Goto

Collaborating Authors

 pod


Orcas are hunting young great white sharks for their livers

Popular Science

Moctezuma's pod continues their dominance in the Gulf of California. Breakthroughs, discoveries, and DIY tips sent every weekday. Orca whales are skilled pack hunters with an ever-growing list of prey . Recently, ocean researchers discovered that the apex predators aren't afraid of taking on equally formidable foes-- great white sharks . Now, a study published on November 3 in the journal documented even more remarkable hunting behavior.


Collision avoidance and path finding in a robotic mobile fulfillment system using multi-objective meta-heuristics

Kokhahi, Ahmad, Kurz, Mary

arXiv.org Artificial Intelligence

The rapid growth of e-commerce in recent years has significantly transformed people's shopping habits [1]. Consumers increasingly favor online shopping over in-person purchases, leading to a substantial impact on product logistics, which plays a crucial role in customer satisfaction. In addition to product quality and other factors, the timely delivery of orders has become a key determinant of customer satisfaction. Picking and replenishment tasks are responsible for 65% of operating costs [2]. In a conventional manual order picking system, often referred to as a picker-to-parts system, pickers dedicate 70% of their working time to searching for items and traveling within the facility [3, 4].


Scaling Homomorphic Applications in Deployment

Marinelli, Ryan, Chowdhury, Angelica

arXiv.org Artificial Intelligence

In this endeavor, a proof-of-concept homomorphic application is developed to determine the production readiness of encryption ecosystems. A movie recommendation app is implemented for this purpose and productionized through containerization and orchestration. By tuning deployment configurations, the computational limitations of Fully Homomorphic Encryption (FHE) are mitigated through additional infrastructure optimizations.


MicroRCA-Agent: Microservice Root Cause Analysis Method Based on Large Language Model Agents

Tang, Pan, Tang, Shixiang, Pu, Huanqi, Miao, Zhiqing, Wang, Zhixing

arXiv.org Artificial Intelligence

This paper presents MicroRCA-Agent, an innovative solution for microservice root cause analysis based on large language model agents, which constructs an intelligent fault root cause localization system with multimodal data fusion. The technical innovations are embodied in three key aspects: First, we combine the pre-trained Drain log parsing algorithm with multi-level data filtering mechanism to efficiently compress massive logs into high-quality fault features. Second, we employ a dual anomaly detection approach that integrates Isolation Forest unsupervised learning algorithms with status code validation to achieve comprehensive trace anomaly identification. Third, we design a statistical symmetry ratio filtering mechanism coupled with a two-stage LLM analysis strategy to enable full-stack phenomenon summarization across node-service-pod hierarchies. The multimodal root cause analysis module leverages carefully designed cross-modal prompts to deeply integrate multimodal anomaly information, fully exploiting the cross-modal understanding and logical reasoning capabilities of large language models to generate structured analysis results encompassing fault components, root cause descriptions, and reasoning trace. Comprehensive ablation studies validate the complementary value of each modal data and the effectiveness of the system architecture. The proposed solution demonstrates superior performance in complex microservice fault scenarios, achieving a final score of 50.71. The code has been released at: https://github.com/tangpan360/MicroRCA-Agent.


Revealed: The 5,000 device that tech billionaires Mark Zuckerberg and Elon Musk swear has led to their success

Daily Mail - Science & tech

It is the gadget that billionaires Elon Musk and Mark Zuckerberg swear is the key to their success. Instead, billionaires and Silicon Valley elite are forking over thousands for high-tech mattresses to optimise their sleep. Eight Sleep, the startup behind these pricey smart beds, claims its mattresses can give you 25 per cent more deep sleep and even cure your snoring. The company's Pod product consists of a sensor-packed mattress cover which connects to a large'hub' and an adjustable base. This system constantly monitors the sleeper's body temperature and position, providing heating or cooling through an in-built water pump.


How listening to light waves could prevent subsea cables sabotage

Popular Science

Breakthroughs, discoveries, and DIY tips sent every weekday. The lifeblood of global communication flows through more than 807,800 miles worth of garden hose-wide cables woven across the sea floor. These cables, which reportedly transmit over 10 trillion worth of financial data every day, are vulnerable to extreme weather, decay, and, if recent reports are to be believed, acts of sabotage. The Associated Press estimates that at least 11 cables have been damaged since October 2023 in the Baltic Sea alone. Finnish and German authorities traced several of those incidents back to dragged anchors, which they allege may have been intentionally deployed to cause damage for political ends.


