=Paper= {{Paper |id=Vol-3057/paper31.pdf |storemode=property |title=Swarm Learning Based on the Artificially Intelligent Edge |pdfUrl=https://ceur-ws.org/Vol-3057/paper31.pdf |volume=Vol-3057 |authors=Vitaly A. Dovgal }} ==Swarm Learning Based on the Artificially Intelligent Edge== https://ceur-ws.org/Vol-3057/paper31.pdf
Swarm Learning Based on the Artificially Intelligent Edge
Vitaly A. Dovgal 1
1
    Maikop State Technological University, Maykop,385000, Russia


                 Abstract
                 Recently, the practical use of sensor groups, the number of which is growing exponentially,
                 causes problems associated with their simultaneous and at the same time independent
                 operation. The amount of data processed in a group of sensors sometimes becomes so
                 incredibly huge that their effective processing is difficult for high-performance devices, not
                 to mention low-performance processors of small-sized devices such as drones. Therefore, it is
                 extremely necessary to effectively process the data coming from the sensors of such devices
                 located on the edge of the computing system. The purpose of this study is to review and
                 analyze traditional methods of machine learning in a distributed information collection and
                 processing system, as well as the application of a new paradigm for this – artificially
                 intelligent edge computing, as well as ways to implement them in terms of transmitting the
                 collected data and training a model of a swarm of drones performing an independent flight.

                 Keywords 1
                 Paper template, paper formatting, CEUR-WS
                 unmanned aerial vehicle, edge computing, artificial intelligence, blockchain, swarm learning,
                 artificially intelligent edge

1. Introduction

   Currently, there are quite a large number of various tasks in which information about the
environment is collected by sensors installed on mobile and non-mobile devices. Then this data
should be collected into a single information array for further processing of information and making
any decision based on the collected and processed data. A fairly common example is a group of
unmanned aerial vehicles (UAVs), which are increasingly used to perform some task (for example, a
search operation or a monitoring mission) as part of an organized group, which can be called a swarm
(or flock) [1]. The control of the UAV swarm can be carried out remotely using a ground station (GS),
which allows performing a completely autonomous flight. However, in this case, the operator who is
the weakest link in terms of effective management will be included in the control loop of the drone
flock. It will be much more advantageous to perform a group of drones without the participation of a
person or with his minimal participation. The purpose of this article is to analyze data processing
methods at the edge of a computing system, which is a group of drones.

2. Artificially Intelligent Edge
   Usually, data processing devices that have sensors for collecting primary information, for the
implementation of an artificial intelligence model, send the data collected by the sensors to some
central point. The data is used to "train” the model, and then the model is transmitted back to all
peripheral devices. The idea of local processing of the collected data, without transferring them to a
central server for performing calculations, is natural. This will reduce delays, reduce the energy needs

    Proceedings of VI International Scientific and Practical Conference Distance Learning Technologies (DLT–2021), September 20-22,
2021, Yalta, Crimea
EMAIL: vdovgal@mkgtu.ru
ORCID: 0000-0003-4181-8776
            ©️ 2021 Copyright for this paper by its authors.
            Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
            CEUR Workshop Proceedings (CEUR-WS.org)



                                                                                   260
of devices and, sometimes, heat removal, as well as solve the growing transport and opportunity costs.
For this purpose, artificial intelligence algorithms are used. Independent solutions obtained directly on
the peripheral device or a server next to the device will be developed in a matter of milliseconds
without the need for an Internet connection or the cloud.
    Returning to the example of a swarm of drones, we can compare it with a flock of starlings or fish,
in which each of the members of the flock is a separately functioning device in terms of collecting,
processing and further using the information received about the environment. At the same time, such
a flock, as a single object, acts quite synchronously, pulsating and fluttering in the air or water. This
behavior of birds or fish is usually called scale-free correlation, noise, or swarming, which allows us
to understand the geometric increase in the amount of data collected at the border of the flock.
    For such a joint movement of a large set of objects that are elements of a larger object (swarm),
according to scientists [2], artificially intelligent boundary calculations are used, which are a
combination of nebulous calculations and artificial intelligence that allow the implementation a
distributed computing system. Swarm training, which is used for the described systems, is not only a
method of placing the model in a protected environment and then training it without moving data
anywhere but also eliminates the need to include a certain central leader as a control point: artificial
intelligence modeling is performed by boundary devices that are part of the entire system. That is,
artificial intelligence is formed at the swarm boundary, which allows reducing the energy and
computational load (a fog layer consisting of microprocessors installed on devices of a distributed
system and bringing data storage and processing operations closer to the place of their occurrence –
sensors installed on devices and included in the described system).
    Thus, a set of devices included in a distributed computing system forms a computing node that
includes filtering and clustering tools that allow delivering critical information based on importance
following the requirements of the application [3].

