-
Mixture-of-Experts Graph Transformers for Interpretable Particle Collision Detection
Authors:
Donatella Genovese,
Alessandro Sgroi,
Alessio Devoto,
Samuel Valentine,
Lennox Wood,
Cristiano Sebastiani,
Stefano Giagu,
Monica D'Onofrio,
Simone Scardapane
Abstract:
The Large Hadron Collider at CERN produces immense volumes of complex data from high-energy particle collisions, demanding sophisticated analytical techniques for effective interpretation. Neural Networks, including Graph Neural Networks, have shown promise in tasks such as event classification and object identification by representing collisions as graphs. However, while Graph Neural Networks exc…
▽ More
The Large Hadron Collider at CERN produces immense volumes of complex data from high-energy particle collisions, demanding sophisticated analytical techniques for effective interpretation. Neural Networks, including Graph Neural Networks, have shown promise in tasks such as event classification and object identification by representing collisions as graphs. However, while Graph Neural Networks excel in predictive accuracy, their "black box" nature often limits their interpretability, making it difficult to trust their decision-making processes. In this paper, we propose a novel approach that combines a Graph Transformer model with Mixture-of-Expert layers to achieve high predictive performance while embedding interpretability into the architecture. By leveraging attention maps and expert specialization, the model offers insights into its internal decision-making, linking predictions to physics-informed features. We evaluate the model on simulated events from the ATLAS experiment, focusing on distinguishing rare Supersymmetric signal events from Standard Model background. Our results highlight that the model achieves competitive classification accuracy while providing interpretable outputs that align with known physics, demonstrating its potential as a robust and transparent tool for high-energy physics data analysis. This approach underscores the importance of explainability in machine learning methods applied to high energy physics, offering a path toward greater trust in AI-driven discoveries.
△ Less
Submitted 8 January, 2025; v1 submitted 6 January, 2025;
originally announced January 2025.
-
Scaling Continuous Kernels with Sparse Fourier Domain Learning
Authors:
Clayton Harper,
Luke Wood,
Peter Gerstoft,
Eric C. Larson
Abstract:
We address three key challenges in learning continuous kernel representations: computational efficiency, parameter efficiency, and spectral bias. Continuous kernels have shown significant potential, but their practical adoption is often limited by high computational and memory demands. Additionally, these methods are prone to spectral bias, which impedes their ability to capture high-frequency det…
▽ More
We address three key challenges in learning continuous kernel representations: computational efficiency, parameter efficiency, and spectral bias. Continuous kernels have shown significant potential, but their practical adoption is often limited by high computational and memory demands. Additionally, these methods are prone to spectral bias, which impedes their ability to capture high-frequency details. To overcome these limitations, we propose a novel approach that leverages sparse learning in the Fourier domain. Our method enables the efficient scaling of continuous kernels, drastically reduces computational and memory requirements, and mitigates spectral bias by exploiting the Gibbs phenomenon.
△ Less
Submitted 15 September, 2024;
originally announced September 2024.
-
KerasCV and KerasNLP: Vision and Language Power-Ups
Authors:
Matthew Watson,
Divyashree Shivakumar Sreepathihalli,
Francois Chollet,
Martin Gorner,
Kiranbir Sodhia,
Ramesh Sampath,
Tirth Patel,
Haifeng Jin,
Neel Kovelamudi,
Gabriel Rasskin,
Samaneh Saadat,
Luke Wood,
Chen Qian,
Jonathan Bischof,
Ian Stenbit,
Abheesht Sharma,
Anshuman Mishra
Abstract:
We present the Keras domain packages KerasCV and KerasNLP, extensions of the Keras API for Computer Vision and Natural Language Processing workflows, capable of running on either JAX, TensorFlow, or PyTorch. These domain packages are designed to enable fast experimentation, with a focus on ease-of-use and performance. We adopt a modular, layered design: at the library's lowest level of abstraction…
▽ More
We present the Keras domain packages KerasCV and KerasNLP, extensions of the Keras API for Computer Vision and Natural Language Processing workflows, capable of running on either JAX, TensorFlow, or PyTorch. These domain packages are designed to enable fast experimentation, with a focus on ease-of-use and performance. We adopt a modular, layered design: at the library's lowest level of abstraction, we provide building blocks for creating models and data preprocessing pipelines, and at the library's highest level of abstraction, we provide pretrained ``task" models for popular architectures such as Stable Diffusion, YOLOv8, GPT2, BERT, Mistral, CLIP, Gemma, T5, etc. Task models have built-in preprocessing, pretrained weights, and can be fine-tuned on raw inputs. To enable efficient training, we support XLA compilation for all models, and run all preprocessing via a compiled graph of TensorFlow operations using the tf.data API. The libraries are fully open-source (Apache 2.0 license) and available on GitHub.
△ Less
Submitted 5 June, 2024; v1 submitted 30 May, 2024;
originally announced May 2024.
