2,349 research outputs found

    RL-IoT: Reinforcement Learning to Interact with IoT Devices

    Get PDF
    Our life is getting filled by Internet of Things (IoT) devices. These devices often rely on closed or poorly documented protocols, with unknown formats and semantics. Learning how to interact with such devices in an autonomous manner is the key for interoperability and automatic verification of their capabilities. In this paper, we propose RL-IoT, a system that explores how to automatically interact with possibly unknown IoT devices. We leverage reinforcement learning (RL) to recover the semantics of protocol messages and to take control of the device to reach a given goal, while minimizing the number of interactions. We assume to know only a database of possible IoT protocol messages, whose semantics are however unknown. RL-IoT exchanges messages with the target IoT device, learning those commands that are useful to reach the given goal. Our results show that RL-IoT is able to solve both simple and complex tasks. With properly tuned parameters, RL-IoT learns how to perform actions with the target device, a Yeelight smart bulb in our case study, completing non-trivial patterns with as few as 400 interactions. RL-IoT paves the road for automatic interactions with poorly documented IoT protocols, thus enabling interoperable systems

    Lattice Boltzmann simulations of droplet breakup in confined and time-dependent flows

    Get PDF
    We study droplet dynamics and breakup in generic time-dependent flows via a multicomponent Lattice Boltzmann algorithm, with emphasis on flow start up conditions. We first study droplet breakup in a confined oscillatory shear flow via two different protocols. In one set up, we start from an initially spherical droplet and turn on the flow abruptly ("shock method"); in the other protocol, we start from an initially spherical droplet as well, but we progressively increase the amplitude of the flow, by allowing the droplet to relax to the steady state for each increase in amplitude, before increasing the flow amplitude again ("relaxation method"). The two protocols are shown to produce substantially different breakup scenarios. The mismatch between these two protocols is also studied for variations in the flow topology, the degree of confinement and the inertia of the fluid. All results point to the fact that under extreme conditions of confinement the relaxation protocols can drive the droplets into metastable states, which break only for very intense flow amplitudes, but their stability is prone to external perturbations, such as an oscillatory driving force

    A Microarray study of Carpet-Shell Clam (Ruditapes decussatus) shows common and organ-specific growth-related gene expression Differences in gills and digestive gland

    Get PDF
    Growth rate is one of the most important traits from the point of view of individual fitness and commercial production in mollusks, but its molecular and physiological basis is poorly known. We have studied differential gene expression related to differences in growth rate in adult individuals of the commercial marine clam Ruditapes decussatus. Gene expression in the gills and the digestive gland was analyzed in 5 fast-growing and five slow-growing animals by means of an oligonucleotide microarray containing 14,003 probes. A total of 356 differentially expressed genes (DEG) were found. We tested the hypothesis that differential expression might be concentrated at the growth control gene core (GCGC), i. e., the set of genes that underlie the molecular mechanisms of genetic control of tissue and organ growth and body size, as demonstrated in model organisms. The GCGC includes the genes coding for enzymes of the insulin/ insulin-like growth factor signaling pathway (IIS), enzymes of four additional signaling pathways (Raf/ Ras/ Mapk, Jnk, TOR, and Hippo), and transcription factors acting at the end of those pathways. Only two out of 97 GCGC genes present in themicroarray showed differential expression, indicating a very little contribution of GCGC genes to growth-related differential gene expression. Forty eight DEGs were shared by both organs, with gene ontology (GO) annotations corresponding to transcription regulation, RNA splicing, sugar metabolism, protein catabolism, immunity, defense against pathogens, and fatty acid biosynthesis. GO termenrichment tests indicated that genes related to growth regulation, development and morphogenesis, extracellular matrix proteins, and proteolysis were overrepresented in the gills. In the digestive gland overrepresented GO terms referred to gene expression control through chromatin rearrangement, RAS-related small GTPases, glucolysis, and energy metabolism. These analyses suggest a relevant role of, among others, some genes related to the IIS, such as the ParaHox gene Xlox, CCAR and the CCN family of secreted proteins, in the regulation of growth in bivalves.Direccion General de Investigacion Cientifica y Tecnica of the Spanish Government [AGL2010-16743, AGL2013-49144-C3-3-R]; COMPETE Program; Portuguese National Funds [PEst-255 C/MAR/LA0015/2011]; Portuguese FCT [UID/Multi/04326/2013]; Generalitat Valenciana; Ministry of Education, Culture, and Sports of the Spanish Government; Association of European Marine Biology Laboratoriesinfo:eu-repo/semantics/publishedVersio

