-
A Decision Model for Selecting Patterns and Strategies to Decompose Applications into Microservices
Authors:
Muhammad Waseem,
Peng Liang,
Gastón Márquez,
Mojtaba Shahin,
Arif Ali Khan,
Aakash Ahmad
Abstract:
Microservices Architecture (MSA) style is a promising design approach to develop software applications consisting of multiple small and independently deployable services. Over the past few years, researchers and practitioners have proposed many MSA patterns and strategies covering various aspects of microservices design, such as application decomposition. However, selecting appropriate patterns an…
▽ More
Microservices Architecture (MSA) style is a promising design approach to develop software applications consisting of multiple small and independently deployable services. Over the past few years, researchers and practitioners have proposed many MSA patterns and strategies covering various aspects of microservices design, such as application decomposition. However, selecting appropriate patterns and strategies can entail various challenges for practitioners. To this end, this study proposes a decision model for selecting patterns and strategies to decompose applications into microservices. We used peer-reviewed and grey literature to collect the patterns, strategies, and quality attributes for creating this decision model.
△ Less
Submitted 8 October, 2021;
originally announced October 2021.
-
Artificial Intelligence For Breast Cancer Detection: Trends & Directions
Authors:
Shahid Munir Shah,
Rizwan Ahmed Khan,
Sheeraz Arif,
Unaiza Sajid
Abstract:
In the last decade, researchers working in the domain of computer vision and Artificial Intelligence (AI) have beefed up their efforts to come up with the automated framework that not only detects but also identifies stage of breast cancer. The reason for this surge in research activities in this direction are mainly due to advent of robust AI algorithms (deep learning), availability of hardware t…
▽ More
In the last decade, researchers working in the domain of computer vision and Artificial Intelligence (AI) have beefed up their efforts to come up with the automated framework that not only detects but also identifies stage of breast cancer. The reason for this surge in research activities in this direction are mainly due to advent of robust AI algorithms (deep learning), availability of hardware that can train those robust and complex AI algorithms and accessibility of large enough dataset required for training AI algorithms. Different imaging modalities that have been exploited by researchers to automate the task of breast cancer detection are mammograms, ultrasound, magnetic resonance imaging, histopathological images or any combination of them. This article analyzes these imaging modalities and presents their strengths, limitations and enlists resources from where their datasets can be accessed for research purpose. This article then summarizes AI and computer vision based state-of-the-art methods proposed in the last decade, to detect breast cancer using various imaging modalities. Generally, in this article we have focused on to review frameworks that have reported results using mammograms as it is most widely used breast imaging modality that serves as first test that medical practitioners usually prescribe for the detection of breast cancer. Second reason of focusing on mammogram imaging modalities is the availability of its labeled datasets. Datasets availability is one of the most important aspect for the development of AI based frameworks as such algorithms are data hungry and generally quality of dataset affects performance of AI based algorithms. In a nutshell, this research article will act as a primary resource for the research community working in the field of automated breast imaging analysis.
△ Less
Submitted 3 October, 2021;
originally announced October 2021.
-
Molecular gas along the old radio jets of the cluster-central type 2 quasar IRAS 09104+4109
Authors:
Ewan O'Sullivan,
Françoise Combes,
Arif Babul,
Scott Chapman,
Kedar A. Phadke,
Gerrit Schellenberger,
Philippe Salomé
Abstract:
We present Northern Extended Millimeter Array (NOEMA) CO(2-1) maps of the z=0.4418 cluster-central QSO IRAS 09104+4109, which trace ~4.5x10^10 Msol of molecular gas in and around the galaxy. As in many low redshift cool core clusters, the molecular gas is located in a series of clumps extending along the old radio jets and lobes. It has a relatively low velocity dispersion (336 [+39,-35] km/s FWHM…
▽ More
We present Northern Extended Millimeter Array (NOEMA) CO(2-1) maps of the z=0.4418 cluster-central QSO IRAS 09104+4109, which trace ~4.5x10^10 Msol of molecular gas in and around the galaxy. As in many low redshift cool core clusters, the molecular gas is located in a series of clumps extending along the old radio jets and lobes. It has a relatively low velocity dispersion (336 [+39,-35] km/s FWHM) and shows no velocity gradients indicative of outflow or infall. Roughly half the gas is located in a central clump on the northeast side of the galaxy, overlapping a bright ionized gas filament and a spur of excess X-ray emission, suggesting that this is a location of rapid cooling. The molecular gas is unusually extended, out to ~55 kpc radius, comparable to the scale of the filamentary nebula in the Perseus cluster, despite the much higher redshift of this system. The extent falls within the thermal instability radius of the intracluster medium (ICM), with t_cool/t_ff<25 and t_cool}/t_eddy~1 within ~70 kpc. Continuum measurements at 159.9 GHz from NOEMA and 850 micron from the JCMT SCUBA-2 show excess far infrared emission, which we interpret as free-free emission arising from the ongoing starburst. These observations suggest that ICM cooling is not strongly affected by the buried QSO, and that cooling from the ICM can build gas reservoirs sufficient to fuel quasar-mode activity and drive the reorientation of the central AGN.
△ Less
Submitted 14 October, 2021; v1 submitted 28 September, 2021;
originally announced September 2021.