-
'SSL?! What on earth is that?': Towards Designing Age-Inclusive Secure Smartphone Browsing
Authors:
Pavithren V. S. Pakianathan,
L. Siddharth,
Sujithra Raviselvam,
Kristin L. Wood,
Hyowon Lee,
Pin Sym Foong,
Jianying Zhou,
Simon Tangi Perrault
Abstract:
Owing to the increase in 'certified' phishing websites, there is a steady increase in the number of phishing cases and general susceptibility to phishing. Trust mechanisms (e.g., HTTPS Lock Indicators, SSL Certificates) that help differentiate genuine and phishing websites should therefore be evaluated for their effectiveness in preventing vulnerable users from accessing phishing websites. In this…
▽ More
Owing to the increase in 'certified' phishing websites, there is a steady increase in the number of phishing cases and general susceptibility to phishing. Trust mechanisms (e.g., HTTPS Lock Indicators, SSL Certificates) that help differentiate genuine and phishing websites should therefore be evaluated for their effectiveness in preventing vulnerable users from accessing phishing websites. In this article, we present a study involving 18 adults (male-6; female-12) and 12 older adults (male-4; female-8) to understand the usability of current trust mechanisms and preferred modalities in a conceptualized mechanism. In the first part of the study, using Chrome browser on Android, we asked the participants to browse a banking website and a government website for digital particulars. We asked them to identify which one of the two was a phishing website, rate the usability of both websites and provide qualitative feedback on the trust mechanisms. In the second part, we conceptualized an alternative trust mechanism, which allows seeking social, community and AI-based support to make website trust-related decisions. Herein, we asked the participants as to which modality (social, community or AI) they prefer to seek support from and why it is preferred. Using the current trust mechanisms, none of the participants were able to identify the phishing website. As the participants rated the current mechanisms poorly in terms of usability, they expressed various difficulties that largely did not differ between adults and older adults. In the conceptualized mechanism, we observed a notable difference in the preferred modalities, in that, older adults primarily preferred social support. In addition to these overall findings, specific observations suggest that future trust mechanisms should not only consider age-specific needs but also incorporate substantial improvement in terms of usability.
△ Less
Submitted 29 April, 2025; v1 submitted 4 March, 2024;
originally announced March 2024.
-
Optimizing Group Utility in Itinerary Planning: A Strategic and Crowd-Aware Approach
Authors:
Junhua Liu,
Kwan Hui Lim,
Kristin L. Wood,
Menglin Li
Abstract:
Itinerary recommendation is a complex sequence prediction problem with numerous real-world applications. This task becomes even more challenging when considering the optimization of multiple user queuing times and crowd levels, as well as numerous involved parameters, such as attraction popularity, queuing time, walking time, and operating hours. Existing solutions typically focus on single-person…
▽ More
Itinerary recommendation is a complex sequence prediction problem with numerous real-world applications. This task becomes even more challenging when considering the optimization of multiple user queuing times and crowd levels, as well as numerous involved parameters, such as attraction popularity, queuing time, walking time, and operating hours. Existing solutions typically focus on single-person perspectives and fail to address real-world issues resulting from natural crowd behavior, like the Selfish Routing problem. In this paper, we introduce the Strategic and Crowd-Aware Itinerary Recommendation (SCAIR) algorithm, which optimizes group utility in real-world settings. We model the route recommendation strategy as a Markov Decision Process and propose a State Encoding mechanism that enables real-time planning and allocation in linear time. We evaluate our algorithm against various competitive and realistic baselines using a theme park dataset, demonstrating that SCAIR outperforms these baselines in addressing the Selfish Routing problem across four theme parks.
△ Less
Submitted 10 September, 2023; v1 submitted 4 April, 2023;
originally announced April 2023.
-
Estimation of Average Annual Daily Bicycle Count Using Bike-Share GPS Data and Bike Counter Data for an Urban Active Transportation Network
Authors:
Marzi Rafieenia,
Liza Wood,
Mohsen Zardadi,
Scott Fazackerley,
Ramon Lawrence
Abstract:
In 2018, the City of Kelowna entered into a license agreement with Dropbike to operate a dockless bike-share pilot in and around the downtown core. The bikes were tracked by the user's cell phone GPS through the Dropbike app. The City's Active Transportation team recognized that this GPS data could help understand the routes used by cyclists which would then inform decision-making for infrastructu…
▽ More
In 2018, the City of Kelowna entered into a license agreement with Dropbike to operate a dockless bike-share pilot in and around the downtown core. The bikes were tracked by the user's cell phone GPS through the Dropbike app. The City's Active Transportation team recognized that this GPS data could help understand the routes used by cyclists which would then inform decision-making for infrastructure improvements. Using OSMnx and NetworkX, the map of Kelowna was converted into a graph network to map inaccurate, infrequent GPS points to the nearest street intersection, calculate the potential paths taken by cyclists and count the number of trips by street segment though the comparison of different path-finding models. Combined with the data from four counters around downtown, a mixed effects statistical model and a least squares optimization were used to estimate a relationship between the different traffic patterns of the bike-share and counter data. Using this relationship based on sparse data input from physical counting stations and bike share data, estimations and visualizations of the annual daily bicycle volume in downtown Kelowna were produced. The analysis, modelling and visualization helped to better understand how the bike network was being used in the urban center, including non-traditional routes such as laneways and highway crossings.
△ Less
Submitted 13 February, 2023;
originally announced February 2023.
-
Deep Learning Object Detection Approaches to Signal Identification
Authors:
Luke Wood,
Kevin Anderson,
Peter Gerstoft,
Richard Bell,
Raghab Subbaraman,
Dinesh Bharadia
Abstract:
Traditionally source identification is solved using threshold based energy detection algorithms. These algorithms frequently sum up the activity in regions, and consider regions above a specific activity threshold to be sources. While these algorithms work for the majority of cases, they often fail to detect signals that occupy small frequency bands, fail to distinguish sources with overlapping fr…
▽ More
Traditionally source identification is solved using threshold based energy detection algorithms. These algorithms frequently sum up the activity in regions, and consider regions above a specific activity threshold to be sources. While these algorithms work for the majority of cases, they often fail to detect signals that occupy small frequency bands, fail to distinguish sources with overlapping frequency bands, and cannot detect any signals under a specified signal to noise ratio. Through the conversion of raw signal data to spectrogram, source identification can be framed as an object detection problem. By leveraging modern advancements in deep learning based object detection, we propose a system that manages to alleviate the failure cases encountered when using traditional source identification algorithms. Our contributions include framing source identification as an object detection problem, the publication of a spectrogram object detection dataset, and evaluation of the RetinaNet and YOLOv5 object detection models trained on the dataset. Our final models achieve Mean Average Precisions of up to 0.906. With such a high Mean Average Precision, these models are sufficiently robust for use in real world applications.
