-
MEQA: A Meta-Evaluation Framework for Question & Answer LLM Benchmarks
Authors:
Jaime Raldua Veuthey,
Zainab Ali Majid,
Suhas Hariharan,
Jacob Haimes
Abstract:
As Large Language Models (LLMs) advance, their potential for widespread societal impact grows simultaneously. Hence, rigorous LLM evaluations are both a technical necessity and social imperative. While numerous evaluation benchmarks have been developed, there remains a critical gap in meta-evaluation: effectively assessing benchmarks' quality. We propose MEQA, a framework for the meta-evaluation o…
▽ More
As Large Language Models (LLMs) advance, their potential for widespread societal impact grows simultaneously. Hence, rigorous LLM evaluations are both a technical necessity and social imperative. While numerous evaluation benchmarks have been developed, there remains a critical gap in meta-evaluation: effectively assessing benchmarks' quality. We propose MEQA, a framework for the meta-evaluation of question and answer (QA) benchmarks, to provide standardized assessments, quantifiable scores, and enable meaningful intra-benchmark comparisons. We demonstrate this approach on cybersecurity benchmarks, using human and LLM evaluators, highlighting the benchmarks' strengths and weaknesses. We motivate our choice of test domain by AI models' dual nature as powerful defensive tools and security threats.
△ Less
Submitted 18 April, 2025;
originally announced April 2025.
-
Solaris: A Foundation Model of the Sun
Authors:
Harris Abdul Majid,
Pietro Sittoni,
Francesco Tudisco
Abstract:
Foundation models have demonstrated remarkable success across various scientific domains, motivating our exploration of their potential in solar physics. In this paper, we present Solaris, the first foundation model for forecasting the Sun's atmosphere. We leverage 13 years of full-disk, multi-wavelength solar imagery from the Solar Dynamics Observatory, spanning a complete solar cycle, to pre-tra…
▽ More
Foundation models have demonstrated remarkable success across various scientific domains, motivating our exploration of their potential in solar physics. In this paper, we present Solaris, the first foundation model for forecasting the Sun's atmosphere. We leverage 13 years of full-disk, multi-wavelength solar imagery from the Solar Dynamics Observatory, spanning a complete solar cycle, to pre-train Solaris for 12-hour interval forecasting. Solaris is built on a large-scale 3D Swin Transformer architecture with 109 million parameters. We demonstrate Solaris' ability to generalize by fine-tuning on a low-data regime using a single wavelength (1700 Å), that was not included in pre-training, outperforming models trained from scratch on this specific wavelength. Our results indicate that Solaris can effectively capture the complex dynamics of the solar atmosphere and transform solar forecasting.
△ Less
Submitted 25 November, 2024;
originally announced November 2024.
-
Rethinking CyberSecEval: An LLM-Aided Approach to Evaluation Critique
Authors:
Suhas Hariharan,
Zainab Ali Majid,
Jaime Raldua Veuthey,
Jacob Haimes
Abstract:
A key development in the cybersecurity evaluations space is the work carried out by Meta, through their CyberSecEval approach. While this work is undoubtedly a useful contribution to a nascent field, there are notable features that limit its utility. Key drawbacks focus on the insecure code detection part of Meta's methodology. We explore these limitations, and use our exploration as a test case f…
▽ More
A key development in the cybersecurity evaluations space is the work carried out by Meta, through their CyberSecEval approach. While this work is undoubtedly a useful contribution to a nascent field, there are notable features that limit its utility. Key drawbacks focus on the insecure code detection part of Meta's methodology. We explore these limitations, and use our exploration as a test case for LLM-assisted benchmark analysis.
△ Less
Submitted 13 November, 2024;
originally announced November 2024.
