-
Reasoning with LLMs for Zero-Shot Vulnerability Detection
Authors:
Arastoo Zibaeirad,
Marco Vieira
Abstract:
Automating software vulnerability detection (SVD) remains a critical challenge in an era of increasingly complex and interdependent software systems. Despite significant advances in Large Language Models (LLMs) for code analysis, prevailing evaluation methodologies often lack the \textbf{context-aware robustness} necessary to capture real-world intricacies and cross-component interactions. To addr…
▽ More
Automating software vulnerability detection (SVD) remains a critical challenge in an era of increasingly complex and interdependent software systems. Despite significant advances in Large Language Models (LLMs) for code analysis, prevailing evaluation methodologies often lack the \textbf{context-aware robustness} necessary to capture real-world intricacies and cross-component interactions. To address these limitations, we present \textbf{VulnSage}, a comprehensive evaluation framework and a dataset curated from diverse, large-scale open-source system software projects developed in C/C++. Unlike prior datasets, it leverages a heuristic noise pre-filtering approach combined with LLM-based reasoning to ensure a representative and minimally noisy spectrum of vulnerabilities. The framework supports multi-granular analysis across function, file, and inter-function levels and employs four diverse zero-shot prompt strategies: Baseline, Chain-of-Thought, Think, and Think & Verify. Through this evaluation, we uncover that structured reasoning prompts substantially improve LLM performance, with Think & Verify reducing ambiguous responses from 20.3% to 9.1% while increasing accuracy. We further demonstrate that code-specialized models consistently outperform general-purpose alternatives, with performance varying significantly across vulnerability types, revealing that no single approach universally excels across all security contexts. Link to dataset and codes: https://github.com/Erroristotle/VulnSage.git
△ Less
Submitted 22 March, 2025;
originally announced March 2025.
-
An Empirical Study on the Classification of Bug Reports with Machine Learning
Authors:
Renato Andrade,
César Teixeira,
Nuno Laranjeiro,
Marco Vieira
Abstract:
Software defects are a major threat to the reliability of computer systems. The literature shows that more than 30% of bug reports submitted in large software projects are misclassified (i.e., are feature requests, or mistakes made by the bug reporter), leading developers to place great effort in manually inspecting them. Machine Learning algorithms can be used for the automatic classification of…
▽ More
Software defects are a major threat to the reliability of computer systems. The literature shows that more than 30% of bug reports submitted in large software projects are misclassified (i.e., are feature requests, or mistakes made by the bug reporter), leading developers to place great effort in manually inspecting them. Machine Learning algorithms can be used for the automatic classification of issue reports. Still, little is known regarding key aspects of training models, such as the influence of programming languages and issue tracking systems. In this paper, we use a dataset containing more than 660,000 issue reports, collected from heterogeneous projects hosted in different issue tracking systems, to study how different factors (e.g., project language, report content) can influence the performance of models in handling classification of issue reports. Results show that using the report title or description does not significantly differ; Support Vector Machine, Logistic Regression, and Random Forest are effective in classifying issue reports; programming languages and issue tracking systems influence classification outcomes; and models based on heterogeneous projects can classify reports from projects not present during training. Based on findings, we propose guidelines for future research, including recommendations for using heterogeneous data and selecting high-performing algorithms.
△ Less
Submitted 1 March, 2025;
originally announced March 2025.
-
When Less is More: Evolutionary Dynamics of Deception in a Sender-Receiver Game
Authors:
Eduardo V. M. Vieira,
José F. Fontanari
Abstract:
The spread of disinformation poses a significant threat to societal well-being. We analyze this phenomenon using an evolutionary game theory model of the sender-receiver game, where senders aim to mislead receivers and receivers aim to discern the truth. Using a combination of replicator equations, finite-size scaling analysis, and extensive Monte Carlo simulations, we investigate the long-term ev…
▽ More
The spread of disinformation poses a significant threat to societal well-being. We analyze this phenomenon using an evolutionary game theory model of the sender-receiver game, where senders aim to mislead receivers and receivers aim to discern the truth. Using a combination of replicator equations, finite-size scaling analysis, and extensive Monte Carlo simulations, we investigate the long-term evolutionary dynamics of this game. Our central finding is a counterintuitive threshold phenomenon: the role (sender or receiver) with the larger difference in payoffs between successful and unsuccessful interactions is surprisingly more likely to lose in the long run. We show that this effect is robust across different parameter values and arises from the interplay between the relative speeds of evolution of the two roles and the ability of the slower evolving role to exploit the fixed strategy of the faster evolving role. Moreover, for finite populations we find that the initially less frequent strategy of the slower role is more likely to fixate in the population. The initially rarer strategy in the less-rewarded role is, paradoxically, more likely to prevail.
△ Less
Submitted 16 March, 2025; v1 submitted 4 February, 2025;
originally announced February 2025.
-
Temperature-redshift relation in energy-momentum-powered gravity models
Authors:
C. J. A. P. Martins,
A. M. M. Vieira
Abstract:
There has been recent interest in the cosmological consequences of energy-momentum-powered gravity models, in which the matter side of Einstein's equations includes a term proportional to some power, $n$, of the energy-momentum tensor, in addition to the canonical linear term. Previous works have suggested that these models can lead to a recent accelerating universe without a cosmological constant…
▽ More
There has been recent interest in the cosmological consequences of energy-momentum-powered gravity models, in which the matter side of Einstein's equations includes a term proportional to some power, $n$, of the energy-momentum tensor, in addition to the canonical linear term. Previous works have suggested that these models can lead to a recent accelerating universe without a cosmological constant, but they can also be seen as phenomenological extensions of the standard $Λ$CDM, which are observationally constrained to be close to the $Λ$CDM limit. Here we show that these models violate the temperature-redshift relation, and are therefore further constrained by astrophysical measurements of the cosmic microwave background temperature. We provide joint constraints on these models from the combination of astrophysical and background cosmological data, showing that this power is constrained to be about $|n|<0.01$ and $|n|<0.1$, respectively in models without and with a cosmological constant, and improving previous constraints on this parameter by more than a factor of three. By breaking degeneracies between this parameter and the matter density, constraints on the latter are also improved by a factor of about two.
△ Less
Submitted 31 January, 2025;
originally announced January 2025.
-
Exploring the interplay between small and large scales movements in a neotropical small mammal
Authors:
E. Brigatti,
B. Ríos-Uzeda,
M. V. Vieira
Abstract:
We record and analyze the movement patterns of the marsupial {\it Didelphis aurita} at different temporal scales. Animals trajectories are collected at a daily scale by using spool-and-line techniques, and with the help of radio-tracking devices animals traveled distances are estimated at intervals of weeks. Small-scale movements are well described by truncated Lévy flight, while large-scale movem…
▽ More
We record and analyze the movement patterns of the marsupial {\it Didelphis aurita} at different temporal scales. Animals trajectories are collected at a daily scale by using spool-and-line techniques, and with the help of radio-tracking devices animals traveled distances are estimated at intervals of weeks. Small-scale movements are well described by truncated Lévy flight, while large-scale movements produce a distribution of distances which is compatible with a Brownian motion. A model of the movement behavior of these animals, based on a truncated Lévy flight calibrated on the small scale data, converges towards a Brownian behavior after a short time interval of the order of one week. These results show that whether Lévy flight or Brownian motion behaviors apply, will depend on the scale of aggregation of the animals paths. In this specific case, as the effect of the rude truncation present in the daily data generates a fast convergence towards Brownian behaviors, Lévy flights become of scarce interest for describing the local dispersion properties of these animals, which result well approximated by a normal diffusion process and not a fast, anomalous one. Interestingly, we are able to describe two movement phases as the consequence of a statistical effect generated by aggregation, without the necessity of introducing ecological constraints or mechanisms operating at different spatio-temporal scales. This result is of general interest, as it can be a key element for describing movement phenomenology at distinct spatio-temporal scales across different taxa and in a variety of systems.
△ Less
Submitted 23 January, 2025;
originally announced January 2025.
-
A hybrid pressure formulation of the face-centred finite volume method for viscous laminar incompressible flows
Authors:
Matteo Giacomini,
Davide Cortellessa,
Luan M. Vieira,
Ruben Sevilla,
Antonio Huerta
Abstract:
This work presents a hybrid pressure face-centred finite volume (FCFV) solver to simulate steady-state incompressible Navier-Stokes flows. The method leverages the robustness, in the incompressible limit, of the hybridisable discontinuous Galerkin paradigm for compressible and weakly compressible flows to derive the formulation of a novel, low-order face-based discretisation. The incompressibility…
▽ More
This work presents a hybrid pressure face-centred finite volume (FCFV) solver to simulate steady-state incompressible Navier-Stokes flows. The method leverages the robustness, in the incompressible limit, of the hybridisable discontinuous Galerkin paradigm for compressible and weakly compressible flows to derive the formulation of a novel, low-order face-based discretisation. The incompressibility constraint is enforced in a weak sense, by introducing an inter-cell mass flux defined in terms of a new, hybrid variable, representing the pressure at the cell faces. This results in a new hybridisation strategy where cell variables (velocity, pressure and deviatoric strain rate tensor) are expressed as a function of velocity and pressure at the barycentre of the cell faces. The hybrid pressure formulation provides first-order convergence of all variables, including the stress, without the need for gradient reconstruction, thus being less sensitive to cell type, stretching, distortion, and skewness than traditional low-order finite volume solvers. Numerical benchmarks of Navier-Stokes flows at low and moderate Reynolds numbers, in two and three dimensions, are presented to evaluate accuracy and robustness of the method. In particular, the hybrid pressure formulation outperforms the FCFV method when convective effects are relevant, achieving accurate predictions on significantly coarser meshes.