    Cross-network Embeddings Transfer for Traffic Analysis

    Get PDF
    Artificial Intelligence (AI) approaches have emerged as powerful tools to improve traffic analysis for network monitoring and management. However, the lack of large labeled datasets and the ever-changing networking scenarios make a fundamental difference compared to other domains where AI is thriving. We believe the ability to transfer the specific knowledge acquired in one network (or dataset) to a different network (or dataset) would be fundamental to speed up the adoption of AI-based solutions for traffic analysis and other networking applications (e.g., cybersecurity). We here propose and evaluate different options to transfer the knowledge built from a provider network, owning data and labels, to a customer network that desires to label its traffic but lacks labels. We formulate this problem as a domain adaptation problem that we solve with embedding alignment techniques and canonical transfer learning approaches. We present a thorough experimental analysis to assess the performance considering both supervised (e.g., classification) and unsupervised (e.g., novelty detection) downstream tasks related to darknet and honeypot traffic. Our experiments show the proper transfer techniques to use the models obtained from a network in a different network. We believe our contribution opens new opportunities and business models where network providers can successfully share their knowledge and AI models with customers

    Mass Corrections to Flavor-Changing Fermion-Graviton Vertices in the Standard Model

    Full text link
    In a previous study, the flavor-changing fermion-graviton interactions have been analyzed in the framework of the standard model, where analytical results for the relevant form factors were obtained at the leading order in the external fermion masses. These interactions arise at one-loop level by the charged electroweak corrections to the fermion-graviton vertex, when the off-diagonal flavor transitions in the corresponding charged weak currents are taken into account. Due to the conservation of the energy-momentum tensor, the corresponding form factors turn out to be finite and gauge invariant when external fermions are on-shell. Here we extend this previous analysis by including the exact dependence on the external fermion masses. Complete analytical results are provided for all the relevant form factors to the flavor-changing fermion-graviton transitions.Comment: 19 pages, 9 figure

    Federated Linear Contextual Bandits with User-level Differential Privacy

    Full text link
    This paper studies federated linear contextual bandits under the notion of user-level differential privacy (DP). We first introduce a unified federated bandits framework that can accommodate various definitions of DP in the sequential decision-making setting. We then formally introduce user-level central DP (CDP) and local DP (LDP) in the federated bandits framework, and investigate the fundamental trade-offs between the learning regrets and the corresponding DP guarantees in a federated linear contextual bandits model. For CDP, we propose a federated algorithm termed as \robin and show that it is near-optimal in terms of the number of clients MM and the privacy budget ε\varepsilon by deriving nearly-matching upper and lower regret bounds when user-level DP is satisfied. For LDP, we obtain several lower bounds, indicating that learning under user-level (ε,δ)(\varepsilon,\delta)-LDP must suffer a regret blow-up factor at least {min{1/ε,M}\min\{1/\varepsilon,M\} or min{1/ε,M}\min\{1/\sqrt{\varepsilon},\sqrt{M}\}} under different conditions.Comment: Accepted by ICML 202

    Stable topological insulators achieved using high energy electron beams

    Full text link
    Topological insulators are transformative quantum solids with immune-to-disorder metallic surface states having Dirac band structure. Ubiquitous charged bulk defects, however, pull the Fermi energy into the bulk bands, denying access to surface charge transport. Here we demonstrate that irradiation with swift (2.5\sim 2.5 MeV energy) electron beams allows to compensate these defects, bring the Fermi level back into the bulk gap, and reach the charge neutrality point (CNP). Controlling the beam fluence we tune bulk conductivity from \textit{p}- (hole-like) to \textit{n}-type (electron-like), crossing the Dirac point and back, while preserving the Dirac energy dispersion. The CNP conductance has a two-dimensional (2D) character on the order of ten conductance quanta G0=e2/hG_0 =e^2/h, and reveals, both in Bi2_2Te3_3 and Bi2_2Se3_3, the presence of only two quantum channels corresponding to two topological surfaces. The intrinsic quantum transport of the topological states is accessible disregarding the bulk size.Comment: Main manuscript - 12 pages, 4 figures; Supplementary file - 15 pages, 11 figures, 1 Table, 4 Note

    Managing the far-Edge: are today's centralized solutions a good fit

    Get PDF
    Edge computing has established itself as the foundation for next-generation mobile networks, IT infrastructure, and industrial systems thanks to promised low network latency, computation offloading, and data locality. These properties empower key use-cases like Industry 4.0, Vehicular Communication and Internet of Things. Nowadays implementation of Edge computing is based on extensions to available Cloud computing software tools. While this approach accelerates adoption, it hinders the deployment of the aforementioned use-cases that requires an infrastructure largely more decentralized than Cloud data centers, notably in the far-Edge of the network. In this context, this work aims at: (i) to analyze the differences between Cloud and Edge infrastructures, (ii) to analyze the architecture adopted by the most prominent open-source Edge computing solutions, and (iii) to experimentally evaluate those solutions in terms of scalability and service instantiation time in a medium-size far Edge system. Results show that mainstream Edge solutions require powerful centralized controllers and always-on connectivity, making them unsuitable for highly decentralized scenarios in the far-Edge where stable and high-bandwidth links are not ubiquitous.This work has been partially funded by the H2020 collaborative Europe/Taiwan research project 5G-DIVE (grant no. 589881) and by the H2020 European collaborative research project DAEMON (grant no. 101017109)
    corecore