Clifford wavelets for fetal ECG extraction

Analysis of the fetal heart rate during pregnancy is essential for monitoring the proper development of the fetus . The challenge lies in the extraction ofthe fetal ECG from the mother’s ECG during pregnancy . This approach has theadvantage of being a reliable and non-invasive technique .…

HexDom Polycube Based Hexahedral Dominant Mesh Generation

Given the boundary representation of a solid model, HexDom creates a hex-dominant mesh by using a semi-automated polycube-based mesh generation method . The resulting hexahedral dominant mesh includeshexahedra, tetrahedra and triangular prisms . We also apply our software to a number of other complex models totest their robustness .…

Simplicial Complex Representation Learning

Simplicial complexes form an important class of topological spaces that are frequently used to in many applications areas such as computer-aided design, computer graphics, and simulation . The representation learning on graphs, whichare just 1-d simplicial complexes, has witnessed a great attention and success in the past few years .…

A Framework for Measuring Compositional Inductive Bias

We devise corruptedcompositional grammars that probe for limitations in the compositionalinductive bias of frequently used models . We propose a hierarchicalmodel which might show an inductive bias towards relocatable atomic groups oftokens, thus potentially encouraging the emergence of words . We experiment withprobing for the .…

Putting Humans in the Natural Language Processing Loop A Survey

There is a growing research body of Human-in-the-loop (HITL)NLP frameworks that continuously integrate human feedback to improve the model itself . HITL NLP research is nascent but multifarious — solving various NLPproblems, collecting diverse feedback from different people, and applyingdifferent methods to learn from collected feedback .…

Selective Encryption of the Versatile Video Coding Standard

Versatile video coding (VVC) is the next generation video coding standard developed by the joint video experts team (JVET) and released in July 2020 . VVCintroduces several new coding tools providing a significant coding gain over the HEVC standard . A new algorithm is proposed to encrypt informat-compliant and constant bitrate the transform coefficients (TCs) together with other syntax elements at the level of the entropy encoder .…

Hidden Backdoor Attack against Semantic Segmentation Models

Deep neural networks (DNNs) are vulnerable to the \emph{backdoor attack}. It intends to embed hidden backdoors in DNNs by poisoning training data . So far, backdoor research has mostly been conducted towards classification tasks . In this paper, we reveal that this threat could also happen in semanticsegmentation, which may further endanger many mission-critical applications ($e.g.!),…

Smart Speakers the Next Frontier in Computational Health

The rapid dissemination and adoption of smart speakers has enabled substantial opportunities to improve human health . Smart speakers carry several unique advantages that have the potential to catalyze newfields of health research, particularly in out-of-hospital environments . Therecent rise and ubiquity of these smart computing systems hold significantpotential for enhancing chronic disease management, enabling passiveidentification of unwitnessed medical emergencies, detecting subtle changes in behavior and cognition, limiting isolation, and potentially allowing widespread, passive, remote monitoring of respiratory diseases that impact the public health .…

Make Your Autonomous Vehicle Deliver And Earn Money for You

The drone-based last-mile delivery is an emerging technology designed toautomate the delivery process by utilizing drones loaded on a truck totransport parcels to customers . A novel greedy algorithm is proposed to solve the problem that incorporates the real-world operational cost of AVs, traveling distances, and varying load capacities of .…

Blueprint Cyberinfrastructure Center of Excellence

In 2018, NSF funded an effort to pilot a Cyberinfrastructure Center ofExcellence (CI CoE or Center) that would serve the cyberinfrastructure (CI)needs of the NSF Major Facilities (MFs) and large projects with advanced CIarchitectures . The goal of the CI CoE Pilot project (Pilot) effort was todevelop a model and a blueprint for such a CoE .…

Matroid Secretary is Equivalent to Contention Resolution

We show that the matroid secretary problem is equivalent to correlatedcontention resolution in the online random-order model . Our result indicates that the core challenge of the problem lies in resolvingcontention for positively correlated inputs, in particular when the positivecorrelation is benign in as much as offline contention resolution is concerned .…

DONeRF Towards Real Time Rendering of Neural Radiance Fields using Depth Oracle Networks

The number of samples required for each view ray can be reduced when local samples are placed around surfaces in the scene . With our design, wereduce the inference costs by up to 48x compared to NeRF . Using anoff-the-shelf inference API in combination with simple compute kernels, we are the first to render raymarching-based neural representations at interactiveframe rates (15 frames per second at 800×800) on a single GPU .…

Revenue Maximization for Buyers with Outside Options

We study mechanisms for selling a single item when buyers have private values for their outside options, which they forego by participating in the mechanism . For example, theseller can strictly benefit from selling lotteries already in the single-buyersetting . We bound the menu size and the sample complexity for the optimalsingle-buyer mechanism .…