-
Molecular Understanding of the Effect of Hydrogen on Graphene Growth by Plasma-Enhanced Chemical Vapor Deposition
Authors:
Shiwen Wu,
Dezhao Huang,
Haoliang Yu,
Siyu Tian,
Arif Malik,
Tengfei Luo,
Guoping Xiong
Abstract:
Plasma-enhanced chemical vapor deposition (PECVD) provides a low-temperature, highly-efficient, and catalyst-free route to fabricate graphene materials by virtue of the unique properties of plasma. In this paper, we conduct reactive molecular dynamics simulations to theoretically study the detailed growth process of graphene by PECVD at the atomic scale. Hydrocarbon radicals with different carbon/…
▽ More
Plasma-enhanced chemical vapor deposition (PECVD) provides a low-temperature, highly-efficient, and catalyst-free route to fabricate graphene materials by virtue of the unique properties of plasma. In this paper, we conduct reactive molecular dynamics simulations to theoretically study the detailed growth process of graphene by PECVD at the atomic scale. Hydrocarbon radicals with different carbon/hydrogen (C/H) ratios are employed as dissociated precursors in the plasma environment during the growth process. The simulation results show that hydrogen content in the precursors significantly affects the growth behavior and critical properties of graphene. The highest number of hexagonal carbon rings formed in the graphene sheets, which is an indicator of their quality, is achieved for a C/H ratio of 1:1 in the precursors. Moreover, increasing the content of hydrogen in the precursors is shown to reduce the growth rate of carbon clusters, and prevent the formation of curved carbon structures during the growth process. The findings provide a detailed understanding of the fundamental mechanisms regarding the effects of hydrogen on the growth of graphene in a PECVD process.
△ Less
Submitted 24 September, 2021;
originally announced September 2021.
-
Ethics of AI: A Systematic Literature Review of Principles and Challenges
Authors:
Arif Ali Khan,
Sher Badshah,
Peng Liang,
Bilal Khan,
Muhammad Waseem,
Mahmood Niazi,
Muhammad Azeem Akbar
Abstract:
Ethics in AI becomes a global topic of interest for both policymakers and academic researchers. In the last few years, various research organizations, lawyers, think tankers and regulatory bodies get involved in developing AI ethics guidelines and principles. However, there is still debate about the implications of these principles. We conducted a systematic literature review (SLR) study to invest…
▽ More
Ethics in AI becomes a global topic of interest for both policymakers and academic researchers. In the last few years, various research organizations, lawyers, think tankers and regulatory bodies get involved in developing AI ethics guidelines and principles. However, there is still debate about the implications of these principles. We conducted a systematic literature review (SLR) study to investigate the agreement on the significance of AI principles and identify the challenging factors that could negatively impact the adoption of AI ethics principles. The results reveal that the global convergence set consists of 22 ethical principles and 15 challenges. Transparency, privacy, accountability and fairness are identified as the most common AI ethics principles. Similarly, lack of ethical knowledge and vague principles are reported as the significant challenges for considering ethics in AI. The findings of this study are the preliminary inputs for proposing a maturity model that assess the ethical capabilities of AI systems and provide best practices for further improvements.
△ Less
Submitted 12 September, 2021;
originally announced September 2021.
-
College Student Retention Risk Analysis From Educational Database using Multi-Task Multi-Modal Neural Fusion
Authors:
Mohammad Arif Ul Alam
Abstract:
We develop a Multimodal Spatiotemporal Neural Fusion network for Multi-Task Learning (MSNF-MTCL) to predict 5 important students' retention risks: future dropout, next semester dropout, type of dropout, duration of dropout and cause of dropout. First, we develop a general purpose multi-modal neural fusion network model MSNF for learning students' academic information representation by fusing spati…
▽ More
We develop a Multimodal Spatiotemporal Neural Fusion network for Multi-Task Learning (MSNF-MTCL) to predict 5 important students' retention risks: future dropout, next semester dropout, type of dropout, duration of dropout and cause of dropout. First, we develop a general purpose multi-modal neural fusion network model MSNF for learning students' academic information representation by fusing spatial and temporal unstructured advising notes with spatiotemporal structured data. MSNF combines a Bidirectional Encoder Representations from Transformers (BERT)-based document embedding framework to represent each advising note, Long-Short Term Memory (LSTM) network to model temporal advising note embeddings, LSTM network to model students' temporal performance variables and students' static demographics altogether. The final fused representation from MSNF has been utilized on a Multi-Task Cascade Learning (MTCL) model towards building MSNF-MTCL for predicting 5 student retention risks. We evaluate MSNFMTCL on a large educational database consists of 36,445 college students over 18 years period of time that provides promising performances comparing with the nearest state-of-art models. Additionally, we test the fairness of such model given the existence of biases.
△ Less
Submitted 11 September, 2021;
originally announced September 2021.
