-
WeedNet: A Foundation Model-Based Global-to-Local AI Approach for Real-Time Weed Species Identification and Classification
Authors:
Yanben Shen,
Timilehin T. Ayanlade,
Venkata Naresh Boddepalli,
Mojdeh Saadati,
Ashlyn Rairdin,
Zi K. Deng,
Muhammad Arbab Arshad,
Aditya Balu,
Daren Mueller,
Asheesh K Singh,
Wesley Everman,
Nirav Merchant,
Baskar Ganapathysubramanian,
Meaghan Anderson,
Soumik Sarkar,
Arti Singh
Abstract:
Early identification of weeds is essential for effective management and control, and there is growing interest in automating the process using computer vision techniques coupled with AI methods. However, challenges associated with training AI-based weed identification models, such as limited expert-verified data and complexity and variability in morphological features, have hindered progress. To a…
▽ More
Early identification of weeds is essential for effective management and control, and there is growing interest in automating the process using computer vision techniques coupled with AI methods. However, challenges associated with training AI-based weed identification models, such as limited expert-verified data and complexity and variability in morphological features, have hindered progress. To address these issues, we present WeedNet, the first global-scale weed identification model capable of recognizing an extensive set of weed species, including noxious and invasive plant species. WeedNet is an end-to-end real-time weed identification pipeline and uses self-supervised learning, fine-tuning, and enhanced trustworthiness strategies. WeedNet achieved 91.02% accuracy across 1,593 weed species, with 41% species achieving 100% accuracy. Using a fine-tuning strategy and a Global-to-Local approach, the local Iowa WeedNet model achieved an overall accuracy of 97.38% for 85 Iowa weeds, most classes exceeded a 90% mean accuracy per class. Testing across intra-species dissimilarity (developmental stages) and inter-species similarity (look-alike species) suggests that diversity in the images collected, spanning all the growth stages and distinguishable plant characteristics, is crucial in driving model performance. The generalizability and adaptability of the Global WeedNet model enable it to function as a foundational model, with the Global-to-Local strategy allowing fine-tuning for region-specific weed communities. Additional validation of drone- and ground-rover-based images highlights the potential of WeedNet for integration into robotic platforms. Furthermore, integration with AI for conversational use provides intelligent agricultural and ecological conservation consulting tools for farmers, agronomists, researchers, land managers, and government agencies across diverse landscapes.
△ Less
Submitted 24 May, 2025;
originally announced May 2025.
-
A Semi Black-Box Adversarial Bit-Flip Attack with Limited DNN Model Information
Authors:
Behnam Ghavami,
Mani Sadati,
Mohammad Shahidzadeh,
Lesley Shannon,
Steve Wilton
Abstract:
Despite the rising prevalence of deep neural networks (DNNs) in cyber-physical systems, their vulnerability to adversarial bit-flip attacks (BFAs) is a noteworthy concern. This paper proposes B3FA, a semi-black-box BFA-based parameter attack on DNNs, assuming the adversary has limited knowledge about the model. We consider practical scenarios often feature a more restricted threat model for real-w…
▽ More
Despite the rising prevalence of deep neural networks (DNNs) in cyber-physical systems, their vulnerability to adversarial bit-flip attacks (BFAs) is a noteworthy concern. This paper proposes B3FA, a semi-black-box BFA-based parameter attack on DNNs, assuming the adversary has limited knowledge about the model. We consider practical scenarios often feature a more restricted threat model for real-world systems, contrasting with the typical BFA models that presuppose the adversary's full access to a network's inputs and parameters. The introduced bit-flip approach utilizes a magnitude-based ranking method and a statistical re-construction technique to identify the vulnerable bits. We demonstrate the effectiveness of B3FA on several DNN models in a semi-black-box setting. For example, B3FA could drop the accuracy of a MobileNetV2 from 69.84% to 9% with only 20 bit-flips in a real-world setting.
△ Less
Submitted 12 December, 2024;
originally announced December 2024.
-
Learning-Based Autonomous Navigation, Benchmark Environments and Simulation Framework for Endovascular Interventions
Authors:
Lennart Karstensen,
Harry Robertshaw,
Johannes Hatzl,
Benjamin Jackson,
Jens Langejürgen,
Katharina Breininger,
Christian Uhl,
S. M. Hadi Sadati,
Thomas Booth,
Christos Bergeles,
Franziska Mathis-Ullrich
Abstract:
Endovascular interventions are a life-saving treatment for many diseases, yet suffer from drawbacks such as radiation exposure and potential scarcity of proficient physicians. Robotic assistance during these interventions could be a promising support towards these problems. Research focusing on autonomous endovascular interventions utilizing artificial intelligence-based methodologies is gaining p…
▽ More
Endovascular interventions are a life-saving treatment for many diseases, yet suffer from drawbacks such as radiation exposure and potential scarcity of proficient physicians. Robotic assistance during these interventions could be a promising support towards these problems. Research focusing on autonomous endovascular interventions utilizing artificial intelligence-based methodologies is gaining popularity. However, variability in assessment environments hinders the ability to compare and contrast the efficacy of different approaches, primarily due to each study employing a unique evaluation framework. In this study, we present deep reinforcement learning-based autonomous endovascular device navigation on three distinct digital benchmark interventions: BasicWireNav, ArchVariety, and DualDeviceNav. The benchmark interventions were implemented with our modular simulation framework stEVE (simulated EndoVascular Environment). Autonomous controllers were trained solely in simulation and evaluated in simulation and on physical test benches with camera and fluoroscopy feedback. Autonomous control for BasicWireNav and ArchVariety reached high success rates and was successfully transferred from the simulated training environment to the physical test benches, while autonomous control for DualDeviceNav reached a moderate success rate. The experiments demonstrate the feasibility of stEVE and its potential for transferring controllers trained in simulation to real-world scenarios. Nevertheless, they also reveal areas that offer opportunities for future research. This study demonstrates the transferability of autonomous controllers from simulation to the real world in endovascular navigation and lowers the entry barriers and increases the comparability of research on endovascular assistance systems by providing open-source training scripts, benchmarks and the stEVE framework.