Simplifying Root Cause Analysis in Kubernetes with StateGraph and LLM

Xiang, Yong, Chen, Charley Peter, Zeng, Liyi, Yin, Wei, Liu, Xin, Li, Hu, Xu, Wei

arXiv.org Artificial Intelligence

Kubernetes, a notably complex and distributed system, utilizes an array of controllers to uphold cluster management logic through state reconciliation. Nevertheless, maintaining state consistency presents significant challenges due to unexpected failures, network disruptions, and asynchronous issues, especially within dynamic cloud environments. These challenges result in operational disruptions and economic losses, underscoring the necessity for robust root cause analysis (RCA) to enhance Kubernetes reliability. The development of large language models (LLMs) presents a promising direction for RCA. However, existing methodologies encounter several obstacles, including the diverse and evolving nature of Kubernetes incidents, the intricate context of incidents, and the polymorphic nature of these incidents. In this paper, we introduce SynergyRCA, an innovative tool that leverages LLMs with retrieval augmentation from graph databases and enhancement with expert prompts. SynergyRCA constructs a StateGraph to capture spatial and temporal relationships and utilizes a MetaGraph to outline entity connections. Upon the occurrence of an incident, an LLM predicts the most pertinent resource, and SynergyRCA queries the MetaGraph and StateGraph to deliver context-specific insights for RCA. We evaluate SynergyRCA using datasets from two production Kubernetes clusters, highlighting its capacity to identify numerous root causes, including novel ones, with high efficiency and precision. SynergyRCA demonstrates the ability to identify root causes in an average time of about two minutes and achieves an impressive precision of approximately 0.90.


ADA: Automated Moving Target Defense for AI Workloads via Ephemeral Infrastructure-Native Rotation in Kubernetes

Sheriff, Akram, Huang, Ken, Nemeth, Zsolt, Nakhjiri, Madjid

arXiv.org Artificial Intelligence

This paper introduces the Adaptive Defense Agent (ADA), an innovative Automated Moving Target Defense (AMTD) system designed to fundamentally enhance the security posture of AI workloads. ADA operates by continuously and automatically rotating these workloads at the infrastructure level, leveraging the inherent ephemerality of Kubernetes pods. This constant managed churn systematically invalidates attacker assumptions and disrupts potential kill chains by regularly destroying and respawning AI service instances. This methodology, applying principles of chaos engineering as a continuous, proactive defense, offers a paradigm shift from traditional static defenses that rely on complex and expensive confidential or trusted computing solutions to secure the underlying compute platforms, while at the same time agnostically supporting the latest advancements in agentic and nonagentic AI ecosystems and solutions such as agent-to-agent (A2A) communication frameworks or model context protocols (MCP). This AI-native infrastructure design, relying on the widely proliferated cloud-native Kubernetes technologies, facilitates easier deployment, simplifies maintenance through an inherent zero trust posture achieved by rotation, and promotes faster adoption. We posit that ADA's novel approach to AMTD provides a more robust, agile, and operationally efficient zero-trust model for AI services, achieving security through proactive environmental manipulation rather than reactive patching.


Stow: Robotic Packing of Items into Fabric Pods

Hudson, Nicolas, Hooks, Josh, Warrier, Rahul, Salisbury, Curt, Hartley, Ross, Kumar, Kislay, Chandrashekhar, Bhavana, Birkmeyer, Paul, Tang, Bosch, Frost, Matt, Thakar, Shantanu, Piaskowy, Tony, Nilsson, Petter, Petersen, Josh, Doshi, Neel, Slatter, Alan, Bhatia, Ankit, Meeker, Cassie, Xue, Yuechuan, Cox, Dylan, Kyriazis, Alex, Lou, Bai, Hasan, Nadeem, Rana, Asif, Chacko, Nikhil, Xu, Ruinian, Faal, Siamak, Seraj, Esi, Agrawal, Mudit, Jamieson, Kevin, Bisagni, Alessio, Samzun, Valerie, Fuller, Christine, Keklak, Alex, Frenkel, Alex, Ratliff, Lillian, Parness, Aaron

arXiv.org Artificial Intelligence

This paper presents a compliant manipulation system capable of placing items onto densely packed shelves. The wide diversity of items and strict business requirements for high producing rates and low defect generation have prohibited warehouse robotics from performing this task. Our innovations in hardware, perception, decision-making, motion planning, and control have enabled this system to perform over 500,000 stows in a large e-commerce fulfillment center. The system achieves human levels of packing density and speed while prioritizing work on overhead shelves to enhance the safety of humans working alongside the robots.


Capturing Extreme Events in Turbulence using an Extreme Variational Autoencoder (xVAE)

Zhang, Likun, Bhaganagar, Kiran, Wikle, Christopher K.

arXiv.org Machine Learning

Turbulent flow fields are characterized by extreme events that are statistically intermittent and carry a significant amount of energy and physical importance. To emulate these flows, we introduce the extreme variational Autoencoder (xVAE), which embeds a max-infinitely divisible process with heavy-tailed distributions into a standard VAE framework, enabling accurate modeling of extreme events. xVAEs are neural network models that reduce system dimensionality by learning non-linear latent representations of data. We demonstrate the effectiveness of xVAE in large-eddy simulation data of wildland fire plumes, where intense heat release and complex plume-atmosphere interactions generate extreme turbulence. Comparisons with the commonly used Proper Orthogonal Decomposition (POD) modes show that xVAE is more robust in capturing extreme values and provides a powerful uncertainty quantification framework using variational Bayes. Additionally, xVAE enables analysis of the so-called copulas of fields to assess risks associated with rare events while rigorously accounting for uncertainty, such as simultaneous exceedances of high thresholds across multiple locations. The proposed approach provides a new direction for studying realistic turbulent flows, such as high-speed aerodynamics, space propulsion, and atmospheric and oceanic systems that are characterized by extreme events.