-
In-depth Analysis of Privacy Threats in Federated Learning for Medical Data
Authors:
Badhan Chandra Das,
M. Hadi Amini,
Yanzhao Wu
Abstract:
Federated learning is emerging as a promising machine learning technique in the medical field for analyzing medical images, as it is considered an effective method to safeguard sensitive patient data and comply with privacy regulations. However, recent studies have revealed that the default settings of federated learning may inadvertently expose private training data to privacy attacks. Thus, the…
▽ More
Federated learning is emerging as a promising machine learning technique in the medical field for analyzing medical images, as it is considered an effective method to safeguard sensitive patient data and comply with privacy regulations. However, recent studies have revealed that the default settings of federated learning may inadvertently expose private training data to privacy attacks. Thus, the intensity of such privacy risks and potential mitigation strategies in the medical domain remain unclear. In this paper, we make three original contributions to privacy risk analysis and mitigation in federated learning for medical data. First, we propose a holistic framework, MedPFL, for analyzing privacy risks in processing medical data in the federated learning environment and developing effective mitigation strategies for protecting privacy. Second, through our empirical analysis, we demonstrate the severe privacy risks in federated learning to process medical images, where adversaries can accurately reconstruct private medical images by performing privacy attacks. Third, we illustrate that the prevalent defense mechanism of adding random noises may not always be effective in protecting medical images against privacy attacks in federated learning, which poses unique and pressing challenges related to protecting the privacy of medical data. Furthermore, the paper discusses several unique research questions related to the privacy protection of medical data in the federated learning environment. We conduct extensive experiments on several benchmark medical image datasets to analyze and mitigate the privacy risks associated with federated learning for medical data.
△ Less
Submitted 27 September, 2024;
originally announced September 2024.
-
CorBin-FL: A Differentially Private Federated Learning Mechanism using Common Randomness
Authors:
Hojat Allah Salehi,
Md Jueal Mia,
S. Sandeep Pradhan,
M. Hadi Amini,
Farhad Shirani
Abstract:
Federated learning (FL) has emerged as a promising framework for distributed machine learning. It enables collaborative learning among multiple clients, utilizing distributed data and computing resources. However, FL faces challenges in balancing privacy guarantees, communication efficiency, and overall model accuracy. In this work, we introduce CorBin-FL, a privacy mechanism that uses correlated…
▽ More
Federated learning (FL) has emerged as a promising framework for distributed machine learning. It enables collaborative learning among multiple clients, utilizing distributed data and computing resources. However, FL faces challenges in balancing privacy guarantees, communication efficiency, and overall model accuracy. In this work, we introduce CorBin-FL, a privacy mechanism that uses correlated binary stochastic quantization to achieve differential privacy while maintaining overall model accuracy. The approach uses secure multi-party computation techniques to enable clients to perform correlated quantization of their local model updates without compromising individual privacy. We provide theoretical analysis showing that CorBin-FL achieves parameter-level local differential privacy (PLDP), and that it asymptotically optimizes the privacy-utility trade-off between the mean square error utility measure and the PLDP privacy measure. We further propose AugCorBin-FL, an extension that, in addition to PLDP, achieves user-level and sample-level central differential privacy guarantees. For both mechanisms, we derive bounds on privacy parameters and mean squared error performance measures. Extensive experiments on MNIST and CIFAR10 datasets demonstrate that our mechanisms outperform existing differentially private FL mechanisms, including Gaussian and Laplacian mechanisms, in terms of model accuracy under equal PLDP privacy budgets.
△ Less
Submitted 19 September, 2024;
originally announced September 2024.
-
Bridging the Gap between Real-world and Synthetic Images for Testing Autonomous Driving Systems
Authors:
Mohammad Hossein Amini,
Shiva Nejati
Abstract:
Deep Neural Networks (DNNs) for Autonomous Driving Systems (ADS) are typically trained on real-world images and tested using synthetic simulator images. This approach results in training and test datasets with dissimilar distributions, which can potentially lead to erroneously decreased test accuracy. To address this issue, the literature suggests applying domain-to-domain translators to test data…
▽ More
Deep Neural Networks (DNNs) for Autonomous Driving Systems (ADS) are typically trained on real-world images and tested using synthetic simulator images. This approach results in training and test datasets with dissimilar distributions, which can potentially lead to erroneously decreased test accuracy. To address this issue, the literature suggests applying domain-to-domain translators to test datasets to bring them closer to the training datasets. However, translating images used for testing may unpredictably affect the reliability, effectiveness and efficiency of the testing process. Hence, this paper investigates the following questions in the context of ADS: Could translators reduce the effectiveness of images used for ADS-DNN testing and their ability to reveal faults in ADS-DNNs? Can translators result in excessive time overhead during simulation-based testing? To address these questions, we consider three domain-to-domain translators: CycleGAN and neural style transfer, from the literature, and SAEVAE, our proposed translator. Our results for two critical ADS tasks -- lane keeping and object detection -- indicate that translators significantly narrow the gap in ADS test accuracy caused by distribution dissimilarities between training and test data, with SAEVAE outperforming the other two translators. We show that, based on the recent diversity, coverage, and fault-revealing ability metrics for testing deep-learning systems, translators do not compromise the diversity and the coverage of test data, nor do they lead to revealing fewer faults in ADS-DNNs. Further, among the translators considered, SAEVAE incurs a negligible overhead in simulation time and can be efficiently integrated into simulation-based testing. Finally, we show that translators increase the correlation between offline and simulation-based testing results, which can help reduce the cost of simulation-based testing.
△ Less
Submitted 25 August, 2024;
originally announced August 2024.
-
Naïve Bayes and Random Forest for Crop Yield Prediction
Authors:
Abbas Maazallahi,
Sreehari Thota,
Naga Prasad Kondaboina,
Vineetha Muktineni,
Deepthi Annem,
Abhi Stephen Rokkam,
Mohammad Hossein Amini,
Mohammad Amir Salari,
Payam Norouzzadeh,
Eli Snir,
Bahareh Rahmani
Abstract:
This study analyzes crop yield prediction in India from 1997 to 2020, focusing on various crops and key environmental factors. It aims to predict agricultural yields by utilizing advanced machine learning techniques like Linear Regression, Decision Tree, KNN, Naïve Bayes, K-Mean Clustering, and Random Forest. The models, particularly Naïve Bayes and Random Forest, demonstrate high effectiveness, a…
▽ More
This study analyzes crop yield prediction in India from 1997 to 2020, focusing on various crops and key environmental factors. It aims to predict agricultural yields by utilizing advanced machine learning techniques like Linear Regression, Decision Tree, KNN, Naïve Bayes, K-Mean Clustering, and Random Forest. The models, particularly Naïve Bayes and Random Forest, demonstrate high effectiveness, as shown through data visualizations. The research concludes that integrating these analytical methods significantly enhances the accuracy and reliability of crop yield predictions, offering vital contributions to agricultural data science.
△ Less
Submitted 23 April, 2024;
originally announced April 2024.