-
Extracting Paragraphs from LLM Token Activations
Authors:
Nicholas Pochinkov,
Angelo Benoit,
Lovkush Agarwal,
Zainab Ali Majid,
Lucile Ter-Minassian
Abstract:
Generative large language models (LLMs) excel in natural language processing tasks, yet their inner workings remain underexplored beyond token-level predictions. This study investigates the degree to which these models decide the content of a paragraph at its onset, shedding light on their contextual understanding. By examining the information encoded in single-token activations, specifically the…
▽ More
Generative large language models (LLMs) excel in natural language processing tasks, yet their inner workings remain underexplored beyond token-level predictions. This study investigates the degree to which these models decide the content of a paragraph at its onset, shedding light on their contextual understanding. By examining the information encoded in single-token activations, specifically the "\textbackslash n\textbackslash n" double newline token, we demonstrate that patching these activations can transfer significant information about the context of the following paragraph, providing further insights into the model's capacity to plan ahead.
△ Less
Submitted 10 September, 2024;
originally announced September 2024.
-
A Recent Survey of Vision Transformers for Medical Image Segmentation
Authors:
Asifullah Khan,
Zunaira Rauf,
Abdul Rehman Khan,
Saima Rathore,
Saddam Hussain Khan,
Najmus Saher Shah,
Umair Farooq,
Hifsa Asif,
Aqsa Asif,
Umme Zahoora,
Rafi Ullah Khalil,
Suleman Qamar,
Umme Hani Asif,
Faiza Babar Khan,
Abdul Majid,
Jeonghwan Gwak
Abstract:
Medical image segmentation plays a crucial role in various healthcare applications, enabling accurate diagnosis, treatment planning, and disease monitoring. Traditionally, convolutional neural networks (CNNs) dominated this domain, excelling at local feature extraction. However, their limitations in capturing long-range dependencies across image regions pose challenges for segmenting complex, inte…
▽ More
Medical image segmentation plays a crucial role in various healthcare applications, enabling accurate diagnosis, treatment planning, and disease monitoring. Traditionally, convolutional neural networks (CNNs) dominated this domain, excelling at local feature extraction. However, their limitations in capturing long-range dependencies across image regions pose challenges for segmenting complex, interconnected structures often encountered in medical data. In recent years, Vision Transformers (ViTs) have emerged as a promising technique for addressing the challenges in medical image segmentation. Their multi-scale attention mechanism enables effective modeling of long-range dependencies between distant structures, crucial for segmenting organs or lesions spanning the image. Additionally, ViTs' ability to discern subtle pattern heterogeneity allows for the precise delineation of intricate boundaries and edges, a critical aspect of accurate medical image segmentation. However, they do lack image-related inductive bias and translational invariance, potentially impacting their performance. Recently, researchers have come up with various ViT-based approaches that incorporate CNNs in their architectures, known as Hybrid Vision Transformers (HVTs) to capture local correlation in addition to the global information in the images. This survey paper provides a detailed review of the recent advancements in ViTs and HVTs for medical image segmentation. Along with the categorization of ViT and HVT-based medical image segmentation approaches, we also present a detailed overview of their real-time applications in several medical image modalities. This survey may serve as a valuable resource for researchers, healthcare practitioners, and students in understanding the state-of-the-art approaches for ViT-based medical image segmentation.
△ Less
Submitted 18 December, 2023; v1 submitted 1 December, 2023;
originally announced December 2023.
