Deep Reinforcement Learning for Vehicular Edge Computing: An Intelligent Offloading System
- Authors: Ning, Zhaolong , Dong, Peiran , Wang, Xiaojie , Rodrigues, Joel , Xia, Feng
- Date: 2019
- Type: Text , Journal article
- Relation: ACM Transactions on Intelligent Systems and Technology Vol. 10, no. 6 (Dec 2019), p. 24
- Full Text:
- Reviewed:
- Description: The development of smart vehicles brings drivers and passengers a comfortable and safe environment. Various emerging applications are promising to enrich users' traveling experiences and daily life. However, how to execute computing-intensive applications on resource-constrained vehicles still faces huge challenges. In this article, we construct an intelligent offloading system for vehicular edge computing by leveraging deep reinforcement learning. First, both the communication and computation states are modelled by finite Markov chains. Moreover, the task scheduling and resource allocation strategy is formulated as a joint optimization problem to maximize users' Quality of Experience (QoE). Due to its complexity, the original problem is further divided into two sub-optimization problems. A two-sided matching scheme and a deep reinforcement learning approach are developed to schedule offloading requests and allocate network resources, respectively. Performance evaluations illustrate the effectiveness and superiority of our constructed system.
An incremental piecewise linear classifier based on polyhedral conic separation
- Authors: Ozturk, Gurkan , Bagirov, Adil , Kasimbeyli, Refail
- Date: 2015
- Type: Text , Journal article
- Relation: Machine Learning Vol. 101, no. 1-3 (2015), p. 397-413
- Relation: http://purl.org/au-research/grants/arc/DP140103213
- Full Text: false
- Reviewed:
- Description: In this paper, a piecewise linear classifier based on polyhedral conic separation is developed. This classifier builds nonlinear boundaries between classes using polyhedral conic functions. Since the number of polyhedral conic functions separating classes is not known a priori, an incremental approach is proposed to build separating functions. These functions are found by minimizing an error function which is nonsmooth and nonconvex. A special procedure is proposed to generate starting points to minimize the error function and this procedure is based on the incremental approach. The discrete gradient method, which is a derivative-free method for nonsmooth optimization, is applied to minimize the error function starting from those points. The proposed classifier is applied to solve classification problems on 12 publicly available data sets and compared with some mainstream and piecewise linear classifiers. © 2014, The Author(s).
A basic theory of intelligent finance
- Authors: Pan, Heping
- Date: 2011
- Type: Text , Journal article
- Relation: New Mathematics and Natural Computation Vol. 7, no. 2 (May 2011), p. 197-227
- Full Text: false
- Reviewed:
- Description: This paper presents a basic theory of intelligent finance as a new paradigm of financial investment. It is assumed that the financial market is always in a state of swing between efficient and inefficient modes on multiple levels of time scale; it is possible to go beyond the efficient market theory to study the dynamic evolving process of the market between equilibrium and far-from-equilibrium; there are robust dynamic patterns in this evolving process, which may be exploitable via intelligent trading systems. On the foundation of the four principles - comprehensive, predictive, dynamic and strategic, the basic theory takes the information sources into the loop as the starting points for all the market analysis, introducing the scale space of time into the pricing process analysis in order to detect and capture trends, cycles and seasonality on multiple intrinsic levels of time scale which are then used as the dynamic basis for constructing and managing portfolios. In stock markets, the theory exhibits itself in the form of an Intelligent Dynamic Portfolio Theory, which integrates predictive modeling of a bullbear market cycle, sector rotation, and portfolio optimization with a reactive trend following trading strategy.
Preface
- Authors: Pan, Heping , Hayward, Serge
- Date: 2011
- Type: Text , Journal article
- Relation: New Mathematics and Natural Computation Vol. 7, no. 2 (2011), p. 187-196
- Full Text: false
- Reviewed:
ZERO++ : Harnessing the power of zero appearances to detect anomalies in large-scale data sets
- Authors: Pang, Guansong , Ting, Kaiming , Albrecht, David , Jin, Huidong
- Date: 2016
- Type: Text , Journal article
- Relation: Journal of Artificial Intelligence Research Vol. 57, no. (2016), p. 593-620
- Full Text: false
- Reviewed:
- Description: This paper introduces a new unsupervised anomaly detector called ZERO++ which employs the number of zero appearances in subspaces to detect anomalies in categorical data. It is unique in that it works in regions of subspaces that are not occupied by data; whereas existing methods work in regions occupied by data. ZERO++ examines only a small number of low dimensional subspaces to successfully identify anomalies. Unlike existing frequency-based algorithms, ZERO++ does not involve subspace pattern searching. We show that ZERO++ is better than or comparable with the state-of-the-art anomaly detection methods over a wide range of real-world categorical and numeric data sets; and it is efficient with linear time complexity and constant space complexity which make it a suitable candidate for large-scale data sets.
