2,349 research outputs found
RL-IoT: Reinforcement Learning to Interact with IoT Devices
Our life is getting filled by Internet of Things (IoT) devices. These devices often rely on closed or poorly documented protocols, with unknown formats and semantics. Learning how to interact with such devices in an autonomous manner is the key for interoperability and automatic verification of their capabilities. In this paper, we propose RL-IoT, a system that explores how to automatically interact with possibly unknown IoT devices. We leverage reinforcement learning (RL) to recover the semantics of protocol messages and to take control of the device to reach a given goal, while minimizing the number of interactions. We assume to know only a database of possible IoT protocol messages, whose semantics are however unknown. RL-IoT exchanges messages with the target IoT device, learning those commands that are useful to reach the given goal. Our results show that RL-IoT is able to solve both simple and complex tasks. With properly tuned parameters, RL-IoT learns how to perform actions with the target device, a Yeelight smart bulb in our case study, completing non-trivial patterns with as few as 400 interactions. RL-IoT paves the road for automatic interactions with poorly documented IoT protocols, thus enabling interoperable systems
Lattice Boltzmann simulations of droplet breakup in confined and time-dependent flows
We study droplet dynamics and breakup in generic time-dependent flows via a
multicomponent Lattice Boltzmann algorithm, with emphasis on flow start up
conditions. We first study droplet breakup in a confined oscillatory shear flow
via two different protocols. In one set up, we start from an initially
spherical droplet and turn on the flow abruptly ("shock method"); in the other
protocol, we start from an initially spherical droplet as well, but we
progressively increase the amplitude of the flow, by allowing the droplet to
relax to the steady state for each increase in amplitude, before increasing the
flow amplitude again ("relaxation method"). The two protocols are shown to
produce substantially different breakup scenarios. The mismatch between these
two protocols is also studied for variations in the flow topology, the degree
of confinement and the inertia of the fluid. All results point to the fact that
under extreme conditions of confinement the relaxation protocols can drive the
droplets into metastable states, which break only for very intense flow
amplitudes, but their stability is prone to external perturbations, such as an
oscillatory driving force
A Microarray study of Carpet-Shell Clam (Ruditapes decussatus) shows common and organ-specific growth-related gene expression Differences in gills and digestive gland
Growth rate is one of the most important traits from the point of view of individual fitness and commercial production in mollusks, but its molecular and physiological basis is poorly known. We have studied differential gene expression related to differences in growth rate in adult individuals of the commercial marine clam Ruditapes decussatus. Gene expression in the gills and the digestive gland was analyzed in 5 fast-growing and five slow-growing animals by means of an oligonucleotide microarray containing 14,003 probes. A total of 356 differentially expressed genes (DEG) were found. We tested the hypothesis that differential expression might be concentrated at the growth control gene core (GCGC), i. e., the set of genes that underlie the molecular mechanisms of genetic control of tissue and organ growth and body size, as demonstrated in model organisms. The GCGC includes the genes coding for enzymes of the insulin/ insulin-like growth factor signaling pathway (IIS), enzymes of four additional signaling pathways (Raf/ Ras/ Mapk, Jnk, TOR, and Hippo), and transcription factors acting at the end of those pathways. Only two out of 97 GCGC genes present in themicroarray showed differential expression, indicating a very little contribution of GCGC genes to growth-related differential gene expression. Forty eight DEGs were shared by both organs, with gene ontology (GO) annotations corresponding to transcription regulation, RNA splicing, sugar metabolism, protein catabolism, immunity, defense against pathogens, and fatty acid biosynthesis. GO termenrichment tests indicated that genes related to growth regulation, development and morphogenesis, extracellular matrix proteins, and proteolysis were overrepresented in the gills. In the digestive gland overrepresented GO terms referred to gene expression control through chromatin rearrangement, RAS-related small GTPases, glucolysis, and energy metabolism. These analyses suggest a relevant role of, among others, some genes related to the IIS, such as the ParaHox gene Xlox, CCAR and the CCN family of secreted proteins, in the regulation of growth in bivalves.Direccion General de Investigacion Cientifica y Tecnica of the Spanish Government [AGL2010-16743, AGL2013-49144-C3-3-R]; COMPETE Program; Portuguese National Funds [PEst-255 C/MAR/LA0015/2011]; Portuguese FCT [UID/Multi/04326/2013]; Generalitat Valenciana; Ministry of Education, Culture, and Sports of the Spanish Government; Association of European Marine Biology Laboratoriesinfo:eu-repo/semantics/publishedVersio
Cross-network Embeddings Transfer for Traffic Analysis