-
Security and Privacy Challenges of Large Language Models: A Survey
Authors:
Badhan Chandra Das,
M. Hadi Amini,
Yanzhao Wu
Abstract:
Large Language Models (LLMs) have demonstrated extraordinary capabilities and contributed to multiple fields, such as generating and summarizing text, language translation, and question-answering. Nowadays, LLM is becoming a very popular tool in computerized language processing tasks, with the capability to analyze complicated linguistic patterns and provide relevant and appropriate responses depe…
▽ More
Large Language Models (LLMs) have demonstrated extraordinary capabilities and contributed to multiple fields, such as generating and summarizing text, language translation, and question-answering. Nowadays, LLM is becoming a very popular tool in computerized language processing tasks, with the capability to analyze complicated linguistic patterns and provide relevant and appropriate responses depending on the context. While offering significant advantages, these models are also vulnerable to security and privacy attacks, such as jailbreaking attacks, data poisoning attacks, and Personally Identifiable Information (PII) leakage attacks. This survey provides a thorough review of the security and privacy challenges of LLMs for both training data and users, along with the application-based risks in various domains, such as transportation, education, and healthcare. We assess the extent of LLM vulnerabilities, investigate emerging security and privacy attacks for LLMs, and review the potential defense mechanisms. Additionally, the survey outlines existing research gaps in this domain and highlights future research directions.
△ Less
Submitted 29 January, 2024;
originally announced February 2024.
-
Evaluating the Impact of Flaky Simulators on Testing Autonomous Driving Systems
Authors:
Mohammad Hossein Amini,
Shervin Naseri,
Shiva Nejati
Abstract:
Simulators are widely used to test Autonomous Driving Systems (ADS), but their potential flakiness can lead to inconsistent test results. We investigate test flakiness in simulation-based testing of ADS by addressing two key questions: (1) How do flaky ADS simulations impact automated testing that relies on randomized algorithms? and (2) Can machine learning (ML) effectively identify flaky ADS tes…
▽ More
Simulators are widely used to test Autonomous Driving Systems (ADS), but their potential flakiness can lead to inconsistent test results. We investigate test flakiness in simulation-based testing of ADS by addressing two key questions: (1) How do flaky ADS simulations impact automated testing that relies on randomized algorithms? and (2) Can machine learning (ML) effectively identify flaky ADS tests while decreasing the required number of test reruns? Our empirical results, obtained from two widely-used open-source ADS simulators and five diverse ADS test setups, show that test flakiness in ADS is a common occurrence and can significantly impact the test results obtained by randomized algorithms. Further, our ML classifiers effectively identify flaky ADS tests using only a single test run, achieving F1-scores of $85$%, $82$% and $96$% for three different ADS test setups. Our classifiers significantly outperform our non-ML baseline, which requires executing tests at least twice, by $31$%, $21$%, and $13$% in F1-score performance, respectively. We conclude with a discussion on the scope, implications and limitations of our study. We provide our complete replication package in a Github repository.
△ Less
Submitted 30 November, 2023;
originally announced November 2023.
-
Privacy Risks Analysis and Mitigation in Federated Learning for Medical Images
Authors:
Badhan Chandra Das,
M. Hadi Amini,
Yanzhao Wu
Abstract:
Federated learning (FL) is gaining increasing popularity in the medical domain for analyzing medical images, which is considered an effective technique to safeguard sensitive patient data and comply with privacy regulations. However, several recent studies have revealed that the default settings of FL may leak private training data under privacy attacks. Thus, it is still unclear whether and to wh…
▽ More
Federated learning (FL) is gaining increasing popularity in the medical domain for analyzing medical images, which is considered an effective technique to safeguard sensitive patient data and comply with privacy regulations. However, several recent studies have revealed that the default settings of FL may leak private training data under privacy attacks. Thus, it is still unclear whether and to what extent such privacy risks of FL exist in the medical domain, and if so, "how to mitigate such risks?". In this paper, first, we propose a holistic framework for Medical data Privacy risk analysis and mitigation in Federated Learning (MedPFL) to analyze privacy risks and develop effective mitigation strategies in FL for protecting private medical data. Second, we demonstrate the substantial privacy risks of using FL to process medical images, where adversaries can easily perform privacy attacks to reconstruct private medical images accurately. Third, we show that the defense approach of adding random noises may not always work effectively to protect medical images against privacy attacks in FL, which poses unique and pressing challenges associated with medical data for privacy protection.
△ Less
Submitted 31 January, 2024; v1 submitted 11 November, 2023;
originally announced November 2023.
-
A Survey on Secure and Private Federated Learning Using Blockchain: Theory and Application in Resource-constrained Computing
Authors:
Ervin Moore,
Ahmed Imteaj,
Shabnam Rezapour,
M. Hadi Amini
Abstract:
Federated Learning (FL) has gained widespread popularity in recent years due to the fast booming of advanced machine learning and artificial intelligence along with emerging security and privacy threats. FL enables efficient model generation from local data storage of the edge devices without revealing the sensitive data to any entities. While this paradigm partly mitigates the privacy issues of u…
▽ More
Federated Learning (FL) has gained widespread popularity in recent years due to the fast booming of advanced machine learning and artificial intelligence along with emerging security and privacy threats. FL enables efficient model generation from local data storage of the edge devices without revealing the sensitive data to any entities. While this paradigm partly mitigates the privacy issues of users' sensitive data, the performance of the FL process can be threatened and reached a bottleneck due to the growing cyber threats and privacy violation techniques. To expedite the proliferation of FL process, the integration of blockchain for FL environments has drawn prolific attention from the people of academia and industry. Blockchain has the potential to prevent security and privacy threats with its decentralization, immutability, consensus, and transparency characteristic. However, if the blockchain mechanism requires costly computational resources, then the resource-constrained FL clients cannot be involved in the training. Considering that, this survey focuses on reviewing the challenges, solutions, and future directions for the successful deployment of blockchain in resource-constrained FL environments. We comprehensively review variant blockchain mechanisms that are suitable for FL process and discuss their trade-offs for a limited resource budget. Further, we extensively analyze the cyber threats that could be observed in a resource-constrained FL environment, and how blockchain can play a key role to block those cyber attacks. To this end, we highlight some potential solutions towards the coupling of blockchain and federated learning that can offer high levels of reliability, data privacy, and distributed computing performance.
△ Less
Submitted 23 March, 2023;
originally announced March 2023.
-
3D-model ShapeNet Core Classification using Meta-Semantic Learning
Authors:
Farid Ghareh Mohammadi,
Cheng Chen,
Farzan Shenavarmasouleh,
M. Hadi Amini,
Beshoy Morkos,
Hamid R. Arabnia
Abstract:
Understanding 3D point cloud models for learning purposes has become an imperative challenge for real-world identification such as autonomous driving systems. A wide variety of solutions using deep learning have been proposed for point cloud segmentation, object detection, and classification. These methods, however, often require a considerable number of model parameters and are computationally ex…
▽ More
Understanding 3D point cloud models for learning purposes has become an imperative challenge for real-world identification such as autonomous driving systems. A wide variety of solutions using deep learning have been proposed for point cloud segmentation, object detection, and classification. These methods, however, often require a considerable number of model parameters and are computationally expensive. We study a semantic dimension of given 3D data points and propose an efficient method called Meta-Semantic Learning (Meta-SeL). Meta-SeL is an integrated framework that leverages two input 3D local points (input 3D models and part-segmentation labels), providing a time and cost-efficient, and precise projection model for a number of 3D recognition tasks. The results indicate that Meta-SeL yields competitive performance in comparison with other complex state-of-the-art work. Moreover, being random shuffle invariant, Meta-SeL is resilient to translation as well as jittering noise.