△ Less
Submitted 1 November, 2022; v1 submitted 26 October, 2022;
originally announced October 2022.
-
Efficient Graph-Friendly COCO Metric Computation for Train-Time Model Evaluation
Authors:
Luke Wood,
Francois Chollet
Abstract:
Evaluating the COCO mean average precision (MaP) and COCO recall metrics as part of the static computation graph of modern deep learning frameworks poses a unique set of challenges. These challenges include the need for maintaining a dynamic-sized state to compute mean average precision, reliance on global dataset-level statistics to compute the metrics, and managing differing numbers of bounding…
▽ More
Evaluating the COCO mean average precision (MaP) and COCO recall metrics as part of the static computation graph of modern deep learning frameworks poses a unique set of challenges. These challenges include the need for maintaining a dynamic-sized state to compute mean average precision, reliance on global dataset-level statistics to compute the metrics, and managing differing numbers of bounding boxes between images in a batch. As a consequence, it is common practice for researchers and practitioners to evaluate COCO metrics as a post training evaluation step. With a graph-friendly algorithm to compute COCO Mean Average Precision and recall, these metrics could be evaluated at training time, improving visibility into the evolution of the metrics through training curve plots, and decreasing iteration time when prototyping new model versions.
Our contributions include an accurate approximation algorithm for Mean Average Precision, an open source implementation of both COCO mean average precision and COCO recall, extensive numerical benchmarks to verify the accuracy of our implementations, and an open-source training loop that include train-time evaluation of mean average precision and recall.
△ Less
Submitted 21 July, 2022;
originally announced July 2022.
-
AI-assisted Optimization of the ECCE Tracking System at the Electron Ion Collider
Authors:
C. Fanelli,
Z. Papandreou,
K. Suresh,
J. K. Adkins,
Y. Akiba,
A. Albataineh,
M. Amaryan,
I. C. Arsene,
C. Ayerbe Gayoso,
J. Bae,
X. Bai,
M. D. Baker,
M. Bashkanov,
R. Bellwied,
F. Benmokhtar,
V. Berdnikov,
J. C. Bernauer,
F. Bock,
W. Boeglin,
M. Borysova,
E. Brash,
P. Brindza,
W. J. Briscoe,
M. Brooks,
S. Bueltmann
, et al. (258 additional authors not shown)
Abstract:
The Electron-Ion Collider (EIC) is a cutting-edge accelerator facility that will study the nature of the "glue" that binds the building blocks of the visible matter in the universe. The proposed experiment will be realized at Brookhaven National Laboratory in approximately 10 years from now, with detector design and R&D currently ongoing. Notably, EIC is one of the first large-scale facilities to…
▽ More
The Electron-Ion Collider (EIC) is a cutting-edge accelerator facility that will study the nature of the "glue" that binds the building blocks of the visible matter in the universe. The proposed experiment will be realized at Brookhaven National Laboratory in approximately 10 years from now, with detector design and R&D currently ongoing. Notably, EIC is one of the first large-scale facilities to leverage Artificial Intelligence (AI) already starting from the design and R&D phases. The EIC Comprehensive Chromodynamics Experiment (ECCE) is a consortium that proposed a detector design based on a 1.5T solenoid. The EIC detector proposal review concluded that the ECCE design will serve as the reference design for an EIC detector. Herein we describe a comprehensive optimization of the ECCE tracker using AI. The work required a complex parametrization of the simulated detector system. Our approach dealt with an optimization problem in a multidimensional design space driven by multiple objectives that encode the detector performance, while satisfying several mechanical constraints. We describe our strategy and show results obtained for the ECCE tracking system. The AI-assisted design is agnostic to the simulation framework and can be extended to other sub-detectors or to a system of sub-detectors to further optimize the performance of the EIC detector.
△ Less
Submitted 19 May, 2022; v1 submitted 18 May, 2022;
originally announced May 2022.
-
Engineering Knowledge Graph from Patent Database
Authors:
L Siddharth,
Lucienne T. M. Blessing,
Kristin L. Wood,
Jianxi Luo
Abstract:
We propose a large, scalable engineering knowledge graph, comprising sets of (entity, relationship, entity) triples that are real-world engineering facts found in the patent database. We apply a set of rules based on the syntactic and lexical properties of claims in a patent document to extract facts. We aggregate these facts within each patent document and integrate the aggregated sets of facts a…
▽ More
We propose a large, scalable engineering knowledge graph, comprising sets of (entity, relationship, entity) triples that are real-world engineering facts found in the patent database. We apply a set of rules based on the syntactic and lexical properties of claims in a patent document to extract facts. We aggregate these facts within each patent document and integrate the aggregated sets of facts across the patent database to obtain the engineering knowledge graph. Such a knowledge graph is expected to support inference, reasoning, and recalling in various engineering tasks. The knowledge graph has a greater size and coverage in comparison with the previously used knowledge graphs and semantic networks in the engineering literature.
△ Less
Submitted 12 June, 2021;
originally announced June 2021.