-
Operationalizing Human Values in Software Engineering: A Survey
Authors:
Mojtaba Shahin,
Waqar Hussain,
Arif Nurwidyantoro,
Harsha Perera,
Rifat Shams,
John Grundy,
Jon Whittle
Abstract:
Human values (e.g., pleasure, privacy, and social justice) are what a person or a society considers important. The inability to address them in software-intensive systems can result in numerous undesired consequences (e.g., financial losses) for individuals and communities. Various solutions (e.g., methodologies, techniques) are developed to help "operationalize values in software". The ultimate g…
▽ More
Human values (e.g., pleasure, privacy, and social justice) are what a person or a society considers important. The inability to address them in software-intensive systems can result in numerous undesired consequences (e.g., financial losses) for individuals and communities. Various solutions (e.g., methodologies, techniques) are developed to help "operationalize values in software". The ultimate goal is to ensure building software (better) reflects and respects human values. In this survey, "operationalizing values" is referred to as the process of identifying human values and translating them to accessible and concrete concepts so that they can be implemented, validated, verified, and measured in software. This paper provides a deep understanding of the research landscape on operationalizing values in software engineering, covering 51 primary studies. It also presents an analysis and taxonomy of 51 solutions for operationalizing values in software engineering. Our survey reveals that most solutions attempt to help operationalize values in the early phases (requirements and design) of the software development life cycle. However, the later phases (implementation and testing) and other aspects of software development (e.g., "team organization") still need adequate consideration. We outline implications for research and practice and identify open issues and future research directions to advance this area.
△ Less
Submitted 25 July, 2022; v1 submitted 12 August, 2021;
originally announced August 2021.
-
The Impact of Traceability on Software Maintenance and Evolution: A Mapping Study
Authors:
Fangchao Tian,
Tianlu Wang,
Peng Liang,
Chong Wang,
Arif Ali Khan,
Muhammad Ali Babar
Abstract:
Software traceability plays a critical role in software maintenance and evolution. We conducted a systematic mapping study with six research questions to understand the benefits, costs, and challenges of using traceability in maintenance and evolution. We systematically selected, analyzed, and synthesized 63 studies published between January 2000 and May 2020, and the results show that: traceabili…
▽ More
Software traceability plays a critical role in software maintenance and evolution. We conducted a systematic mapping study with six research questions to understand the benefits, costs, and challenges of using traceability in maintenance and evolution. We systematically selected, analyzed, and synthesized 63 studies published between January 2000 and May 2020, and the results show that: traceability supports 11 maintenance and evolution activities, among which change management is the most frequently supported activity; strong empirical evidence from industry is needed to validate the impact of traceability on maintenance and evolution; easing the process of change management is the main benefit of deploying traceability practices; establishing and maintaining traceability links is the main cost of deploying traceability practices; 13 approaches and 32 tools that support traceability in maintenance and evolution were identified; improving the quality of traceability links, the performance of using traceability approaches and tools are the main traceability challenges in maintenance and evolution. The findings of this study provide a comprehensive understanding of deploying traceability practices in software maintenance and evolution phase, and can be used by researchers for future directions and practitioners for making informed decisions while using traceability in maintenance and evolution.
△ Less
Submitted 4 August, 2021;
originally announced August 2021.
-
End to End Bangla Speech Synthesis
Authors:
Prithwiraj Bhattacharjee,
Rajan Saha Raju,
Arif Ahmad,
M. Shahidur Rahman
Abstract:
Text-to-Speech (TTS) system is a system where speech is synthesized from a given text following any particular approach. Concatenative synthesis, Hidden Markov Model (HMM) based synthesis, Deep Learning (DL) based synthesis with multiple building blocks, etc. are the main approaches for implementing a TTS system. Here, we are presenting our deep learning-based end-to-end Bangla speech synthesis sy…
▽ More
Text-to-Speech (TTS) system is a system where speech is synthesized from a given text following any particular approach. Concatenative synthesis, Hidden Markov Model (HMM) based synthesis, Deep Learning (DL) based synthesis with multiple building blocks, etc. are the main approaches for implementing a TTS system. Here, we are presenting our deep learning-based end-to-end Bangla speech synthesis system. It has been implemented with minimal human annotation using only 3 major components (Encoder, Decoder, Post-processing net including waveform synthesis). It does not require any frontend preprocessor and Grapheme-to-Phoneme (G2P) converter. Our model has been trained with phonetically balanced 20 hours of single speaker speech data. It has obtained a 3.79 Mean Opinion Score (MOS) on a scale of 5.0 as subjective evaluation and a 0.77 Perceptual Evaluation of Speech Quality(PESQ) score on a scale of [-0.5, 4.5] as objective evaluation. It is outperforming all existing non-commercial state-of-the-art Bangla TTS systems based on naturalness.
△ Less
Submitted 1 August, 2021;
originally announced August 2021.