Artificial Intelligence (AI) approaches have emerged as powerful tools to improve traffic analysis for network monitoring and management. However, the lack of large labeled datasets and the ever-changing networking scenarios make a fundamental difference compared to other domains where AI is thriving. We believe the ability to transfer the specific knowledge acquired in one network (or dataset) to a different network (or dataset) would be fundamental to speed up the adoption of AI-based solutions for traffic analysis and other networking applications (e.g., cybersecurity). We here propose and evaluate different options to transfer the knowledge built from a provider network, owning data and labels, to a customer network that desires to label its traffic but lacks labels. We formulate this problem as a domain adaptation problem that we solve with embedding alignment techniques and canonical transfer learning approaches. We present a thorough experimental analysis to assess the performance considering both supervised (e.g., classification) and unsupervised (e.g., novelty detection) downstream tasks related to darknet and honeypot traffic. Our experiments show the proper transfer techniques to use the models obtained from a network in a different network. We believe our contribution opens new opportunities and business models where network providers can successfully share their knowledge and AI models with customers
Mass Corrections to Flavor-Changing Fermion-Graviton Vertices in the Standard Model
In a previous study, the flavor-changing fermion-graviton interactions have
been analyzed in the framework of the standard model, where analytical results
for the relevant form factors were obtained at the leading order in the
external fermion masses. These interactions arise at one-loop level by the
charged electroweak corrections to the fermion-graviton vertex, when the
off-diagonal flavor transitions in the corresponding charged weak currents are
taken into account. Due to the conservation of the energy-momentum tensor, the
corresponding form factors turn out to be finite and gauge invariant when
external fermions are on-shell. Here we extend this previous analysis by
including the exact dependence on the external fermion masses. Complete
analytical results are provided for all the relevant form factors to the
flavor-changing fermion-graviton transitions.Comment: 19 pages, 9 figure
Federated Linear Contextual Bandits with User-level Differential Privacy
This paper studies federated linear contextual bandits under the notion of
user-level differential privacy (DP). We first introduce a unified federated
bandits framework that can accommodate various definitions of DP in the
sequential decision-making setting. We then formally introduce user-level
central DP (CDP) and local DP (LDP) in the federated bandits framework, and
investigate the fundamental trade-offs between the learning regrets and the
corresponding DP guarantees in a federated linear contextual bandits model. For
CDP, we propose a federated algorithm termed as \robin and show that it is
near-optimal in terms of the number of clients and the privacy budget
by deriving nearly-matching upper and lower regret bounds when
user-level DP is satisfied. For LDP, we obtain several lower bounds, indicating
that learning under user-level -LDP must suffer a regret
blow-up factor at least { or
} under different conditions.Comment: Accepted by ICML 202
Stable topological insulators achieved using high energy electron beams
Topological insulators are transformative quantum solids with
immune-to-disorder metallic surface states having Dirac band structure.
Ubiquitous charged bulk defects, however, pull the Fermi energy into the bulk
bands, denying access to surface charge transport. Here we demonstrate that
irradiation with swift ( MeV energy) electron beams allows to
compensate these defects, bring the Fermi level back into the bulk gap, and
reach the charge neutrality point (CNP). Controlling the beam fluence we tune
bulk conductivity from \textit{p}- (hole-like) to \textit{n}-type
(electron-like), crossing the Dirac point and back, while preserving the Dirac
energy dispersion. The CNP conductance has a two-dimensional (2D) character on
the order of ten conductance quanta , and reveals, both in
BiTe and BiSe, the presence of only two quantum channels
corresponding to two topological surfaces. The intrinsic quantum transport of
the topological states is accessible disregarding the bulk size.Comment: Main manuscript - 12 pages, 4 figures; Supplementary file - 15 pages,
11 figures, 1 Table, 4 Note
Managing the far-Edge: are today's centralized solutions a good fit
Edge computing has established itself as the foundation for next-generation mobile networks, IT infrastructure, and industrial systems thanks to promised low network latency, computation offloading, and data locality. These properties empower key use-cases like Industry 4.0, Vehicular Communication and Internet of Things. Nowadays implementation of Edge computing is based on extensions to available Cloud computing software tools. While this approach accelerates adoption, it hinders the deployment of the aforementioned use-cases that requires an infrastructure largely more decentralized than Cloud data centers, notably in the far-Edge of the network. In this context, this work aims at: (i) to analyze the differences between Cloud and Edge infrastructures, (ii) to analyze the architecture adopted by the most prominent open-source Edge computing solutions, and (iii) to experimentally evaluate those solutions in terms of scalability and service instantiation time in a medium-size far Edge system. Results show that mainstream Edge solutions require powerful centralized controllers and always-on connectivity, making them unsuitable for highly decentralized scenarios in the far-Edge where stable and high-bandwidth links are not ubiquitous.This work has been partially funded by the H2020 collaborative Europe/Taiwan research project 5G-DIVE (grant no. 589881) and by the H2020 European collaborative research project DAEMON (grant no. 101017109)
- …