△ Less
Submitted 28 May, 2022;
originally announced May 2022.
-
The application of Evolutionary and Nature Inspired Algorithms in Data Science and Data Analytics
Authors:
Farid Ghareh Mohammadi,
Farzan Shenavarmasouleh,
Khaled Rasheed,
Thiab Taha,
M. Hadi Amini,
Hamid R. Arabnia
Abstract:
In the past 30 years, scientists have searched nature, including animals and insects, and biology in order to discover, understand, and model solutions for solving large-scale science challenges. The study of bionics reveals that how the biological structures, functions found in nature have improved our modern technologies. In this study, we present our discovery of evolutionary and nature-inspire…
▽ More
In the past 30 years, scientists have searched nature, including animals and insects, and biology in order to discover, understand, and model solutions for solving large-scale science challenges. The study of bionics reveals that how the biological structures, functions found in nature have improved our modern technologies. In this study, we present our discovery of evolutionary and nature-inspired algorithms applications in Data Science and Data Analytics in three main topics of pre-processing, supervised algorithms, and unsupervised algorithms. Among all applications, in this study, we aim to investigate four optimization algorithms that have been performed using the evolutionary and nature-inspired algorithms within data science and analytics. Feature selection optimization in pre-processing section, Hyper-parameter tuning optimization, and knowledge discovery optimization in supervised algorithms, and clustering optimization in the unsupervised algorithms.
△ Less
Submitted 6 February, 2022;
originally announced February 2022.
-
OptABC: an Optimal Hyperparameter Tuning Approach for Machine Learning Algorithms
Authors:
Leila Zahedi,
Farid Ghareh Mohammadi,
M. Hadi Amini
Abstract:
Hyperparameter tuning in machine learning algorithms is a computationally challenging task due to the large-scale nature of the problem. In order to develop an efficient strategy for hyper-parameter tuning, one promising solution is to use swarm intelligence algorithms. Artificial Bee Colony (ABC) optimization lends itself as a promising and efficient optimization algorithm for this purpose. Howev…
▽ More
Hyperparameter tuning in machine learning algorithms is a computationally challenging task due to the large-scale nature of the problem. In order to develop an efficient strategy for hyper-parameter tuning, one promising solution is to use swarm intelligence algorithms. Artificial Bee Colony (ABC) optimization lends itself as a promising and efficient optimization algorithm for this purpose. However, in some cases, ABC can suffer from a slow convergence rate or execution time due to the poor initial population of solutions and expensive objective functions. To address these concerns, a novel algorithm, OptABC, is proposed to help ABC algorithm in faster convergence toward a near-optimum solution. OptABC integrates artificial bee colony algorithm, K-Means clustering, greedy algorithm, and opposition-based learning strategy for tuning the hyper-parameters of different machine learning models. OptABC employs these techniques in an attempt to diversify the initial population, and hence enhance the convergence ability without significantly decreasing the accuracy. In order to validate the performance of the proposed method, we compare the results with previous state-of-the-art approaches. Experimental results demonstrate the effectiveness of the OptABC compared to existing approaches in the literature.
△ Less
Submitted 15 December, 2021;
originally announced December 2021.
-
Data Analytics for Smart cities: Challenges and Promises
Authors:
Farid Ghareh Mohammadi,
Farzan Shenavarmasouleh,
M. Hadi Amini,
Hamid R. Arabnia
Abstract:
The explosion of advancements in artificial intelligence, sensor technologies, and wireless communication activates ubiquitous sensing through distributed sensors. These sensors are various domains of networks that lead us to smart systems in healthcare, transportation, environment, and other relevant branches/networks. Having collaborative interaction among the smart systems connects end-user dev…
▽ More
The explosion of advancements in artificial intelligence, sensor technologies, and wireless communication activates ubiquitous sensing through distributed sensors. These sensors are various domains of networks that lead us to smart systems in healthcare, transportation, environment, and other relevant branches/networks. Having collaborative interaction among the smart systems connects end-user devices to each other which enables achieving a new integrated entity called Smart Cities. The goal of this study is to provide a comprehensive survey of data analytics in smart cities. In this paper, we aim to focus on one of the smart cities important branches, namely Smart Mobility, and its positive ample impact on the smart cities decision-making process. Intelligent decision-making systems in smart mobility offer many advantages such as saving energy, relaying city traffic, and more importantly, reducing air pollution by offering real-time useful information and imperative knowledge. Making a decision in smart cities in time is challenging due to various and high dimensional factors and parameters, which are not frequently collected. In this paper, we first address current challenges in smart cities and provide an overview of potential solutions to these challenges. Then, we offer a framework of these solutions, called universal smart cities decision making, with three main sections of data capturing, data analysis, and decision making to optimize the smart mobility within smart cities. With this framework, we elaborate on fundamental concepts of big data, machine learning, and deep leaning algorithms that have been applied to smart cities and discuss the role of these algorithms in decision making for smart mobility in smart cities.
△ Less
Submitted 12 September, 2021;
originally announced September 2021.
-
HyP-ABC: A Novel Automated Hyper-Parameter Tuning Algorithm Using Evolutionary Optimization
Authors:
Leila Zahedi,
Farid Ghareh Mohammadi,
M. Hadi Amini
Abstract:
Machine learning techniques lend themselves as promising decision-making and analytic tools in a wide range of applications. Different ML algorithms have various hyper-parameters. In order to tailor an ML model towards a specific application, a large number of hyper-parameters should be tuned. Tuning the hyper-parameters directly affects the performance (accuracy and run-time). However, for large-…
▽ More
Machine learning techniques lend themselves as promising decision-making and analytic tools in a wide range of applications. Different ML algorithms have various hyper-parameters. In order to tailor an ML model towards a specific application, a large number of hyper-parameters should be tuned. Tuning the hyper-parameters directly affects the performance (accuracy and run-time). However, for large-scale search spaces, efficiently exploring the ample number of combinations of hyper-parameters is computationally challenging. Existing automated hyper-parameter tuning techniques suffer from high time complexity. In this paper, we propose HyP-ABC, an automatic innovative hybrid hyper-parameter optimization algorithm using the modified artificial bee colony approach, to measure the classification accuracy of three ML algorithms, namely random forest, extreme gradient boosting, and support vector machine. Compared to the state-of-the-art techniques, HyP-ABC is more efficient and has a limited number of parameters to be tuned, making it worthwhile for real-world hyper-parameter optimization problems. We further compare our proposed HyP-ABC algorithm with state-of-the-art techniques. In order to ensure the robustness of the proposed method, the algorithm takes a wide range of feasible hyper-parameter values, and is tested using a real-world educational dataset.
△ Less
Submitted 11 September, 2021;
originally announced September 2021.