3. The Method of Teaching the Swarm
   To implement machine learning (ML), you initially need sufficiently large data arrays and an
appropriate computing infrastructure, which includes a data warehouse for processing and analytics as
an integral part. In the case of a distributed system, it is possible to implement several ML techniques,
the first of which is local learning ("on edge") – data and computing infrastructure are available
locally (Fig. 1).




Figure 1: Local machine learning scheme

  With a small amount of data at the local level (i.e. insufficient for training), it is possible to
combine data obtained from different sources (sensors) and process them centrally, performing


                                                    261
training with ML algorithms in a centralized computing environment (Fig. 2) – using cloud
computing, which significantly improves training results [4]. Among the disadvantages of cloud
computing is data duplication when transferring from local storage to central storage and an increase
in data traffic, problems with locally different data privacy, and security rules [5].




Figure 2: Centralized machine learning scheme

    In addition, Google offers an alternative approach called federated learning [6], and Facebook
offers Deep learning with Elastic Averaging SGD [7]. In these models, the aggregation and
distribution of local learning are carried out due to dedicated parameter servers (Fig. 3). The star-
shaped topology gives rise to the disadvantages of these systems associated with the lack of a central
structure, and therefore the need to coordinate the transmitted data for their joint use. In addition, the
key problem and bottleneck in the federated learning network is the speed of communication, which
remains low due to frequent interactions between the central server and clients.
    In the considered swarm learning model (SL), there is no dedicated server, and parameters and
models are used together only in a local way (Fig. 4). In this case, parameters are transmitted via a
network consisting of separate swarm devices (Fig. 5), and training models are built independently
based on private data (Model Private Data) on separate nodes called swarm edge nodes.




Figure 3: Federated Machine Learning scheme



                                                    262
Figure 4: Swarm machine learning scheme

   The security and confidentiality of data in the SL model are provided by blockchain technology,
which allows various organizations or consortia to cooperate effectively (Fig. 6). Transactions can
only be performed by pre-authorized participants since each participant in the blockchain network is
clearly defined. Consequently, they use computationally inexpensive consensus algorithms, which
largely determine its performance and security and are the most important component of any
blockchain system [8]. For continuous scaling of training, new participants or nodes are dynamically
included, subject to the appropriate authorization measures of network participants. Registration of a
new node is carried out using a smart contract, which is a computer algorithm of the blockchain
designed to generate, control, and provide information about the ownership of something and
implemented by a set of functions and data located at a certain address in the blockchain [9]. The new
node receives the model and performs local training of the model until certain synchronization
conditions are met. Then, using the swarm API, the model parameters are exchanged with the rest of
the flock members. Thus, the updated model is combined with the updated parameter settings and you
can start a new round of training on the nodes.




Figure 5: Swarm network diagram

   The specified process is repeated until the stopping criteria are reached, which are agreed upon
between the swarm participating nodes. To combine the parameters, a dynamic selection of a leader is

                                                  263
used based on a blockchain smart contract, protecting it from semi-honest or dishonest participants.
Therefore, there is no need for a central coordinator in such a network (swarm). In the future, the
elected leader combines the parameters by applying various functions (including the average,
weighted average, minimum, maximum, or median functions). Various merging methods and the
frequency of merging allow swarm training to work effectively with unbalanced and unevenly
distributed data [10]. Currently, the described algorithms are already used for parametric models with
finite sets of parameters, such as linear regression or neural network models.




Figure 6: Blockchain in the SL model

    At each node of the flock, swarm machine learning can be conceptually divided into an
infrastructure layer (hardware layer), which lies at the level of the physical infrastructure, and an
application layer (Fig. 7). The ML platform, the blockchain itself, and the swarm learning library
(SLL) are included in the application environment of the first of the described sublevels. The layer is
designed as a software and hardware swarm interface (Swarm API) in a container deployment, which
facilitates the use of swarm training in heterogeneous hardware infrastructures. The application layer
consists of data sets and models from the corresponding domain. For a swarm of drones, this can be
information about the geographical location, a description of the data sets of assigned missions, and
other useful sets.




