to create tags for movies. Automatic tagging systems can help recommendation engines to improve the retrieval of similar movies as well as help viewers to know what to expect from a movie in advance. In this paper, we set out to the task of collecting a corpus of movie plot synopses and tags. We describe a methodology that enabled us to build a fine-grained set of around 70 tags exposing heterogeneous characteristics of movie plots and the multi-label associations of these tags with some 14K movie plot synopses. We investigate how these tags correlate with movies and the flow of emotions throughout different types of movies. Finally, we use this corpus to explore the feasibility of inferring tags from plot synopses. We expect the corpus will be useful in other tasks where analysis of narratives is relevant.
△ Less
Submitted 22 February, 2018; v1 submitted 21 February, 2018;
originally announced February 2018.
-
Deep Learning for Secure Mobile Edge Computing
Authors:
Yuanfang Chen,
Yan Zhang,
Sabita Maharjan
Abstract:
Mobile edge computing (MEC) is a promising approach for enabling cloud-computing capabilities at the edge of cellular networks. Nonetheless, security is becoming an increasingly important issue in MEC-based applications. In this paper, we propose a deep-learning-based model to detect security threats. The model uses unsupervised learning to automate the detection process, and uses location informa…
▽ More
Mobile edge computing (MEC) is a promising approach for enabling cloud-computing capabilities at the edge of cellular networks. Nonetheless, security is becoming an increasingly important issue in MEC-based applications. In this paper, we propose a deep-learning-based model to detect security threats. The model uses unsupervised learning to automate the detection process, and uses location information as an important feature to improve the performance of detection. Our proposed model can be used to detect malicious applications at the edge of a cellular network, which is a serious security threat. Extensive experiments are carried out with 10 different datasets, the results of which illustrate that our deep-learning-based model achieves an average gain of 6% accuracy compared with state-of-the-art machine learning algorithms.
△ Less
Submitted 23 September, 2017;
originally announced September 2017.
-
Social Computing for Mobile Big Data in Wireless Networks
Authors:
Xing Zhang,
Zhenglei Yi,
Zhi Yan,
Geyong Min,
Wenbo Wang,
Sabita Maharjan,
Yan Zhang
Abstract:
Mobile big data contains vast statistical features in various dimensions, including spatial, temporal, and the underlying social domain. Understanding and exploiting the features of mobile data from a social network perspective will be extremely beneficial to wireless networks, from planning, operation, and maintenance to optimization and marketing. In this paper, we categorize and analyze the big…
▽ More
Mobile big data contains vast statistical features in various dimensions, including spatial, temporal, and the underlying social domain. Understanding and exploiting the features of mobile data from a social network perspective will be extremely beneficial to wireless networks, from planning, operation, and maintenance to optimization and marketing. In this paper, we categorize and analyze the big data collected from real wireless cellular networks. Then, we study the social characteristics of mobile big data and highlight several research directions for mobile big data in the social computing areas.
△ Less
Submitted 30 September, 2016;
originally announced September 2016.