Video coding focusing on block partitioning and occlusion
- Authors: Paul, Manoranjan , Murshed, Manzur
- Date: 2010
- Type: Text , Journal article
- Relation: IEEE Transactions on Image Processing Vol. 19, no. 3 (2010), p. 691-701
- Full Text: false
- Reviewed:
- Description: Among the existing block partitioning schemes, the pattern-based video coding (PVC) has already established its superiority at low bit-rate. Its innovative segmentation process with regular-shaped pattern templates is very fast as it avoids handling the exact shape of the moving objects. It also judiciously encodes the pattern-uncovered background segments capturing high level of interblock temporal redundancy without any motion compensation, which is favoured by the rate-distortion optimizer at low bit-rates. The existing PVC technique, however, uses a number of content-sensitive thresholds and thus setting them to any predefined values risks ignoring some of the macroblocks that would otherwise be encoded with patterns. Furthermore, occluded background can potentially degrade the performance of this technique. In this paper, a robust PVC scheme is proposed by removing all the content-sensitive thresholds, introducing a new similarity metric, considering multiple top-ranked patterns by the rate-distortion optimizer, and refining the Lagrangian multiplier of the H.264 standard for efficient embedding. A novel pattern-based residual encoding approach is also integrated to address the occlusion issue. Once embedded into the H.264 Baseline profile, the proposed PVC scheme improves the image quality perceptually significantly by at least 0.5 dB in low bit-rate video coding applications. A similar trend is observed for moderate to high bit-rate applications when the proposed scheme replaces the bi-directional predictive mode in the H.264 High profile.
Efficient pattern index coding using syndrome coding and side information
- Authors: Paul, Manoranjan , Murshed, Manzur
- Date: 2012
- Type: Text , Journal article
- Relation: International Journal of Engineering and Industries Vol. 3, no. 3 (2012), p. 1-12
- Full Text: false
- Reviewed:
- Description: Pattern-based video coding focusing on moving regions has already established its superiority over the H.264 at very low bit rate. Up to a certain limit, the larger the number of pattern templates, thebetter the approximation to the moving regions. However, beyond that limit no coding gain is observed due to the need of an excessive number of pattern identification bits. Recently, distributed video codingschemes have used syndrome coding to predict the original information in the decoder using side information. In this paper a pattern identification scheme is proposed which predicts the pattern fromthe syndrome codes and side information in the decoder so that the actual pattern identification code is not needed. The experimental results confirm that the new scheme improves the rate-distortionperformance compared to the existing pattern-based video coding and compared with the H.264 standard. The proposed new scheme will also present opportunities for further syndrome codingapplication.
Exploring the existence and potential underpinnings of dog-human and horse-human attachment bonds
- Authors: Payne, Elyssa , DeAraugo, Jodi , Bennett, Pauleen , McGreevy, Paul
- Date: 2016
- Type: Text , Journal article , Review
- Relation: Behavioural Processes Vol. 125, no. (2016), p. 114-121
- Full Text: false
- Reviewed:
- Description: This article reviews evidence for the existence of attachment bonds directed toward humans in dog-human and horse-human dyads. It explores each species' alignment with the four features of a typical attachment bond: separation-related distress, safe haven, secure base and proximity seeking. While dog-human dyads show evidence of each of these, there is limited alignment for horse-human dyads. These differences are discussed in the light of the different selection paths of domestic dogs and horses as well as the different contexts in which the two species interact with humans. The role of emotional intelligence in humans as a potential mediator for human-animal relationships, attachment or otherwise, is also examined. Finally, future studies, which may clarify the interplay between attachment, human-animal relationships and emotional intelligence, are proposed. Such avenues of research may help us explore the concepts of trust and bonding that are often said to occur at the dog-human and horse-human interface. © 2015.
A numerical control algorithm for navigation of an operator-driven snake-like robot with 4WD-4WS segments
- Authors: Percy, Andrew , Spark, Ian
- Date: 2010
- Type: Text , Journal article
- Relation: Robotica Vol. 29, no. 3 (2010), p. 471-482
- Full Text:
- Reviewed:
- Description: This paper presents a new algorithm for the control of a snake-like robot with passive joints and active wheels. Each segment has four autonomously driven and steered wheels. The algorithm approximates the ideal solution in which all wheels on a segment have the same centre of curvature with wheel speeds, providing cooperative redundancy. Each hitch point joining segments traverses the same path, which is determined by an operator, prescribing the path curvature and front hitch speed. The numerical algorithm developed in this paper is simulation tested against a previously derived analytical solution for a predetermined path. Further simulations are carried out to show the effects of changing curvature and front hitch speed on hitch path, wheel angles and wheel speeds for a one, two and three segment robot.