-
Embodied AI-Driven Operation of Smart Cities: A Concise Review
Authors:
Farzan Shenavarmasouleh,
Farid Ghareh Mohammadi,
M. Hadi Amini,
Hamid R. Arabnia
Abstract:
A smart city can be seen as a framework, comprised of Information and Communication Technologies (ICT). An intelligent network of connected devices that collect data with their sensors and transmit them using cloud technologies in order to communicate with other assets in the ecosystem plays a pivotal role in this framework. Maximizing the quality of life of citizens, making better use of resource…
▽ More
A smart city can be seen as a framework, comprised of Information and Communication Technologies (ICT). An intelligent network of connected devices that collect data with their sensors and transmit them using cloud technologies in order to communicate with other assets in the ecosystem plays a pivotal role in this framework. Maximizing the quality of life of citizens, making better use of resources, cutting costs, and improving sustainability are the ultimate goals that a smart city is after. Hence, data collected from connected devices will continuously get thoroughly analyzed to gain better insights into the services that are being offered across the city; with this goal in mind that they can be used to make the whole system more efficient. Robots and physical machines are inseparable parts of a smart city. Embodied AI is the field of study that takes a deeper look into these and explores how they can fit into real-world environments. It focuses on learning through interaction with the surrounding environment, as opposed to Internet AI which tries to learn from static datasets. Embodied AI aims to train an agent that can See (Computer Vision), Talk (NLP), Navigate and Interact with its environment (Reinforcement Learning), and Reason (General Intelligence), all at the same time. Autonomous driving cars and personal companions are some of the examples that benefit from Embodied AI nowadays. In this paper, we attempt to do a concise review of this field. We will go through its definitions, its characteristics, and its current achievements along with different algorithms, approaches, and solutions that are being used in different components of it (e.g. Vision, NLP, RL). We will then explore all the available simulators and 3D interactable databases that will make the research in this area feasible. Finally, we will address its challenges and identify its potentials for future research.
△ Less
Submitted 22 August, 2021;
originally announced August 2021.
-
DRDrV3: Complete Lesion Detection in Fundus Images Using Mask R-CNN, Transfer Learning, and LSTM
Authors:
Farzan Shenavarmasouleh,
Farid Ghareh Mohammadi,
M. Hadi Amini,
Thiab Taha,
Khaled Rasheed,
Hamid R. Arabnia
Abstract:
Medical Imaging is one of the growing fields in the world of computer vision. In this study, we aim to address the Diabetic Retinopathy (DR) problem as one of the open challenges in medical imaging. In this research, we propose a new lesion detection architecture, comprising of two sub-modules, which is an optimal solution to detect and find not only the type of lesions caused by DR, their corresp…
▽ More
Medical Imaging is one of the growing fields in the world of computer vision. In this study, we aim to address the Diabetic Retinopathy (DR) problem as one of the open challenges in medical imaging. In this research, we propose a new lesion detection architecture, comprising of two sub-modules, which is an optimal solution to detect and find not only the type of lesions caused by DR, their corresponding bounding boxes, and their masks; but also the severity level of the overall case. Aside from traditional accuracy, we also use two popular evaluation criteria to evaluate the outputs of our models, which are intersection over union (IOU) and mean average precision (mAP). We hypothesize that this new solution enables specialists to detect lesions with high confidence and estimate the severity of the damage with high accuracy.
△ Less
Submitted 18 August, 2021;
originally announced August 2021.
-
A Survey on Optimal Transport for Machine Learning: Theory and Applications
Authors:
Luis Caicedo Torres,
Luiz Manella Pereira,
M. Hadi Amini
Abstract:
Optimal Transport (OT) theory has seen an increasing amount of attention from the computer science community due to its potency and relevance in modeling and machine learning. It introduces means that serve as powerful ways to compare probability distributions with each other, as well as producing optimal mappings to minimize cost functions. In this survey, we present a brief introduction and hist…
▽ More
Optimal Transport (OT) theory has seen an increasing amount of attention from the computer science community due to its potency and relevance in modeling and machine learning. It introduces means that serve as powerful ways to compare probability distributions with each other, as well as producing optimal mappings to minimize cost functions. In this survey, we present a brief introduction and history, a survey of previous work and propose directions of future study. We will begin by looking at the history of optimal transport and introducing the founders of this field. We then give a brief glance into the algorithms related to OT. Then, we will follow up with a mathematical formulation and the prerequisites to understand OT. These include Kantorovich duality, entropic regularization, KL Divergence, and Wassertein barycenters. Since OT is a computationally expensive problem, we then introduce the entropy-regularized version of computing optimal mappings, which allowed OT problems to become applicable in a wide range of machine learning problems. In fact, the methods generated from OT theory are competitive with the current state-of-the-art methods. We follow this up by breaking down research papers that focus on image processing, graph learning, neural architecture search, document representation, and domain adaptation. We close the paper with a small section on future research. Of the recommendations presented, three main problems are fundamental to allow OT to become widely applicable but rely strongly on its mathematical formulation and thus are hardest to answer. Since OT is a novel method, there is plenty of space for new research, and with more and more competitive methods (either on an accuracy level or computational speed level) being created, the future of applied optimal transport is bright as it has become pervasive in machine learning.
△ Less
Submitted 3 June, 2021;
originally announced June 2021.
-
Search Algorithms for Automated Hyper-Parameter Tuning
Authors:
Leila Zahedi,
Farid Ghareh Mohammadi,
Shabnam Rezapour,
Matthew W. Ohland,
M. Hadi Amini
Abstract:
Machine learning is a powerful method for modeling in different fields such as education. Its capability to accurately predict students' success makes it an ideal tool for decision-making tasks related to higher education. The accuracy of machine learning models depends on selecting the proper hyper-parameters. However, it is not an easy task because it requires time and expertise to tune the hype…
▽ More
Machine learning is a powerful method for modeling in different fields such as education. Its capability to accurately predict students' success makes it an ideal tool for decision-making tasks related to higher education. The accuracy of machine learning models depends on selecting the proper hyper-parameters. However, it is not an easy task because it requires time and expertise to tune the hyper-parameters to fit the machine learning model. In this paper, we examine the effectiveness of automated hyper-parameter tuning techniques to the realm of students' success. Therefore, we develop two automated Hyper-Parameter Optimization methods, namely grid search and random search, to assess and improve a previous study's performance. The experiment results show that applying random search and grid search on machine learning algorithms improves accuracy. We empirically show automated methods' superiority on real-world educational data (MIDFIELD) for tuning HPs of conventional machine learning classifiers. This work emphasizes the effectiveness of automated hyper-parameter optimization while applying machine learning in the education field to aid faculties, directors', or non-expert users' decisions to improve students' success.
△ Less
Submitted 29 April, 2021;
originally announced April 2021.
-
FedAR: Activity and Resource-Aware Federated Learning Model for Distributed Mobile Robots
Authors:
Ahmed Imteaj,
M. Hadi Amini
Abstract:
Smartphones, autonomous vehicles, and the Internet-of-things (IoT) devices are considered the primary data source for a distributed network. Due to a revolutionary breakthrough in internet availability and continuous improvement of the IoT devices capabilities, it is desirable to store data locally and perform computation at the edge, as opposed to share all local information with a centralized co…
▽ More
Smartphones, autonomous vehicles, and the Internet-of-things (IoT) devices are considered the primary data source for a distributed network. Due to a revolutionary breakthrough in internet availability and continuous improvement of the IoT devices capabilities, it is desirable to store data locally and perform computation at the edge, as opposed to share all local information with a centralized computation agent. A recently proposed Machine Learning (ML) algorithm called Federated Learning (FL) paves the path towards preserving data privacy, performing distributed learning, and reducing communication overhead in large-scale machine learning (ML) problems. This paper proposes an FL model by monitoring client activities and leveraging available local computing resources, particularly for resource-constrained IoT devices (e.g., mobile robots), to accelerate the learning process. We assign a trust score to each FL client, which is updated based on the client's activities. We consider a distributed mobile robot as an FL client with resource limitations either in memory, bandwidth, processor, or battery life. We consider such mobile robots as FL clients to understand their resource-constrained behavior in a real-world setting. We consider an FL client to be untrustworthy if the client infuses incorrect models or repeatedly gives slow responses during the FL process. After disregarding the ineffective and unreliable client, we perform local training on the selected FL clients. To further reduce the straggler issue, we enable an asynchronous FL mechanism by performing aggregation on the FL server without waiting for a long period to receive a particular client's response.
