105 research outputs found
A hybrid neuro--wavelet predictor for QoS control and stability
For distributed systems to properly react to peaks of requests, their
adaptation activities would benefit from the estimation of the amount of
requests. This paper proposes a solution to produce a short-term forecast based
on data characterising user behaviour of online services. We use \emph{wavelet
analysis}, providing compression and denoising on the observed time series of
the amount of past user requests; and a \emph{recurrent neural network} trained
with observed data and designed so as to provide well-timed estimations of
future requests. The said ensemble has the ability to predict the amount of
future user requests with a root mean squared error below 0.06\%. Thanks to
prediction, advance resource provision can be performed for the duration of a
request peak and for just the right amount of resources, hence avoiding
over-provisioning and associated costs. Moreover, reliable provision lets users
enjoy a level of availability of services unaffected by load variations
Improving files availability for BitTorrent using a diffusion model
The BitTorrent mechanism effectively spreads file fragments by copying the
rarest fragments first. We propose to apply a mathematical model for the
diffusion of fragments on a P2P in order to take into account both the effects
of peer distances and the changing availability of peers while time goes on.
Moreover, we manage to provide a forecast on the availability of a torrent
thanks to a neural network that models the behaviour of peers on the P2P
system. The combination of the mathematical model and the neural network
provides a solution for choosing file fragments that need to be copied first,
in order to ensure their continuous availability, counteracting possible
disconnections by some peers
An agent-driven semantical identifier using radial basis neural networks and reinforcement learning
Due to the huge availability of documents in digital form, and the deception
possibility raise bound to the essence of digital documents and the way they
are spread, the authorship attribution problem has constantly increased its
relevance. Nowadays, authorship attribution,for both information retrieval and
analysis, has gained great importance in the context of security, trust and
copyright preservation. This work proposes an innovative multi-agent driven
machine learning technique that has been developed for authorship attribution.
By means of a preprocessing for word-grouping and time-period related analysis
of the common lexicon, we determine a bias reference level for the recurrence
frequency of the words within analysed texts, and then train a Radial Basis
Neural Networks (RBPNN)-based classifier to identify the correct author. The
main advantage of the proposed approach lies in the generality of the semantic
analysis, which can be applied to different contexts and lexical domains,
without requiring any modification. Moreover, the proposed system is able to
incorporate an external input, meant to tune the classifier, and then
self-adjust by means of continuous learning reinforcement.Comment: Published on: Proceedings of the XV Workshop "Dagli Oggetti agli
Agenti" (WOA 2014), Catania, Italy, Sepember. 25-26, 201
A Software Architecture Assisting Workflow Executions on Cloud Resources
An enterprise providing services handled by means of workflows needs to monitor and control their execution, gather usage data, determine priorities, and properly use computing cloud-related resources. This paper proposes a software architecture that connects unaware services to components handling workflow monitoring and management concerns. Moreover, the provided components enhance dependability of services while letting developers focus only on the business logic
Simplified firefly algorithm for 2D image key-points search
In order to identify an object, human eyes firstly search the field of view
for points or areas which have particular properties. These properties are used
to recognise an image or an object. Then this process could be taken as a model
to develop computer algorithms for images identification. This paper proposes
the idea of applying the simplified firefly algorithm to search for key-areas
in 2D images. For a set of input test images the proposed version of firefly
algorithm has been examined. Research results are presented and discussed to
show the efficiency of this evolutionary computation method.Comment: Published version on: 2014 IEEE Symposium on Computational
Intelligence for Human-like Intelligenc
From statistical- to machine learning-based network traffic prediction
Nowadays, due to the exponential and continuous expansion of new paradigms such as Internet of Things (IoT), Internet of Vehicles (IoV) and 6G, the world is witnessing a tremendous and sharp increase of network traffic. In such large-scale, heterogeneous, and complex networks, the volume of transferred data, as big data, is considered a challenge causing different networking inefficiencies. To overcome these challenges, various techniques are introduced to monitor the performance of networks, called Network Traffic Monitoring and Analysis (NTMA). Network Traffic Prediction (NTP) is a significant subfield of NTMA which is mainly focused on predicting the future of network load and its behavior. NTP techniques can generally be realized in two ways, that is, statistical- and Machine Learning (ML)-based. In this paper, we provide a study on existing NTP techniques through reviewing, investigating, and classifying the recent relevant works conducted in this field. Additionally, we discuss the challenges and future directions of NTP showing that how ML and statistical techniques can be used to solve challenges of NTP.publishedVersio
Probabilistic data-driven methods for forecasting, identification and control
This dissertation presents contributions mainly in three different fields: system
identification, probabilistic forecasting and stochastic control.