REPLOT : REtrieving Profile Links on Twitter for malicious campaign discovery
- Authors: Perez, Charles , Birregah, Babiga , Layton, Robert , Lemercier, Marc , Watters, Paul
- Date: 2015
- Type: Text , Journal article
- Relation: AI Communications Vol. 29, no. 1 (2015), p. 107-122
- Full Text:
- Reviewed:
- Description: Social networking sites are increasingly subject to malicious activities such as self-propagating worms, confidence scams and drive-by-download malwares. The high number of users associated with the presence of sensitive data, such as personal or professional information, is certainly an unprecedented opportunity for attackers. These attackers are moving away from previous platforms of attack, such as emails, towards social networking websites. In this paper, we present a full stack methodology for the identification of campaigns of malicious profiles on social networking sites, composed of maliciousness classification, campaign discovery and attack profiling. The methodology named REPLOT, for REtrieving Profile Links On Twitter, contains three major phases. First, profiles are analysed to determine whether they are more likely to be malicious or benign. Second, connections between suspected malicious profiles are retrieved using a late data fusion approach consisting of temporal and authorship analysis based models to discover campaigns. Third, the analysis of the discovered campaigns is performed to investigate the attacks. In this paper, we apply this methodology to a real world dataset, with a view to understanding the links between malicious profiles, their attack methods and their connections. Our analysis identifies a cluster of linked profiles focusing on propagating malicious links, as well as profiling two other major clusters of attacking campaigns. © 2016 - IOS Press and the authors. All rights reserved.
Detection of multiple dynamic textures using feature space mapping
- Authors: Rahman, Ashfaqur , Murshed, Manzur
- Date: 2009
- Type: Text , Journal article
- Relation: IEEE Transactions on Circuits and Systems for Video Technology Vol. 19, no. 5 (2009), p. 766-771
- Full Text: false
- Reviewed:
- Description: Abstract— Image sequences of smoke, fire, etc. are known as dynamic textures. Research is mostly limited to characterization of single dynamic textures. In this paper we address the problem of detecting the presence of multiple dynamic textures in an image sequence by establishing a correspondence between the feature space of dynamic textures and that of their mixture in an image sequence. Accuracy of our proposed technique is both analytically and empirically established with detection experiments yielding 92.5% average accuracy on a diverse set of dynamic texture mixtures in synthetically generated as well as real-world image sequences.
Feature weighting and retrieval methods for dynamic texture motion features
- Authors: Rahman, Ashfaqur , Murshed, Manzur
- Date: 2010
- Type: Text , Journal article
- Relation: International Journal of Computational Intelligence Systems Vol. 2, no. 1 (2010 2010), p. 27-38
- Full Text:
- Reviewed:
- Description: Feature weighing methods are commonly used to find the relative significance among a set of features that are effectively used by the retrieval methods to search image sequences efficiently from large databases. As evidenced in the current literature, dynamic textures (image sequences with regular motion patterns) can be effectively modelled by a set of spatial and temporal motion distribution features like motion co-occurrence matrix. The aim of this paper is to develop effective feature weighting and retrieval methods for a set of dynamic textures while characterized by motion co-occurrence matrices.
Artificial neural network for prediction of air flow in a single rock joint
- Authors: Ranjith, Pathegama , Khandelwal, Manoj
- Date: 2012
- Type: Text , Journal article
- Relation: Neural Computing and Applications Vol. 21, no. 6 (2012), p. 1413-1422
- Full Text: false
- Reviewed:
- Description: In this paper, an attempt has been made to evaluate and predict the air flow rate in triaxial conditions at various confining pressures incorporating cell pressure, air inlet pressure, and air outlet pressure using artificial neural network (ANN) technique. A three-layer feed forward back propagation neural network having 3-7-1 architecture network was trained using 37 data sets measured from laboratory investigation. Ten new data sets were used for the, validation and comparison of the air flow rate by ANN and multi-variate regression analysis (MVRA) to develop more confidence on the proposed method. Results were compared based on coefficient of determination (CoD) and mean absolute error (MAE) between measured and predicted values of air flow rate. It was found that CoD between measured and predicted air flow rate was 0. 995 and 0. 758 by ANN and MVRA, respectively, whereas MAE was 0. 0413 and 0. 1876. © 2011 Springer-Verlag London Limited.