△ Less
Submitted 1 April, 2025; v1 submitted 8 January, 2025;
originally announced January 2025.
-
Python Agent in Ludii
Authors:
Izaias S. de Lima Neto,
Marco A. A. de Aguiar Vieira,
Anderson R. Tavares
Abstract:
Ludii is a Java general game system with a considerable number of board games, with an API for developing new agents and a game description language to create new games. To improve versatility and ease development, we provide Python interfaces for agent programming. This allows the use of Python modules to implement general game playing agents.
As a means of enabling Python for creating Ludii ag…
▽ More
Ludii is a Java general game system with a considerable number of board games, with an API for developing new agents and a game description language to create new games. To improve versatility and ease development, we provide Python interfaces for agent programming. This allows the use of Python modules to implement general game playing agents.
As a means of enabling Python for creating Ludii agents, the interfaces are implemented using different Java libraries: jpy and Py4J. The main goal of this work is to determine which version is faster. To do so, we conducted a performance analysis of two different GGP algorithms, Minimax adapted to GGP and MCTS. The analysis was performed across several combinatorial games with varying depth, branching factor, and ply time. For reproducibility, we provide tutorials and repositories.
Our analysis includes predictive models using regression, which suggest that jpy is faster than Py4J, however slower than a native Java Ludii agent, as expected.
△ Less
Submitted 18 December, 2024;
originally announced December 2024.
-
Engineering Trustworthy Software: A Mission for LLMs
Authors:
Marco Vieira
Abstract:
LLMs are transforming software engineering by accelerating development, reducing complexity, and cutting costs. When fully integrated into the software lifecycle they will drive design, development and deployment while facilitating early bug detection, continuous improvement, and rapid resolution of critical issues. However, trustworthy LLM-driven software engineering requires addressing multiple…
▽ More
LLMs are transforming software engineering by accelerating development, reducing complexity, and cutting costs. When fully integrated into the software lifecycle they will drive design, development and deployment while facilitating early bug detection, continuous improvement, and rapid resolution of critical issues. However, trustworthy LLM-driven software engineering requires addressing multiple challenges such as accuracy, scalability, bias, and explainability.
△ Less
Submitted 26 November, 2024;
originally announced November 2024.
-
Extended Kato inequalities for conformal operators
Authors:
Daniel Cibotaru,
Matheus Vieira
Abstract:
We prove, for a class of first order differential operators that contains the Stein-Weiss, Dirac and Penrose twistor operators, a family of Kato inequalities that interpolates between the classical and the refined Kato. For the Hodge-de-Rham operator we get a more detailed result. As a corollary, we get various Kato inequalities from the literature.
We prove, for a class of first order differential operators that contains the Stein-Weiss, Dirac and Penrose twistor operators, a family of Kato inequalities that interpolates between the classical and the refined Kato. For the Hodge-de-Rham operator we get a more detailed result. As a corollary, we get various Kato inequalities from the literature.
△ Less
Submitted 20 October, 2024;
originally announced October 2024.
-
Spectrum of the drift Laplacian on Ricci expanders
Authors:
Helton Leal,
Matheus Vieira,
Detang Zhou
Abstract:
In this paper, we study the spectrum of the drift Laplacian on Ricci expanders. We show that the spectrum is discrete when the potential function is proper, and we show that the hypothesis on the properness of the potential function cannot be removed. We also extend previous results concerning the asymptotic behavior of the potential function on Ricci expanders. This allows us to conclude that the…
▽ More
In this paper, we study the spectrum of the drift Laplacian on Ricci expanders. We show that the spectrum is discrete when the potential function is proper, and we show that the hypothesis on the properness of the potential function cannot be removed. We also extend previous results concerning the asymptotic behavior of the potential function on Ricci expanders. This allows us to conclude that the drift Laplacian has discrete spectrum on Ricci expanders whose Ricci curvature is bounded below by a suitable constant, possibly negative. Further, we compute all the eigenvalues of the drift Laplacian on rigid expanders and rigid shrinkers. Lastly, we investigate the second eigenvalue of the drift Laplacian on rigid Ricci expanders whose Einstein factor is a closed hyperbolic Riemann surface.
△ Less
Submitted 9 October, 2024;
originally announced October 2024.
-
VulnLLMEval: A Framework for Evaluating Large Language Models in Software Vulnerability Detection and Patching
Authors:
Arastoo Zibaeirad,
Marco Vieira
Abstract:
Large Language Models (LLMs) have shown promise in tasks like code translation, prompting interest in their potential for automating software vulnerability detection (SVD) and patching (SVP). To further research in this area, establishing a benchmark is essential for evaluating the strengths and limitations of LLMs in these tasks. Despite their capabilities, questions remain regarding whether LLMs…
▽ More
Large Language Models (LLMs) have shown promise in tasks like code translation, prompting interest in their potential for automating software vulnerability detection (SVD) and patching (SVP). To further research in this area, establishing a benchmark is essential for evaluating the strengths and limitations of LLMs in these tasks. Despite their capabilities, questions remain regarding whether LLMs can accurately analyze complex vulnerabilities and generate appropriate patches. This paper introduces VulnLLMEval, a framework designed to assess the performance of LLMs in identifying and patching vulnerabilities in C code. Our study includes 307 real-world vulnerabilities extracted from the Linux kernel, creating a well-curated dataset that includes both vulnerable and patched code. This dataset, based on real-world code, provides a diverse and representative testbed for evaluating LLM performance in SVD and SVP tasks, offering a robust foundation for rigorous assessment. Our results reveal that LLMs often struggle with distinguishing between vulnerable and patched code. Furthermore, in SVP tasks, these models tend to oversimplify the code, producing solutions that may not be directly usable without further refinement.
△ Less
Submitted 16 September, 2024;
originally announced September 2024.
-
Slab tilings, flips and the triple twist
Authors:
George L. D. Alencar,
Nicolau C. Saldanha,
Arthur M. M. Vieira
Abstract:
A \textit{domino} is a $2\times 1\times 1$ parallelepiped formed by the union of two unit cubes and a \textit{slab} is a $2\times 2\times 1$ parallelepiped formed by the union of four unit cubes. We are interested in tiling regions formed by the finite union of unit cubes. Domino tilings have been studied before; here we investigate \textit{slab tilings}. As for domino tilings, a flip in a slab ti…
▽ More
A \textit{domino} is a $2\times 1\times 1$ parallelepiped formed by the union of two unit cubes and a \textit{slab} is a $2\times 2\times 1$ parallelepiped formed by the union of four unit cubes. We are interested in tiling regions formed by the finite union of unit cubes. Domino tilings have been studied before; here we investigate \textit{slab tilings}. As for domino tilings, a flip in a slab tiling is a local move: two neighboring parallel slabs are removed and placed back in a different position.
Inspired by the twist for domino tilings, we construct a flip invariant for slab tilings: the \textit{triple twist}, assuming values in $\mathbb{Z}^3$. We show that if the region is a large box then the triple twist assumes a large number of possible values, roughly proportional to the fourth power of the volume. We also give examples of smaller regions for which the set of tilings is connected under flips, so that the triple twist assumes only one value.
△ Less
Submitted 9 March, 2025; v1 submitted 11 July, 2024;
originally announced July 2024.
-
Gap theorems in Yang-Mills theory for complete four-dimensional manifolds with positive Yamabe constant
Authors:
Matheus Vieira
Abstract:
In this paper we prove gap theorems in Yang-Mills theory for complete four-dimensional manifolds with positive Yamabe constant. We extend the results of Gursky-Kelleher-Streets to complete manifolds. We also describe the equality in the gap theorem in terms of the basic instanton, which is interesting even for compact manifolds.
In this paper we prove gap theorems in Yang-Mills theory for complete four-dimensional manifolds with positive Yamabe constant. We extend the results of Gursky-Kelleher-Streets to complete manifolds. We also describe the equality in the gap theorem in terms of the basic instanton, which is interesting even for compact manifolds.
△ Less
Submitted 11 June, 2024; v1 submitted 10 June, 2024;
originally announced June 2024.