Thanks to the concept of dissimilarity and by defining an appropriate dissimilarity
function, it is shown that a family of predictors can be obtained. First, a
predictor to compute nominal forecastings of a time-series or a dynamical system
is presented. The effectiveness of the predictor is shown by means of a numerical
example, where daily predictions of a stock index are computed. The obtained
results turn out to be better than those obtained with popular machine learning
techniques like Neural Networks.
Similarly, the aforementioned dissimilarity function can be used to compute conditioned
probability distributions. By means of the obtained distributions, interval
predictions can be made by using the concept of quantiles. However, in order to
do that, it is necessary to integrate the distribution for all the possible values of
the output. As this numerical integration process is computationally expensive,
an alternate method bypassing the computation of the probability distribution is
also proposed. Not only is computationally cheaper but it also allows to compute
prediction regions, which are the multivariate version of the interval predictions.
Both methods present better results than other baseline approaches in a set of
examples, including a stock forecasting example and the prediction of the Lorenz
attractor.
Furthermore, new methods to obtain models of nonlinear systems by means of
input-output data are proposed. Two different model approaches are presented:
a local data approach and a kernel-based approach. A kalman filter can be added
to improve the quality of the predictions. It is shown that the forecasting performance
of the proposed models is better than other machine learning methods in
several examples, such as the forecasting of the sunspot number and the R¨ossler
attractor. Also, as these models are suitable for Model Predictive Control (MPC),
new MPC formulations are proposed. Thanks to the distinctive features of the
proposed models, the nonlinear MPC problem can be posed as a simple quadratic
programming problem. Finally, by means of a simulation example and a real
experiment, it is shown that the controller performs adequately.
On the other hand, in the field of stochastic control, several methods to bound
the constraint violation rate of any controller under the presence of bounded or
unbounded disturbances are presented. These can be used, for example, to tune
some hyperparameters of the controller. Some simulation examples are proposed
in order to show the functioning of the algorithms. One of these examples considers
the management of a data center. Here, an energy-efficient MPC-inspired policy is developed in order to reduce the electricity consumption while keeping
the quality of service at acceptable levels
Data analytics for stochastic control and prognostics in cyber-physical systems
In this dissertation, several novel cyber fault diagnosis and prognosis and defense methodologies for cyber-physical systems have been proposed. First, a novel routing scheme for wireless mesh network is proposed. An effective capacity estimation for P2P and E2E path is designed to guarantee the vital transmission safety. This scheme can ensure a high quality of service (QoS) under imperfect network condition, even cyber attacks. Then, the imperfection, uncertainties, and dynamics in the cyberspace are considered both in system model and controller design. A PDF identifier is proposed to capture the time-varying delays and its distribution. With the modification of traditional stochastic optimal control using PDF of delays, the assumption of full knowledge of network imperfection in priori is relaxed. This proposed controller is considered a novel resilience control strategy for cyber fault diagnosis and prognosis. After that, we turn to the development of a general framework for cyber fault diagnosis and prognosis schemes for CPSs wherein the cyberspace performance affect the physical system and vice versa. A novel cyber fault diagnosis scheme is proposed. It is capable of detecting cyber fault by monitoring the probability of delays. Also, the isolation of cyber and physical system fault is achieved with cooperating with the traditional observer based physical system fault detection. Next, a novel cyber fault prognosis scheme, which can detect and estimate cyber fault and its negative effects on system performance ahead of time, is proposed. Moreover, soft and hard cyber faults are isolated depending on whether potential threats on system stability is predicted. Finally, one-class SVM is employed to classify healthy and erroneous delays. Then, another cyber fault prognosis based on OCSVM is proposed --Abstract, page iv
- …