-
A Review of Deep Reinforcement Learning in Serverless Computing: Function Scheduling and Resource Auto-Scaling
Authors:
Amjad Yousef Majid,
Eduard Marin
Abstract:
In the rapidly evolving field of serverless computing, efficient function scheduling and resource scaling are critical for optimizing performance and cost. This paper presents a comprehensive review of the application of Deep Reinforcement Learning (DRL) techniques in these areas. We begin by providing an overview of serverless computing, highlighting its benefits and challenges, with a particular…
▽ More
In the rapidly evolving field of serverless computing, efficient function scheduling and resource scaling are critical for optimizing performance and cost. This paper presents a comprehensive review of the application of Deep Reinforcement Learning (DRL) techniques in these areas. We begin by providing an overview of serverless computing, highlighting its benefits and challenges, with a particular focus on function scheduling and resource scaling. We then delve into the principles of deep reinforcement learning (DRL) and its potential for addressing these challenges. A systematic review of recent studies applying DRL to serverless computing is presented, covering various algorithms, models, and performances. Our analysis reveals that DRL, with its ability to learn and adapt from an environment, shows promising results in improving the efficiency of function scheduling and resource scaling in serverless computing. However, several challenges remain, including the need for more realistic simulation environments, handling of cold starts, and the trade-off between learning time and scheduling performance. We conclude by discussing potential future directions for this research area, emphasizing the need for more robust DRL models, better benchmarking methods, and the exploration of multi-agent reinforcement learning for more complex serverless architectures. This review serves as a valuable resource for researchers and practitioners aiming to understand and advance the application of DRL in serverless computing.
△ Less
Submitted 5 October, 2023;
originally announced November 2023.
-
Drug Repurposing Targeting COVID-19 3CL Protease using Molecular Docking and Machine Learning Regression Approach
Authors:
Imra Aqeel,
Abdul Majid
Abstract:
The COVID-19 pandemic has initiated a global health emergency, with an exigent need for effective cure. Progressively, drug repurposing is emerging a promise solution as it saves the time, cost and labor. However, the number of drug candidates that have been identified as being repurposed for the treatment of COVID-19 are still insufficient, so more effective and thorough drug exploring strategies…
▽ More
The COVID-19 pandemic has initiated a global health emergency, with an exigent need for effective cure. Progressively, drug repurposing is emerging a promise solution as it saves the time, cost and labor. However, the number of drug candidates that have been identified as being repurposed for the treatment of COVID-19 are still insufficient, so more effective and thorough drug exploring strategies are required. In this study, we joint the molecular docking with machine learning regression approaches to find some prospective therapeutic candidates for COVID-19 treatment. We screened the 5903 approved drugs for their inhibition by targeting the main protease 3CL of SARS-CoV-2, which is responsible to replicate the virus. Molecular docking is used to calculate the binding affinities of these drugs to the main protease 3CL. We employed several machine learning regression approaches for QSAR modeling to find out some potential drugs with high binding affinities. Our outcomes demonstrated that the Decision Tree Regression (DTR) model with best scores of R2 and RMSE, is the most suitable model to explore the potential drugs. We shortlisted six favorable drugs. These drugs have novel repurposing potential, except for one antiviral ZINC203757351 compound that has already been identified in other studies. We further examined the physiochemical and pharmacokinetic properties of these most potent drugs and their best binding interaction to specific target protease 3CLpro. Our verdicts contribute to the larger goal of finding effective cures for COVID-19, which is an acute global health challenge. The outcomes of our study provide valuable insights into potential therapeutic candidates for COVID-19 treatment.
△ Less
Submitted 23 June, 2024; v1 submitted 25 May, 2023;
originally announced May 2023.