-
Data-Driven Design-by-Analogy: State of the Art and Future Directions
Authors:
Shuo Jiang,
Jie Hu,
Kristin L. Wood,
Jianxi Luo
Abstract:
Design-by-Analogy (DbA) is a design methodology wherein new solutions, opportunities or designs are generated in a target domain based on inspiration drawn from a source domain; it can benefit designers in mitigating design fixation and improving design ideation outcomes. Recently, the increasingly available design databases and rapidly advancing data science and artificial intelligence technologi…
▽ More
Design-by-Analogy (DbA) is a design methodology wherein new solutions, opportunities or designs are generated in a target domain based on inspiration drawn from a source domain; it can benefit designers in mitigating design fixation and improving design ideation outcomes. Recently, the increasingly available design databases and rapidly advancing data science and artificial intelligence technologies have presented new opportunities for developing data-driven methods and tools for DbA support. In this study, we survey existing data-driven DbA studies and categorize individual studies according to the data, methods, and applications in four categories, namely, analogy encoding, retrieval, mapping, and evaluation. Based on both nuanced organic review and structured analysis, this paper elucidates the state of the art of data-driven DbA research to date and benchmarks it with the frontier of data science and AI research to identify promising research opportunities and directions for the field. Finally, we propose a future conceptual data-driven DbA system that integrates all propositions.
△ Less
Submitted 3 June, 2021;
originally announced June 2021.
-
Adversarial Training for EM Classification Networks
Authors:
Tom Grimes,
Eric Church,
William Pitts,
Lynn Wood,
Eva Brayfindley,
Luke Erikson,
Mark Greaves
Abstract:
We present a novel variant of Domain Adversarial Networks with impactful improvements to the loss functions, training paradigm, and hyperparameter optimization. New loss functions are defined for both forks of the DANN network, the label predictor and domain classifier, in order to facilitate more rapid gradient descent, provide more seamless integration into modern neural networking frameworks, a…
▽ More
We present a novel variant of Domain Adversarial Networks with impactful improvements to the loss functions, training paradigm, and hyperparameter optimization. New loss functions are defined for both forks of the DANN network, the label predictor and domain classifier, in order to facilitate more rapid gradient descent, provide more seamless integration into modern neural networking frameworks, and allow previously unavailable inferences into network behavior. Using these loss functions, it is possible to extend the concept of 'domain' to include arbitrary user defined labels applicable to subsets of the training data, the test data, or both. As such, the network can be operated in either 'On the Fly' mode where features provided by the feature extractor indicative of differences between 'domain' labels in the training data are removed or in 'Test Collection Informed' mode where features indicative of difference between 'domain' labels in the combined training and test data are removed (without needing to know or provide test activity labels to the network). This work also draws heavily from previous works on Robust Training which draws training examples from a L_inf ball around the training data in order to remove fragile features induced by random fluctuations in the data. On these networks we explore the process of hyperparameter optimization for both the domain adversarial and robust hyperparameters. Finally, this network is applied to the construction of a binary classifier used to identify the presence of EM signal emitted by a turbopump. For this example, the effect of the robust and domain adversarial training is to remove features indicative of the difference in background between instances of operation of the device - providing highly discriminative features on which to construct the classifier.
△ Less
Submitted 20 November, 2020;
originally announced November 2020.
-
Explanation of Unintended Radiated Emission Classification via LIME
Authors:
Tom Grimes,
Eric Church,
William Pitts,
Lynn Wood
Abstract:
Unintended radiated emissions arise during the use of electronic devices. Identifying and mitigating the effects of these emissions is a key element of modern power engineering and associated control systems. Signal processing of the electrical system can identify the sources of these emissions. A dataset known as Flaming Moes includes captured unintended radiated emissions from consumer electroni…
▽ More
Unintended radiated emissions arise during the use of electronic devices. Identifying and mitigating the effects of these emissions is a key element of modern power engineering and associated control systems. Signal processing of the electrical system can identify the sources of these emissions. A dataset known as Flaming Moes includes captured unintended radiated emissions from consumer electronics. This dataset was analyzed to construct next-generation methods for device identification. To this end, a neural network based on applying the ResNet-18 image classification architecture to the short time Fourier transforms of short segments of voltage signatures was constructed. Using this classifier, the 18 device classes and background class were identified with close to 100 percent accuracy. By applying LIME to this classifier and aggregating the results over many classifications for the same device, it was possible to determine the frequency bands used by the classifier to make decisions. Using ensembles of classifiers trained on very similar datasets from the same parent data distribution, it was possible to recover robust sets of features of device output useful for identification. The additional understanding provided by the application of LIME enhances the trainability, trustability, and transferability of URE analysis networks.
△ Less
Submitted 8 September, 2020; v1 submitted 4 September, 2020;
originally announced September 2020.
-
EPIC30M: An Epidemics Corpus Of Over 30 Million Relevant Tweets
Authors:
Junhua Liu,
Trisha Singhal,
Lucienne T. M. Blessing,
Kristin L. Wood,
Kwan Hui Lim
Abstract:
Since the start of COVID-19, several relevant corpora from various sources are presented in the literature that contain millions of data points. While these corpora are valuable in supporting many analyses on this specific pandemic, researchers require additional benchmark corpora that contain other epidemics to facilitate cross-epidemic pattern recognition and trend analysis tasks. During our oth…
▽ More
Since the start of COVID-19, several relevant corpora from various sources are presented in the literature that contain millions of data points. While these corpora are valuable in supporting many analyses on this specific pandemic, researchers require additional benchmark corpora that contain other epidemics to facilitate cross-epidemic pattern recognition and trend analysis tasks. During our other efforts on COVID-19 related work, we discover very little disease related corpora in the literature that are sizable and rich enough to support such cross-epidemic analysis tasks. In this paper, we present EPIC30M, a large-scale epidemic corpus that contains 30 millions micro-blog posts, i.e., tweets crawled from Twitter, from year 2006 to 2020. EPIC30M contains a subset of 26.2 millions tweets related to three general diseases, namely Ebola, Cholera and Swine Flu, and another subset of 4.7 millions tweets of six global epidemic outbreaks, including 2009 H1N1 Swine Flu, 2010 Haiti Cholera, 2012 Middle-East Respiratory Syndrome (MERS), 2013 West African Ebola, 2016 Yemen Cholera and 2018 Kivu Ebola. Furthermore, we explore and discuss the properties of the corpus with statistics of key terms and hashtags and trends analysis for each subset. Finally, we demonstrate the value and impact that EPIC30M could create through a discussion of multiple use cases of cross-epidemic research topics that attract growing interest in recent years. These use cases span multiple research areas, such as epidemiological modeling, pattern recognition, natural language understanding and economical modeling.