△ Less
Submitted 2 October, 2024;
originally announced October 2024.
-
FlowBench: A Large Scale Benchmark for Flow Simulation over Complex Geometries
Authors:
Ronak Tali,
Ali Rabeh,
Cheng-Hau Yang,
Mehdi Shadkhah,
Samundra Karki,
Abhisek Upadhyaya,
Suriya Dhakshinamoorthy,
Marjan Saadati,
Soumik Sarkar,
Adarsh Krishnamurthy,
Chinmay Hegde,
Aditya Balu,
Baskar Ganapathysubramanian
Abstract:
Simulating fluid flow around arbitrary shapes is key to solving various engineering problems. However, simulating flow physics across complex geometries remains numerically challenging and computationally resource-intensive, particularly when using conventional PDE solvers. Machine learning methods offer attractive opportunities to create fast and adaptable PDE solvers. However, benchmark datasets…
▽ More
Simulating fluid flow around arbitrary shapes is key to solving various engineering problems. However, simulating flow physics across complex geometries remains numerically challenging and computationally resource-intensive, particularly when using conventional PDE solvers. Machine learning methods offer attractive opportunities to create fast and adaptable PDE solvers. However, benchmark datasets to measure the performance of such methods are scarce, especially for flow physics across complex geometries. We introduce FlowBench, a dataset for neural simulators with over 10K samples, which is currently larger than any publicly available flow physics dataset. FlowBench contains flow simulation data across complex geometries (\textit{parametric vs. non-parametric}), spanning a range of flow conditions (\textit{Reynolds number and Grashoff number}), capturing a diverse array of flow phenomena (\textit{steady vs. transient; forced vs. free convection}), and for both 2D and 3D. FlowBench contains over 10K data samples, with each sample the outcome of a fully resolved, direct numerical simulation using a well-validated simulator framework designed for modeling transport phenomena in complex geometries. For each sample, we include velocity, pressure, and temperature field data at 3 different resolutions and several summary statistics features of engineering relevance (such as coefficients of lift and drag, and Nusselt numbers). %Additionally, we include masks and signed distance fields for each shape. We envision that FlowBench will enable evaluating the interplay between complex geometry, coupled flow phenomena, and data sufficiency on the performance of current, and future, neural PDE solvers. We enumerate several evaluation metrics to help rank order the performance of neural PDE solvers. We benchmark the performance of several baseline methods including FNO, CNO, WNO, and DeepONet.
△ Less
Submitted 26 September, 2024;
originally announced September 2024.
-
Simulation study to evaluate when Plasmode simulation is superior to parametric simulation in estimating the mean squared error of the least squares estimator in linear regression
Authors:
Marieke Stolte,
Nicholas Schreck,
Alla Slynko,
Maral Saadati,
Axel Benner,
Jörg Rahnenführer,
Andrea Bommert
Abstract:
Simulation is a crucial tool for the evaluation and comparison of statistical methods. How to design fair and neutral simulation studies is therefore of great interest for researchers developing new methods and practitioners confronted with the choice of the most suitable method. The term simulation usually refers to parametric simulation, that is, computer experiments using artificial data made u…
▽ More
Simulation is a crucial tool for the evaluation and comparison of statistical methods. How to design fair and neutral simulation studies is therefore of great interest for researchers developing new methods and practitioners confronted with the choice of the most suitable method. The term simulation usually refers to parametric simulation, that is, computer experiments using artificial data made up of pseudo-random numbers. Plasmode simulation, that is, computer experiments using the combination of resampling feature data from a real-life dataset and generating the target variable with a known user-selected outcome-generating model (OGM), is an alternative that is often claimed to produce more realistic data. We compare parametric and Plasmode simulation for the example of estimating the mean squared error (MSE) of the least squares estimator (LSE) in linear regression. If the true underlying data-generating process (DGP) and the OGM were known, parametric simulation would obviously be the best choice in terms of estimating the MSE well. However, in reality, both are usually unknown, so researchers have to make assumptions: in Plasmode simulation for the OGM, in parametric simulation for both DGP and OGM. Most likely, these assumptions do not exactly reflect the truth. Here, we aim to find out how assumptions deviating from the true DGP and the true OGM affect the performance of parametric and Plasmode simulations in the context of MSE estimation for the LSE and in which situations which simulation type is preferable. Our results suggest that the preferable simulation method depends on many factors, including the number of features, and on how and to what extent the assumptions of a parametric simulation differ from the true DGP. Also, the resampling strategy used for Plasmode influences the results. In particular, subsampling with a small sampling proportion can be recommended.
△ Less
Submitted 16 December, 2024; v1 submitted 7 December, 2023;
originally announced December 2023.