-
Current and future cosmological impact of microwave background temperature measurements
Authors:
C. J. A. P. Martins,
A. M. M. Vieira
Abstract:
The redshift dependence of the cosmic microwave background temperature, $T(z)=T_0(1+z)$, is a key prediction of standard cosmology, but this relation is violated in many extensions thereof. Current astrophysical facilities can probe it in the redshift range $0\le z\le6.34$. We extend recent work by Gelo {\it et al.} (2022) showing that for several classes of models (all of which aim to provide alt…
▽ More
The redshift dependence of the cosmic microwave background temperature, $T(z)=T_0(1+z)$, is a key prediction of standard cosmology, but this relation is violated in many extensions thereof. Current astrophysical facilities can probe it in the redshift range $0\le z\le6.34$. We extend recent work by Gelo {\it et al.} (2022) showing that for several classes of models (all of which aim to provide alternative mechanisms for the recent acceleration of the universe) the constraining power of these measurements is comparable to that of other background cosmology probes. Specifically, we discuss constraints on two classes of models not considered in the earlier work: a model with torsion and a recently proposed phenomenological dynamical dark energy model which can be thought of as a varying speed of light model. Moreover, for both these models and also for those in the earlier work, we discuss how current constraints may be improved by next-generation ground and space astrophysical facilities. Overall, we conclude that these measurements have a significant cosmological impact, mainly because they often constrain combinations of model parameters that are orthogonal, in the relevant parameter space, to those of other probes.
△ Less
Submitted 7 April, 2024;
originally announced April 2024.
-
A face-centred finite volume method for laminar and turbulent incompressible flows
Authors:
Luan M. Vieira,
Matteo Giacomini,
Ruben Sevilla,
Antonio Huerta
Abstract:
This work develops, for the first time, a face-centred finite volume (FCFV) solver for the simulation of laminar and turbulent viscous incompressible flows. The formulation relies on the Reynolds-averaged Navier-Stokes (RANS) equations coupled with the negative Spalart-Allmaras (SA) model and three novel convective stabilisations, inspired by Riemann solvers, are derived and compared numerically.…
▽ More
This work develops, for the first time, a face-centred finite volume (FCFV) solver for the simulation of laminar and turbulent viscous incompressible flows. The formulation relies on the Reynolds-averaged Navier-Stokes (RANS) equations coupled with the negative Spalart-Allmaras (SA) model and three novel convective stabilisations, inspired by Riemann solvers, are derived and compared numerically. The resulting method achieves first-order convergence of the velocity, the velocity-gradient tensor and the pressure. FCFV accurately predicts engineering quantities of interest, such as drag and lift, on unstructured meshes and, by avoiding gradient reconstruction, the method is less sensitive to mesh quality than other FV methods, even in the presence of highly distorted and stretched cells. A monolithic and a staggered solution strategies for the RANS-SA system are derived and compared numerically. Numerical benchmarks, involving laminar and turbulent, steady and transient cases are used to assess the performance, accuracy and robustness of the proposed FCFV method.
△ Less
Submitted 11 June, 2024; v1 submitted 3 March, 2024;
originally announced March 2024.
-
The Gauss map of hypersurfaces with constant weighted mean curvature in the Gaussian space
Authors:
Michael Gomez,
Matheus Vieira
Abstract:
In this paper we study the Gauss map of hypersurfaces with constant weighted mean curvature in the Gaussian space. We show that if the image of the Gauss map is in a closed hemisphere, then the hypersurface is a hyperplane or a generalized cylinder. We also show that if the image of the Gauss map is in $S^{n}\setminus\bar{S}_{+}^{n-1}$, then the hypersurface is a hyperplane. This generalizes previ…
▽ More
In this paper we study the Gauss map of hypersurfaces with constant weighted mean curvature in the Gaussian space. We show that if the image of the Gauss map is in a closed hemisphere, then the hypersurface is a hyperplane or a generalized cylinder. We also show that if the image of the Gauss map is in $S^{n}\setminus\bar{S}_{+}^{n-1}$, then the hypersurface is a hyperplane. This generalizes previous results for self-shrinkers obtained by Ding-Xin-Yang.
△ Less
Submitted 23 January, 2024; v1 submitted 1 December, 2023;
originally announced December 2023.
-
Weak Stability and Quasistability
Authors:
C. S. Kubrusly,
P. C. M. Vieira
Abstract:
It is known that weak l-sequential supercyclicity implies weak quasistability, and it is still unknown weather weak l-sequential supercyclicity implies weak stability, much less whether weak supercyclicity implies weak stability (although it is known for a long time that strong supercyclicity implies strong stability). It is shown that weak l-sequential supercyclicity implies weak stability under…
▽ More
It is known that weak l-sequential supercyclicity implies weak quasistability, and it is still unknown weather weak l-sequential supercyclicity implies weak stability, much less whether weak supercyclicity implies weak stability (although it is known for a long time that strong supercyclicity implies strong stability). It is shown that weak l-sequential supercyclicity implies weak stability under the assumption of boundedly spaced subsequences. It is given an example of a power bounded quasistable operator which is not weakly stable.
△ Less
Submitted 16 December, 2024; v1 submitted 23 November, 2023;
originally announced November 2023.
-
Hybrid Minimax-MCTS and Difficulty Adjustment for General Game Playing
Authors:
Marco Antônio Athayde de Aguiar Vieira,
Anderson Rocha Tavares,
Renato Perez Ribas
Abstract:
Board games are a great source of entertainment for all ages, as they create a competitive and engaging environment, as well as stimulating learning and strategic thinking. It is common for digital versions of board games, as any other type of digital games, to offer the option to select the difficulty of the game. This is usually done by customizing the search parameters of the AI algorithm. Howe…
▽ More
Board games are a great source of entertainment for all ages, as they create a competitive and engaging environment, as well as stimulating learning and strategic thinking. It is common for digital versions of board games, as any other type of digital games, to offer the option to select the difficulty of the game. This is usually done by customizing the search parameters of the AI algorithm. However, this approach cannot be extended to General Game Playing agents, as different games might require different parametrization for each difficulty level. In this paper, we present a general approach to implement an artificial intelligence opponent with difficulty levels for zero-sum games, together with a propose of a Minimax-MCTS hybrid algorithm, which combines the minimax search process with GGP aspects of MCTS. This approach was tested in our mobile application LoBoGames, an extensible board games platform, that is intended to have an broad catalog of games, with an emphasis on accessibility: the platform is friendly to visually-impaired users, and is compatible with more than 92\% of Android devices. The tests in this work indicate that both the hybrid Minimax-MCTS and the new difficulty adjustment system are promising GGP approaches that could be expanded in future work.
△ Less
Submitted 25 October, 2023;
originally announced October 2023.
-
Predictive Maintenance Model Based on Anomaly Detection in Induction Motors: A Machine Learning Approach Using Real-Time IoT Data
Authors:
Sergio F. Chevtchenko,
Monalisa C. M. dos Santos,
Diego M. Vieira,
Ricardo L. Mota,
Elisson Rocha,
Bruna V. Cruz,
Danilo Araújo,
Ermeson Andrade
Abstract:
With the support of Internet of Things (IoT) devices, it is possible to acquire data from degradation phenomena and design data-driven models to perform anomaly detection in industrial equipment. This approach not only identifies potential anomalies but can also serve as a first step toward building predictive maintenance policies. In this work, we demonstrate a novel anomaly detection system on i…
▽ More
With the support of Internet of Things (IoT) devices, it is possible to acquire data from degradation phenomena and design data-driven models to perform anomaly detection in industrial equipment. This approach not only identifies potential anomalies but can also serve as a first step toward building predictive maintenance policies. In this work, we demonstrate a novel anomaly detection system on induction motors used in pumps, compressors, fans, and other industrial machines. This work evaluates a combination of pre-processing techniques and machine learning (ML) models with a low computational cost. We use a combination of pre-processing techniques such as Fast Fourier Transform (FFT), Wavelet Transform (WT), and binning, which are well-known approaches for extracting features from raw data. We also aim to guarantee an optimal balance between multiple conflicting parameters, such as anomaly detection rate, false positive rate, and inference speed of the solution. To this end, multiobjective optimization and analysis are performed on the evaluated models. Pareto-optimal solutions are presented to select which models have the best results regarding classification metrics and computational effort. Differently from most works in this field that use publicly available datasets to validate their models, we propose an end-to-end solution combining low-cost and readily available IoT sensors. The approach is validated by acquiring a custom dataset from induction motors. Also, we fuse vibration, temperature, and noise data from these sensors as the input to the proposed ML model. Therefore, we aim to propose a methodology general enough to be applied in different industrial contexts in the future.
△ Less
Submitted 15 October, 2023;
originally announced October 2023.
