{"title":"Sparse Matrix Codes: Rate-Reliability Trade-offs for URLLC","authors":"Sudarshan Adiga, R. Tandon, T. Bose","doi":"10.1109/CISS53076.2022.9751171","DOIUrl":"https://doi.org/10.1109/CISS53076.2022.9751171","url":null,"abstract":"In this paper, we present a new channel coding technique, namely sparse matrix codes (SMC), for URLLC applications with the goal of achieving higher reliability, and low decoding complexity. The main idea behind SMC is to map the message bits to a structured sparse matrix which is then multiplied by a spreading matrix and transmitted over the communication channel over time-or frequency resources. At the decoder, we recover the message from the channel output using a low-decoding complexity algorithm which is derived by leveraging and adapting tools from 2D compressed sensing. We perform various experiments to compare our approach with sparse vector code (SVC) and Polar codes for block error rate (BLER). From our experiments, we show that for a fixed code rate and reliability requirement (BLER), SMC operates at shorter blocklengths compared to Polar codes and SVC.","PeriodicalId":305918,"journal":{"name":"2022 56th Annual Conference on Information Sciences and Systems (CISS)","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114254469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Ephraim, Joshua Coblenz, B. L. Mark, H. Lev-Ari
{"title":"Traffic Rate Network Tomography via Moment Generating Function Matching","authors":"Y. Ephraim, Joshua Coblenz, B. L. Mark, H. Lev-Ari","doi":"10.1109/CISS53076.2022.9751201","DOIUrl":"https://doi.org/10.1109/CISS53076.2022.9751201","url":null,"abstract":"Network tomography aims at estimating source-destination traffic rates from link traffic measurements. This inverse problem was formulated by Vardi in 1996 for independent Poisson traffic over networks operating under deterministic as well as random routing regimes. Vardi used a second-order moment matching approach to estimate the rates where a solution for the resulting linear matrix equation was obtained using an iterative minimum I-divergence procedure. Vardi's second-order moment matching approach was recently extended to higher order cumulant matching approach with the goal of improving the rank of the system of linear equations. In this paper we go one step further and develop a moment generating function matching approach for rate estimation, and seek a least squares as well as an iterative minimum I-divergence solution of the resulting linear equations. We also specialize this approach to a characteristic function matching approach which exhibits some advantages. These follow from the fact that the characteristic function matching approach results in fewer conflicting equations involving the empirical estimates. We demonstrate that the new approach outperforms the cumulant matching approach while being conceptually simpler.","PeriodicalId":305918,"journal":{"name":"2022 56th Annual Conference on Information Sciences and Systems (CISS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116500614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Estimating Test Statistic Distributions for Multiple Hypothesis Testing in Sensor Networks","authors":"Martin Gölz, A. Zoubir, V. Koivunen","doi":"10.1109/CISS53076.2022.9751186","DOIUrl":"https://doi.org/10.1109/CISS53076.2022.9751186","url":null,"abstract":"We recently proposed a novel approach to perform spatial inference using large-scale sensor networks and multiple hypothesis testing [1]. It identifies the regions in which a spatial phenomenon of interest exhibits different behavior from its nominal statistical model. To reduce the intra-sensor-network communication overhead, the raw data is pre-processed at the sensors locally and a summary statistic is send to the cloud or fusion center where the actual spatial inference using multiple hypothesis testing and false discovery control takes place. Local false discovery rates (lfdrs) are estimated to express local believes in the state of the spatial signal. In this work, we extend our approach by proposing two novel lfdr estimators stemming from the Expectation-Maximization method. The estimation bias is considered to explain the differences in performance among the compared lfdr estimators.","PeriodicalId":305918,"journal":{"name":"2022 56th Annual Conference on Information Sciences and Systems (CISS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125783820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identifying the Superspreader in Proactive Backward Contact Tracing by Deep Learning","authors":"Siya Chen, Pei-Duo Yu, C. Tan, H. Poor","doi":"10.1109/CISS53076.2022.9751196","DOIUrl":"https://doi.org/10.1109/CISS53076.2022.9751196","url":null,"abstract":"The goal of proactive contact tracing is to diminish the spread of an epidemic by means of contact tracing mobile apps and big data analysis. Finding superspreaders as has been used in Japan and Australia during the early days of the COVID-19 pandemic has proven effective as backward contact tracing can pick up infections that might otherwise be missed. In this paper, we formulate a proactive contact tracing problem to identify the superspreaders using maximum-likelihood estimation, graph traversal and deep learning algorithms. This problem is challenging due to its sheer combinatorial complexity, problem scale and the fact that the underlying infection network topology is rarely known. We propose a deep learning-based framework using Graph Neural Networks to iteratively refine the supervised learning of proactive contact tracing networks using smaller infection networks and to identify the superspreader. By optimizing the graph traversal and topological features for deep learning, proactive contact tracing strategies can be developed to contain superspreading in an epidemic outbreak.","PeriodicalId":305918,"journal":{"name":"2022 56th Annual Conference on Information Sciences and Systems (CISS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133822526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yasuki Kakishita, Hideharu Hattori, Arkadip Ray, A. Hisada, Y. Ominami, J. Baudoin, J. B. Khalil, D. Raoult