Figure 7: Conceptual levels of swarm machine learning

   Thus, swarm learning in the object system under consideration will provide a fully decentralized
and, therefore, hardware-independent, confidential, secure, and scalable machine learning
environment applicable to many scenarios and areas. The described ML technology is based on

                                                   264
standardized libraries of artificial intelligence classes, with a permitted blockchain chain for securely
connecting participants, dynamically selecting a leader among participants, and combining model
parameters. The advantage of swarm learning when building a model for a drone swarm is the ability
to create a model from an infinitely large data pool without having to move this data across the border
of peripheral devices. With the help of swarm machine learning, the configuration process, which
requires a lot of computing power, can be carried out on the spot, using a communication channel
between the peripheral devices of the flock.

4. Conclusions
   Within the framework of this study, issues related to the distributed training of a group of
computing objects (using the example of a flock of drones) were considered, i.e. in the study of
possible and promising principles for building a decentralized model using data extracted by a large
number of drones. The article describes various methods of swarm training, considers the main areas
of their application, shows the structure of swarm training at each node, consisting of two layers.
Currently, swarm learning is a research project, the development of which technology allows us to
recognize several trends that make a new way of thinking vital.

5. References
[1] V.A. Dovgal, Decision-making for placing unmanned aerial vehicles to implementation of
     analyzing cloud computing cooperation applied to information processing. In collect.:
     Proceedings - 2020 International Conference on Industrial Engineering, Applications and
     Manufacturing, ICIEAM 2020, Sochi. Sochi: IEEE Inc., 2020. P. 9111975. DOI:
     10.1109/ICIEAM48468.2020.9111975.
[2] Warnat-Herresthal, Stefanie & Schultze, Hartmut & Shastry, Krishna & Manamohan,
     Sathyanarayanan & Mukherjee, Saikat & Garg, Vishesh & Sarveswara, Ravi & Händler, Kristian
     & Pickkers, Peter & Aziz, N. Ahmad & Ktena, Sofia & Siever, Christian & Kraut, Michael &
     Desai, Milind & Monet, Bruno & Saridaki, Maria & Siegel, Charles & Drews, Anna & Nuesch
     Germano, Melanie & Schultze, Joachim. (2020). Swarm Learning as a privacy-preserving
     machine learning approach for disease classification. DOI:10.1101/2020.06.25.171009.
[3] V.A. Dovgal, D.V. Dovgal, Analysis of communication interaction systems for drones
     performing a search mission as part of a group. The Bulletin of the Adyghe State University. Ser.
     Natural-Mathematical and Technical Sciences. 2020. V. 4 (271) РР. 87-94.
[4] G.A. Kaissis, M.R. Makowski, D. Rückert & R.F. Braren, Secure, privacy-preserving and
     federated machine learning in medical imaging. Nature Machine Intelligence. (2020)
     doi:10.1038/s42256-020-0186-1.
[5] E.S. Dove, Y. Joly, A-M. Tassé, et al., Genomic cloud computing: legal and ethical points to
     consider.     European     Journal    of    Human      Genetics     23,   1271–1278       (2015).
     https://doi.org/10.1038/ejhg.2014.196
[6] Jakub Konečný, H. Brendan McMahan, Felix X. Yu, Ananda Theertha Suresh & Dave Bacon.
     Federated Learning: Strategies for Improving Communication Efficiency. URL:
     https://arxiv.org/pdf/1610.05492.pdf
[7] S. Zhang, A. Choromanska, Y. LeCun, Deep learning with Elastic Averaging SGD URL:
     https://proceedings.neurips.cc/paper/2015/file/d18f655c3fce66ca401d5f38b48c89af-Paper.pdf.
[8] Md Sadek Ferdous, Member, IEEE, Mohammad Jabed Morshed Chowdhury, A. Mohammad
     Hoque, Member, IEEE, and Alan Colman, Blockchain Consensus Algorithms: A Survey. URL:
     https://arxiv.org/pdf/2001.07091.pdf
[9] Zhang, Shijie & Lee, Jong-Hyouk. (2019). Smart Contract-based Miner Registration and Block
     Validation. 691-693. DOI:10.1145/3321705.3331010.
[10] S.V. Safonov, I.V. Struchkov. A decentralized protocol for coordinating financial conditions in a
     public distributed registry with ensuring confidentiality. Innovations. The science. Education.
     2021. No. 33. PP. 1123-1132.


                                                    265