-
The role of pressure-induced stacking faults on the magnetic properties of gadolinium
Authors:
Rafael Martinho Vieira,
Olle Eriksson,
Torbjörn Björkman,
Ondřej Šipr,
Heike C. Herper
Abstract:
Experimental data show that under pressure, Gd goes through a series of structural transitions hcp to Sm-type (close-packed rhombohedral) to dhcp that is accompanied by a gradual decrease of the Curie temperature and magnetization till the collapse of a finite magnetization close to the dhcp structure. We explore theoretically the pressure-induced changes of the magnetic properties, by describing…
▽ More
Experimental data show that under pressure, Gd goes through a series of structural transitions hcp to Sm-type (close-packed rhombohedral) to dhcp that is accompanied by a gradual decrease of the Curie temperature and magnetization till the collapse of a finite magnetization close to the dhcp structure. We explore theoretically the pressure-induced changes of the magnetic properties, by describing these structural transitions as the formation of fcc stackings faults. Using this approach, we are able to describe correctly the variation of the Curie temperature with pressure, in contrast to a static structural model using the hcp structure.
△ Less
Submitted 21 December, 2023; v1 submitted 3 September, 2023;
originally announced September 2023.
-
Anomaly Detection in Industrial Machinery using IoT Devices and Machine Learning: a Systematic Mapping
Authors:
Sérgio F. Chevtchenko,
Elisson da Silva Rocha,
Monalisa Cristina Moura Dos Santos,
Ricardo Lins Mota,
Diego Moura Vieira,
Ermeson Carneiro de Andrade,
Danilo Ricardo Barbosa de Araújo
Abstract:
Anomaly detection is critical in the smart industry for preventing equipment failure, reducing downtime, and improving safety. Internet of Things (IoT) has enabled the collection of large volumes of data from industrial machinery, providing a rich source of information for Anomaly Detection. However, the volume and complexity of data generated by the Internet of Things ecosystems make it difficult…
▽ More
Anomaly detection is critical in the smart industry for preventing equipment failure, reducing downtime, and improving safety. Internet of Things (IoT) has enabled the collection of large volumes of data from industrial machinery, providing a rich source of information for Anomaly Detection. However, the volume and complexity of data generated by the Internet of Things ecosystems make it difficult for humans to detect anomalies manually. Machine learning (ML) algorithms can automate anomaly detection in industrial machinery by analyzing generated data. Besides, each technique has specific strengths and weaknesses based on the data nature and its corresponding systems. However, the current systematic mapping studies on Anomaly Detection primarily focus on addressing network and cybersecurity-related problems, with limited attention given to the industrial sector. Additionally, these studies do not cover the challenges involved in using ML for Anomaly Detection in industrial machinery within the context of the IoT ecosystems. This paper presents a systematic mapping study on Anomaly Detection for industrial machinery using IoT devices and ML algorithms to address this gap. The study comprehensively evaluates 84 relevant studies spanning from 2016 to 2023, providing an extensive review of Anomaly Detection research. Our findings identify the most commonly used algorithms, preprocessing techniques, and sensor types. Additionally, this review identifies application areas and points to future challenges and research opportunities.
△ Less
Submitted 14 November, 2023; v1 submitted 28 July, 2023;
originally announced July 2023.
-
Giant magnetocaloric effect in the (Mn,Fe)NiSi-system
Authors:
Sagar Ghorai,
Rafael Martinho Vieira,
Vitalii Shtender,
Erna K. Delczeg-Czirjak,
Heike C. Herper,
Torbjörn Björkman,
Sergei I. Simak,
Olle Eriksson,
Martin Sahlberg,
Peter Svedlindh
Abstract:
The search for energy-efficient and environmentally friendly cooling technologies is a key driver for the development of magnetic refrigeration based on the magnetocaloric effect (MCE). This phenomenon arises from the interplay between magnetic and lattice degrees of freedom that is strong in certain materials, leading to a change in temperature upon application or removal of a magnetic field. Her…
▽ More
The search for energy-efficient and environmentally friendly cooling technologies is a key driver for the development of magnetic refrigeration based on the magnetocaloric effect (MCE). This phenomenon arises from the interplay between magnetic and lattice degrees of freedom that is strong in certain materials, leading to a change in temperature upon application or removal of a magnetic field. Here we report on a new material, Mn$_{1-x}$Fe$_x$NiSi$_{0.95}$Al$_{0.05}$, with an exceptionally large isothermal entropy at room temperature. By combining experimental and theoretical methods we outline the microscopic mechanism behind the large MCE in this material. It is demonstrated that the competition between the Ni$_2$In-type hexagonal phase and the MnNiSi-type orthorhombic phase, that coexist in this system, combined with the distinctly different magnetic properties of these phases, is a key parameter for the functionality of this material for magnetic cooling.
△ Less
Submitted 30 June, 2023;
originally announced July 2023.
-
Scheduling Network Function Chains Under Sub-Millisecond Latency SLOs
Authors:
Jianfeng Wang,
Siddhant Gupta,
Marcos A. M. Vieira,
Barath Raghavan,
Ramesh Govindan
Abstract:
Network Function Virtualization (NFV) seeks to replace hardware middleboxes with software-based Network Functions (NFs). NFV systems are seeing greater deployment in the cloud and at the edge. However, especially at the edge, there is a mismatch between the traditional focus on NFV throughput and the need to meet very low latency SLOs, as edge services inherently require low latency. Moreover, clo…
▽ More
Network Function Virtualization (NFV) seeks to replace hardware middleboxes with software-based Network Functions (NFs). NFV systems are seeing greater deployment in the cloud and at the edge. However, especially at the edge, there is a mismatch between the traditional focus on NFV throughput and the need to meet very low latency SLOs, as edge services inherently require low latency. Moreover, cloud-based NFV systems need to achieve such low latency while minimizing CPU core usage.
We find that real-world traffic exhibits burstiness that causes latency spikes of up to 10s of milliseconds in existing NFV systems. To address this, we built NetBlaze, which achieves sub-millisecond p99 latency SLOs, even for adversarial traffic, using a novel multi-scale core-scaling strategy. NetBlaze makes traffic-to-core allocation decisions at rack, server, and core-spatial scales, and at increasingly finer timescales, to accommodate multi-timescale bursts. In comparison with state-of-the-art approaches, NetBlaze is the only one capable of achieving sub-millisecond p99 latency SLOs while using a comparable number of cores.
△ Less
Submitted 3 May, 2023;
originally announced May 2023.
-
A study on a Q-Learning algorithm application to a manufacturing assembly problem
Authors:
Miguel Neves,
Miguel Vieira,
Pedro Neto
Abstract:
The development of machine learning algorithms has been gathering relevance to address the increasing modelling complexity of manufacturing decision-making problems. Reinforcement learning is a methodology with great potential due to the reduced need for previous training data, i.e., the system learns along time with actual operation. This study focuses on the implementation of a reinforcement lea…
▽ More
The development of machine learning algorithms has been gathering relevance to address the increasing modelling complexity of manufacturing decision-making problems. Reinforcement learning is a methodology with great potential due to the reduced need for previous training data, i.e., the system learns along time with actual operation. This study focuses on the implementation of a reinforcement learning algorithm in an assembly problem of a given object, aiming to identify the effectiveness of the proposed approach in the optimisation of the assembly process time. A model-free Q-Learning algorithm is applied, considering the learning of a matrix of Q-values (Q-table) from the successive interactions with the environment to suggest an assembly sequence solution. This implementation explores three scenarios with increasing complexity so that the impact of the Q-Learning\textsc's parameters and rewards is assessed to improve the reinforcement learning agent performance. The optimisation approach achieved very promising results by learning the optimal assembly sequence 98.3% of the times.
△ Less
Submitted 17 April, 2023;
originally announced April 2023.
-
Cosmological impact of microwave background temperature measurements
Authors:
L. Gelo,
C. J. A. P. Martins,
N. Quevedo,
A. M. M. Vieira
Abstract:
The cosmic microwave background temperature is a cornerstone astrophysical observable. Its present value is tightly constrained, but its redshift dependence, which can now be determined until redshift $z\sim6.34$, is also an important probe of fundamental cosmology. We show that its constraining power is now comparable to that of other background cosmology probes, including Type Ia supernovae and…
▽ More
The cosmic microwave background temperature is a cornerstone astrophysical observable. Its present value is tightly constrained, but its redshift dependence, which can now be determined until redshift $z\sim6.34$, is also an important probe of fundamental cosmology. We show that its constraining power is now comparable to that of other background cosmology probes, including Type Ia supernovae and Hubble parameter measurements. We illustrate this with three models, each based on a different conceptual paradigm, which aim to explain the recent acceleration of the universe. We find that for parametric extension of $Λ$CDM the combination of temperature and cosmological data significantly improves constraints on the model parameters, while for alternative models without a $Λ$CDM limit this data combination rules them out.
△ Less
Submitted 10 November, 2022;
originally announced November 2022.