{"title":"Deep Learning Based Bacteria Classification from SEM Images Using a Combination of Membrane and Internal Features","authors":"Yasuki Kakishita, Hideharu Hattori, Arkadip Ray, A. Hisada, Y. Ominami, J. Baudoin, J. B. Khalil, D. Raoult","doi":"10.1109/CISS53076.2022.9751170","DOIUrl":"https://doi.org/10.1109/CISS53076.2022.9751170","url":null,"abstract":"Scanning electron microscopes (SEM) take very high-magnification images that allow us to examine the mor-phological features of bacteria samples in great detail. However, there are two major problems associated with this task. First, typical SEM images of bacteria show many different bacteria touching each other. For accurate classification and quantitative analysis, the touching bacteria need to be distinguished correctly into individual bacteria regions. Second, in these images, different types of bacteria might share similar visual features and have only locally distinguishable features. Here, we propose a system to perform multi-class classification of bacteria from SEM images. The system incorporates distance map inference and feature classification of the membrane and internal bacterial region, in order to segment the bacteria regions accurately, distinguish bacteria in contact with one another and identify local bacterial features. Extensive experimentation on an original bacteria dataset that we prepared shows that our system outperforms other object detection and segmentation methods on this problem.","PeriodicalId":305918,"journal":{"name":"2022 56th Annual Conference on Information Sciences and Systems (CISS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123863258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahana Gangopadhyay, Indrajit Bardhan, Anirban Das, N. Soman, Santanu Das
{"title":"Democratizing Language Learning using Machine Learning","authors":"Ahana Gangopadhyay, Indrajit Bardhan, Anirban Das, N. Soman, Santanu Das","doi":"10.1109/CISS53076.2022.9751168","DOIUrl":"https://doi.org/10.1109/CISS53076.2022.9751168","url":null,"abstract":"Most apps available in the market for learning a new language are severely limited in terms of the number of languages users can learn on the platform (“target language”), as well as the language in which users can receive instruction (“source language”). Users are also limited by the fixed sets of lessons or the curriculum provided by these apps. In this work, we present an app framework which allows users free choice of source and target languages, as well as the flexibility in learning any input word, phrase or sentence of their choice using machine translation, whose performance and coverage of new languages is continuously improving. The app provides real-time feedback on the correctness of user pronunciation for any input using a text-based similarity metric, and helps learners practice their pronunciation until they perfect it. The app also provides a conversation platform where intermediate and advanced learners can engage in simple, real-time conversations with a chatbot on topics they are most likely to engage in while learning a new language. The conversation platform uses machine translation and speech-to-text tools to convert user query in any source language into an English query, gets the chatbot response and converts it back to the source language. This simple and novel approach allows users to freely converse in any language they want to practice, while having the chatbot trained only on English language-based corpus. The chatbot also integrates a novel intent classification module that classifies user query into one of several available topics, thereby enabling the chatbot to continue conversation with the user in the same topic. Finally, the chatbot is also capable of integrating search capability for specific queries (e.g., weather) with the help of available public domain resources so that it can provide users with real-time updates for such queries, thus making language learning fun and interesting.","PeriodicalId":305918,"journal":{"name":"2022 56th Annual Conference on Information Sciences and Systems (CISS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126238976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khondoker Murad Hossain, Suchita Bhinge, Qunfang Long, V. Calhoun, T. Adalı
{"title":"Data-driven spatio-temporal dynamic brain connectivity analysis using fALFF: Application to sensorimotor task data","authors":"Khondoker Murad Hossain, Suchita Bhinge, Qunfang Long, V. Calhoun, T. Adalı","doi":"10.1109/CISS53076.2022.9751190","DOIUrl":"https://doi.org/10.1109/CISS53076.2022.9751190","url":null,"abstract":"Dynamic functional connectivity (dFC) analysis enables us to capture the time-varying interactions between brain regions and can lead to powerful biomarkers. Most dFC studies are focused on the study of temporal dynamics and require significant post-processing to summarize the results of the dynamics analysis. In this paper, we introduce an effective framework that makes use of independent vector analysis (IVA) with fractional amplitude of low frequency fluctuation (fALFF) features extracted from task functional magnetic resonance imaging (fMRI) data. Our approach, which is based on IVA with fALLF features as input, (IVA-fALLF) produces an effective summary of the dynamics also greatly facilitating the study of both spatial and temporal