△ Less
Submitted 11 January, 2021;
originally announced January 2021.
-
Malware Detection using Artificial Bee Colony Algorithm
Authors:
Farid Ghareh Mohammadi,
Farzan Shenavarmasouleh,
M. Hadi Amini,
Hamid R. Arabnia
Abstract:
Malware detection has become a challenging task due to the increase in the number of malware families. Universal malware detection algorithms that can detect all the malware families are needed to make the whole process feasible. However, the more universal an algorithm is, the higher number of feature dimensions it needs to work with, and that inevitably causes the emerging problem of Curse of Di…
▽ More
Malware detection has become a challenging task due to the increase in the number of malware families. Universal malware detection algorithms that can detect all the malware families are needed to make the whole process feasible. However, the more universal an algorithm is, the higher number of feature dimensions it needs to work with, and that inevitably causes the emerging problem of Curse of Dimensionality (CoD). Besides, it is also difficult to make this solution work due to the real-time behavior of malware analysis. In this paper, we address this problem and aim to propose a feature selection based malware detection algorithm using an evolutionary algorithm that is referred to as Artificial Bee Colony (ABC). The proposed algorithm enables researchers to decrease the feature dimension and as a result, boost the process of malware detection. The experimental results reveal that the proposed method outperforms the state-of-the-art.
△ Less
Submitted 1 December, 2020;
originally announced December 2020.
-
DRDr II: Detecting the Severity Level of Diabetic Retinopathy Using Mask RCNN and Transfer Learning
Authors:
Farzan Shenavarmasouleh,
Farid Ghareh Mohammadi,
M. Hadi Amini,
Hamid R. Arabnia
Abstract:
DRDr II is a hybrid of machine learning and deep learning worlds. It builds on the successes of its antecedent, namely, DRDr, that was trained to detect, locate, and create segmentation masks for two types of lesions (exudates and microaneurysms) that can be found in the eyes of the Diabetic Retinopathy (DR) patients; and uses the entire model as a solid feature extractor in the core of its pipeli…
▽ More
DRDr II is a hybrid of machine learning and deep learning worlds. It builds on the successes of its antecedent, namely, DRDr, that was trained to detect, locate, and create segmentation masks for two types of lesions (exudates and microaneurysms) that can be found in the eyes of the Diabetic Retinopathy (DR) patients; and uses the entire model as a solid feature extractor in the core of its pipeline to detect the severity level of the DR cases. We employ a big dataset with over 35 thousand fundus images collected from around the globe and after 2 phases of preprocessing alongside feature extraction, we succeed in predicting the correct severity levels with over 92% accuracy.
△ Less
Submitted 30 November, 2020;
originally announced November 2020.
-
Data-driven Inferences of Agency-level Risk and Response Communication on COVID-19 through Social Media based Interactions
Authors:
Md Ashraf Ahmed,
Arif Mohaimin Sadri,
M. Hadi Amini
Abstract:
Risk and response communication of public agencies through social media played a significant role in the emergence and spread of novel Coronavirus (COVID-19) and such interactions were echoed in other information outlets. This study collected time-sensitive online social media data and analyzed such communication patterns from public health (WHO, CDC), emergency (FEMA), and transportation (FDOT) a…
▽ More
Risk and response communication of public agencies through social media played a significant role in the emergence and spread of novel Coronavirus (COVID-19) and such interactions were echoed in other information outlets. This study collected time-sensitive online social media data and analyzed such communication patterns from public health (WHO, CDC), emergency (FEMA), and transportation (FDOT) agencies using data-driven methods. The scope of the work includes a detailed understanding of how agencies communicate risk information through social media during a pandemic and influence community response (i.e. timing of lockdown, timing of reopening) and disease outbreak indicators (i.e. number of confirmed cases, number of deaths). The data includes Twitter interactions from different agencies (2.15K tweets per agency on average) and crowdsourced data (i.e. Worldometer) on COVID-19 cases and deaths were observed between February 21, 2020 and June 06, 2020. Several machine learning techniques such as (i.e. topic mining and sentiment ratings over time) are applied here to identify the dynamics of emergent topics during this unprecedented time. Temporal infographics of the results captured the agency-levels variations over time in circulating information about the importance of face covering, home quarantine, social distancing and contact tracing. In addition, agencies showed differences in their discussions about community transmission, lack of personal protective equipment, testing and medical supplies, use of tobacco, vaccine, mental health issues, hospitalization, hurricane season, airports, construction work among others. Findings could support more efficient transfer of risk and response information as communities shift to new normal as well as in future pandemics.
△ Less
Submitted 9 August, 2020;
originally announced August 2020.
-
On Parameter Tuning in Meta-learning for Computer Vision
Authors:
Farid Ghareh Mohammadi,
M. Hadi Amini,
Hamid R. Arabnia
Abstract:
Learning to learn plays a pivotal role in meta-learning (MTL) to obtain an optimal learning model. In this paper, we investigate mage recognition for unseen categories of a given dataset with limited training information. We deploy a zero-shot learning (ZSL) algorithm to achieve this goal. We also explore the effect of parameter tuning on performance of semantic auto-encoder (SAE). We further addr…
▽ More
Learning to learn plays a pivotal role in meta-learning (MTL) to obtain an optimal learning model. In this paper, we investigate mage recognition for unseen categories of a given dataset with limited training information. We deploy a zero-shot learning (ZSL) algorithm to achieve this goal. We also explore the effect of parameter tuning on performance of semantic auto-encoder (SAE). We further address the parameter tuning problem for meta-learning, especially focusing on zero-shot learning. By combining different embedded parameters, we improved the accuracy of tuned-SAE. Advantages and disadvantages of parameter tuning and its application in image classification are also explored.
△ Less
Submitted 11 February, 2020;
originally announced March 2020.
-
Federated Learning for Resource-Constrained IoT Devices: Panoramas and State-of-the-art
Authors:
Ahmed Imteaj,
Urmish Thakker,
Shiqiang Wang,
Jian Li,
M. Hadi Amini
Abstract:
Nowadays, devices are equipped with advanced sensors with higher processing/computing capabilities. Further, widespread Internet availability enables communication among sensing devices. As a result, vast amounts of data are generated on edge devices to drive Internet-of-Things (IoT), crowdsourcing, and other emerging technologies. The collected extensive data can be pre-processed, scaled, classif…
▽ More
Nowadays, devices are equipped with advanced sensors with higher processing/computing capabilities. Further, widespread Internet availability enables communication among sensing devices. As a result, vast amounts of data are generated on edge devices to drive Internet-of-Things (IoT), crowdsourcing, and other emerging technologies. The collected extensive data can be pre-processed, scaled, classified, and finally, used for predicting future events using machine learning (ML) methods. In traditional ML approaches, data is sent to and processed in a central server, which encounters communication overhead, processing delay, privacy leakage, and security issues. To overcome these challenges, each client can be trained locally based on its available data and by learning from the global model. This decentralized learning structure is referred to as Federated Learning (FL). However, in large-scale networks, there may be clients with varying computational resource capabilities. This may lead to implementation and scalability challenges for FL techniques. In this paper, we first introduce some recently implemented real-life applications of FL. We then emphasize on the core challenges of implementing the FL algorithms from the perspective of resource limitations (e.g., memory, bandwidth, and energy budget) of client clients. We finally discuss open issues associated with FL and highlight future directions in the FL area concerning resource-constrained devices.