-
ABL: An original active blacklist based on a modification of the SMTP
Authors:
Pablo M. Oliveira,
Mateus B. Vieira,
Isaac C. Ferreira,
João P. R. R. Leite,
Edvard M. Oliveira,
Bruno T. Kuehne,
Edmilson M. Moreira,
Otávio A. S. Carpinteiro
Abstract:
This paper presents a novel Active Blacklist (ABL) based on a modification of the Simple Mail Transfer Protocol (SMTP). ABL was implemented in the Mail Transfer Agent (MTA) Postfix of the e-mail server Zimbra and assessed exhaustively in a series of experiments. The modified server Zimbra showed computational performance and costs similar to those of the original server Zimbra when receiving legit…
▽ More
This paper presents a novel Active Blacklist (ABL) based on a modification of the Simple Mail Transfer Protocol (SMTP). ABL was implemented in the Mail Transfer Agent (MTA) Postfix of the e-mail server Zimbra and assessed exhaustively in a series of experiments. The modified server Zimbra showed computational performance and costs similar to those of the original server Zimbra when receiving legitimate e-mails. When receiving spam, however, it showed better computing performance and costs than the original Zimbra. Moreover, there was a considerable computational cost on the spammer's server when it sent spam e-mails. ABL was assessed at the Federal University of Itajubá, Brazil, during a period of sixty-one days. It was responsible for rejecting a percentage of 20.94% of the spam e-mails received by the university during this period. After this period, it was deployed and remained in use, from July-2015 to July-2019, at the university. ABL is part of the new Open Machine-Learning-Based Anti-Spam (Open-MaLBAS). Both ABL and Open-MaLBAS are freely available on GitHub.
△ Less
Submitted 22 August, 2022;
originally announced August 2022.
-
Guidelines for Artifacts to Support Industry-Relevant Research on Self-Adaptation
Authors:
Danny Weyns,
Ilias Gerostathopoulos,
Barbora Buhnova,
Nicolas Cardozo,
Emilia Cioroaica,
Ivana Dusparic,
Lars Grunske,
Pooyan Jamshidi,
Christine Julien,
Judith Michael,
Gabriel Moreno,
Shiva Nejati,
Patrizio Pelliccione,
Federico Quin,
Genaina Rodrigues,
Bradley Schmerl,
Marco Vieira,
Thomas Vogel,
Rebekka Wohlrab
Abstract:
Artifacts support evaluating new research results and help comparing them with the state of the art in a field of interest. Over the past years, several artifacts have been introduced to support research in the field of self-adaptive systems. While these artifacts have shown their value, it is not clear to what extent these artifacts support research on problems in self-adaptation that are relevan…
▽ More
Artifacts support evaluating new research results and help comparing them with the state of the art in a field of interest. Over the past years, several artifacts have been introduced to support research in the field of self-adaptive systems. While these artifacts have shown their value, it is not clear to what extent these artifacts support research on problems in self-adaptation that are relevant to industry. This paper provides a set of guidelines for artifacts that aim at supporting industry-relevant research on self-adaptation. The guidelines that are grounded on data obtained from a survey with practitioners were derived during working sessions at the 17th International Symposium on Software Engineering for Adaptive and Self-Managing Systems. Artifact providers can use the guidelines for aligning future artifacts with industry needs; they can also be used to evaluate the industrial relevance of existing artifacts. We also propose an artifact template.
△ Less
Submitted 24 June, 2022;
originally announced June 2022.
-
Convolutional Neural Network to Restore Low-Dose Digital Breast Tomosynthesis Projections in a Variance Stabilization Domain
Authors:
Rodrigo de Barros Vimieiro,
Chuang Niu,
Hongming Shan,
Lucas Rodrigues Borges,
Ge Wang,
Marcelo Andrade da Costa Vieira
Abstract:
Digital breast tomosynthesis (DBT) exams should utilize the lowest possible radiation dose while maintaining sufficiently good image quality for accurate medical diagnosis. In this work, we propose a convolution neural network (CNN) to restore low-dose (LD) DBT projections to achieve an image quality equivalent to a standard full-dose (FD) acquisition. The proposed network architecture benefits fr…
▽ More
Digital breast tomosynthesis (DBT) exams should utilize the lowest possible radiation dose while maintaining sufficiently good image quality for accurate medical diagnosis. In this work, we propose a convolution neural network (CNN) to restore low-dose (LD) DBT projections to achieve an image quality equivalent to a standard full-dose (FD) acquisition. The proposed network architecture benefits from priors in terms of layers that were inspired by traditional model-based (MB) restoration methods, considering a model-based deep learning approach, where the network is trained to operate in the variance stabilization transformation (VST) domain. To accurately control the network operation point, in terms of noise and blur of the restored image, we propose a loss function that minimizes the bias and matches residual noise between the input and the output. The training dataset was composed of clinical data acquired at the standard FD and low-dose pairs obtained by the injection of quantum noise. The network was tested using real DBT projections acquired with a physical anthropomorphic breast phantom. The proposed network achieved superior results in terms of the mean normalized squared error (MNSE), training time and noise spatial correlation compared with networks trained with traditional data-driven methods. The proposed approach can be extended for other medical imaging application that requires LD acquisitions.
△ Less
Submitted 22 March, 2022;
originally announced March 2022.
-
Powers of posinormal operators
Authors:
C. S. Kubrusly,
P. C. M. Vieira,
J. Zanni
Abstract:
Square of a posinormal operator is not necessarily posinormal$.$ But (i) powers of quasiposinormal operators are quasiposinormal and, under closed ranges assumption, powers of (ii) posinormal operators are posinormal, (iii) of operators that are both posinormal and coposinormal are posinormal and coposinormal, and (iv) of semi-Fredholm posinormal operators are posinormal.
Square of a posinormal operator is not necessarily posinormal$.$ But (i) powers of quasiposinormal operators are quasiposinormal and, under closed ranges assumption, powers of (ii) posinormal operators are posinormal, (iii) of operators that are both posinormal and coposinormal are posinormal and coposinormal, and (iv) of semi-Fredholm posinormal operators are posinormal.
△ Less
Submitted 18 February, 2022;
originally announced February 2022.
-
Automatic evaluation of scientific abstracts through natural language processing
Authors:
Lucas G. O. Lopes,
Thales M. A. Vieira,
William W. M. Lira
Abstract:
This work presents a framework to classify and evaluate distinct research abstract texts which are focused on the description of processes and their applications. In this context, this paper proposes natural language processing algorithms to classify, segment and evaluate the results of scientific work. Initially, the proposed framework categorize the abstract texts into according to the problems…
▽ More
This work presents a framework to classify and evaluate distinct research abstract texts which are focused on the description of processes and their applications. In this context, this paper proposes natural language processing algorithms to classify, segment and evaluate the results of scientific work. Initially, the proposed framework categorize the abstract texts into according to the problems intended to be solved by employing a text classification approach. Then, the abstract text is segmented into problem description, methodology and results. Finally, the methodology of the abstract is ranked based on the sentiment analysis of its results. The proposed framework allows us to quickly rank the best methods to solve specific problems. To validate the proposed framework, oil production anomaly abstracts were experimented and achieved promising results.
△ Less
Submitted 14 November, 2021;
originally announced December 2021.
-
Impact of loss functions on the performance of a deep neural network designed to restore low-dose digital mammography
Authors:
Hongming Shan,
Rodrigo de Barros Vimieiro,
Lucas Rodrigues Borges,
Marcelo Andrade da Costa Vieira,
Ge Wang
Abstract:
Digital mammography is still the most common imaging tool for breast cancer screening. Although the benefits of using digital mammography for cancer screening outweigh the risks associated with the x-ray exposure, the radiation dose must be kept as low as possible while maintaining the diagnostic utility of the generated images, thus minimizing patient risks. Many studies investigated the feasibil…
▽ More
Digital mammography is still the most common imaging tool for breast cancer screening. Although the benefits of using digital mammography for cancer screening outweigh the risks associated with the x-ray exposure, the radiation dose must be kept as low as possible while maintaining the diagnostic utility of the generated images, thus minimizing patient risks. Many studies investigated the feasibility of dose reduction by restoring low-dose images using deep neural networks. In these cases, choosing the appropriate training database and loss function is crucial and impacts the quality of the results. In this work, a modification of the ResNet architecture, with hierarchical skip connections, is proposed to restore low-dose digital mammography. We compared the restored images to the standard full-dose images. Moreover, we evaluated the performance of several loss functions for this task. For training purposes, we extracted 256,000 image patches from a dataset of 400 images of retrospective clinical mammography exams, where different dose levels were simulated to generate low and standard-dose pairs. To validate the network in a real scenario, a physical anthropomorphic breast phantom was used to acquire real low-dose and standard full-dose images in a commercially avaliable mammography system, which were then processed through our trained model. An analytical restoration model for low-dose digital mammography, previously presented, was used as a benchmark in this work. Objective assessment was performed through the signal-to-noise ratio (SNR) and mean normalized squared error (MNSE), decomposed into residual noise and bias. Results showed that the perceptual loss function (PL4) is able to achieve virtually the same noise levels of a full-dose acquisition, while resulting in smaller signal bias compared to other loss functions.
△ Less
Submitted 12 November, 2021;
originally announced November 2021.