△ Less
Submitted 22 June, 2020; v1 submitted 9 June, 2020;
originally announced June 2020.
-
CrisisBERT: a Robust Transformer for Crisis Classification and Contextual Crisis Embedding
Authors:
Junhua Liu,
Trisha Singhal,
Lucienne T. M. Blessing,
Kristin L. Wood,
Kwan Hui Lim
Abstract:
Classification of crisis events, such as natural disasters, terrorist attacks and pandemics, is a crucial task to create early signals and inform relevant parties for spontaneous actions to reduce overall damage. Despite crisis such as natural disasters can be predicted by professional institutions, certain events are first signaled by civilians, such as the recent COVID-19 pandemics. Social media…
▽ More
Classification of crisis events, such as natural disasters, terrorist attacks and pandemics, is a crucial task to create early signals and inform relevant parties for spontaneous actions to reduce overall damage. Despite crisis such as natural disasters can be predicted by professional institutions, certain events are first signaled by civilians, such as the recent COVID-19 pandemics. Social media platforms such as Twitter often exposes firsthand signals on such crises through high volume information exchange over half a billion tweets posted daily. Prior works proposed various crisis embeddings and classification using conventional Machine Learning and Neural Network models. However, none of the works perform crisis embedding and classification using state of the art attention-based deep neural networks models, such as Transformers and document-level contextual embeddings. This work proposes CrisisBERT, an end-to-end transformer-based model for two crisis classification tasks, namely crisis detection and crisis recognition, which shows promising results across accuracy and f1 scores. The proposed model also demonstrates superior robustness over benchmark, as it shows marginal performance compromise while extending from 6 to 36 events with only 51.4% additional data points. We also proposed Crisis2Vec, an attention-based, document-level contextual embedding architecture for crisis embedding, which achieve better performance than conventional crisis embedding methods such as Word2Vec and GloVe. To the best of our knowledge, our works are first to propose using transformer-based crisis classification and document-level contextual crisis embedding in the literature.
△ Less
Submitted 18 May, 2020; v1 submitted 11 May, 2020;
originally announced May 2020.
-
Path tracking control of self-reconfigurable robot hTetro with four differential drive units
Authors:
Yuyao Shi,
Mohan Rajesh Elara,
Anh Vu Le,
Veerajagadheswar Prabakaran,
Kristin L. Wood
Abstract:
The research interest in mobile robots with independent steering wheels has been increasing over recent years due to their high mobility and better payload capacity over the systems using omnidirectional wheels. However, with more controllable degrees of freedom, almost all of the platforms include redundancy which is modeled using the instantaneous center of rotation (ICR). This paper deals with…
▽ More
The research interest in mobile robots with independent steering wheels has been increasing over recent years due to their high mobility and better payload capacity over the systems using omnidirectional wheels. However, with more controllable degrees of freedom, almost all of the platforms include redundancy which is modeled using the instantaneous center of rotation (ICR). This paper deals with a Tetris inspired floor cleaning robot hTetro which consists of four interconnected differential-drive units, i.e., each module has a differential drive unit, which can steer individually. Differing from most other steerable wheeled mobile robots, the wheel arrangement of this robot changes because of its self-reconfigurability. In this paper, we proposed a robust path tracking controller that can handle discontinuous trajectories and sudden orientation changes. Singularity problems are resolved on both the mechanical aspect and control aspect. The controller is tested experimentally with the self-reconfigurable robotic platform hero, and results are discussed.
△ Less
Submitted 15 January, 2020; v1 submitted 20 November, 2019;
originally announced November 2019.
-
IPOD: An Industrial and Professional Occupations Dataset and its Applications to Occupational Data Mining and Analysis
Authors:
Junhua Liu,
Yung Chuen Ng,
Kristin L. Wood,
Kwan Hui Lim
Abstract:
Occupational data mining and analysis is an important task in understanding today's industry and job market. Various machine learning techniques are proposed and gradually deployed to improve companies' operations for upstream tasks, such as employee churn prediction, career trajectory modelling and automated interview. Job titles analysis and embedding, as the fundamental building blocks, are cru…
▽ More
Occupational data mining and analysis is an important task in understanding today's industry and job market. Various machine learning techniques are proposed and gradually deployed to improve companies' operations for upstream tasks, such as employee churn prediction, career trajectory modelling and automated interview. Job titles analysis and embedding, as the fundamental building blocks, are crucial upstream tasks to address these occupational data mining and analysis problems. In this work, we present the Industrial and Professional Occupations Dataset (IPOD), which consists of over 190,000 job titles crawled from over 56,000 profiles from Linkedin. We also illustrate the usefulness of IPOD by addressing two challenging upstream tasks, including: (i) proposing Title2vec, a contextual job title vector representation using a bidirectional Language Model (biLM) approach; and (ii) addressing the important occupational Named Entity Recognition problem using Conditional Random Fields (CRF) and bidirectional Long Short-Term Memory with CRF (LSTM-CRF). Both CRF and LSTM-CRF outperform human and baselines in both exact-match accuracy and F1 scores. The dataset and pre-trained embeddings are available at https://www.github.com/junhua/ipod.