△ Less
Submitted 24 February, 2020;
originally announced February 2020.
-
Leveraging Decentralized Artificial Intelligence to Enhance Resilience of Energy Networks
Authors:
Ahmed Imteaj,
M. Hadi Amini,
Javad Mohammadi
Abstract:
This paper reintroduces the notion of resilience in the context of recent issues originated from climate change triggered events including severe hurricanes and wildfires. A recent example is PG&E's forced power outage to contain wildfire risk which led to widespread power disruption. This paper focuses on answering two questions: who is responsible for resilience? and how to quantify the monetary…
▽ More
This paper reintroduces the notion of resilience in the context of recent issues originated from climate change triggered events including severe hurricanes and wildfires. A recent example is PG&E's forced power outage to contain wildfire risk which led to widespread power disruption. This paper focuses on answering two questions: who is responsible for resilience? and how to quantify the monetary value of resilience? To this end, we first provide preliminary definitions of resilience for power systems. We then investigate the role of natural hazards, especially wildfire, on power system resilience. Finally, we will propose a decentralized strategy for a resilient management system using distributed storage and demand response resources. Our proposed high fidelity model provides utilities, operators, and policymakers with a clearer picture for strategic decision making and preventive decisions.
△ Less
Submitted 18 November, 2019;
originally announced November 2019.
-
An Introduction to Advanced Machine Learning : Meta Learning Algorithms, Applications and Promises
Authors:
Farid Ghareh Mohammadi,
M. Hadi Amini,
Hamid R. Arabnia
Abstract:
In [1, 2], we have explored the theoretical aspects of feature extraction optimization processes for solving largescale problems and overcoming machine learning limitations. Majority of optimization algorithms that have been introduced in [1, 2] guarantee the optimal performance of supervised learning, given offline and discrete data, to deal with curse of dimensionality (CoD) problem. These algor…
▽ More
In [1, 2], we have explored the theoretical aspects of feature extraction optimization processes for solving largescale problems and overcoming machine learning limitations. Majority of optimization algorithms that have been introduced in [1, 2] guarantee the optimal performance of supervised learning, given offline and discrete data, to deal with curse of dimensionality (CoD) problem. These algorithms, however, are not tailored for solving emerging learning problems. One of the important issues caused by online data is lack of sufficient samples per class. Further, traditional machine learning algorithms cannot achieve accurate training based on limited distributed data, as data has proliferated and dispersed significantly. Machine learning employs a strict model or embedded engine to train and predict which still fails to learn unseen classes and sufficiently use online data. In this chapter, we introduce these challenges elaborately. We further investigate Meta-Learning (MTL) algorithm, and their application and promises to solve the emerging problems by answering how autonomous agents can learn to learn?.
△ Less
Submitted 26 August, 2019;
originally announced August 2019.
-
Applications of Nature-Inspired Algorithms for Dimension Reduction: Enabling Efficient Data Analytics
Authors:
Farid Ghareh Mohammadi,
M. Hadi Amini,
Hamid R. Arabnia
Abstract:
In [1], we have explored the theoretical aspects of feature selection and evolutionary algorithms. In this chapter, we focus on optimization algorithms for enhancing data analytic process, i.e., we propose to explore applications of nature-inspired algorithms in data science. Feature selection optimization is a hybrid approach leveraging feature selection techniques and evolutionary algorithms pro…
▽ More
In [1], we have explored the theoretical aspects of feature selection and evolutionary algorithms. In this chapter, we focus on optimization algorithms for enhancing data analytic process, i.e., we propose to explore applications of nature-inspired algorithms in data science. Feature selection optimization is a hybrid approach leveraging feature selection techniques and evolutionary algorithms process to optimize the selected features. Prior works solve this problem iteratively to converge to an optimal feature subset. Feature selection optimization is a non-specific domain approach. Data scientists mainly attempt to find an advanced way to analyze data n with high computational efficiency and low time complexity, leading to efficient data analytics. Thus, by increasing generated/measured/sensed data from various sources, analysis, manipulation and illustration of data grow exponentially. Due to the large scale data sets, Curse of dimensionality (CoD) is one of the NP-hard problems in data science. Hence, several efforts have been focused on leveraging evolutionary algorithms (EAs) to address the complex issues in large scale data analytics problems. Dimension reduction, together with EAs, lends itself to solve CoD and solve complex problems, in terms of time complexity, efficiently. In this chapter, we first provide a brief overview of previous studies that focused on solving CoD using feature extraction optimization process. We then discuss practical examples of research studies are successfully tackled some application domains, such as image processing, sentiment analysis, network traffics / anomalies analysis, credit score analysis and other benchmark functions/data sets analysis.
△ Less
Submitted 22 August, 2019;
originally announced August 2019.
-
Evolutionary Computation, Optimization and Learning Algorithms for Data Science
Authors:
Farid Ghareh Mohammadi,
M. Hadi Amini,
Hamid R. Arabnia
Abstract:
A large number of engineering, science and computational problems have yet to be solved in a computationally efficient way. One of the emerging challenges is how evolving technologies grow towards autonomy and intelligent decision making. This leads to collection of large amounts of data from various sensing and measurement technologies, e.g., cameras, smart phones, health sensors, smart electrici…
▽ More
A large number of engineering, science and computational problems have yet to be solved in a computationally efficient way. One of the emerging challenges is how evolving technologies grow towards autonomy and intelligent decision making. This leads to collection of large amounts of data from various sensing and measurement technologies, e.g., cameras, smart phones, health sensors, smart electricity meters, and environment sensors. Hence, it is imperative to develop efficient algorithms for generation, analysis, classification, and illustration of data. Meanwhile, data is structured purposefully through different representations, such as large-scale networks and graphs. We focus on data science as a crucial area, specifically focusing on a curse of dimensionality (CoD) which is due to the large amount of generated/sensed/collected data. This motivates researchers to think about optimization and to apply nature-inspired algorithms, such as evolutionary algorithms (EAs) to solve optimization problems. Although these algorithms look un-deterministic, they are robust enough to reach an optimal solution. Researchers do not adopt evolutionary algorithms unless they face a problem which is suffering from placement in local optimal solution, rather than global optimal solution. In this chapter, we first develop a clear and formal definition of the CoD problem, next we focus on feature extraction techniques and categories, then we provide a general overview of meta-heuristic algorithms, its terminology, and desirable properties of evolutionary algorithms.
△ Less
Submitted 16 August, 2019;
originally announced August 2019.