-
Towards a Human Values Dashboard for Software Development: An Exploratory Study
Authors:
Arif Nurwidyantoro,
Mojtaba Shahin,
Michel Chaudron,
Waqar Hussain,
Harsha Perera,
Rifat Ara Shams,
Jon Whittle
Abstract:
Background: There is a growing awareness of the importance of human values (e.g., inclusiveness, privacy) in software systems. However, there are no practical tools to support the integration of human values during software development. We argue that a tool that can identify human values from software development artefacts and present them to varying software development roles can (partially) addr…
▽ More
Background: There is a growing awareness of the importance of human values (e.g., inclusiveness, privacy) in software systems. However, there are no practical tools to support the integration of human values during software development. We argue that a tool that can identify human values from software development artefacts and present them to varying software development roles can (partially) address this gap. We refer to such a tool as human values dashboard. Further to this, our understanding of such a tool is limited. Aims: This study aims to (1) investigate the possibility of using a human values dashboard to help address human values during software development, (2) identify possible benefits of using a human values dashboard, and (3) elicit practitioners' needs from a human values dashboard. Method: We conducted an exploratory study by interviewing 15 software practitioners. A dashboard prototype was developed to support the interview process. We applied thematic analysis to analyse the collected data. Results: Our study finds that a human values dashboard would be useful for the development team (e.g., project manager, developer, tester). Our participants acknowledge that development artefacts, especially requirements documents and issue discussions, are the most suitable source for identifying values for the dashboard. Our study also yields a set of high-level user requirements for a human values dashboard (e.g., it shall allow determining values priority of a project). Conclusions: Our study suggests that a values dashboard is potentially used to raise awareness of values and support values-based decision-making in software development. Future work will focus on addressing the requirements and using issue discussions as potential artefacts for the dashboard.
△ Less
Submitted 23 July, 2021;
originally announced July 2021.
-
Probing tripartite entanglement and coherence dynamics in pure and mixed independent classical environments
Authors:
Atta Ur Rahman,
Muhammad Javed,
Arif Ullah,
Quantum Optics,
Quantum Information Research Group,
Department of Physics,
University of Malakand,
Chakdara Dir,
Pakistan
Abstract:
Quantum information processing exploits non-local functionality that has led to significant breakthroughs in the successful deployment of quantum mechanical protocols. In this regard, we address the dynamics of entanglement and coherence for three non-interacting qubits initially prepared as maximally entangled GHZ-like state coupled with independent classical environments. Two different Gaussian…
▽ More
Quantum information processing exploits non-local functionality that has led to significant breakthroughs in the successful deployment of quantum mechanical protocols. In this regard, we address the dynamics of entanglement and coherence for three non-interacting qubits initially prepared as maximally entangled GHZ-like state coupled with independent classical environments. Two different Gaussian noises in pure and mixed noisy situations, namely, pure power-law noise, pure fractional Gaussian noise, power-law noise maximized and fractional Gaussian noise maximized cases are assumed to characterize the environments. With the help of time-dependent entanglement witnesses, purity, and decoherence measures, within the full range of parameters, we show that the current mixed noise cases are more detrimental than pure ones where entanglement and coherence are found short-lived. The power-law noise phase, in particular, appears to be more flexible and exploitable for long-term preservation effects. In contrast, we find that in both pure and mixed noise cases, where entanglement and coherence degrade at a relatively high rate, there is no ultimate solution for avoiding the detrimental dephasing effects of fractional Gaussian noise. The three-qubit state becomes disentangled and decoherent within independent classical environments driven by both pure and mixed Gaussian noises, either in long or short interaction time. In addition, due to the lack of the entanglement revival phenomenon, there is no information exchange between the system and the environment. The three-qubit GHZ-like states have thus been realized to be an excellent resource for long enough quantum correlations, coherence, and quantum information preservation in classical independent channels driven by pure power-law noise with extremely low parameter values.
△ Less
Submitted 23 July, 2021;
originally announced July 2021.
-
Probing multipartite entanglement, coherence and quantum information preservation under classical Ornstein-Uhlenbeck noise
Authors:
Atta Ur Rahman,
Muhammad Javed,
Arif Ullah,
Khyber Pakhtunkhwa
Abstract:
We address entanglement, coherence, and information protection in a system of four non-interacting qubits coupled with different classical environments, namely: common, bipartite, tripartite, and independent environments described by Ornstein-Uhlenbeck (ORU) noise. We show that quantum information preserved by the four qubit state is more dependent on the coherence than the entanglement using time…
▽ More
We address entanglement, coherence, and information protection in a system of four non-interacting qubits coupled with different classical environments, namely: common, bipartite, tripartite, and independent environments described by Ornstein-Uhlenbeck (ORU) noise. We show that quantum information preserved by the four qubit state is more dependent on the coherence than the entanglement using time-dependent entanglement witness, purity, and Shannon entropy. We find these two quantum phenomena directly interrelated and highly vulnerable in environments with ORU noise, resulting in the pure exponential decay of a considerable amount. The current Markovian dynamical map, as well as suppression of the fluctuating character of the environments are observed to be entirely attributable to the Gaussian nature of the noise. Furthermore, the increasing number of environments are witnessed to accelerate the amount of decay. Unlike other noises, the current noise parameter's flexible range is readily exploitable, ensuring long enough preserved memory properties. The four-qubit GHZ state, besides having a large information storage potential, stands partially entangled and coherent in common environments for an indefinite duration. Thus, it appeared to be a more promising resource for functional quantum computing than bipartite and tripartite quantum systems. In addition, we derive computational values for each system-environment interaction, which will help quantum practitioners to optimize the related kind of classical environments.
△ Less
Submitted 23 July, 2021;
originally announced July 2021.