A data mining approach for machine fault diagnosis based on associated frequency patterns
- Authors: Rashid, Md. Mamunur , Amar, Muhammad , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2016
- Type: Text , Journal article
- Relation: Applied Intelligence Vol. 45, no. 3 (2016), p. 638-651
- Full Text: false
- Reviewed:
- Description: Bearings play a crucial role in rotational machines and their failure is one of the foremost causes of breakdowns in rotary machinery. Their functionality is directly relevant to the operational performance, service life and efficiency of these machines. Therefore, bearing fault identification is very significant. The accuracy of fault or anomaly detection by the current techniques is not adequate. We propose a data mining-based framework for fault identification and anomaly detection from machine vibration data. In this framework, to capture the useful knowledge from the vibration data stream (VDS), we first pre-process the data using Fast Fourier Transform (FFT) to extract the frequency signature and then build a compact tree called SAFP-tree (sliding window associated frequency pattern tree), and propose a mining algorithm called SAFP. Our SAFP algorithm can mine associated frequency patterns (i.e., fault frequency signatures) in the current window of VDS and use them to identify faults in the bearing data. Finally, SAFP is further enhanced to SAFP-AD for anomaly detection by determining the normal behavior measure (NBM) from the extracted frequency patterns. The results show that our technique is very efficient in identifying faults and detecting anomalies over VDS and can be used for remote machine health diagnosis. © 2016, Springer Science+Business Media New York.
Image preprocessing in classification and identification of diabetic eye diseases
- Authors: Sarki, Rubina , Ahmed, Khandakar , Wang, Hua , Zhang, Yanchun , Ma, Jiangang , Wang, Kate
- Date: 2021
- Type: Text , Journal article
- Relation: Data Science and Engineering Vol. 6, no. 4 (2021), p. 455-471
- Full Text:
- Reviewed:
- Description: Diabetic eye disease (DED) is a cluster of eye problem that affects diabetic patients. Identifying DED is a crucial activity in retinal fundus images because early diagnosis and treatment can eventually minimize the risk of visual impairment. The retinal fundus image plays a significant role in early DED classification and identification. An accurate diagnostic model’s development using a retinal fundus image depends highly on image quality and quantity. This paper presents a methodical study on the significance of image processing for DED classification. The proposed automated classification framework for DED was achieved in several steps: image quality enhancement, image segmentation (region of interest), image augmentation (geometric transformation), and classification. The optimal results were obtained using traditional image processing methods with a new build convolution neural network (CNN) architecture. The new built CNN combined with the traditional image processing approach presented the best performance with accuracy for DED classification problems. The results of the experiments conducted showed adequate accuracy, specificity, and sensitivity. © 2021, The Author(s).
How to improve postgenomic knowledge discovery using imputation
- Authors: Sehgal, Muhammad Shoaib B , Gondal, Iqbal , Dooley, Laurence , Coppel, Ross
- Date: 2009
- Type: Text , Journal article
- Relation: Eurasip Journal on Bioinformatics and Systems Biology Vol. 2009, no. 1 (2009), p. 1-14
- Full Text:
- Reviewed:
- Description: While microarrays make it feasible to rapidly investigate many complex biological problems, their multistep fabrication has the proclivity for error at every stage. The standard tactic has been to either ignore or regard erroneous gene readings as missing values, though this assumption can exert a major influence upon postgenomic knowledge discovery methods like gene selection and gene regulatory network (GRN) reconstruction. This has been the catalyst for a raft of new flexible imputation algorithms including local least square impute and the recent heuristic collateral missing value imputation, which exploit the biological transactional behaviour of functionally correlated genes to afford accurate missing value estimation. This paper examines the influence of missing value imputation techniques upon postgenomic knowledge inference methods with results for various algorithms consistently corroborating that instead of ignoring missing values, recycling microarray data by flexible and robust imputation can provide substantial performance benefits for subsequent downstream procedures
Optimization based clustering algorithms for authorship analysis of phishing emails
- Authors: Seifollahi, Sattar , Bagirov, Adil , Layton, Robert , Gondal, Iqbal
- Date: 2017
- Type: Text , Journal article
- Relation: Neural Processing Letters Vol. 46, no. 2 (2017), p. 411-425
- Relation: http://purl.org/au-research/grants/arc/DP140103213
- Full Text: false
- Reviewed:
- Description: Phishing has given attackers power to masquerade as legitimate users of organizations, such as banks, to scam money and private information from victims. Phishing is so widespread that combating the phishing attacks could overwhelm the victim organization. It is important to group the phishing attacks to formulate effective defence mechanism. In this paper, we use clustering methods to analyze and characterize phishing emails and perform their relative attribution. Emails are first tokenized to a bag-of-word space and, then, transformed to a numeric vector space using frequencies of words in documents. Wordnet vocabulary is used to take effects of similar words into account and to reduce sparsity. The word similarity measure is combined with the term frequencies to introduce a novel text transformation into numeric features. To improve the accuracy, we apply inverse document frequency weighting, which gives higher weights to features used by fewer authors. The k-means and recently introduced three optimization based algorithms: MS-MGKM, INCA and DCClust are applied for clustering purposes. The optimization based algorithms indicate the existence of well separated clusters in the phishing emails dataset. © 2017, Springer Science+Business Media New York.