-
Unveiling the Complexity of Neural Populations: Evaluating the Validity and Limitations of the Wilson-Cowan Model
Authors:
Maryam Saadati,
Saba Sadat Khodaei,
Yousef Jamali
Abstract:
The population model of Wilson-Cowan is perhaps the most popular in the history of computational neuroscience. It embraces the nonlinear mean field dynamics of excitatory and inhibitory neuronal populations provided via a temporal coarse-graining technique. The traditional Wilson-Cowan equations exhibit either steady-state regimes or else limit cycle competitions for an appropriate range of parame…
▽ More
The population model of Wilson-Cowan is perhaps the most popular in the history of computational neuroscience. It embraces the nonlinear mean field dynamics of excitatory and inhibitory neuronal populations provided via a temporal coarse-graining technique. The traditional Wilson-Cowan equations exhibit either steady-state regimes or else limit cycle competitions for an appropriate range of parameters. As these equations lower the resolution of the neural system and obscure vital information, we assess the validity of mass-type model approximations for complex neural behaviors. Using a large-scale network of Hodgkin-Huxley style neurons, we derive implicit average population dynamics based on mean field assumptions. Our comparison of the microscopic neural activity with the macroscopic temporal profiles reveals dependency on the binary state of interacting subpopulations and the random property of the structural network at the Hopf bifurcation points when different synaptic weights are considered. For substantial configurations of stimulus intensity, our model provides further estimates of the neural population's dynamics official, ranging from simple periodic to quasi-periodic and aperiodic patterns, as well as phase transition regimes. While this shows its great potential for studying the collective behavior of individual neurons particularly concentrating on the occurrence of bifurcation phenomena, we must accept a quite limited accuracy of the Wilson-Cowan approximations-at least in some parameter regimes. Additionally, we report that the complexity and temporal diversity of neural dynamics, especially in terms of limit cycle trajectory, and synchronization can be induced by either small heterogeneity in the degree of various types of local excitatory connectivity or considerable diversity in the external drive to the excitatory pool.
△ Less
Submitted 12 September, 2023;
originally announced September 2023.
-
LCPOM: Precise Reconstruction of Polarized Optical Microscopy Images of Liquid Crystals
Authors:
Chuqiao Chen,
Viviana Palacio-Betancur,
Sepideh Norouzi,
Pablo F. Zubieta Rico,
Monirosadat Sadati,
Stuart J. Rowan,
Juan J. de Pablo
Abstract:
When viewed with a cross-polarized optical microscope (POM), liquid crystals display interference colors and complex patterns that depend on the material's microscopic orientation. That orientation can be manipulated by application of external fields, which provides the basis for applications in optical display and sensing technologies. The color patterns themselves have a high information content…
▽ More
When viewed with a cross-polarized optical microscope (POM), liquid crystals display interference colors and complex patterns that depend on the material's microscopic orientation. That orientation can be manipulated by application of external fields, which provides the basis for applications in optical display and sensing technologies. The color patterns themselves have a high information content. Traditionally, however, calculations of the optical appearance of liquid crystals have been performed by assuming that a single-wavelength light source is employed, and reported in a monochromatic scale. In this work, the original Jones matrix method is extended to calculate the colored images that arise when a liquid crystal is exposed to a multi-wavelength source. By accounting for the material properties, the visible light spectrum and the CIE color matching functions, we demonstrate that the proposed approach produces colored POM images that are in quantitative agreement with experimental data. Results are presented for a variety of systems, including radial, bipolar, and cholesteric droplets, where results of simulations are compared to experimental microscopy images. The effects of droplet size, topological defect structure, and droplet orientation are examined systematically. The technique introduced here generates images that can be directly compared to experiments, thereby facilitating machine learning efforts aimed at interpreting LC microscopy images, and paving the way for the inverse design of materials capable of producing specific internal microstructures in response to external stimuli.
△ Less
Submitted 21 July, 2023;
originally announced July 2023.
-
Deep learning powered real-time identification of insects using citizen science data
Authors:
Shivani Chiranjeevi,
Mojdeh Sadaati,
Zi K Deng,
Jayanth Koushik,
Talukder Z Jubery,
Daren Mueller,
Matthew E O Neal,
Nirav Merchant,
Aarti Singh,
Asheesh K Singh,
Soumik Sarkar,
Arti Singh,
Baskar Ganapathysubramanian
Abstract:
Insect-pests significantly impact global agricultural productivity and quality. Effective management involves identifying the full insect community, including beneficial insects and harmful pests, to develop and implement integrated pest management strategies. Automated identification of insects under real-world conditions presents several challenges, including differentiating similar-looking spec…
▽ More
Insect-pests significantly impact global agricultural productivity and quality. Effective management involves identifying the full insect community, including beneficial insects and harmful pests, to develop and implement integrated pest management strategies. Automated identification of insects under real-world conditions presents several challenges, including differentiating similar-looking species, intra-species dissimilarity and inter-species similarity, several life cycle stages, camouflage, diverse imaging conditions, and variability in insect orientation. A deep-learning model, InsectNet, is proposed to address these challenges. InsectNet is endowed with five key features: (a) utilization of a large dataset of insect images collected through citizen science; (b) label-free self-supervised learning for large models; (c) improving prediction accuracy for species with a small sample size; (d) enhancing model trustworthiness; and (e) democratizing access through streamlined MLOps. This approach allows accurate identification (>96% accuracy) of over 2500 insect species, including pollinator (e.g., butterflies, bees), parasitoid (e.g., some wasps and flies), predator species (e.g., lady beetles, mantises, dragonflies) and harmful pest species (e.g., armyworms, cutworms, grasshoppers, stink bugs). InsectNet can identify invasive species, provide fine-grained insect species identification, and work effectively in challenging backgrounds. It also can abstain from making predictions when uncertain, facilitating seamless human intervention and making it a practical and trustworthy tool. InsectNet can guide citizen science data collection, especially for invasive species where early detection is crucial. Similar approaches may transform other agricultural challenges like disease detection and underscore the importance of data collection, particularly through citizen science efforts..