△ Less
Submitted 26 April, 2020; v1 submitted 22 October, 2019;
originally announced October 2019.
-
Strategic and Crowd-Aware Itinerary Recommendation
Authors:
Junhua Liu,
Kristin L. Wood,
Kwan Hui Lim
Abstract:
There is a rapidly growing demand for itinerary planning in tourism but this task remains complex and difficult, especially when considering the need to optimize for queuing time and crowd levels for multiple users. This difficulty is further complicated by the large amount of parameters involved, i.e., attraction popularity, queuing time, walking time, operating hours, etc. Many recent works prop…
▽ More
There is a rapidly growing demand for itinerary planning in tourism but this task remains complex and difficult, especially when considering the need to optimize for queuing time and crowd levels for multiple users. This difficulty is further complicated by the large amount of parameters involved, i.e., attraction popularity, queuing time, walking time, operating hours, etc. Many recent works propose solutions based on the single-person perspective, but otherwise do not address real-world problems resulting from natural crowd behavior, such as the Selfish Routing problem, which describes the consequence of ineffective network and sub-optimal social outcome by leaving agents to decide freely. In this work, we propose the Strategic and Crowd-Aware Itinerary Recommendation (SCAIR) algorithm which optimizes social welfare in real-world situations. We formulate the strategy of route recommendation as Markov chains which enables our simulations to be carried out in poly-time. We then evaluate our proposed algorithm against various competitive and realistic baselines using a theme park dataset. Our simulation results highlight the existence of the Selfish Routing problem and show that SCAIR outperforms the baselines in handling this issue.
△ Less
Submitted 9 June, 2020; v1 submitted 12 September, 2019;
originally announced September 2019.
-
Decentralized Multi-Floor Exploration by a Swarm of Miniature Robots Teaming with Wall-Climbing Units
Authors:
Jabez L. Kit,
Audelia G. Dharmawan,
David Mateo,
Shaohui Foong,
Gim Song Soh,
Roland Bouffanais,
Kristin L. Wood
Abstract:
In this paper, we consider the problem of collectively exploring unknown and dynamic environments with a decentralized heterogeneous multi-robot system consisting of multiple units of two variants of a miniature robot. The first variant-a wheeled ground unit-is at the core of a swarm of floor-mapping robots exhibiting scalability, robustness and flexibility. These properties are systematically tes…
▽ More
In this paper, we consider the problem of collectively exploring unknown and dynamic environments with a decentralized heterogeneous multi-robot system consisting of multiple units of two variants of a miniature robot. The first variant-a wheeled ground unit-is at the core of a swarm of floor-mapping robots exhibiting scalability, robustness and flexibility. These properties are systematically tested and quantitatively evaluated in unstructured and dynamic environments, in the absence of any supporting infrastructure. The results of repeated sets of experiments show a consistent performance for all three features, as well as the possibility to inject units into the system while it is operating. Several units of the second variant-a wheg-based wall-climbing unit-are used to support the swarm of mapping robots when simultaneously exploring multiple floors by expanding the distributed communication channel necessary for the coordinated behavior among platforms. Although the occupancy-grid maps obtained can be large, they are fully distributed. Not a single robotic unit possesses the overall map, which is not required by our cooperative path-planning strategy.
△ Less
Submitted 15 August, 2019;
originally announced August 2019.
-
TechNet: Technology Semantic Network Based on Patent Data
Authors:
Serhad Sarica,
Jianxi Luo,
Kristin L. Wood
Abstract:
The growing developments in general semantic networks, knowledge graphs and ontology databases have motivated us to build a large-scale comprehensive semantic network of technology-related data for engineering knowledge discovery, technology search and retrieval, and artificial intelligence for engineering design and innovation. Specially, we constructed a technology semantic network (TechNet) tha…
▽ More
The growing developments in general semantic networks, knowledge graphs and ontology databases have motivated us to build a large-scale comprehensive semantic network of technology-related data for engineering knowledge discovery, technology search and retrieval, and artificial intelligence for engineering design and innovation. Specially, we constructed a technology semantic network (TechNet) that covers the elemental concepts in all domains of technology and their semantic associations by mining the complete U.S. patent database from 1976. To derive the TechNet, natural language processing techniques were utilized to extract terms from massive patent texts and recent word embedding algorithms were employed to vectorize such terms and establish their semantic relationships. We report and evaluate the TechNet for retrieving terms and their pairwise relevance that is meaningful from a technology and engineering design perspective. The TechNet may serve as an infrastructure to support a wide range of applications, e.g., technical text summaries, search query predictions, relational knowledge discovery, and design ideation support, in the context of engineering and technology, and complement or enrich existing semantic databases. To enable such applications, the TechNet is made public via an online interface and APIs for public users to retrieve technology-related terms and their relevancies.
△ Less
Submitted 4 October, 2019; v1 submitted 2 June, 2019;
originally announced June 2019.