dynamics in a more concise manner. IVA-fALLF captures the spatial and temporal dynamics of sensorimotor task data and identifies a component with significant difference in dynamic behavior between healthy controls (HC) and patients with schizophrenia (SZ). Finally, our post analysis using behavioral scores finds significant correlation between brain imaging data and the associated behavioral scores, increasing confidence on our results. Our results are consistent with the previous data-driven dFC analysis as we find similar brain networks showing abnormal behavior in patients with SZ. Moreover, our analysis identifies component behavior in task and rest windows separately and provides additional confirmation of results through correlation with behavioral scores.","PeriodicalId":305918,"journal":{"name":"2022 56th Annual Conference on Information Sciences and Systems (CISS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121727803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The RBMLE method for Reinforcement Learning","authors":"A. Mete, Rahul Singh, P. Kumar","doi":"10.1109/CISS53076.2022.9751189","DOIUrl":"https://doi.org/10.1109/CISS53076.2022.9751189","url":null,"abstract":"The Reward Biased Maximum Likelihood Estimate (RBMLE) method was proposed about four decades ago for the adaptive control of unknown Markov Decision Processes, and later studied for more general Controlled Markovian Systems and Linear Quadratic Gaussian systems. It showed that if one could bias the Maximum Likelihood Estimate in favor of parameters with larger rewards then one could obtain long-term average optimality. It provided a reason for preferring parameters with larger rewards based on the fact that generally one can only identify the behavior of a system under closed-loop, and therefore any limiting parameter estimate has to necessarily have lower reward than the true parameter. It thereby provided a reason for what his now called “optimism in the face of uncertainty”. It similarly preceded the definition of “regret”, and it is only in the last three years that it has been analyzed for its regret performance, both analytically, and in comparative simulation testing. This paper provides an account of the RBMLE method for reinforcement learning.","PeriodicalId":305918,"journal":{"name":"2022 56th Annual Conference on Information Sciences and Systems (CISS)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121746824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Convergence Time Minimization for Federated Reinforcement Learning over Wireless Networks","authors":"Sihua Wang, Mingzhe Chen, Changchuan Yin, H. Poor","doi":"10.1109/CISS53076.2022.9751199","DOIUrl":"https://doi.org/10.1109/CISS53076.2022.9751199","url":null,"abstract":"In this paper, the convergence time of federated reinforcement learning (FRL) that is deployed over a realistic wireless network is studied. In the considered model, several devices and the base station (BS) jointly participate in the iterative training of an FRL algorithm. Due to limited wireless resources, the BS must select a subset of devices to exchange FRL training parameters at each iteration, which will significantly affect the training loss and convergence time of the considered FRL algorithm. This joint learning, wireless resource allocation, and device selection problem is formulated as an optimization problem aiming to minimize the FRL convergence time while meeting the FRL temporal difference (TD) error requirement. To solve this problem, a deep Q network based algorithm is designed. The proposed method enables the BS to dynamically select an appropriate subset of devices to join the FRL training. Given the selected devices, a resource block allocation scheme can be derived to further minimize the FRL convergence time. Simulation results with real data show that the proposed approach can reduce the FRL convergence time by up to 44.7% compared to a baseline that randomly determines the subset of participating devices and their occupied resource blocks.","PeriodicalId":305918,"journal":{"name":"2022 56th Annual Conference on Information Sciences and Systems (CISS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125312132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fredy Mendoza-Cardenas, Rai Stiv Leon-Aguilar, Jose L. Quiroz Arroyo
{"title":"CP-ABE encryption over MQTT for an IoT system with Raspberry Pi","authors":"Fredy Mendoza-Cardenas, Rai Stiv Leon-Aguilar, Jose L. Quiroz Arroyo","doi":"10.1109/CISS53076.2022.9751194","DOIUrl":"https://doi.org/10.1109/CISS53076.2022.9751194","url":null,"abstract":"Nowadays, the increasing number of devices deployed in IoT systems implementation and the requirement of preserving the integrity of data transported over the Internet, demand the use of data encryption schemes. This paper aims to show the performance evaluation of CP-ABE (Ciphertext-Policy Attribute Based Encryption) type of encryption over MQTT (Message Queue Transport Telemetry) that focuses on execution time for an IoT system with Raspberry Pi. For the implementation, two Raspberry Pi 4 Computer Model B are used for both the publisher and the subscriber, and a computer with Ubuntu 20.04 LTS operating system is used for the Broker and the Key Authority. The result of the present work provides relevant information on the execution times required in the CP-ABE encryption scheme to provide data integrity and fine-grained access control policy in an IoT system. The work demonstrates that the CP-ABE encryption scheme is suitable for IoT systems.","PeriodicalId":305918,"journal":{"name":"2022 56th Annual Conference on Information Sciences and Systems (CISS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128319037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}