△ Less
Submitted 4 June, 2023;
originally announced June 2023.
-
Statistical Plasmode Simulations -- Potentials, Challenges and Recommendations
Authors:
Nicholas Schreck,
Alla Slynko,
Maral Saadati,
Axel Benner
Abstract:
Statistical data simulation is essential in the development of statistical models and methods as well as in their performance evaluation. To capture complex data structures, in particular for high-dimensional data, a variety of simulation approaches have been introduced including parametric and the so-called plasmode simulations. While there are concerns about the realism of parametrically simulat…
▽ More
Statistical data simulation is essential in the development of statistical models and methods as well as in their performance evaluation. To capture complex data structures, in particular for high-dimensional data, a variety of simulation approaches have been introduced including parametric and the so-called plasmode simulations. While there are concerns about the realism of parametrically simulated data, it is widely claimed that plasmodes come very close to reality with some aspects of the "truth'' known. However, there are no explicit guidelines or state-of-the-art on how to perform plasmode data simulations. In the present paper, we first review existing literature and introduce the concept of statistical plasmode simulation. We then discuss advantages and challenges of statistical plasmodes and provide a step-wise procedure for their generation, including key steps to their implementation and reporting. Finally, we illustrate the concept of statistical plasmodes as well as the proposed plasmode generation procedure by means of a public real RNA dataset on breast carcinoma patients.
△ Less
Submitted 10 May, 2023;
originally announced May 2023.
-
Out-of-distribution detection algorithms for robust insect classification
Authors:
Mojdeh Saadati,
Aditya Balu,
Shivani Chiranjeevi,
Talukder Zaki Jubery,
Asheesh K Singh,
Soumik Sarkar,
Arti Singh,
Baskar Ganapathysubramanian
Abstract:
Deep learning-based approaches have produced models with good insect classification accuracy; Most of these models are conducive for application in controlled environmental conditions. One of the primary emphasis of researchers is to implement identification and classification models in the real agriculture fields, which is challenging because input images that are wildly out of the distribution (…
▽ More
Deep learning-based approaches have produced models with good insect classification accuracy; Most of these models are conducive for application in controlled environmental conditions. One of the primary emphasis of researchers is to implement identification and classification models in the real agriculture fields, which is challenging because input images that are wildly out of the distribution (e.g., images like vehicles, animals, humans, or a blurred image of an insect or insect class that is not yet trained on) can produce an incorrect insect classification. Out-of-distribution (OOD) detection algorithms provide an exciting avenue to overcome these challenge as it ensures that a model abstains from making incorrect classification prediction of non-insect and/or untrained insect class images. We generate and evaluate the performance of state-of-the-art OOD algorithms on insect detection classifiers. These algorithms represent a diversity of methods for addressing an OOD problem. Specifically, we focus on extrusive algorithms, i.e., algorithms that wrap around a well-trained classifier without the need for additional co-training. We compared three OOD detection algorithms: (i) Maximum Softmax Probability, which uses the softmax value as a confidence score, (ii) Mahalanobis distance-based algorithm, which uses a generative classification approach; and (iii) Energy-Based algorithm that maps the input data to a scalar value, called energy. We performed an extensive series of evaluations of these OOD algorithms across three performance axes: (a) \textit{Base model accuracy}: How does the accuracy of the classifier impact OOD performance? (b) How does the \textit{level of dissimilarity to the domain} impact OOD performance? and (c) \textit{Data imbalance}: How sensitive is OOD performance to the imbalance in per-class sample size?
△ Less
Submitted 2 May, 2023;
originally announced May 2023.
-
Robust optimality and duality for composite uncertain multiobjective optimization in Asplund spaces with its applications
Authors:
Maryam Saadati,
Morteza Oveisiha
Abstract:
This article is devoted to investigate a nonsmooth/nonconvex uncertain multiobjective optimization problem with composition fields (CUP) for brevity) over arbitrary Asplund spaces. Employing some advanced techniques of variational analysis and generalized differentiation, we establish necessary optimality conditions for weakly robust efficient solutions of (CUP) in terms of the limiting subdiffere…
▽ More
This article is devoted to investigate a nonsmooth/nonconvex uncertain multiobjective optimization problem with composition fields (CUP) for brevity) over arbitrary Asplund spaces. Employing some advanced techniques of variational analysis and generalized differentiation, we establish necessary optimality conditions for weakly robust efficient solutions of (CUP) in terms of the limiting subdifferential. Sufficient conditions for the existence of (weakly) robust efficient solutions to such a problem are also driven under the new concept of pseudo-quasi convexity for composite functions. We formulate a Mond-Weir-type robust dual problem to the primal problem (CUP), and explore weak, strong, and converse duality properties. In addition, the obtained results are applied to an approximate uncertain multiobjective problem and a composite uncertain multiobjective problem with linear operators.
△ Less
Submitted 9 March, 2024; v1 submitted 14 November, 2022;
originally announced November 2022.