-
A Motivational Game-Theoretic Approach for Peer-to-Peer Energy Trading in the Smart Grid
Authors:
Wayes Tushar,
Tapan Kumar Saha,
Chau Yuen,
Thomas Morstyn,
Malcolm D. McCulloch,
H. Vincent Poor,
Kristin L. Wood
Abstract:
Peer-to-peer trading in energy networks is expected to be exclusively conducted by the prosumers of the network with negligible influence from the grid. This raises the critical question: how can enough prosumers be encouraged to participate in peer-to-peer trading so as to make its operation sustainable and beneficial to the overall electricity network? To this end, this paper proposes how a moti…
▽ More
Peer-to-peer trading in energy networks is expected to be exclusively conducted by the prosumers of the network with negligible influence from the grid. This raises the critical question: how can enough prosumers be encouraged to participate in peer-to-peer trading so as to make its operation sustainable and beneficial to the overall electricity network? To this end, this paper proposes how a motivational psychology framework can be used effectively to design peer-to-peer energy trading to increase user participation. To do so, first, the state-of-the-art of peer-to-peer energy trading literature is discussed by following a systematic classification, and gaps in existing studies are identified. Second, a motivation psychology framework is introduced, which consists of a number of motivational models that a prosumer needs to satisfy before being convinced to participate in energy trading. Third, a game-theoretic peer-to-peer energy trading scheme is developed, its relevant properties are studied, and it is shown that the coalition among different prosumers is a stable coalition. Fourth, through numerical case studies, it is shown that the proposed model can reduce carbon emissions by 18.38% and 9.82% in a single day in Summer and Winter respectively compared to a feed-in-tariff scheme. The proposed scheme is also shown to reduce the cost of energy up to 118 cents and 87 cents per day in Summer and Winter respectively. Finally, how the outcomes of the scheme satisfy all the motivational psychology models is discussed, which subsequently shows its potential to attract users to participate in energy trading.
△ Less
Submitted 9 March, 2019;
originally announced March 2019.
-
IoT for Green Building Management
Authors:
Wayes Tushar,
Nipun Wijerathne,
Wen-Tai Li,
Chau Yuen,
H. Vincent Poor,
Tapan Kumar Saha,
Kristin L. Wood
Abstract:
Buildings consume 60% of global electricity. However, current building management systems (BMSs) are highly expensive and difficult to justify for small to medium-sized buildings. As such, the Internet of Things (IoT), which can monitor and collect a large amount of data on different contexts of a building and feed the data to the processor of the BMS, provides a new opportunity to integrate intel…
▽ More
Buildings consume 60% of global electricity. However, current building management systems (BMSs) are highly expensive and difficult to justify for small to medium-sized buildings. As such, the Internet of Things (IoT), which can monitor and collect a large amount of data on different contexts of a building and feed the data to the processor of the BMS, provides a new opportunity to integrate intelligence into the BMS to monitor and manage the energy consumption of the building in a cost-effective manner. Although an extensive literature is available on IoT based BMS and applications of signal processing techniques for some aspects of building energy management separately, detailed study on their integration to address the overall BMS is quite limited. As such, the proposed paper will address this gap by providing an overview of an IoT based BMS leveraging signal processing and machine learning techniques. It is demonstrated how to extract high-level building occupancy information through simple and low-cost IoT sensors and studied the impact of human activities on energy usage of a building, which can be exploited to design energy conservation measures to reduce the building's energy consumption.
△ Less
Submitted 27 May, 2018;
originally announced May 2018.
-
Transforming Energy Networks via Peer to Peer Energy Trading: Potential of Game Theoretic Approaches
Authors:
Wayes Tushar,
Chau Yuen,
Hamed Mohsenian-Rad,
Tapan Saha,
H. Vincent Poor,
Kristin L Wood
Abstract:
Peer-to-peer (P2P) energy trading has emerged as a next-generation energy management mechanism for the smart grid that enables each prosumer of the network to participate in energy trading with one another and the grid. This poses a significant challenge in terms of modeling the decision-making process of each participant with conflicting interest and motivating prosumers to participate in energy…
▽ More
Peer-to-peer (P2P) energy trading has emerged as a next-generation energy management mechanism for the smart grid that enables each prosumer of the network to participate in energy trading with one another and the grid. This poses a significant challenge in terms of modeling the decision-making process of each participant with conflicting interest and motivating prosumers to participate in energy trading and to cooperate, if necessary, for achieving different energy management goals. Therefore, such decision-making process needs to be built on solid mathematical and signal processing tools that can ensure an efficient operation of the smart grid. This paper provides an overview of the use of game theoretic approaches for P2P energy trading as a feasible and effective means of energy management. As such, we discuss various games and auction theoretic approaches by following a systematic classification to provide information on the importance of game theory for smart energy research. Then, the paper focuses on the P2P energy trading describing its key features and giving an introduction to an existing P2P testbed. Further, the paper zooms into the detail of some specific game and auction theoretic models that have recently been used in P2P energy trading and discusses some important finding of these schemes.
△ Less
Submitted 19 March, 2018;
originally announced April 2018.
-
Revisiting elliptical satellite orbits to enhance the O3b constellation
Authors:
Lloyd Wood,
Yuxuan Lou,
Opeoluwa Olusola
Abstract:
We propose an addition of known elliptical orbits to the new equatorial O3b satellite constellation, extending O3b to cover high latitudes and the Earth's poles. We simulate the O3b constellation and compare this to recent measurement of the first real Internet traffic across the newly deployed O3b network.
We propose an addition of known elliptical orbits to the new equatorial O3b satellite constellation, extending O3b to cover high latitudes and the Earth's poles. We simulate the O3b constellation and compare this to recent measurement of the first real Internet traffic across the newly deployed O3b network.
△ Less
Submitted 8 July, 2014;
originally announced July 2014.
-
SaVi: satellite constellation visualization
Authors:
Lloyd Wood
Abstract:
SaVi, a program for visualizing satellite orbits, movement, and coverage, is maintained at the University of Surrey. This tool has been used for research in academic papers, and by industry companies designing and intending to deploy satellite constellations. It has also proven useful for demonstrating aspects of satellite constellations and their geometry, coverage and movement for educational an…
▽ More
SaVi, a program for visualizing satellite orbits, movement, and coverage, is maintained at the University of Surrey. This tool has been used for research in academic papers, and by industry companies designing and intending to deploy satellite constellations. It has also proven useful for demonstrating aspects of satellite constellations and their geometry, coverage and movement for educational and teaching purposes. SaVi is introduced and described briefly here.