-
Effects of classical fluctuating environments on decoherence and bipartite quantum correlations dynamics
Authors:
Atta Ur Rahman,
Muhammad Javed,
Muhammad Noman,
Arif Ullah,
Chakdara Dir,
Ming-Xing Luo
Abstract:
We address the time evolution of the quantum correlations ($QCs$) such as entanglement, purity, and coherence for a model of two non-interacting qubits initially prepared as a maximally entangled bipartite state. We contrast the comparative potential of the classical fields to preserve these $QCs$ in the noisy and noiseless realms. We also disclose the characteristic dynamical behavior of the…
▽ More
We address the time evolution of the quantum correlations ($QCs$) such as entanglement, purity, and coherence for a model of two non-interacting qubits initially prepared as a maximally entangled bipartite state. We contrast the comparative potential of the classical fields to preserve these $QCs$ in the noisy and noiseless realms. We also disclose the characteristic dynamical behavior of the $QCs$ of the two-qubit state under the static noisy effects originating from the common and different configuration models. We show that there is a direct connection between the fluctuations allowed by an environment and the $QCs$ preservation. Due to the static noisy dephasing effects, the $QCs$ are suppressed, resulting in the separability of the two-qubit entangled state after a finite duration. Here, the $QCs$ decay effects are found much smaller in the common configuration model than that of the opponent. Furthermore, this protection of the $QCs$ under static noise for large intervals is entirely attributable to the existence of the entanglement sudden death and birth phenomenon. Most importantly, we found the bipartite $QCs$ less fragile than the tripartite ones in comparison under the static noise. In the case of the measures, the concurrence is found to be sharper for showing the entanglement sudden death and birth revivals in comparison to the purity and decoherence.
△ Less
Submitted 23 July, 2021;
originally announced July 2021.
-
A Review on Edge Analytics: Issues, Challenges, Opportunities, Promises, Future Directions, and Applications
Authors:
Sabuzima Nayak,
Ripon Patgiri,
Lilapati Waikhom,
Arif Ahmed
Abstract:
Edge technology aims to bring Cloud resources (specifically, the compute, storage, and network) to the closed proximity of the Edge devices, i.e., smart devices where the data are produced and consumed. Embedding computing and application in Edge devices lead to emerging of two new concepts in Edge technology, namely, Edge computing and Edge analytics. Edge analytics uses some techniques or algori…
▽ More
Edge technology aims to bring Cloud resources (specifically, the compute, storage, and network) to the closed proximity of the Edge devices, i.e., smart devices where the data are produced and consumed. Embedding computing and application in Edge devices lead to emerging of two new concepts in Edge technology, namely, Edge computing and Edge analytics. Edge analytics uses some techniques or algorithms to analyze the data generated by the Edge devices. With the emerging of Edge analytics, the Edge devices have become a complete set. Currently, Edge analytics is unable to provide full support for the execution of the analytic techniques. The Edge devices cannot execute advanced and sophisticated analytic algorithms following various constraints such as limited power supply, small memory size, limited resources, etc. This article aims to provide a detailed discussion on Edge analytics. A clear explanation to distinguish between the three concepts of Edge technology, namely, Edge devices, Edge computing, and Edge analytics, along with their issues. Furthermore, the article discusses the implementation of Edge analytics to solve many problems in various areas such as retail, agriculture, industry, and healthcare. In addition, the research papers of the state-of-the-art edge analytics are rigorously reviewed in this article to explore the existing issues, emerging challenges, research opportunities and their directions, and applications.
△ Less
Submitted 1 July, 2021;
originally announced July 2021.
-
A Parallel Approximation Algorithm for Maximizing Submodular $b$-Matching
Authors:
S M Ferdous,
Alex Pothen,
Arif Khan,
Ajay Panyala,
Mahantesh Halappanavar
Abstract:
We design new serial and parallel approximation algorithms for computing a maximum weight $b$-matching in an edge-weighted graph with a submodular objective function. This problem is NP-hard; the new algorithms have approximation ratio $1/3$, and are relaxations of the Greedy algorithm that rely only on local information in the graph, making them parallelizable. We have designed and implemented Lo…
▽ More
We design new serial and parallel approximation algorithms for computing a maximum weight $b$-matching in an edge-weighted graph with a submodular objective function. This problem is NP-hard; the new algorithms have approximation ratio $1/3$, and are relaxations of the Greedy algorithm that rely only on local information in the graph, making them parallelizable. We have designed and implemented Local Lazy Greedy algorithms for both serial and parallel computers. We have applied the approximate submodular $b$-matching algorithm to assign tasks to processors in the computation of Fock matrices in quantum chemistry on parallel computers. The assignment seeks to reduce the run time by balancing the computational load on the processors and bounding the number of messages that each processor sends. We show that the new assignment of tasks to processors provides a four fold speedup over the currently used assignment in the NWChemEx software on $8000$ processors on the Summit supercomputer at Oak Ridge National Lab.
△ Less
Submitted 12 July, 2021;
originally announced July 2021.