-
RPoA: Redefined Proof of Activity
Authors:
Sina Kamali,
Shayan Shabihi,
Mohammad Taha Fakharian,
Alireza Arbabi,
Pouriya Tajmehrabi,
Mohammad Saadati,
Behnam Bahrak
Abstract:
The consensus protocol is the core of a blockchain system which guarantees its secure and stable operation. Proof of Activity (PoA) is a consensus protocol that tries to address some of the issues pertinent to the most widely used protocols, such as Proof of Stake (PoS) and Proof of Work (PoW). However, it still needs to solve the issues regarding high energy consumption, significant resources req…
▽ More
The consensus protocol is the core of a blockchain system which guarantees its secure and stable operation. Proof of Activity (PoA) is a consensus protocol that tries to address some of the issues pertinent to the most widely used protocols, such as Proof of Stake (PoS) and Proof of Work (PoW). However, it still needs to solve the issues regarding high energy consumption, significant resources required, high mining latency, and the need for private blockchains. In this paper, we propose Redefined Proof of Activity (RPoA), a new consensus protocol that builds on top of some of the best features of the existing protocols, such as PoW, PoS, and PoA, and values active service provided by users on the network. Our approach tries to address the issues above and falls in the service-based protocols category that gives mining credit to users as they serve on the network.
△ Less
Submitted 29 November, 2022; v1 submitted 17 October, 2022;
originally announced October 2022.
-
Machine Learning Application in Health
Authors:
Ghadah Alshabana,
Marjn Sadati,
Thao Tran,
Michael Thompson,
Ashritha Chitimalla
Abstract:
Coronavirus can be transmitted through the air by close proximity to infected persons. Commercial aircraft are a likely way to both transmit the virus among passengers and move the virus between locations. The importance of learning about where and how coronavirus has entered the United States will help further our understanding of the disease. Air travelers can come from countries or areas with a…
▽ More
Coronavirus can be transmitted through the air by close proximity to infected persons. Commercial aircraft are a likely way to both transmit the virus among passengers and move the virus between locations. The importance of learning about where and how coronavirus has entered the United States will help further our understanding of the disease. Air travelers can come from countries or areas with a high rate of infection and may very well be at risk of being exposed to the virus. Therefore, as they reach the United States, the virus could easily spread. On our analysis, we utilized machine learning to determine if the number of flights into the Washington DC Metro Area had an effect on the number of cases and deaths reported in the city and surrounding area.
△ Less
Submitted 9 June, 2022;
originally announced July 2022.
-
Approximate solutions for robust multiobjective optimization programming in Asplund spaces
Authors:
Maryam Saadati,
Morteza Oveisiha
Abstract:
In this paper, we study a nonsmooth/nonconvex multiobjective optimization problem with uncertain constraints in arbitrary Asplund spaces. We first provide necessary optimality condition in a fuzzy form for approximate weakly robust efficient solutions and then establish necessary optimality theorem for approximate weakly robust quasi-efficient solutions of the problem in the sense of the limiting…
▽ More
In this paper, we study a nonsmooth/nonconvex multiobjective optimization problem with uncertain constraints in arbitrary Asplund spaces. We first provide necessary optimality condition in a fuzzy form for approximate weakly robust efficient solutions and then establish necessary optimality theorem for approximate weakly robust quasi-efficient solutions of the problem in the sense of the limiting subdifferential by exploiting a fuzzy optimality condition in terms of the Frechet subdifferential. Sufficient conditions for approximate (weakly) robust quasi-efficient solutions to such a problem are also driven under the new concept of generalized pseudo convex functions. Finally, we address an approximate Mond-Weir-type dual robust problem to the reference problem and explore weak, strong, and converse duality properties under assumptions of pseudo convexity.
△ Less
Submitted 14 November, 2022; v1 submitted 2 May, 2022;
originally announced May 2022.
-
A damage model for granite subjected to quasi-static contact loading
Authors:
H Shariati,
M Saadati,
K Weddfelt,
P. -L Larsson,
François Hild
Abstract:
An anisotropic damage model is employed in order to simulate the fracture pattern of Bohus granite under quasi-static spherical indentation loading. The chosen damage description is added to the previously employed Drucker-Prager plasticity model with variable dilation angle. The resulting constitutive model is implemented to simulate the behavior of Bohus granite under indentation up to the load…
▽ More
An anisotropic damage model is employed in order to simulate the fracture pattern of Bohus granite under quasi-static spherical indentation loading. The chosen damage description is added to the previously employed Drucker-Prager plasticity model with variable dilation angle. The resulting constitutive model is implemented to simulate the behavior of Bohus granite under indentation up to the load capacity of the material. The initial fragmentation, corresponding to the first small load-drop in the force-penetration curve, is likely due to the high radial tensile stress state at or close to the contact boundary. Both predicted fracture pattern and force-penetration results from the numerical simulation are compared to experimental data and a good agreement is found. The variability in tensile strength of the material is included in the chosen damage model by taking advantage of Weibull statistics. In this work, it is suggested that indentation test results by themselves may be used to calibrate the statistical distribution of tensile strength at small size scales such as in indentation applications.
△ Less
Submitted 20 December, 2021;
originally announced January 2022.
-
FitAct: Error Resilient Deep Neural Networks via Fine-Grained Post-Trainable Activation Functions
Authors:
Behnam Ghavami,
Mani Sadati,
Zhenman Fang,
Lesley Shannon
Abstract:
Deep neural networks (DNNs) are increasingly being deployed in safety-critical systems such as personal healthcare devices and self-driving cars. In such DNN-based systems, error resilience is a top priority since faults in DNN inference could lead to mispredictions and safety hazards. For latency-critical DNN inference on resource-constrained edge devices, it is nontrivial to apply conventional r…
▽ More
Deep neural networks (DNNs) are increasingly being deployed in safety-critical systems such as personal healthcare devices and self-driving cars. In such DNN-based systems, error resilience is a top priority since faults in DNN inference could lead to mispredictions and safety hazards. For latency-critical DNN inference on resource-constrained edge devices, it is nontrivial to apply conventional redundancy-based fault tolerance techniques. In this paper, we propose FitAct, a low-cost approach to enhance the error resilience of DNNs by deploying fine-grained post-trainable activation functions. The main idea is to precisely bound the activation value of each individual neuron via neuron-wise bounded activation functions so that it could prevent fault propagation in the network. To avoid complex DNN model re-training, we propose to decouple the accuracy training and resilience training and develop a lightweight post-training phase to learn these activation functions with precise bound values. Experimental results on widely used DNN models such as AlexNet, VGG16, and ResNet50 demonstrate that FitAct outperforms state-of-the-art studies such as Clip-Act and Ranger in enhancing the DNN error resilience for a wide range of fault rates while adding manageable runtime and memory space overheads.