-
Small Data and Process in Data Visualization: The Radical Translations Case Study
Authors:
Arianna Ciula,
Miguel Vieira,
Ginestra Ferraro,
Tiffany Ong,
Sanja Perovic,
Rosa Mucignat,
Niccolò Valmori,
Brecht Deseure,
Erica Joy Mannucci
Abstract:
This paper uses the collaborative project Radical Translations as case study to examine some of the theoretical perspectives informing the adoption and critique of data visualization in the digital humanities with applied examples in context. It showcases how data visualization is used within a King's Digital Lab project lifecycle to facilitate collaborative data exploration within the project int…
▽ More
This paper uses the collaborative project Radical Translations as case study to examine some of the theoretical perspectives informing the adoption and critique of data visualization in the digital humanities with applied examples in context. It showcases how data visualization is used within a King's Digital Lab project lifecycle to facilitate collaborative data exploration within the project interdisciplinary team - to support data curation and cleaning and/or to guide the design process - as well as data analysis by users external to the team. Theoretical issues around bridging the gap between approaches adopted for small and/or large-scale datasets are addressed from functional perspectives with reference to evolving data modelling and software development lifecycle approaches and workflows. While anchored to the specific context of the project under examination, some of the identified trade-offs have epistemological value beyond the specific case study iterations and its design solutions.
△ Less
Submitted 18 October, 2021;
originally announced October 2021.
-
Constant weighted mean curvature hypersurfaces in Shrinking Ricci Solitons
Authors:
Igor Miranda,
Matheus Vieira
Abstract:
In this paper, we study constant weighted mean curvature hypersurfaces in shrinking Ricci solitons. First, we show that a constant weighted mean curvature hypersurface with finite weighted volume cannot lie in a region determined by a special level set of the potential function, unless it is the level set. Next, we show that a compact constant weighted mean curvature hypersurface with a certain up…
▽ More
In this paper, we study constant weighted mean curvature hypersurfaces in shrinking Ricci solitons. First, we show that a constant weighted mean curvature hypersurface with finite weighted volume cannot lie in a region determined by a special level set of the potential function, unless it is the level set. Next, we show that a compact constant weighted mean curvature hypersurface with a certain upper bound or lower bound on the mean curvature is a level set of the potential function. We can apply both results to the cylinder shrinking Ricci soliton ambient space. Finally, we show that a constant weighted mean curvature hypersurface in the Gaussian shrinking Ricci soliton (not necessarily properly immersed) with a certain assumption on the integral of the second fundamental form must be a generalized cylinder.
△ Less
Submitted 5 March, 2022; v1 submitted 30 August, 2021;
originally announced August 2021.
-
BlockColdChain: Vaccine Cold Chain Blockchain
Authors:
Ronan D. Mendonça,
Otávio S. Gomes,
Luiz F. M. Vieira,
Marcos A. M. Vieira,
Alex B. Vieira,
José A. M. Nacif
Abstract:
In this paper, we propose a blockchain-based cold chain technology for vaccine cooling track. The COVID-19 pandemic has caused the death of millions of people. An important step towards ending the pandemic is vaccination. Vaccines must be kept under control temperature during the whole process, from fabrication to the hands of the health professionals who will immunize the population. However, the…
▽ More
In this paper, we propose a blockchain-based cold chain technology for vaccine cooling track. The COVID-19 pandemic has caused the death of millions of people. An important step towards ending the pandemic is vaccination. Vaccines must be kept under control temperature during the whole process, from fabrication to the hands of the health professionals who will immunize the population. However, there are numerous reports of vaccine loss due to temperature variations, and, currently, people getting vaccinated have no control if their vaccine was kept safe. Blockchain is a technology solution that can provide public and verifiable records. We review the World Health Organization (WHO) cool chain and Blockchain technology. Moreover, we describe current IoT temperature monitoring devices and propose Blockcoldchain to track vaccine cold chain using blockchain, thus proving an unalterable vaccine temperature history. Our experimental results using smart contracts demonstrate the system's feasibility.
△ Less
Submitted 28 April, 2021;
originally announced April 2021.
-
Predicting the pseudocapacitive windows for MXene electrodes with voltage-dependent cluster expansion models
Authors:
James M. Goff,
Francisco Marques dos Santos Vieira,
Nathan D. Keilbart,
Yasuaki Okada,
Ismaila Dabo
Abstract:
MXene transition-metal carbides and nitrides are of growing interest for energy storage applications. These compounds are especially promising for use as pseudocapacitive electrodes due to their ability to convert energy electrochemically at fast rates. Using voltage-dependent cluster expansion models, we predict the charge storage performance of MXene pseudocapacitors for a range of electrode com…
▽ More
MXene transition-metal carbides and nitrides are of growing interest for energy storage applications. These compounds are especially promising for use as pseudocapacitive electrodes due to their ability to convert energy electrochemically at fast rates. Using voltage-dependent cluster expansion models, we predict the charge storage performance of MXene pseudocapacitors for a range of electrode compositions. $M_3C_2O_2$ electrodes based on group-VI transition metals have up to 80% larger areal energy densities than prototypical titanium-based ( e.g. $Ti_3C_2O_2$) MXene electrodes. We attribute this high pseudocapacitance to the Faradaic voltage windows of group-VI MXene electrodes, which are predicted to be 1.2 to 1.8 times larger than those of titanium-based MXenes. The size of the pseudocapacitive voltage window increases with the range of oxidation states that is accessible to the MXene transition metals. By similar mechanisms, the presence of multiple ions in the solvent (Li$^+$ and H$^+$) leads to sharp changes in the transition-metal oxidation states and can significantly increase the charge capacity of MXene pseudocapacitors.
△ Less
Submitted 23 February, 2021;
originally announced February 2021.
-
A Machine Learning model of the combination of normalized SD1 and SD2 indexes from 24h-Heart Rate Variability as a predictor of myocardial infarction
Authors:
Antonio Carlos Silva-Filho,
Sara Raquel Dutra-Macedo,
Adeilson Serra Mendes Vieira,
Cristiano Mostarda
Abstract:
Aim: to evaluate the ability of the nonlinear 24-HRV as a predictor of MI using Machine Learning Methods: The sample was composed of 218 patients divided into two groups (Healthy, n=128; MI n=90). The sample dataset is part of the Telemetric and Holter Electrocardiogram Warehouse (THEW) database, from the University of Rochester Medical Center. We used the most common ML algorithms for accuracy co…
▽ More
Aim: to evaluate the ability of the nonlinear 24-HRV as a predictor of MI using Machine Learning Methods: The sample was composed of 218 patients divided into two groups (Healthy, n=128; MI n=90). The sample dataset is part of the Telemetric and Holter Electrocardiogram Warehouse (THEW) database, from the University of Rochester Medical Center. We used the most common ML algorithms for accuracy comparison with a setting of 10-fold cross-validation (briefly, Linear Regression, Linear Discriminant Analysis, k-Nearest Neighbour, Random Forest, Supporting Vector Machine, Naïve Bayes, C 5.0 and Stochastic Gradient Boosting). Results: The main findings of this study show that the combination of SD1nu + SD2nu has greater predictive power for MI in comparison to other HRV indexes. Conclusion: The ML model using nonlinear HRV indexes showed to be more effective than the linear domain, evidenced through the application of ML, represented by a good precision of the Stochastic Gradient Boosting model.
Keywords: heart rate variability, machine learning, nonlinear domain, cardiovascular disease
△ Less
Submitted 18 February, 2021;
originally announced February 2021.
-
Galleon: Reshaping the Square Peg of NFV
Authors:
Jianfeng Wang,
Tamás Lévai,
Zhuojin Li,
Marcos A. M. Vieira,
Ramesh Govindan,
Barath Raghavan
Abstract:
Software is often used for Network Functions (NFs) -- such as firewalls, NAT, deep packet inspection, and encryption -- that are applied to traffic in the network. The community has hoped that NFV would enable rapid development of new NFs and leverage commodity computing infrastructure. However, the challenge for researchers and operators has been to align the square peg of high-speed packet proce…
▽ More
Software is often used for Network Functions (NFs) -- such as firewalls, NAT, deep packet inspection, and encryption -- that are applied to traffic in the network. The community has hoped that NFV would enable rapid development of new NFs and leverage commodity computing infrastructure. However, the challenge for researchers and operators has been to align the square peg of high-speed packet processing with the round hole of cloud computing infrastructures and abstractions, all while delivering performance, scalability, and isolation. Past work has led to the belief that NFV is different enough that it requires novel, custom approaches that deviate from today's norms. To the contrary, we show that we can achieve performance, scalability, and isolation in NFV judiciously using mechanisms and abstractions of FaaS, the Linux kernel, NIC hardware, and OpenFlow switches. As such, with our system Galleon, NFV can be practically-deployable today in conventional cloud environments while delivering up to double the performance per core compared to the state of the art.
△ Less
Submitted 16 January, 2021;
originally announced January 2021.
-
New classes of spaceable sets of analytic functions on the open unit disk
Authors:
M. Lilian Lourenço,
Daniela M. Vieira
Abstract:
In this paper we study an algebraic and topological structure inside the following sets of special functions: Bloch functions defined on the open unit disk that are unbounded and analytic functions of bounded type defined a Banach algebra E into E, which are not Lorch-analytic.