△ Less
Submitted 15 April, 2012;
originally announced April 2012.
-
Assessing and improving an approach to delay-tolerant networking
Authors:
Lloyd Wood
Abstract:
Delay-tolerant networking (DTN) is a term invented to describe and encompass all types of long-delay, disconnected, disrupted or intermittently-connected networks, where mobility and outages or scheduled contacts may be experienced. 'DTN' is also used to refer to the Bundle Protocol, which has been proposed as the one unifying solution for disparate DTN networking scenarios, after originally being…
▽ More
Delay-tolerant networking (DTN) is a term invented to describe and encompass all types of long-delay, disconnected, disrupted or intermittently-connected networks, where mobility and outages or scheduled contacts may be experienced. 'DTN' is also used to refer to the Bundle Protocol, which has been proposed as the one unifying solution for disparate DTN networking scenarios, after originally being designed solely for use in deep space for the 'Interplanetary Internet.' We evaluated the Bundle Protocol by testing it in space and on the ground. We have found architectural weaknesses in the Bundle Protocol that may prevent engineering deployment of this protocol in realistic delay-tolerant networking scenarios, and have proposed approaches to address these weaknesses.
△ Less
Submitted 15 April, 2012;
originally announced April 2012.
-
Saratoga: scalable, speedy data delivery for sensor networks
Authors:
Lloyd Wood
Abstract:
A networking transport protocol, named Saratoga, has been developed at the University of Surrey for efficient delivery of imagery from Internet-Protocol-based remote-sensing satellites. Saratoga is now being implemented and evaluated for use for the high-end data-delivery needs of astronomers using large, advanced, radio telescopes. These telescopes are expected to take advantage of Internet techn…
▽ More
A networking transport protocol, named Saratoga, has been developed at the University of Surrey for efficient delivery of imagery from Internet-Protocol-based remote-sensing satellites. Saratoga is now being implemented and evaluated for use for the high-end data-delivery needs of astronomers using large, advanced, radio telescopes. These telescopes are expected to take advantage of Internet technologies. This brief paper outlines the reasons for the creation and adoption of this protocol, discusses how it differs from and complements other protocols, and summarises the worldwide collaboration that is making this development possible.
△ Less
Submitted 15 April, 2012;
originally announced April 2012.
-
Investigating operation of the Internet in orbit: Five years of collaboration around CLEO
Authors:
Lloyd Wood,
Will Ivancic,
Wes Eddy,
Dave Stewart,
James Northam,
Chris Jackson
Abstract:
The Cisco router in Low Earth Orbit (CLEO) was launched into space as an experimental secondary payload onboard the UK Disaster Monitoring Constellation (UK-DMC) satellite in September 2003. The UK-DMC satellite is one of an increasing number of DMC satellites in orbit that rely on the Internet Protocol (IP) for command and control and for delivery of data from payloads. The DMC satellites, built…
▽ More
The Cisco router in Low Earth Orbit (CLEO) was launched into space as an experimental secondary payload onboard the UK Disaster Monitoring Constellation (UK-DMC) satellite in September 2003. The UK-DMC satellite is one of an increasing number of DMC satellites in orbit that rely on the Internet Protocol (IP) for command and control and for delivery of data from payloads. The DMC satellites, built by Surrey Satellite Technology Ltd (SSTL), have imaged the effects of Hurricane Katrina, the Indian Ocean Tsunami, and other events for disaster relief under the International Space and Major Disasters Charter. It was possible to integrate the Cisco mobile access router into the UK-DMC satellite as a result of the DMC satellites' adoption of existing commercial networking standards, using IP over Frame Relay over standard High-Level Data Link Control, or HDLC (ISO 13239) on standard serial interfaces. This approach came from work onboard SSTL's earlier UoSAT-12 satellite
△ Less
Submitted 15 April, 2012;
originally announced April 2012.
-
Taking Saratoga from Space-Based Ground Sensors to Ground-Based Space Sensors
Authors:
Lloyd Wood,
Charles Smith,
Wesley M. Eddy,
Will Ivancic,
Chris Jackson
Abstract:
The Saratoga transfer protocol was developed by Surrey Satellite Technology Ltd (SSTL) for its Disaster Monitoring Constellation (DMC) satellites. In over seven years of operation, Saratoga has provided efficient delivery of remote-sensing Earth observation imagery, across private wireless links, from these seven low-orbit satellites to ground stations, using the Internet Protocol (IP). Saratoga i…
▽ More
The Saratoga transfer protocol was developed by Surrey Satellite Technology Ltd (SSTL) for its Disaster Monitoring Constellation (DMC) satellites. In over seven years of operation, Saratoga has provided efficient delivery of remote-sensing Earth observation imagery, across private wireless links, from these seven low-orbit satellites to ground stations, using the Internet Protocol (IP). Saratoga is designed to cope with high bandwidth-delay products, constrained acknowledgement channels, and high loss while streaming or delivering extremely large files. An implementation of this protocol has now been developed at the Australian Commonwealth Scientific and Industrial Research Organisation (CSIRO) for wider use and testing. This is intended to prototype delivery of data across dedicated astronomy radio telescope networks on the ground, where networked sensors in Very Long Baseline Interferometer (VLBI) instruments generate large amounts of data for processing and can send that data across private IP- and Ethernet-based links at very high rates. We describe this new Saratoga implementation, its features and focus on high throughput and link utilization, and lessons learned in developing this protocol for sensor-network applications.
△ Less
Submitted 11 January, 2011;
originally announced January 2011.