ChartStory Automated Partitioning Layout and Captioning of Charts into Comic Style Narratives

ChartStory uses a style akin to comic panels to imply the underlying sequence and logic of data-driven narratives . ChartStory augments this pipeline with intuitive user interactions for visualrefinement of generated data comics . We find that ChartStory provides cogent recommendations for narrative generation,resulting in data comics that compare favorably to manually-created ones.…

Reducing cybersickness in 360 degree virtual reality

Virtual Reality (VR) users are constantly combating feelings of nausea and disorientation, the so calledcybersickness . Triggered by a sensory conflict between the visual and vestibular systems . We evaluated whether an Artificial Intelligence (AI) software . designed to supplement the VR experience with artificial6-degree-of-freedom motion may reduce sensory conflict, and thereforecyberickness.…

Intelligent Reflecting Surface Enhanced D2D Cooperative Computing

This paper investigates a device-to-device (D2D) cooperative computingsystem . An user can offload part of its computation task to nearby idle users with the aid of an intelligent reflecting surface (IRS) We propose tominimize the total computing delay via jointly optimizing the computation taskassignment, transmit power, bandwidth allocation, and phase beamforming of theIRS .…

Distributed Dynamic Map Fusion via Federated Learning for Intelligent Networked Vehicles

The technology of dynamic map fusion among networked vehicles has be developed to enlarge sensing ranges and improve sensing accuracy for individual vehicles . This paper proposes a federated learning (FL) baseddynamic map fusion framework to achieve high map quality despite unknownnumbers of objects in fields of view (FoVs), various sensing and modeluncertainties, and missing data labels for online learning .…

Symplectic GARK methods for Hamiltonian systems

Generalized Additive Runge-Kutta schemes have shown to be a suitable tool for solving ordinary differential equations with additively partitioned right-handsides . Weshow how symplectic and symmetric schemes can be constructed based on schemes that are only symplectic . Special attention is given to the special case of partitioned schemes for Hamiltonians split into multiple potential and kineticenergies .…

Block Randomized Gradient Descent Methods with Importance Sampling for CP Tensor Decomposition

This work considers the problem of computing the CANDECOMP/PARAFAC (CP)decomposition of large tensors . One popular way is to translate the problem into a sequence of overdetermined least squares subproblems with Khatri-Raoproduct (KRP) structure . In this work, for tensor with different levels ofimportance in each fiber, we present a mini-batch stochastic gradient descent algorithm with .importance…

Coarse reduced model selection for nonlinear state estimation

State estimation is the task of approximately reconstructing a solution $u$ of a parametric partial differential equation when the parameter vector $y$ is unknown . In [Cohenetet. al., 2021] the authors proposed a method to use a family of linear reducedspaces as a generalised nonlinear reduced model for state estimation .…

Convolution Neural Network Hyperparameter Optimization Using Simplified Swarm Optimization

Simplified SwarmOptimization (SSO) on the hyperparameter optimization of LeNet models . The experimental resultsshow that the proposed algorithm has higher accuracy than the original LeNetmodel . The proposed algorithm can also be applied to other CNN architectures . The contribution of the study is to provide users with a simplerway to get better results with the existing model.,…

RAN Slicing Performance Trade offs Timing versus Throughput Requirements

The coexistence of diverse services with heterogeneous requirements is amajor component of 5G . This calls for spectrum slicing: efficient sharing of wireless resources among diverse users . We evaluate the trade-offs between between the achievable throughput of broadband users and the timing requirement of intermittent users under three access modes: Orthogonal Multiple Access (OMA), Non-OrthogonalMultiple Access (NOMA) and POMA .…

Towards Automated Benchmark Support for Multi Blockchain Interoperability Facilitating Platforms

Since the introduction of the first Bitcoin blockchain in 2008, differentdecentralized blockchain systems have emerged with public and private accessibility . It has been widelyacknowledged that no single blockchain network will fit all use cases . Inrealization of this multi-blockchain paradigm, initiatives in buildingInteroperability-Facilitating Platforms (IFPs) that aim at bridging differentblockchains have come to the fore .…

Incorporating Wireless Communication Parameters into the E Model Algorithm

ITU-T Recommendation G.107.107 describes the E-model algorithm, which is acomputational model developed for network planning purposes focused onnarrowband (NB) networks . It does not consider wireless techniques used in these networks, such asMultiple-Input-Multiple-Output (MIMO) systems . The main objective of this study is to topropose a general methodology to incorporate wireless network parameters intothe NB and WB E-Model algorithms .…

Quartermaster A Tool for Modeling and Simulating System Degradation

There are patterns and techniques which software engineers use to ensure their systems gracefully degrade . But tuning and configuration is hard to get right and it is expensive to explore possible changes to components andtechniques in complex systems . To fill these gaps, we propose Quartermaster to model and simulate systems and fault-tolerant techniques .…