-
Evolutionary Algorithms and Efficient Data Analytics for Image Processing
Authors:
Farid Ghareh Mohammadi,
Farzan Shenavarmasouleh,
M. Hadi Amini,
Hamid R. Arabnia
Abstract:
Steganography algorithms facilitate communication between a source and a destination in a secret manner. This is done by embedding messages/text/data into images without impacting the appearance of the resultant images/videos. Steganalysis is the science of determining if an image has secret messages embedded/hidden in it. Because there are numerous steganography algorithms, and since each one of…
▽ More
Steganography algorithms facilitate communication between a source and a destination in a secret manner. This is done by embedding messages/text/data into images without impacting the appearance of the resultant images/videos. Steganalysis is the science of determining if an image has secret messages embedded/hidden in it. Because there are numerous steganography algorithms, and since each one of them requires a different type of steganalysis, the steganalysis process is extremely challenging. Thus, researchers aim to develop one universal steganalysis to detect all known and unknown steganography algorithms, ideally in real-time. Universal steganalysis extracts a large number of features to distinguish stego images from cover images. However, the increase in features leads to the problem of the curse of dimensionality (CoD), which is considered to be an NP-hard problem. This COD problem additionally makes real-time steganalysis hard. A large number of features generates large datasets for which machine learning cannot generate an optimal model. Generating a machine learning based model also takes a long time which makes real-time processing appear impossible in any optimization for time-intensive fields such as visual computing. Possible solutions for CoD are deep learning and evolutionary algorithms that overcome the machine learning limitations. In this study, we investigate previously developed evolutionary algorithms for boosting real-time image processing and argue that they provide the most promising solutions for the CoD problem.
△ Less
Submitted 19 October, 2020; v1 submitted 23 July, 2019;
originally announced July 2019.
-
Sensor Placement for Outage Identifiability in Power Distribution Networks
Authors:
Ananth Narayan Samudrala,
M. Hadi Amini,
Soummya Kar,
Rick S. Blum
Abstract:
Accurate topology information is critical for effective operation of power distribution networks. Line outages change the operational topology of a distribution network. Hence, outage detection is an important task. Power distribution networks are operated as radial trees and are recently adopting the integration of advanced sensors to monitor the network in real time. In this paper, a dynamic-pro…
▽ More
Accurate topology information is critical for effective operation of power distribution networks. Line outages change the operational topology of a distribution network. Hence, outage detection is an important task. Power distribution networks are operated as radial trees and are recently adopting the integration of advanced sensors to monitor the network in real time. In this paper, a dynamic-programming-based minimum cost sensor placement solution is proposed for outage identifiability. We propose a novel formulation of the sensor placement as a cost optimization problem involving binary placement decisions, and then provide an algorithm based on dynamic programming to solve it in polynomial time. The advantage of the proposed placement strategy is that it incorporates various types of sensors, is independent of time varying load statistics, has a polynomial execution time and is cost effective. Numerical results illustrating the proposed sensor placement solution are presented for multiple feeder models including standard IEEE test feeders.
△ Less
Submitted 17 February, 2019;
originally announced February 2019.
-
Fully Distributed Cooperative Charging for Plug-in Electric Vehicles in Constrained Power Networks
Authors:
M. Hadi Amini,
Javad Mohammadi,
Soummya Kar
Abstract:
Plug-in Electric Vehicles (PEVs) play a pivotal role in transportation electrification. The flexible nature of PEVs' charging demand can be utilized for reducing charging cost as well as optimizing the operating cost of power and transportation networks. Utilizing charging flexibilities of geographically spread PEVs requires design and implementation of efficient optimization algorithms. To this e…
▽ More
Plug-in Electric Vehicles (PEVs) play a pivotal role in transportation electrification. The flexible nature of PEVs' charging demand can be utilized for reducing charging cost as well as optimizing the operating cost of power and transportation networks. Utilizing charging flexibilities of geographically spread PEVs requires design and implementation of efficient optimization algorithms. To this end, we propose a fully distributed algorithm to solve the PEVs' Cooperative Charging with Power constraints (PEV-CCP). Our solution considers the electric power limits that originate from physical characteristics of charging station, such as on-site transformer capacity limit, and allows for containing charging burden of PEVs on the electric distribution network. Our approach is also motivated by the increasing load demand at the distribution level due to additional PEV charging demand. Our proposed approach distributes computation among agents (PEVs) to solve the PEV-CCP problem in a distributed fashion through an iterative interaction between neighboring agents. The structure of each agent's update functions ensures an agreement on a price signal while enforcing individual PEV constraints. In addition to converging towards the globally-optimum solution, our algorithm ensures the feasibility of each PEV's decision at each iteration. We have tested performance of the proposed approach using a fleet of PEVs.
△ Less
Submitted 28 June, 2018;
originally announced June 2018.
-
A Decentralized Trading Algorithm for an Electricity Market with Generation Uncertainty
Authors:
Shahab Bahrami,
M. Hadi Amini
Abstract:
The uncertainties of the renewable generation units and the proliferation of price-responsive loads make it a challenge for independent system operators (ISOs) to manage the energy trading market in the future power systems. A centralized energy market is not practical for the ISOs due to the high computational burden and violating the privacy of different entities, i.e., load aggregators and gene…
▽ More
The uncertainties of the renewable generation units and the proliferation of price-responsive loads make it a challenge for independent system operators (ISOs) to manage the energy trading market in the future power systems. A centralized energy market is not practical for the ISOs due to the high computational burden and violating the privacy of different entities, i.e., load aggregators and generators. In this paper, we propose a day-ahead decentralized energy trading algorithm for a grid with generation uncertainty. To address the privacy issues, the ISO determines some control signals using the Lagrange relaxation technique to motivate the entities towards an operating point that jointly optimize the cost of load aggregators and profit of the generators, as well as the risk of the generation shortage of the renewable resources. More, specifically, we deploy the concept of conditional-value-at-risk (CVaR) to minimize the risk of renewable generation shortage. The performance of the proposed algorithm is evaluated on an IEEE 30-bus test system. Results show that the proposed decentralized algorithm converges to the solution of the ISO's centralized problem in 45 iterations. It also benefits both the load aggregators by reducing their cost by 18% and the generators by increasing their profit by 17.1%.
△ Less
Submitted 7 May, 2017;
originally announced May 2017.
-
A Decentralized Framework for Real-Time Energy Trading in Distribution Networks with Load and Generation Uncertainty
Authors:
Shahab Bahrami,
M. Hadi Amini
Abstract:
The proliferation of small-scale renewable generators and price-responsive loads makes it a challenge for distribution network operators (DNOs) to schedule the controllable loads of the load aggregators and the generation of the generators in real-time. Additionally, the high computational burden and violation of the entities' (i.e., load aggregators' and generators') privacy make a centralized fr…
▽ More
The proliferation of small-scale renewable generators and price-responsive loads makes it a challenge for distribution network operators (DNOs) to schedule the controllable loads of the load aggregators and the generation of the generators in real-time. Additionally, the high computational burden and violation of the entities' (i.e., load aggregators' and generators') privacy make a centralized framework impractical. In this paper, we propose a decentralized energy trading algorithm that can be executed by the entities in a real-time fashion. To address the privacy issues, the DNO provides the entities with proper control signals using the Lagrange relaxation technique to motivate them towards an operating point with maximum profit for entities. To deal with uncertainty issues, we propose a probabilistic load model and robust framework for renewable generation. The performance of the proposed algorithm is evaluated on an IEEE 123-node test feeder. When compared with a benchmark of not performing load management for the aggregators, the proposed algorithm benefits both the load aggregators and generators by increasing their profit by 17.8%and 10.3%, respectively. When compared with a centralized approach, our algorithm converges to the solution of the DNO's centralized problem with a significantly lower running time in 50 iterations per time slot.