Search and tracking algorithms for swarms of robots: A survey
- Authors: Senanayake, Madhubhashi , Senthooran, Ilankaikaone , Barca, Jan , Chung, Hoam , Kamruzzaman, Joarder , Murshed, Manzur
- Date: 2016
- Type: Text , Journal article
- Relation: Robotics and Autonomous Systems Vol. 75, no. Part B (2016), p. 422-434
- Full Text: false
- Reviewed:
- Description: Target search and tracking is a classical but difficult problem in many research domains, including computer vision, wireless sensor networks and robotics. We review the seminal works that addressed this problem in the area of swarm robotics, which is the application of swarm intelligence principles to the control of multi-robot systems. Robustness, scalability and flexibility, as well as distributed sensing, make swarm robotic systems well suited for the problem of target search and tracking in real-world applications. We classify the works we review according to the variations and aspects of the search and tracking problems they addressed. As this is a particularly application-driven research area, the adopted taxonomy makes this review serve as a quick reference guide to our readers in identifying related works and approaches according to their problem at hand. By no means is this an exhaustive review, but an overview for researchers who are new to the swarm robotics field, to help them easily start off their research. © 2015 Elsevier B.V.
An efficient RANSAC hypothesis evaluation using sufficient statistics for RGB-D pose estimation
- Authors: Senthooran, Ilankalkone , Murshed, Manzur , Barca, Jan , Kamruzzaman, Joarder , Chung, Hoam
- Date: 2019
- Type: Text , Journal article
- Relation: Autonomous Robots Vol. 43, no. 5 (2019), p. 1257-1270
- Full Text:
- Reviewed:
- Description: Achieving autonomous flight in GPS-denied environments begins with pose estimation in three-dimensional space, and this is much more challenging in an MAV in a swarm robotic system due to limited computational resources. In vision-based pose estimation, outlier detection is the most time-consuming step. This usually involves a RANSAC procedure using the reprojection-error method for hypothesis evaluation. Realignment-based hypothesis evaluation method is observed to be more accurate, but the considerably slower speed makes it unsuitable for robots with limited resources. We use sufficient statistics of least-squares minimisation to speed up this process. The additive nature of these sufficient statistics makes it possible to compute pose estimates in each evaluation by reusing previously computed statistics. Thus estimates need not be calculated from scratch each time. The proposed method is tested on standard RANSAC, Preemptive RANSAC and R-RANSAC using benchmark datasets. The results show that the use of sufficient statistics speeds up the outlier detection process with realignment hypothesis evaluation for all RANSAC variants, achieving an execution speed of up to 6.72 times.
Depth sequence coding with hierarchical partitioning and spatial-domain quantization
- Authors: Shahriyar, Shampa , Murshed, Manzur , Ali, Mortuza , Paul, Manoranjan
- Date: 2020
- Type: Text , Journal article
- Relation: IEEE Transactions on Circuits and Systems for Video Technology Vol. 30, no. 3 (2020), p. 835-849
- Full Text:
- Reviewed:
- Description: Depth coding in 3D-HEVC deforms object shapes due to block-level edge-approximation and lacks efficient techniques to exploit the statistical redundancy, due to the frame-level clustering tendency in depth data, for higher coding gain at near-lossless quality. This paper presents a standalone mono-view depth sequence coder, which preserves edges implicitly by limiting quantization to the spatial-domain and exploits the frame-level clustering tendency efficiently with a novel binary tree-based decomposition (BTBD) technique. The BTBD can exploit the statistical redundancy in frame-level syntax, motion components, and residuals efficiently with fewer block-level prediction/coding modes and simpler context modeling for context-adaptive arithmetic coding. Compared with the depth coder in 3D-HEVC, the proposed one has achieved significantly lower bitrate at lossless to near-lossless quality range for mono-view coding and rendered superior quality synthetic views from the depth maps, compressed at the same bitrate, and the corresponding texture frames. © 1991-2012 IEEE.