In this paper we study an algebraic and topological structure inside the following sets of special functions: Bloch functions defined on the open unit disk that are unbounded and analytic functions of bounded type defined a Banach algebra E into E, which are not Lorch-analytic.
△ Less
Submitted 13 November, 2020;
originally announced November 2020.
-
How additive manufacturing can boost the bioactivity of baked functional foods
Authors:
Sara M Oliveira,
Alice Gruppi,
Marta V. Vieira,
Gabriela M. Souza,
António A. Vicente,
José A. C. Teixeira,
Pablo Fuciños,
Giorgia Spigno,
Lorenzo M. Pastrana
Abstract:
The antioxidant activity of baked foods is of utmost interest when envisioning enhancing their health benefits. Incorporating functional ingredients is challenging since their bioactivity naturally declines during baking. In this study, 3D food printing and design of experiments are employed to clarify how the antioxidant activity of cookies enriched with encapsulated polyphenols can be maximized.…
▽ More
The antioxidant activity of baked foods is of utmost interest when envisioning enhancing their health benefits. Incorporating functional ingredients is challenging since their bioactivity naturally declines during baking. In this study, 3D food printing and design of experiments are employed to clarify how the antioxidant activity of cookies enriched with encapsulated polyphenols can be maximized. A synergistic effect between encapsulation, time, temperature, number of layers, and infill of the printed cookies was observed on the moisture and antioxidant activity. Four-layer cookies with 30 % infill provided the highest bioactivity and phenolic content if baked for 10 min and at 180 °C. The bioacitivity and total phenolic content improved by 115 % and 173 %, respectively, comparing to free extract cookies. Moreover, the proper combination of the design and baking variables allowed to vary the bioactivity of cooked cookies (moisture 3-5 %) between 300 to 700 μmolTR/gdry. The additive manufacture of foods with interconnected pores could accelerate baking and browning, or reduce thermal degradation. This represents a potential approach to enhance the functional and healthy properties of cookies or other thermal treated bioactive food products.
△ Less
Submitted 27 October, 2020;
originally announced October 2020.
-
Boundedly Spaced Subsequences and Weak Dynamics
Authors:
C. S. Kubrusly,
P. C. M. Vieira
Abstract:
The purpose of this paper is to characterize weak supercyclicity for Hilbert-space contractions, which is shown to be equivalent to characterizing weak supercyclicity for unitary operators$.$ This is naturally motivated by an open question that asks whether every weakly supercyclic power bounded operator is weakly stable (which in turn is naturally motivated by a result that asserts that every sup…
▽ More
The purpose of this paper is to characterize weak supercyclicity for Hilbert-space contractions, which is shown to be equivalent to characterizing weak supercyclicity for unitary operators$.$ This is naturally motivated by an open question that asks whether every weakly supercyclic power bounded operator is weakly stable (which in turn is naturally motivated by a result that asserts that every supercyclic power bounded operator is strongly stable)$.$ Precisely, weakly supercyclicity is investigated in light of boundedly spaced subsequences as discussed in Lemma 3.1$.$ The main result in Theorem 4.1 characterizes weakly l-sequentially supercyclic unitary operators $U\!$ that are weakly unstable in terms of boundedly spaced subsequences of the power sequence $\{U^n\}.$ Remark 4.1 shows that characterizing any form of weak super\-cyclicity for weakly unstable unitary operators is equivalent to characterizing any form of weak supercyclicity for weakly unstable contractions after the Nagy--Foia\c s--Langer decomposition.
△ Less
Submitted 26 October, 2020;
originally announced October 2020.
-
Biharmonic hypersurfaces in hemispheres
Authors:
Matheus Vieira
Abstract:
In this paper we consider the Balmuş-Montaldo-Oniciuc's conjecture in the case of hemispheres. We prove that a compact non-minimal biharmonic hypersurface in a hemisphere of $S^{n+1}$ must be the small hypersphere $S^{n}\left(1/\sqrt{2}\right)$, provided that $n^{2}-H^{2}$ does not change sign.
In this paper we consider the Balmuş-Montaldo-Oniciuc's conjecture in the case of hemispheres. We prove that a compact non-minimal biharmonic hypersurface in a hemisphere of $S^{n+1}$ must be the small hypersphere $S^{n}\left(1/\sqrt{2}\right)$, provided that $n^{2}-H^{2}$ does not change sign.
△ Less
Submitted 1 November, 2020; v1 submitted 19 August, 2020;
originally announced August 2020.
-
Applying Lie Groups Approaches for Rigid Registration of Point Clouds
Authors:
Liliane Rodrigues de Almeida,
Gilson A. Giraldi,
Marcelo Bernardes Vieira
Abstract:
In the last decades, some literature appeared using the Lie groups theory to solve problems in computer vision. On the other hand, Lie algebraic representations of the transformations therein were introduced to overcome the difficulties behind group structure by mapping the transformation groups to linear spaces. In this paper we focus on application of Lie groups and Lie algebras to find the rigi…
▽ More
In the last decades, some literature appeared using the Lie groups theory to solve problems in computer vision. On the other hand, Lie algebraic representations of the transformations therein were introduced to overcome the difficulties behind group structure by mapping the transformation groups to linear spaces. In this paper we focus on application of Lie groups and Lie algebras to find the rigid transformation that best register two surfaces represented by point clouds. The so called pairwise rigid registration can be formulated by comparing intrinsic second-order orientation tensors that encode local geometry. These tensors can be (locally) represented by symmetric non-negative definite matrices. In this paper we interpret the obtained tensor field as a multivariate normal model. So, we start with the fact that the space of Gaussians can be equipped with a Lie group structure, that is isomorphic to a subgroup of the upper triangular matrices. Consequently, the associated Lie algebra structure enables us to handle Gaussians, and consequently, to compare orientation tensors, with Euclidean operations. We apply this methodology to variants of the Iterative Closest Point (ICP), a known technique for pairwise registration. We compare the obtained results with the original implementations that apply the comparative tensor shape factor (CTSF), which is a similarity notion based on the eigenvalues of the orientation tensors. We notice that the similarity measure in tensor spaces directly derived from Lie's approach is not invariant under rotations, which is a problem in terms of rigid registration. Despite of this, the performed computational experiments show promising results when embedding orientation tensor fields in Lie algebras.
△ Less
Submitted 23 June, 2020;
originally announced June 2020.
-
A Model-Based Approach to Anomaly Detection Trading Detection Time and False Alarm Rate
Authors:
Charles F. Gonçalves,
Daniel S. Menasché,
Alberto Avritzer,
Nuno Antunes,
Marco Vieira
Abstract:
The complexity and ubiquity of modern computing systems is a fertile ground for anomalies, including security and privacy breaches. In this paper, we propose a new methodology that addresses the practical challenges to implement anomaly detection approaches. Specifically, it is challenging to define normal behavior comprehensively and to acquire data on anomalies in diverse cloud environments. To…
▽ More
The complexity and ubiquity of modern computing systems is a fertile ground for anomalies, including security and privacy breaches. In this paper, we propose a new methodology that addresses the practical challenges to implement anomaly detection approaches. Specifically, it is challenging to define normal behavior comprehensively and to acquire data on anomalies in diverse cloud environments. To tackle those challenges, we focus on anomaly detection approaches based on system performance signatures. In particular, performance signatures have the potential of detecting zero-day attacks, as those approaches are based on detecting performance deviations and do not require detailed knowledge of attack history. The proposed methodology leverages an analytical performance model and experimentation and allows to control the rate of false positives in a principled manner. The methodology is evaluated using the TPCx-V workload, which was profiled during a set of executions using resource exhaustion anomalies that emulate the effects of anomalies affecting system performance. The proposed approach was able to successfully detect the anomalies, with a low number of false positives (precision 90%-98%).
△ Less
Submitted 15 June, 2020;
originally announced June 2020.
-
On Localizing a Camera from a Single Image
Authors:
Pradipta Ghosh,
Xiaochen Liu,
Hang Qiu,
Marcos A. M. Vieira,
Gaurav S. Sukhatme,
Ramesh Govindan
Abstract:
Public cameras often have limited metadata describing their attributes. A key missing attribute is the precise location of the camera, using which it is possible to precisely pinpoint the location of events seen in the camera. In this paper, we explore the following question: under what conditions is it possible to estimate the location of a camera from a single image taken by the camera? We show…
▽ More
Public cameras often have limited metadata describing their attributes. A key missing attribute is the precise location of the camera, using which it is possible to precisely pinpoint the location of events seen in the camera. In this paper, we explore the following question: under what conditions is it possible to estimate the location of a camera from a single image taken by the camera? We show that, using a judicious combination of projective geometry, neural networks, and crowd-sourced annotations from human workers, it is possible to position 95% of the images in our test data set to within 12 m. This performance is two orders of magnitude better than PoseNet, a state-of-the-art neural network that, when trained on a large corpus of images in an area, can estimate the pose of a single image. Finally, we show that the camera's inferred position and intrinsic parameters can help design a number of virtual sensors, all of which are reasonably accurate.