△ Less
Submitted 27 December, 2021;
originally announced December 2021.
-
BDFA: A Blind Data Adversarial Bit-flip Attack on Deep Neural Networks
Authors:
Behnam Ghavami,
Mani Sadati,
Mohammad Shahidzadeh,
Zhenman Fang,
Lesley Shannon
Abstract:
Adversarial bit-flip attack (BFA) on Neural Network weights can result in catastrophic accuracy degradation by flipping a very small number of bits. A major drawback of prior bit flip attack techniques is their reliance on test data. This is frequently not possible for applications that contain sensitive or proprietary data. In this paper, we propose Blind Data Adversarial Bit-flip Attack (BDFA),…
▽ More
Adversarial bit-flip attack (BFA) on Neural Network weights can result in catastrophic accuracy degradation by flipping a very small number of bits. A major drawback of prior bit flip attack techniques is their reliance on test data. This is frequently not possible for applications that contain sensitive or proprietary data. In this paper, we propose Blind Data Adversarial Bit-flip Attack (BDFA), a novel technique to enable BFA without any access to the training or testing data. This is achieved by optimizing for a synthetic dataset, which is engineered to match the statistics of batch normalization across different layers of the network and the targeted label. Experimental results show that BDFA could decrease the accuracy of ResNet50 significantly from 75.96\% to 13.94\% with only 4 bits flips.
△ Less
Submitted 6 January, 2022; v1 submitted 6 December, 2021;
originally announced December 2021.
-
A Method to use Nonlinear Dynamics in a Whisker Sensor for Terrain Identification by Mobile Robots
Authors:
Zhenhua Yu,
S. M. Hadi Sadati,
Hasitha Wegiriya,
Peter Childs,
Thrishantha Nanayakkara
Abstract:
This paper shows analytical and experimental evidence of using the vibration dynamics of a compliant whisker for accurate terrain classification during steady state motion of a mobile robot. A Hall effect sensor was used to measure whisker vibrations due to perturbations from the ground. Analytical results predict that the whisker vibrations will have a dominant frequency at the vertical perturbat…
▽ More
This paper shows analytical and experimental evidence of using the vibration dynamics of a compliant whisker for accurate terrain classification during steady state motion of a mobile robot. A Hall effect sensor was used to measure whisker vibrations due to perturbations from the ground. Analytical results predict that the whisker vibrations will have a dominant frequency at the vertical perturbation frequency of the mobile robot sandwiched by two other less dominant but distinct frequency components. These frequency components may come from bifurcation of vibration frequency due to nonlinear interaction dynamics at steady state. Experimental results also exhibit distinct dominant frequency components unique to the speed of the robot and the terrain roughness. This nonlinear dynamic feature is used in a deep multi-layer perceptron neural network to classify terrains. We achieved 85.6\% prediction success rate for seven flat terrain surfaces with different textures.
△ Less
Submitted 4 August, 2021;
originally announced August 2021.
-
Optimality conditions for robust nonsmooth multiobjective optimization problems in Asplund spaces
Authors:
Maryam Saadati,
Morteza Oveisiha
Abstract:
We employ a fuzzy optimality condition for the Frechet subdifferential and some advanced techniques of variational analysis such as formulae for the subdifferentials of an infinite family of nonsmooth functions and the coderivative scalarization to investigate robust optimality condition and robust duality for a nonsmooth/nonconvex multiobjective optimization problem dealing with uncertain constra…
▽ More
We employ a fuzzy optimality condition for the Frechet subdifferential and some advanced techniques of variational analysis such as formulae for the subdifferentials of an infinite family of nonsmooth functions and the coderivative scalarization to investigate robust optimality condition and robust duality for a nonsmooth/nonconvex multiobjective optimization problem dealing with uncertain constraints in arbitrary Asplund spaces. We establish necessary optimality conditions for weakly and properly robust efficient solutions of the problem in terms of the Mordukhovich subdifferentials of the related functions. Further, sufficient conditions for weakly and properly robust efficient solutions as well as for robust efficient solutions of the problem are provided by presenting new concepts of generalized convexity. Finally we formulate a Mond-Weir-type robust dual problem to the reference problem, and examine weak, strong, and converse duality relations between them under the pseudo convexity assumptions.
△ Less
Submitted 14 November, 2022; v1 submitted 29 May, 2021;
originally announced May 2021.
-
An Enterprise Architecture Framework for E-learning
Authors:
Abbas Najafizadeh,
Maryam Saadati,
S. Mahdi Jamei,
S. Shervin Ostadzadeh
Abstract:
With a trend toward becoming more and more information and communication based, learning services and processes were also evolved. E-learning comprises all forms of electronically supported learning and teaching. The information and communication systems serve as a fundamental role to implement these learning processes. In the typical information-driven organizations, the E-learning is part of a m…
▽ More
With a trend toward becoming more and more information and communication based, learning services and processes were also evolved. E-learning comprises all forms of electronically supported learning and teaching. The information and communication systems serve as a fundamental role to implement these learning processes. In the typical information-driven organizations, the E-learning is part of a much larger platform for applications and data that extends across the Internet and intranet/extranet. In this respect, E-learning has brought about an inevitable tendency to lunge towards organizing their information based activities in a comprehensive way. Building an Enterprise Architecture (EA) undoubtedly serves as a fundamental concept to accomplish this goal. In this paper, we propose an EA for E-learning information systems. The presented framework helps developers to design and justify completely integrated learning and teaching processes and information systems which results in improved pedagogical success rate.