-
A Novel Disaster Image Dataset and Characteristics Analysis using Attention Model
Authors:
Fahim Faisal Niloy,
Arif,
Abu Bakar Siddik Nayem,
Anis Sarker,
Ovi Paul,
M. Ashraful Amin,
Amin Ahsan Ali,
Moinul Islam Zaber,
AKM Mahbubur Rahman
Abstract:
The advancement of deep learning technology has enabled us to develop systems that outperform any other classification technique. However, success of any empirical system depends on the quality and diversity of the data available to train the proposed system. In this research, we have carefully accumulated a relatively challenging dataset that contains images collected from various sources for thr…
▽ More
The advancement of deep learning technology has enabled us to develop systems that outperform any other classification technique. However, success of any empirical system depends on the quality and diversity of the data available to train the proposed system. In this research, we have carefully accumulated a relatively challenging dataset that contains images collected from various sources for three different disasters: fire, water and land. Besides this, we have also collected images for various damaged infrastructure due to natural or man made calamities and damaged human due to war or accidents. We have also accumulated image data for a class named non-damage that contains images with no such disaster or sign of damage in them. There are 13,720 manually annotated images in this dataset, each image is annotated by three individuals. We are also providing discriminating image class information annotated manually with bounding box for a set of 200 test images. Images are collected from different news portals, social media, and standard datasets made available by other researchers. A three layer attention model (TLAM) is trained and average five fold validation accuracy of 95.88% is achieved. Moreover, on the 200 unseen test images this accuracy is 96.48%. We also generate and compare attention maps for these test images to determine the characteristics of the trained attention model. Our dataset is available at https://niloy193.github.io/Disaster-Dataset
△ Less
Submitted 2 July, 2021;
originally announced July 2021.
-
Simulating Groups and the IntraGroup Medium: The Surprisingly Complex and Rich Middle Ground Between Clusters and Galaxies
Authors:
Benjamin D. Oppenheimer,
Arif Babul,
Yannick Bahé,
Iryna S. Butsky,
Ian G. McCarthy
Abstract:
Galaxy groups are more than an intermediate scale between clusters and halos hosting individual galaxies, they are crucial laboratories capable of testing a range of astrophysics from how galaxies form and evolve to large scale structure (LSS) statistics for cosmology. Cosmological hydrodynamic simulations of groups on various scales offer an unparalleled testing ground for astrophysical theories.…
▽ More
Galaxy groups are more than an intermediate scale between clusters and halos hosting individual galaxies, they are crucial laboratories capable of testing a range of astrophysics from how galaxies form and evolve to large scale structure (LSS) statistics for cosmology. Cosmological hydrodynamic simulations of groups on various scales offer an unparalleled testing ground for astrophysical theories. Widely used cosmological simulations with ~(100 Mpc)^3 volumes contain statistical samples of groups that provide important tests of galaxy evolution influenced by environmental processes. Larger volumes capable of reproducing LSS while following the redistribution of baryons by cooling and feedback are essential tools necessary to constrain cosmological parameters. Higher resolution simulations can currently model satellite interactions, the processing of cool (T~10^4 K) multi-phase gas, and non-thermal physics including turbulence, magnetic fields, and cosmic ray transport. We review simulation results regarding the gas and stellar contents of groups, cooling flows and the relation to the central galaxy, the formation and processing of multi-phase gas, satellite interactions with the intragroup medium, and the impact of groups for cosmological parameter estimation. Cosmological simulations provide evolutionarily consistent predictions of these observationally difficult-to-define objects, and have untapped potential to accurately model their gaseous, stellar, and dark matter distributions.
△ Less
Submitted 24 June, 2021;
originally announced June 2021.
-
The Dawn of Disk Formation in a Milky Way-sized Galaxy Halo: Thin Stellar Disks at $z > 4$
Authors:
Tomas Tamfal,
Lucio Mayer,
Thomas R. Quinn,
Arif Babul,
Piero Madau,
Pedro R. Capelo,
Sijing Shen,
Marius Staub
Abstract:
We present results from \textsc{GigaEris}, a cosmological, $N$-body hydrodynamical "zoom-in" simulation of the formation of a Milky Way-sized galaxy halo with unprecedented resolution, encompassing of order a billion particles within the refined region. The simulation employs a modern implementation of smoothed-particle hydrodynamics, including metal-line cooling and metal and thermal diffusion. W…
▽ More
We present results from \textsc{GigaEris}, a cosmological, $N$-body hydrodynamical "zoom-in" simulation of the formation of a Milky Way-sized galaxy halo with unprecedented resolution, encompassing of order a billion particles within the refined region. The simulation employs a modern implementation of smoothed-particle hydrodynamics, including metal-line cooling and metal and thermal diffusion. We focus on the early assembly of the galaxy, down to redshift $z=4.4$. The simulated galaxy has properties consistent with extrapolations of the main sequence of star-forming galaxies to higher redshifts and levels off to a star formation rate of $\sim$60$\, M_{\odot}$~yr$^{-1}$ at $z=4.4$. A compact, thin rotating stellar disk with properties analogous to those of low-redshift systems arises already at $z \sim 8$. The galaxy rapidly develops a multi-component structure, and the disk, at least at these early stages, does not grow "upside-down" as often reported in the literature. Rather, at any given time, newly born stars contribute to sustain a thin disk. The kinematics reflect the early, ubiquitous presence of a thin disk, as a stellar disk component with $v_φ/σ_R$ larger than unity is already present at $z \sim 9$--10. Our results suggest that high-resolution spectro-photometric observations of very high-redshift galaxies should find thin rotating disks, consistent with the recent discovery of cold rotating gas disks by ALMA. Finally, we present synthetic images for the JWST NIRCam camera, showing how the early disk would be easily detectable already at those early times.
