skip to main content


Title: Bioinspired and Low-Power 2D Machine Vision with Adaptive Machine Learning and Forgetting
Award ID(s):
2042154
NSF-PAR ID:
10388508
Author(s) / Creator(s):
; ; ; ; ; ; ;
Date Published:
Journal Name:
ACS Nano
Volume:
16
Issue:
12
ISSN:
1936-0851
Page Range / eLocation ID:
20010 to 20020
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. null (Ed.)
    Cyber Physical Systems (CPS) are characterized by their ability to integrate the physical and information or cyber worlds. Their deployment in critical infrastructure have demonstrated a potential to transform the world. However, harnessing this potential is limited by their critical nature and the far reaching effects of cyber attacks on human, infrastructure and the environment. An attraction for cyber concerns in CPS rises from the process of sending information from sensors to actuators over the wireless communication medium, thereby widening the attack surface. Traditionally, CPS security has been investigated from the perspective of preventing intruders from gaining access to the system using cryptography and other access control techniques. Most research work have therefore focused on the detection of attacks in CPS. However, in a world of increasing adversaries, it is becoming more difficult to totally prevent CPS from adversarial attacks, hence the need to focus on making CPS resilient. Resilient CPS are designed to withstand disruptions and remain functional despite the operation of adversaries. One of the dominant methodologies explored for building resilient CPS is dependent on machine learning (ML) algorithms. However, rising from recent research in adversarial ML, we posit that ML algorithms for securing CPS must themselves be resilient. This article is therefore aimed at comprehensively surveying the interactions between resilient CPS using ML and resilient ML when applied in CPS. The paper concludes with a number of research trends and promising future research directions. Furthermore, with this article, readers can have a thorough understanding of recent advances on ML-based security and securing ML for CPS and countermeasures, as well as research trends in this active research area. 
    more » « less
  2. Objective: In this study, we aimed to develop a novel electromyography (EMG)-based neural machine interface (NMI), called the Neural Network-Musculoskeletal hybrid Model (N2M2), to decode continuous joint angles. Our approach combines the concepts of machine learning and musculoskeletal modeling. Methods: We compared our novel design with a musculoskeletal model (MM) and 2 continuous EMG decoders based on artificial neural networks (ANNs): multilayer perceptrons (MLPs) and nonlinear autoregressive neural networks with exogenous inputs (NARX networks). EMG and joint kinematics data were collected from 10 non-disabled and 1 transradial amputee subject. The offline performance tested across 3 different conditions (i.e., varied arm postures, shifted electrode locations, and noise-contaminated EMG signals) and online performance for a virtual postural matching task was quantified. Finally, we implemented the N2M2 to operate a prosthetic hand and tested functional task performance. Results: The N2M2 made more accurate predictions than the MLP in all postures and electrode locations (p < 0.003). For estimated MCP joint angles, the N2M2 was less sensitive to noisy EMG signals than the MM or NARX network with respect to error (p < 0.032) as well as the NARX network with respect to correlation (p = 0.007). Additionally, the N2M2 had better online task performance than the NARX network (p ≤ 0.030). Conclusion: Overall, we have found that combining the concepts of machine learning and musculoskeletal modeling has resulted in a more robust joint kinematics decoder than either concept individually. Significance: The outcome of this study may result in a novel, highly reliable controller for powered prosthetic hands. 
    more » « less
  3. Abstract Recently, the use of machine learning in meteorology has increased greatly. While many machine learning methods are not new, university classes on machine learning are largely unavailable to meteorology students and are not required to become a meteorologist. The lack of formal instruction has contributed to perception that machine learning methods are “black boxes” and thus end-users are hesitant to apply the machine learning methods in their everyday workflow. To reduce the opaqueness of machine learning methods and lower hesitancy toward machine learning in meteorology, this paper provides a survey of some of the most common machine learning methods. A familiar meteorological example is used to contextualize the machine learning methods while also discussing machine learning topics using plain language. The following machine learning methods are demonstrated: linear regression, logistic regression, decision trees, random forest, gradient boosted decision trees, naïve Bayes, and support vector machines. Beyond discussing the different methods, the paper also contains discussions on the general machine learning process as well as best practices to enable readers to apply machine learning to their own datasets. Furthermore, all code (in the form of Jupyter notebooks and Google Colaboratory notebooks) used to make the examples in the paper is provided in an effort to catalyze the use of machine learning in meteorology. 
    more » « less
  4. Quantum machine learning (QML) is an emerging field of research that leverages quantum computing to improve the classical machine learning approach to solve complex real world problems. QML has the potential to address cybersecurity related challenges. Considering the novelty and complex architecture of QML, resources are not yet explicitly available that can pave cybersecurity learners to instill efficient knowledge of this emerging technology. In this research, we design and develop QML-based ten learning modules covering various cybersecurity topics by adopting student centering case-study based learning approach. We apply one subtopic of QML on a cybersecurity topic comprised of pre-lab, lab, and post-lab activities towards providing learners with hands-on QML experiences in solving real-world security problems. In order to engage and motivate students in a learning environment that encourages all students to learn, pre-lab offers a brief introduction to both the QML subtopic and cybersecurity problem. In this paper, we utilize quantum support vector machine (QSVM) for malware classification and protection where we use open source Pennylane QML framework on the drebin 215 dataset. We demonstrate our QSVM model and achieve an accuracy of 95% in malware classification and protection. We will develop all the modules and introduce them to the cybersecurity community in the coming days. 
    more » « less
  5. Image-based machine learning methods are becoming among the most widely-used forms of data analysis across science, technology, engineering, and industry. These methods are powerful because they can rapidly and automatically extract rich contextual and spatial information from images, a process that has historically required a large amount of human labor. A wide range of recent scientific applications have demonstrated the potential of these methods to change how researchers study the ocean. However, despite their promise, machine learning tools are still under-exploited in many domains including species and environmental monitoring, biodiversity surveys, fisheries abundance and size estimation, rare event and species detection, the study of animal behavior, and citizen science. Our objective in this article is to provide an approachable, end-to-end guide to help researchers apply image-based machine learning methods effectively to their own research problems. Using a case study, we describe how to prepare data, train and deploy models, and overcome common issues that can cause models to underperform. Importantly, we discuss how to diagnose problems that can cause poor model performance on new imagery to build robust tools that can vastly accelerate data acquisition in the marine realm. Code to perform analyses is provided at https://github.com/heinsense2/AIO_CaseStudy . 
    more » « less