-
Hybrid Approach to Identify Druglikeness Leading Compounds against COVID-19 3CL Protease
Authors:
Imra Aqeel,
Abdul Majid
Abstract:
SARS-COV-2 is a positive single-strand RNA-based macromolecule that has caused the death of more than 6.3 million people since June 2022. Moreover, by disturbing global supply chains through lockdown, the virus has indirectly caused devastating damage to the global economy. It is vital to design and develop drugs for this virus and its various variants. In this paper, we developed an in-silico stu…
▽ More
SARS-COV-2 is a positive single-strand RNA-based macromolecule that has caused the death of more than 6.3 million people since June 2022. Moreover, by disturbing global supply chains through lockdown, the virus has indirectly caused devastating damage to the global economy. It is vital to design and develop drugs for this virus and its various variants. In this paper, we developed an in-silico study-based hybrid framework to repurpose existing therapeutic agents in finding drug-like bioactive molecules that would cure Covid-19. We employed the Lipinski rules on the retrieved molecules from the ChEMBL database and found 133 drug-likeness bioactive molecules against SARS coronavirus 3CL Protease. Based on standard IC50, the dataset was divided into three classes active, inactive, and intermediate. Our comparative analysis demonstrated that the proposed Extra Tree Regressor (ETR) based QSAR model has improved prediction results related to the bioactivity of chemical compounds as compared to Gradient Boosting, XGBoost, Support Vector, Decision Tree, and Random Forest based regressor models. ADMET analysis is carried out to identify thirteen bioactive molecules with ChEMBL IDs 187460, 190743, 222234, 222628, 222735, 222769, 222840, 222893, 225515, 358279, 363535, 365134 and 426898. These molecules are highly suitable drug candidates for SARS-COV-2 3CL Protease. In the next step, the efficacy of bioactive molecules is computed in terms of binding affinity using molecular docking and then shortlisted six bioactive molecules with ChEMBL IDs 187460, 222769, 225515, 358279, 363535, and 365134. These molecules can be suitable drug candidates for SARS-COV-2. It is anticipated that the pharmacologist/drug manufacturer would further investigate these six molecules to find suitable drug candidates for SARS-COV-2. They can adopt these promising compounds for their downstream drug development stages.
△ Less
Submitted 24 August, 2022; v1 submitted 3 August, 2022;
originally announced August 2022.
-
Covy: An AI-powered Robot with a Compound Vision System for Detecting Breaches in Social Distancing
Authors:
Serge Saaybi,
Amjad Yousef Majid,
R Venkatesha Prasad,
Anis Koubaa,
Chris Verhoeven
Abstract:
This paper introduces a compound vision system that enables robots to localize people up to 15m away using a cheap camera. And, it proposes a robust navigation stack that combines Deep Reinforcement Learning (DRL) and a probabilistic localization method. To test the efficacy of these systems, we prototyped a low-cost mobile robot that we call Covy. Covy can be used for applications such as promoti…
▽ More
This paper introduces a compound vision system that enables robots to localize people up to 15m away using a cheap camera. And, it proposes a robust navigation stack that combines Deep Reinforcement Learning (DRL) and a probabilistic localization method. To test the efficacy of these systems, we prototyped a low-cost mobile robot that we call Covy. Covy can be used for applications such as promoting social distancing during pandemics or estimating the density of a crowd. We evaluated Covy's performance through extensive sets of experiments both in simulated and realistic environments. Our results show that Covy's compound vision algorithm doubles the range of the used depth camera, and its hybrid navigation stack is more robust than a pure DRL-based one.
△ Less
Submitted 23 August, 2022; v1 submitted 14 July, 2022;
originally announced July 2022.
-
Deep Reinforcement Learning Versus Evolution Strategies: A Comparative Survey
Authors:
Amjad Yousef Majid,
Serge Saaybi,
Tomas van Rietbergen,
Vincent Francois-Lavet,
R Venkatesha Prasad,
Chris Verhoeven
Abstract:
Deep Reinforcement Learning (DRL) and Evolution Strategies (ESs) have surpassed human-level control in many sequential decision-making problems, yet many open challenges still exist. To get insights into the strengths and weaknesses of DRL versus ESs, an analysis of their respective capabilities and limitations is provided. After presenting their fundamental concepts and algorithms, a comparison i…
▽ More
Deep Reinforcement Learning (DRL) and Evolution Strategies (ESs) have surpassed human-level control in many sequential decision-making problems, yet many open challenges still exist. To get insights into the strengths and weaknesses of DRL versus ESs, an analysis of their respective capabilities and limitations is provided. After presenting their fundamental concepts and algorithms, a comparison is provided on key aspects such as scalability, exploration, adaptation to dynamic environments, and multi-agent learning. Then, the benefits of hybrid algorithms that combine concepts from DRL and ESs are highlighted. Finally, to have an indication about how they compare in real-world applications, a survey of the literature for the set of applications they support is provided.
△ Less
Submitted 28 September, 2021;
originally announced October 2021.