△ Less
Submitted 7 May, 2017;
originally announced May 2017.
-
Optimal Operation of Interdependent Power Systems and Electrified Transportation Networks
Authors:
M. Hadi Amini,
Orkun Karabasoglu
Abstract:
Electrified transportation and power systems are mutually coupled networks. In this paper, a novel framework is developed for interdependent power and transportation networks. Our approach constitutes solving an iterative least cost vehicle routing process, which utilizes the communication of electrified vehicles (EVs) with competing charging stations to exchange data, such as electricity price, e…
▽ More
Electrified transportation and power systems are mutually coupled networks. In this paper, a novel framework is developed for interdependent power and transportation networks. Our approach constitutes solving an iterative least cost vehicle routing process, which utilizes the communication of electrified vehicles (EVs) with competing charging stations to exchange data, such as electricity price, energy demand, and time of arrival. EV routing problem is solved to minimize the total cost of travel using the Dijkstra algorithm with the input from EVs battery management system, electricity price from charging stations, powertrain component efficiencies, and transportation network traffic conditions. Through the bidirectional communication of EVs with competing charging stations, EVs charging demand estimation is done much more accurately. Then, the optimal power flow problem is solved for the power system, to find the locational marginal price at load buses where charging stations are connected. Finally, the electricity prices are communicated from the charging stations to the EVs, and the loop is closed. Locational electricity price acts as the shared parameter between the two optimization problems, i.e. optimal power flow and optimal routing problem. Electricity price depends on the power demand, which is affected by the charging of EVs. On the other hand, location of EV charging stations and their different pricing strategies might affect the routing decisions of the EVs. Our novel approach that combines the electrified transportation with power system operation, holds tremendous potential for solving electrified transportation issues and reducing energy costs. The effectiveness of the proposed approach is demonstrated using Shanghai transportation network and IEEE 9-bus test system. The results verify the cost-savings for both power system and transportation networks.
△ Less
Submitted 12 January, 2017;
originally announced January 2017.
-
Centralized Load Shedding Based on Thermal Limit of Transmission Lines Against Cascading Events
Authors:
Bakhtyar Hoseinzadeh,
M. Hadi Amini,
Claus Leth Bak
Abstract:
Load shedding is the last and most expensive control action against system collapse and blackout. Achievement of an efficient emergency control to stabilize the power system following severe disturbances, requires two key objectives. First, preventing of further cascading outages, i.e. saving the available and determinant power system elements and second, issuing proper control actions to stabiliz…
▽ More
Load shedding is the last and most expensive control action against system collapse and blackout. Achievement of an efficient emergency control to stabilize the power system following severe disturbances, requires two key objectives. First, preventing of further cascading outages, i.e. saving the available and determinant power system elements and second, issuing proper control actions to stabilize the power system inside the permissible time frame. In this paper online contingency analysis is performed to monitor secure and reliable operation of transmission lines. Load shedding locations are continuously updated based on loading rate/thermal limit of lines to prevent their outage. Simulation of severe contingencies carried out on 39 bus IEEE standard test system in DIgSILENT power-factory validates the efficiency of proposed method.
△ Less
Submitted 29 November, 2016; v1 submitted 27 November, 2016;
originally announced November 2016.
-
Sparsity-Based Error Detection in DC Power Flow State Estimation
Authors:
M. Hadi Amini,
Mostafa Rahmani,
Kianoosh G. Boroojeni,
George Atia,
S. S. Iyengar,
Orkun Karabasoglu
Abstract:
This paper presents a new approach for identifying the measurement error in the DC power flow state estimation problem. The proposed algorithm exploits the singularity of the impedance matrix and the sparsity of the error vector by posing the DC power flow problem as a sparse vector recovery problem that leverages the structure of the power system and uses $l_1$-norm minimization for state estimat…
▽ More
This paper presents a new approach for identifying the measurement error in the DC power flow state estimation problem. The proposed algorithm exploits the singularity of the impedance matrix and the sparsity of the error vector by posing the DC power flow problem as a sparse vector recovery problem that leverages the structure of the power system and uses $l_1$-norm minimization for state estimation. This approach can provably compute the measurement errors exactly, and its performance is robust to the arbitrary magnitudes of the measurement errors. Hence, the proposed approach can detect the noisy elements if the measurements are contaminated with additive white Gaussian noise plus sparse noise with large magnitude. The effectiveness of the proposed sparsity-based decomposition-DC power flow approach is demonstrated on the IEEE 118-bus and 300-bus test systems.
△ Less
Submitted 26 August, 2016; v1 submitted 14 May, 2016;
originally announced May 2016.
-
Distributed Security Constrained Economic Dispatch
Authors:
M. Hadi Amini,
R. Jaddivada,
S. Mishra,
O. Karabasoglu
Abstract:
In this paper, we investigate two decomposition methods for their convergence rate which are used to solve security constrained economic dispatch (SCED): 1) Lagrangian Relaxation (LR), and 2) Augmented Lagrangian Relaxation (ALR). First, the centralized SCED problem is posed for a 6-bus test network and then it is decomposed into subproblems using both of the methods. In order to model the tie-lin…
▽ More
In this paper, we investigate two decomposition methods for their convergence rate which are used to solve security constrained economic dispatch (SCED): 1) Lagrangian Relaxation (LR), and 2) Augmented Lagrangian Relaxation (ALR). First, the centralized SCED problem is posed for a 6-bus test network and then it is decomposed into subproblems using both of the methods. In order to model the tie-line between decomposed areas of the test network, a novel method is proposed. The advantages and drawbacks of each method are discussed in terms of accuracy and information privacy. We show that there is a tradeoff between the information privacy and the convergence rate. It has been found that ALR converges faster compared to LR, due to the large amount of shared data.
△ Less
Submitted 8 November, 2015;
originally announced November 2015.
-
Optimal Two-Tier Forecasting Power Generation Model in Smart Grids
Authors:
Kianoosh G. Boroojeni,
Shekoufeh Mokhtari,
M. H. Amini,
S. S. Iyengar
Abstract:
There has been an increasing trend in the electric power system from a centralized generation-driven grid to a more reliable, environmental friendly, and customer-driven grid. One of the most important issues which the designers of smart grids need to deal with is to forecast the fluctuations of power demand and generation in order to make the power system facilities more flexible to the variable…
▽ More
There has been an increasing trend in the electric power system from a centralized generation-driven grid to a more reliable, environmental friendly, and customer-driven grid. One of the most important issues which the designers of smart grids need to deal with is to forecast the fluctuations of power demand and generation in order to make the power system facilities more flexible to the variable nature of renewable power resources and demand-side. This paper proposes a novel two-tier scheme for forecasting the power demand and generation in a general residential electrical gird which uses the distributed renewable resources as the primary energy resource. The proposed forecasting scheme has two tiers: long-term demand/generation forecaster which is based on Maximum-Likelihood Estimator (MLE) and real-time demand/generation forecaster which is based on Auto-Regressive Integrated Moving-Average (ARIMA) model. The paper also shows that how bulk generation improves the adequacy of proposed residential system by canceling-out the forecasters estimation errors which are in the form of Gaussian White noises.
△ Less
Submitted 2 February, 2015;
originally announced February 2015.