△ Less
Submitted 22 February, 2022; v1 submitted 22 June, 2021;
originally announced June 2021.
-
PALMAR: Towards Adaptive Multi-inhabitant Activity Recognition in Point-Cloud Technology
Authors:
Mohammad Arif Ul Alam,
Md Mahmudur Rahman,
Jared Q Widberg
Abstract:
With the advancement of deep neural networks and computer vision-based Human Activity Recognition, employment of Point-Cloud Data technologies (LiDAR, mmWave) has seen a lot interests due to its privacy preserving nature. Given the high promise of accurate PCD technologies, we develop, PALMAR, a multiple-inhabitant activity recognition system by employing efficient signal processing and novel mach…
▽ More
With the advancement of deep neural networks and computer vision-based Human Activity Recognition, employment of Point-Cloud Data technologies (LiDAR, mmWave) has seen a lot interests due to its privacy preserving nature. Given the high promise of accurate PCD technologies, we develop, PALMAR, a multiple-inhabitant activity recognition system by employing efficient signal processing and novel machine learning techniques to track individual person towards developing an adaptive multi-inhabitant tracking and HAR system. More specifically, we propose (i) a voxelized feature representation-based real-time PCD fine-tuning method, (ii) efficient clustering (DBSCAN and BIRCH), Adaptive Order Hidden Markov Model based multi-person tracking and crossover ambiguity reduction techniques and (iii) novel adaptive deep learning-based domain adaptation technique to improve the accuracy of HAR in presence of data scarcity and diversity (device, location and population diversity). We experimentally evaluate our framework and systems using (i) a real-time PCD collected by three devices (3D LiDAR and 79 GHz mmWave) from 6 participants, (ii) one publicly available 3D LiDAR activity data (28 participants) and (iii) an embedded hardware prototype system which provided promising HAR performances in multi-inhabitants (96%) scenario with a 63% improvement of multi-person tracking than state-of-art framework without losing significant system performances in the edge computing device.
△ Less
Submitted 2 December, 2022; v1 submitted 22 June, 2021;
originally announced June 2021.
-
Person Re-identification Attack on Wearable Sensing
Authors:
Mohammad Arif Ul Alam
Abstract:
Person re-identification is a critical privacy attack in publicly shared healthcare data as per Health Insurance Portability and Accountability Act (HIPAA) privacy rule. In this paper, we investigate the possibility of a new type of privacy attack, Person Re-identification Attack (PRI-attack) on publicly shared privacy insensitive wearable data. We investigate user's specific biometric signature i…
▽ More
Person re-identification is a critical privacy attack in publicly shared healthcare data as per Health Insurance Portability and Accountability Act (HIPAA) privacy rule. In this paper, we investigate the possibility of a new type of privacy attack, Person Re-identification Attack (PRI-attack) on publicly shared privacy insensitive wearable data. We investigate user's specific biometric signature in terms of two contextual biometric traits, physiological (photoplethysmography and electrodermal activity) and physical (accelerometer) contexts. In this regard, we develop a Multi-Modal Siamese Convolutional Neural Network (mmSNN) model. The framework learns the spatial and temporal information individually and combines them together in a modified weighted cost with an objective of predicting a person's identity. We evaluated our proposed model using real-time collected data from 3 collected datasets and one publicly available dataset. Our proposed framework shows that PPG-based breathing rate and heart rate in conjunction with hand gesture contexts can be utilized by attackers to re-identify user's identity (max. 71%) from HIPAA compliant wearable data. Given publicly placed camera can estimate heart rate and breathing rate along with hand gestures remotely, person re-identification using them imposes a significant threat to future HIPAA compliant server which requires a better encryption method to store wearable healthcare data.
△ Less
Submitted 22 June, 2021;
originally announced June 2021.
-
Predicting cognitive scores with graph neural networks through sample selection learning
Authors:
Martin Hanik,
Mehmet Arif Demirtaş,
Mohammed Amine Gharsallaoui,
Islem Rekik
Abstract:
Analyzing the relation between intelligence and neural activity is of the utmost importance in understanding the working principles of the human brain in health and disease. In existing literature, functional brain connectomes have been used successfully to predict cognitive measures such as intelligence quotient (IQ) scores in both healthy and disordered cohorts using machine learning models. How…
▽ More
Analyzing the relation between intelligence and neural activity is of the utmost importance in understanding the working principles of the human brain in health and disease. In existing literature, functional brain connectomes have been used successfully to predict cognitive measures such as intelligence quotient (IQ) scores in both healthy and disordered cohorts using machine learning models. However, existing methods resort to flattening the brain connectome (i.e., graph) through vectorization which overlooks its topological properties. To address this limitation and inspired from the emerging graph neural networks (GNNs), we design a novel regression GNN model (namely RegGNN) for predicting IQ scores from brain connectivity. On top of that, we introduce a novel, fully modular sample selection method to select the best samples to learn from for our target prediction task. However, since such deep learning architectures are computationally expensive to train, we further propose a \emph{learning-based sample selection} method that learns how to choose the training samples with the highest expected predictive power on unseen samples. For this, we capitalize on the fact that connectomes (i.e., their adjacency matrices) lie in the symmetric positive definite (SPD) matrix cone. Our results on full-scale and verbal IQ prediction outperforms comparison methods in autism spectrum disorder cohorts and achieves a competitive performance for neurotypical subjects using 3-fold cross-validation. Furthermore, we show that our sample selection approach generalizes to other learning-based methods, which shows its usefulness beyond our GNN architecture.