-
Multi-hop Backscatter Tag-to-Tag Networks
Authors:
Amjad Yousef Majid,
Michel Jansen,
Guillermo Ortas Delgado,
Kasım Sinan Yıldırım,
Przemysław Pawełczak
Abstract:
We characterize the performance of a backscatter tag-to-tag (T2T) multi-hop network. For this, we developed a discrete component-based backscatter T2T transceiver and a communication protocol suite. The protocol composed of a novel (i) flooding-based link control tailored towards backscatter transmission, and (ii) low-power listening MAC. The MAC design is based on the new insight that backscatter…
▽ More
We characterize the performance of a backscatter tag-to-tag (T2T) multi-hop network. For this, we developed a discrete component-based backscatter T2T transceiver and a communication protocol suite. The protocol composed of a novel (i) flooding-based link control tailored towards backscatter transmission, and (ii) low-power listening MAC. The MAC design is based on the new insight that backscatter reception is more energy costly than transmission. Our experiments show that multi-hopping extends the coverage of backscatter networks by enabling longer backward T2T links (tag far from the exciter sending to the tag close to the exciter). Four hops, for example, extend the communication range by a factor of two. Furthermore, we show that dead spots in multi-hop T2T networks are far less significant than those in the single-hop T2T networks.
△ Less
Submitted 29 January, 2019;
originally announced January 2019.
-
A Testbed for Transiently Powered Computers
Authors:
Henko Aantjes,
Amjad Y. Majid,
Przemysław Pawełczak
Abstract:
Transiently Powered Computers (TPCs) are novel devices that are battery-less and operate using only ambient energy. Therefore TPCs are prone to frequent power interruptions, and such the need for developing TPC-centric algorithms is a necessity. We advocate that only through a common experimental environment, accessible to everyone, a proper comparison of newly developed algorithms for TPCs can be…
▽ More
Transiently Powered Computers (TPCs) are novel devices that are battery-less and operate using only ambient energy. Therefore TPCs are prone to frequent power interruptions, and such the need for developing TPC-centric algorithms is a necessity. We advocate that only through a common experimental environment, accessible to everyone, a proper comparison of newly developed algorithms for TPCs can be realized. Moreover, only through access to various TPC testbeds---distributed geographically throughout the world---a proper applications testing and validation are possible. We enlist properties and features that any TPC testbed should have, calling for more coordinated action in this domain of TPC research. Finally, we present (to the best of our knowledge) world's first Internet-accessible testbed for TPCs.
△ Less
Submitted 24 June, 2016;
originally announced June 2016.
-
On the Synchronization of Intermittently Powered Wireless Embedded Systems
Authors:
Kasım Sinan Yıldırım,
Henko Aantjes,
Amjad Yousef Majid,
Przemysław Pawełczak
Abstract:
Battery-free computational RFID platforms, such as WISP (Wireless Identification and Sensing Platform), are emerging intermittently powered devices designed for replacing existing battery-powered sensor networks. As their applications become increasingly complex, we anticipate that synchronization (among others) to appear as one of crucial building blocks for collaborative and coordinated actions.…
▽ More
Battery-free computational RFID platforms, such as WISP (Wireless Identification and Sensing Platform), are emerging intermittently powered devices designed for replacing existing battery-powered sensor networks. As their applications become increasingly complex, we anticipate that synchronization (among others) to appear as one of crucial building blocks for collaborative and coordinated actions. With this paper we aim at providing initial observations regarding the synchronization of intermittently powered systems. In particular, we design and implement the first and very initial synchronization protocol for the WISP platform that provides explicit synchronization among individual WISPs that reside inside the communication range of a common RFID reader. Evaluations in our testbed showed that with our mechanism a synchronization error of approximately 1.5 milliseconds can be ensured between the RFID reader and a WISP tag.
△ Less
Submitted 6 June, 2016;
originally announced June 2016.