△ Less
Submitted 7 May, 2021;
originally announced May 2021.
-
The effects of beta-cell mass and function, intercellular coupling, and islet synchrony on $\textrm{Ca}^{2+}$ dynamics
Authors:
Maryam Saadati,
Yousef Jamali
Abstract:
Type 2 diabetes (T2D) is a challenging metabolic disorder characterized by a substantial loss of $β$-cell mass and alteration of $β$-cell function in the islets of Langerhans, disrupting insulin secretion and glucose homeostasis. The mechanisms for deficiency in $β$-cell mass and function during the hyperglycemia development and T2D pathogenesis are complex. To study the relative contribution of…
▽ More
Type 2 diabetes (T2D) is a challenging metabolic disorder characterized by a substantial loss of $β$-cell mass and alteration of $β$-cell function in the islets of Langerhans, disrupting insulin secretion and glucose homeostasis. The mechanisms for deficiency in $β$-cell mass and function during the hyperglycemia development and T2D pathogenesis are complex. To study the relative contribution of $β$-cell mass to $β$-cell function in T2D, we make use of a comprehensive electrophysiological model of human $β$-cell clusters. We find that defect in $β$-cell mass causes a functional decline in single $β$-cell, impairment in intra-islet synchrony, and changes in the form of oscillatory patterns of membrane potential and intracellular $\textrm{Ca}^{2+}$ concentration, which can lead to changes in insulin secretion dynamics and in insulin levels. The model demonstrates a good correspondence between suppression of synchronizing electrical activity and published experimental measurements. We then compare the role of gap junction-mediated electrical coupling with both $β$-cell synchronization and metabolic coupling in the behavior of $\textrm{Ca}^{2+}$ concentration dynamics within human islets. Our results indicate that inter-$β$-cellular electrical coupling depicts a more important factor in shaping the physiological regulation of islet function and in human T2D. We further predict that varying the whole-cell conductance of delayed rectifier $\textrm{K}^{+}$ channels modifies oscillatory activity patterns of $β$-cell population lacking intercellular coupling, which significantly affect $\textrm{Ca}^{2+}$ concentration and insulin secretion.
△ Less
Submitted 2 May, 2021; v1 submitted 19 December, 2020;
originally announced December 2020.
-
Movie Recommender Systems: Implementation and Performance Evaluation
Authors:
Mojdeh Saadati,
Syed Shihab,
Mohammed Shaiqur Rahman
Abstract:
Over the years, explosive growth in the number of items in the catalog of e-commerce businesses, such as Amazon, Netflix, Pandora, etc., have warranted the development of recommender systems to guide consumers towards their desired products based on their preferences and tastes. Some of the popular approaches for building recommender systems, for mining user, derived input datasets, are: content-b…
▽ More
Over the years, explosive growth in the number of items in the catalog of e-commerce businesses, such as Amazon, Netflix, Pandora, etc., have warranted the development of recommender systems to guide consumers towards their desired products based on their preferences and tastes. Some of the popular approaches for building recommender systems, for mining user, derived input datasets, are: content-based systems, collaborative filtering, latent-factor systems using Singular Value Decomposition (SVD), and Restricted Boltzmann Machines (RBM). In this project, user-user collaborative filtering, item-item collaborative filtering, content-based recommendation, SVD, and neural networks were chosen for implementation in Python to predict the user ratings of unwatched movies for each user, and their performances were evaluated and compared.
△ Less
Submitted 15 September, 2019;
originally announced September 2019.
-
Adjustment Criteria for Recovering Causal Effects from Missing Data
Authors:
Mojdeh Saadati,
Jin Tian
Abstract:
Confounding bias, missing data, and selection bias are three common obstacles to valid causal inference in the data sciences. Covariate adjustment is the most pervasive technique for recovering casual effects from confounding bias. In this paper, we introduce a covariate adjustment formulation for controlling confounding bias in the presence of missing-not-at-random data and develop a necessary an…
▽ More
Confounding bias, missing data, and selection bias are three common obstacles to valid causal inference in the data sciences. Covariate adjustment is the most pervasive technique for recovering casual effects from confounding bias. In this paper, we introduce a covariate adjustment formulation for controlling confounding bias in the presence of missing-not-at-random data and develop a necessary and sufficient condition for recovering causal effects using the adjustment. We also introduce an adjustment formulation for controlling both confounding and selection biases in the presence of missing data and develop a necessary and sufficient condition for valid adjustment. Furthermore, we present an algorithm that lists all valid adjustment sets and an algorithm that finds a valid adjustment set containing the minimum number of variables, which are useful for researchers interested in selecting adjustment sets with desired properties.
△ Less
Submitted 15 September, 2019; v1 submitted 2 July, 2019;
originally announced July 2019.