△ Less
Submitted 24 March, 2020;
originally announced March 2020.
-
Characterizing Synchronous Writes in Stable Memory Devices
Authors:
William B. Mingardi,
Gustavo M. D. Vieira
Abstract:
Distributed algorithms that operate in the fail-recovery model rely on the state stored in stable memory to guarantee the irreversibility of operations even in the presence of failures. The performance of these algorithms lean heavily on the performance of stable memory. Current storage technologies have a defined performance profile: data is accessed in blocks of hundreds or thousands of bytes, r…
▽ More
Distributed algorithms that operate in the fail-recovery model rely on the state stored in stable memory to guarantee the irreversibility of operations even in the presence of failures. The performance of these algorithms lean heavily on the performance of stable memory. Current storage technologies have a defined performance profile: data is accessed in blocks of hundreds or thousands of bytes, random access to these blocks is expensive and sequential access is somewhat better. File system implementations hide some of the performance limitations of the underlying storage devices using buffers and caches. However, fail-recovery distributed algorithms bypass some of these techniques and perform synchronous writes to be able to tolerate a failure during the write itself. Assuming the distributed system designer is able to buffer the algorithm's writes, we ask how buffer size and latency complement each other. In this paper we start to answer this question by characterizing the performance (throughput and latency) of typical stable memory devices using a representative set of current file systems.
△ Less
Submitted 18 February, 2020;
originally announced February 2020.
-
Decentralized Validation for Non-malicious Arbitrary Fault Tolerance in Paxos
Authors:
Rodrigo R. Barbieri,
Enrique S. dos Santos,
Gustavo M. D. Vieira
Abstract:
Fault-tolerant distributed systems offer high reliability because even if faults in their components occur, they do not exhibit erroneous behavior. Depending on the fault model adopted, hardware and software errors that do not result in a process crashing are usually not tolerated. To tolerate these rather common failures the usual solution is to adopt a stronger fault model, such as the arbitrary…
▽ More
Fault-tolerant distributed systems offer high reliability because even if faults in their components occur, they do not exhibit erroneous behavior. Depending on the fault model adopted, hardware and software errors that do not result in a process crashing are usually not tolerated. To tolerate these rather common failures the usual solution is to adopt a stronger fault model, such as the arbitrary or Byzantine fault model. Algorithms created for this fault model, however, are considerably more complex and require more system resources than the ones developed for less strict fault models. One approach to reach a middle ground is the non-malicious arbitrary fault model. This model assumes it is possible to detect and filter faults with a given probability, if these faults are not created with malicious intent, allowing the isolation and mapping of these faults to benign faults. In this paper we describe how we incremented an implementation of active replication in the non-malicious fault model with a basic type of distributed validation, where a deviation from the expected algorithm behavior will make a process crash. We experimentally evaluate this implementation using a fault injection framework showing that it is feasible to extend the concept of non-malicious failures beyond hardware failures.
△ Less
Submitted 18 February, 2020;
originally announced February 2020.
-
Rapid Top-Down Synthesis of Large-Scale IoT Networks
Authors:
Pradipta Ghosh,
Jonathan Bunton,
Dimitrios Pylorof,
Marcos Vieira,
Kevin Chan,
Ramesh Govindan,
Gaurav Sukhatme,
Paulo Tabuada,
Gunjan Verma
Abstract:
Advances in optimization and constraint satisfaction techniques, together with the availability of elastic computing resources, have spurred interest in large-scale network verification and synthesis. Motivated by this, we consider the top-down synthesis of ad-hoc IoT networks for disaster response and search and rescue operations. This synthesis problem must satisfy complex and competing constrai…
▽ More
Advances in optimization and constraint satisfaction techniques, together with the availability of elastic computing resources, have spurred interest in large-scale network verification and synthesis. Motivated by this, we consider the top-down synthesis of ad-hoc IoT networks for disaster response and search and rescue operations. This synthesis problem must satisfy complex and competing constraints: sensor coverage, line-of-sight visibility, and network connectivity. The central challenge in our synthesis problem is quickly scaling to large regions while producing cost-effective solutions. We explore two qualitatively different representations of the synthesis problems satisfiability modulo convex optimization (SMC), and mixed-integer linear programming (MILP). The former is more expressive, for our problem, than the latter, but is less well-suited for solving optimization problems like ours. We show how to express our network synthesis in these frameworks, and, to scale to problem sizes beyond what these frameworks are capable of, develop a hierarchical synthesis technique that independently synthesizes networks in sub-regions of the deployment area, then combines these. We find that, while MILP outperforms SMC in some settings for smaller problem sizes, the fact that SMC's expressivity matches our problem ensures that it uniformly generates better quality solutions at larger problem sizes.
△ Less
Submitted 27 March, 2020; v1 submitted 11 February, 2020;
originally announced February 2020.
-
Gravitational cubic-in-spin interaction at the next-to-leading post-Newtonian order
Authors:
Michèle Levi,
Stavros Mougiakakos,
Mariana Vieira
Abstract:
In this work we derive for the first time the complete gravitational cubic-in-spin effective action at the next-to-leading order in the post-Newtonian (PN) expansion for the interaction of generic compact binaries via the effective field theory for gravitating spinning objects, which we extend in this work. This sector, which enters at the fourth and a half PN (4.5PN) order for rapidly-rotating co…
▽ More
In this work we derive for the first time the complete gravitational cubic-in-spin effective action at the next-to-leading order in the post-Newtonian (PN) expansion for the interaction of generic compact binaries via the effective field theory for gravitating spinning objects, which we extend in this work. This sector, which enters at the fourth and a half PN (4.5PN) order for rapidly-rotating compact objects, completes finite-size effects up to this PN order, and is the first sector completed beyond the current state of the art for generic compact binary dynamics at the 4PN order. At this order in spins with gravitational nonlinearities we have to take into account additional terms, which arise from a new type of worldline couplings, due to the fact that at this order the Tulczyjew gauge for the rotational degrees of freedom, which involves the linear momentum, can no longer be approximated only in terms of the four-velocity. One of the main motivations for us to tackle this sector is also to see what happens when we go to a sector, which corresponds to the gravitational Compton scattering with quantum spins larger than one, and maybe possibly also get an insight on the inability to uniquely fix its amplitude from factorization when spins larger than two are involved. A general observation that we can clearly make already is that even-parity sectors in the order of the spin are easier to handle than odd ones. In the quantum context this corresponds to the greater ease of dealing with bosons compared to fermions.
△ Less
Submitted 13 January, 2021; v1 submitted 12 December, 2019;
originally announced December 2019.
-
Volume growth of complete submanifolds in gradient Ricci Solitons with bounded weighted mean curvature
Authors:
Xu Cheng,
Matheus Vieira,
Detang Zhou
Abstract:
In this article, we study properly immersed complete noncompact submanifolds in a complete shrinking gradient Ricci soliton with weighted mean curvature vector bounded in norm. We prove that such a submanifold must have polynomial volume growth under some mild assumption on the potential function. On the other hand, if the ambient manifold is of bounded geometry, we prove that such a submanifold m…
▽ More
In this article, we study properly immersed complete noncompact submanifolds in a complete shrinking gradient Ricci soliton with weighted mean curvature vector bounded in norm. We prove that such a submanifold must have polynomial volume growth under some mild assumption on the potential function. On the other hand, if the ambient manifold is of bounded geometry, we prove that such a submanifold must have at least linear volume growth. In particular, we show that a properly immersed complete noncompact hypersurface in the Euclidean space with bounded Gaussian weighted mean curvature must have polynomial volume growth and at least linear volume growth.
△ Less
Submitted 12 September, 2019;
originally announced September 2019.
-
Towards Models for Availability and Security Evaluation of Cloud Computing with Moving Target Defense
Authors:
Matheus Torquato,
Marco Vieira
Abstract:
Security is one of the most relevant concerns in cloud computing. With the evolution of cyber-security threats, developing innovative techniques to thwart attacks is of utmost importance. One recent method to improve cloud computing security is Moving Target Defense (MTD). MTD makes use of dynamic reconfiguration in virtualized environments to "confuse" attackers or to nullify their knowledge abou…
▽ More
Security is one of the most relevant concerns in cloud computing. With the evolution of cyber-security threats, developing innovative techniques to thwart attacks is of utmost importance. One recent method to improve cloud computing security is Moving Target Defense (MTD). MTD makes use of dynamic reconfiguration in virtualized environments to "confuse" attackers or to nullify their knowledge about the system state. However, there is still no consolidated mechanism to evaluate the trade-offs between availability and security when using MTD on cloud computing. The evaluation through measurements is complex as one needs to deal with unexpected events as failures and attacks. To overcome this challenge, we intend to propose a set of models to evaluate the availability and security of MTD in cloud computing environments. The expected results include the quantification of availability and security levels under different conditions (e.g., different software aging rates, varying workloads, different attack intensities).
△ Less
Submitted 3 September, 2019;
originally announced September 2019.