-
Interference Localization for Uplink OFDMA Systems in Presence of CFOs
Authors:
Arman Farhang,
Arslan Javaid Majid,
Nicola Marchetti,
Linda E. Doyle,
Behrouz Farhang-Boroujeny
Abstract:
Multiple carrier frequency offsets (CFOs) present in the uplink of orthogonal frequency division multiple access (OFDMA) systems adversely affect subcarrier orthogonality and impose a serious performance loss. In this paper, we propose the application of time domain receiver windowing to concentrate the leakage caused by CFOs to a few adjacent subcarriers with almost no additional computational co…
▽ More
Multiple carrier frequency offsets (CFOs) present in the uplink of orthogonal frequency division multiple access (OFDMA) systems adversely affect subcarrier orthogonality and impose a serious performance loss. In this paper, we propose the application of time domain receiver windowing to concentrate the leakage caused by CFOs to a few adjacent subcarriers with almost no additional computational complexity. This allows us to approximate the interference matrix with a quasi-banded matrix by neglecting small elements outside a certain band which enables robust and computationally efficient signal detection. The proposed CFO compensation technique is applicable to all types of subcarrier assignment techniques. Simulation results show that the quasi-banded approximation of the interference matrix is accurate enough to provide almost the same bit error rate performance as that of the optimal solution. The excellent performance of our proposed method is also proven through running an experiment using our FPGA-based system setup.
△ Less
Submitted 6 March, 2014;
originally announced March 2014.
-
Modelling Reactive and Proactive Behaviour in Simulation: A Case Study in a University Organisation
Authors:
Mazlina Abdul Majid,
Peer-Olaf Siebers,
Uwe Aickelin
Abstract:
Simulation is a well established what-if scenario analysis tool in Operational Research (OR). While traditionally Discrete Event Simulation (DES) and System Dynamics Simulation (SDS) are the predominant simulation techniques in OR, a new simulation technique, namely Agent-Based Simulation (ABS), has emerged and is gaining more attention. In our research we focus on discrete simulation methods (i.e…
▽ More
Simulation is a well established what-if scenario analysis tool in Operational Research (OR). While traditionally Discrete Event Simulation (DES) and System Dynamics Simulation (SDS) are the predominant simulation techniques in OR, a new simulation technique, namely Agent-Based Simulation (ABS), has emerged and is gaining more attention. In our research we focus on discrete simulation methods (i.e. DES and ABS). The contribution made by this paper is the comparison of DES and combined DES/ABS for modelling human reactive and different level of detail of human proactive behaviour in service systems. The results of our experiments show that the level of proactiveness considered in the model has a big impact on the simulation output. However, there is not a big difference between the results from the DES and the combined DES/ABS simulation models. Therefore, for service systems of the type we investigated we would suggest to use DES as the preferred analysis tool.
△ Less
Submitted 3 July, 2013;
originally announced July 2013.
-
Modelling Reactive and Proactive Behaviour in Simulation
Authors:
Mazlina Abdul Majid,
Peer-Olaf Siebers,
Uwe Aickelin
Abstract:
This research investigated the simulation model behaviour of a traditional and combined discrete event as well as agent based simulation models when modelling human reactive and proactive behaviour in human centric complex systems. A departmental store was chosen as human centric complex case study where the operation system of a fitting room in WomensWear department was investigated. We have look…
▽ More
This research investigated the simulation model behaviour of a traditional and combined discrete event as well as agent based simulation models when modelling human reactive and proactive behaviour in human centric complex systems. A departmental store was chosen as human centric complex case study where the operation system of a fitting room in WomensWear department was investigated. We have looked at ways to determine the efficiency of new management policies for the fitting room operation through simulating the reactive and proactive behaviour of staff towards customers. Once development of the simulation models and their verification had been done, we carried out a validation experiment in the form of a sensitivity analysis. Subsequently, we executed a statistical analysis where the mixed reactive and proactive behaviour experimental results were compared with some reactive experimental results from previously published works. Generally, this case study discovered that simple proactive individual behaviour could be modelled in both simulation models. In addition, we found the traditional discrete event model performed similar in the simulation model output compared to the combined discrete event and agent based simulation when modelling similar human behaviour.