-
An Empirical Investigation of Four Well-Known Polynomial-Size VRP Formulations
Authors:
Deniz Aksen,
Temel Oncan,
Mir Ehsan Hesam Sadati
Abstract:
This study presents an in-depth computational analysis of four well-known Capacitated Vehicle Routing Problem (CVRP) formulations with polynomial number of subtour elimination constraints: a node-based formulation and three arc-based (single, two- and multi-commodity flow) formulations. For each formulation, several valid inequalities (VIs) are added for the purpose of tightening the formulation.…
▽ More
This study presents an in-depth computational analysis of four well-known Capacitated Vehicle Routing Problem (CVRP) formulations with polynomial number of subtour elimination constraints: a node-based formulation and three arc-based (single, two- and multi-commodity flow) formulations. For each formulation, several valid inequalities (VIs) are added for the purpose of tightening the formulation. Moreover, a simple topology-driven granulation scheme is proposed to reduce the number of a certain type of VIs. The lower and upper bounding performance and the solution efficiency of the formulations and respective VI configurations are benchmarked with state-of-the-art commercial optimization software. The extensive computational analysis embraces 121 instances with up to 100 customer nodes. We believe that our findings could be useful for practitioners as well as researchers developing algorithms for the CVRP.
△ Less
Submitted 29 September, 2018;
originally announced October 2018.
-
Mesoscale Structure of Chiral Nematic Shells
Authors:
Ye Zhou,
Ashley Guo,
Rui Zhang,
Julio C. Armas-Perez,
Jose A. Martinez-Gonzalez,
Mohammad Rahimi,
Monirosadat Sadati,
Juan J. de Pablo
Abstract:
There is considerable interest in understanding and controlling topological defects in nematic liquid crystals (LCs). Confinement, in the form of droplets, has been particularly effective in that regard. Here, we employ the Landau-de Gennes method to explore the geometrical frustration of nematic order in shell geometries, and focus on chiral materials. By varying the chirality and thickness in un…
▽ More
There is considerable interest in understanding and controlling topological defects in nematic liquid crystals (LCs). Confinement, in the form of droplets, has been particularly effective in that regard. Here, we employ the Landau-de Gennes method to explore the geometrical frustration of nematic order in shell geometries, and focus on chiral materials. By varying the chirality and thickness in uniform shells, we construct a phase diagram that includes tetravalent structures, bipolar structures (BS), bent structures and radial spherical structures (RSS). It is found that, in uniform shells, the BS-to-RSS structural transition, in response to both chirality and shell geometry, is accompanied by an abrupt change of defect positions, implying a potential use for chiral nematic shells as sensors. Moreover, we investigate thickness heterogeneity in shells and demonstrate that non-chiral and chiral nematic shells exhibit distinct equilibrium positions of their inner core that are governed by shell chirality c.
△ Less
Submitted 27 July, 2016;
originally announced July 2016.
-
The Application of Imperialist Competitive Algorithm for Fuzzy Random Portfolio Selection Problem
Authors:
Mir Ehsan Hesam Sadati,
Jamshid Bagherzadeh Mohasefi
Abstract:
This paper presents an implementation of the Imperialist Competitive Algorithm (ICA) for solving the fuzzy random portfolio selection problem where the asset returns are represented by fuzzy random variables. Portfolio Optimization is an important research field in modern finance. By using the necessity-based model, fuzzy random variables reformulate to the linear programming and ICA will be desig…
▽ More
This paper presents an implementation of the Imperialist Competitive Algorithm (ICA) for solving the fuzzy random portfolio selection problem where the asset returns are represented by fuzzy random variables. Portfolio Optimization is an important research field in modern finance. By using the necessity-based model, fuzzy random variables reformulate to the linear programming and ICA will be designed to find the optimum solution. To show the efficiency of the proposed method, a numerical example illustrates the whole idea on implementation of ICA for fuzzy random portfolio selection problem.
△ Less
Submitted 19 February, 2014;
originally announced February 2014.
-
Optimization of Fuzzy Random Portfolio selection by Implementation of Harmony Search Algorithm
Authors:
Mir Ehsan Hesam Sadati,
Ali Doniavi
Abstract:
This study first reviews fuzzy random Portfolio selection theory and describes the concept of portfolio optimization model as a useful instrument for helping finance practitioners and researchers. Second, this paper specifically aims at applying possibility-based models for transforming the fuzzy random variables to the linear programming. The harmony search algorithm approaches to resolve the por…
▽ More
This study first reviews fuzzy random Portfolio selection theory and describes the concept of portfolio optimization model as a useful instrument for helping finance practitioners and researchers. Second, this paper specifically aims at applying possibility-based models for transforming the fuzzy random variables to the linear programming. The harmony search algorithm approaches to resolve the portfolio selection problem with the objective of return maximization is applied. We provide a numerical example to illustrate the proposed model. The results show that the evolutionary method of this paper with harmony search algorithm, can consistently handle the practical portfolio selection problem.
△ Less
Submitted 17 February, 2014;
originally announced February 2014.
-
Robust creation of atomic W state in a cavity by adiabatic passage
Authors:
M. Amniat-Talab,
M. Saadati,
S. Guerin
Abstract:
We propose two robust schemes to generate controllable (deterministic) atomic W-states of three three-level atoms interacting with an optical cavity and a laser beam. Losses due to atomic spontaneous emissions and to cavity decay are efficiently suppressed by employing adiabatic passage technique and appropriately designed atom-field couplings. In these schemes the three atoms traverse the cavit…
▽ More
We propose two robust schemes to generate controllable (deterministic) atomic W-states of three three-level atoms interacting with an optical cavity and a laser beam. Losses due to atomic spontaneous emissions and to cavity decay are efficiently suppressed by employing adiabatic passage technique and appropriately designed atom-field couplings. In these schemes the three atoms traverse the cavity-mode and the laser beam and become entangled in the free space outside the cavity.
△ Less
Submitted 22 May, 2009;
originally announced May 2009.