△ Less
Submitted 18 June, 2010;
originally announced June 2010.
-
Investigating Output Accuracy for a Discrete Event Simulation Model and an Agent Based Simulation Model
Authors:
Mazlina Abdul Majid,
Uwe Aickelin,
Peer-Olaf Siebers
Abstract:
In this paper, we investigate output accuracy for a Discrete Event Simulation (DES) model and Agent Based Simulation (ABS) model. The purpose of this investigation is to find out which of these simulation techniques is the best one for modelling human reactive behaviour in the retail sector. In order to study the output accuracy in both models, we have carried out a validation experiment in which…
▽ More
In this paper, we investigate output accuracy for a Discrete Event Simulation (DES) model and Agent Based Simulation (ABS) model. The purpose of this investigation is to find out which of these simulation techniques is the best one for modelling human reactive behaviour in the retail sector. In order to study the output accuracy in both models, we have carried out a validation experiment in which we compared the results from our simulation models to the performance of a real system. Our experiment was carried out using a large UK department store as a case study. We had to determine an efficient implementation of management policy in the store's fitting room using DES and ABS. Overall, we have found that both simulation models were a good representation of the real system when modelling human reactive behaviour.
△ Less
Submitted 22 March, 2010;
originally announced March 2010.
-
Comparing Simulation Output Accuracy of Discrete Event and Agent Based Models: A Quantitive Approach
Authors:
Mazlina Abdul Majid,
Uwe Aickelin,
Peer-Olaf Siebers
Abstract:
In our research we investigate the output accuracy of discrete event simulation models and agent based simulation models when studying human centric complex systems. In this paper we focus on human reactive behaviour as it is possible in both modelling approaches to implement human reactive behaviour in the model by using standard methods. As a case study we have chosen the retail sector, and he…
▽ More
In our research we investigate the output accuracy of discrete event simulation models and agent based simulation models when studying human centric complex systems. In this paper we focus on human reactive behaviour as it is possible in both modelling approaches to implement human reactive behaviour in the model by using standard methods. As a case study we have chosen the retail sector, and here in particular the operations of the fitting room in the women wear department of a large UK department store. In our case study we looked at ways of determining the efficiency of implementing new management policies for the fitting room operation through modelling the reactive behaviour of staff and customers of the department. First, we have carried out a validation experiment in which we compared the results from our models to the performance of the real system. This experiment also allowed us to establish differences in output accuracy between the two modelling methids. In a second step a multi-scenario experiment was carried out to study the behaviour of the models when they are used for the purpose of operational improvement. Overall we have found that for our case study example both discrete event simulation and agent based simulation have the same potential to support the investigation into the efficiency of implementing new management policies.
△ Less
Submitted 13 January, 2010;
originally announced January 2010.
-
Low-Cost Multi-Gigahertz Test Systems Using CMOS FPGAs and PECL
Authors:
D. C. Keezer,
C. Gray,
A. Majid,
N. Taher
Abstract:
This paper describes two research projects that develop new low-cost techniques for testing devices with multiple high-speed (2 to 5 Gbps) signals. Each project uses commercially available components to keep costs low, yet achieves performance characteristics comparable to (and in some ways exceeding) more expensive ATE. A common CMOS FPGA-based logic core provides flexibility, adaptability, and…
▽ More
This paper describes two research projects that develop new low-cost techniques for testing devices with multiple high-speed (2 to 5 Gbps) signals. Each project uses commercially available components to keep costs low, yet achieves performance characteristics comparable to (and in some ways exceeding) more expensive ATE. A common CMOS FPGA-based logic core provides flexibility, adaptability, and communication with controlling computers while customized positive emitter-coupled logic (PECL) achieves multi-gigahertz data rates with about $\pm$25ps timing accuracy.
△ Less
Submitted 25 October, 2007;
originally announced October 2007.