△ Less
Submitted 15 February, 2022; v1 submitted 17 June, 2021;
originally announced June 2021.
-
Investigating Misinformation Dissemination on Social Media in Pakistan
Authors:
Danyal Haroon,
Hammad Arif,
Ahmed Abdullah Tariq,
fareeda nawaz,
Ihsan Ayyub Qazi,
Maryam mustafa
Abstract:
Fake news and misinformation are one of the most significant challenges brought about by advances in communication technologies. We chose to research the spread of fake news in Pakistan because of some unfortunate incidents that took place during 2020. These included the downplaying of the severity of the COVID-19 pandemic, and protests by right-wing political movements. We observed that fake news…
▽ More
Fake news and misinformation are one of the most significant challenges brought about by advances in communication technologies. We chose to research the spread of fake news in Pakistan because of some unfortunate incidents that took place during 2020. These included the downplaying of the severity of the COVID-19 pandemic, and protests by right-wing political movements. We observed that fake news and misinformation contributed significantly to these events and especially affected low-literate and low-income populations. We conducted a cross-platform comparison of misinformation on WhatsApp, Twitter and YouTube with a primary focus on messages shared in public WhatsApp groups, and analysed the characteristics of misinformation, techniques used to make is believable, and how users respond to it. To the best of our knowledge, this is the first attempt to compare misinformation on all three platforms in Pakistan. Data collected over a span of eight months helped us identify fake news and misinformation related to politics, religion and health, among other categories. Common elements which were used by fake news creators in Pakistan to make false content seem believable included: appeals to emotion, conspiracy theories, political and religious polarization, incorrect facts and impersonation of credible sources.
△ Less
Submitted 8 August, 2021; v1 submitted 17 June, 2021;
originally announced June 2021.
-
Silent Speech and Emotion Recognition from Vocal Tract Shape Dynamics in Real-Time MRI
Authors:
Laxmi Pandey,
Ahmed Sabbir Arif
Abstract:
Speech sounds of spoken language are obtained by varying configuration of the articulators surrounding the vocal tract. They contain abundant information that can be utilized to better understand the underlying mechanism of human speech production. We propose a novel deep neural network-based learning framework that understands acoustic information in the variable-length sequence of vocal tract sh…
▽ More
Speech sounds of spoken language are obtained by varying configuration of the articulators surrounding the vocal tract. They contain abundant information that can be utilized to better understand the underlying mechanism of human speech production. We propose a novel deep neural network-based learning framework that understands acoustic information in the variable-length sequence of vocal tract shaping during speech production, captured by real-time magnetic resonance imaging (rtMRI), and translate it into text. The proposed framework comprises of spatiotemporal convolutions, a recurrent network, and the connectionist temporal classification loss, trained entirely end-to-end. On the USC-TIMIT corpus, the model achieved a 40.6% PER at sentence-level, much better compared to the existing models. To the best of our knowledge, this is the first study that demonstrates the recognition of entire spoken sentence based on an individual's articulatory motions captured by rtMRI video. We also performed an analysis of variations in the geometry of articulation in each sub-regions of the vocal tract (i.e., pharyngeal, velar and dorsal, hard palate, labial constriction region) with respect to different emotions and genders. Results suggest that each sub-regions distortion is affected by both emotion and gender.
△ Less
Submitted 16 June, 2021;
originally announced June 2021.
-
Fairness as Equality of Opportunity: Normative Guidance from Political Philosophy
Authors:
Falaah Arif Khan,
Eleni Manis,
Julia Stoyanovich
Abstract:
Recent interest in codifying fairness in Automated Decision Systems (ADS) has resulted in a wide range of formulations of what it means for an algorithmic system to be fair. Most of these propositions are inspired by, but inadequately grounded in, political philosophy scholarship. This paper aims to correct that deficit. We introduce a taxonomy of fairness ideals using doctrines of Equality of Opp…
▽ More
Recent interest in codifying fairness in Automated Decision Systems (ADS) has resulted in a wide range of formulations of what it means for an algorithmic system to be fair. Most of these propositions are inspired by, but inadequately grounded in, political philosophy scholarship. This paper aims to correct that deficit. We introduce a taxonomy of fairness ideals using doctrines of Equality of Opportunity (EOP) from political philosophy, clarifying their conceptions in philosophy and the proposed codification in fair machine learning. We arrange these fairness ideals onto an EOP spectrum, which serves as a useful frame to guide the design of a fair ADS in a given context.
We use our fairness-as-EOP framework to re-interpret the impossibility results from a philosophical perspective, as the in-compatibility between different value systems, and demonstrate the utility of the framework with several real-world and hypothetical examples. Through our EOP-framework we hope to answer what it means for an ADS to be fair from a moral and political philosophy standpoint, and to pave the way for similar scholarship from ethics and legal experts.
△ Less
Submitted 15 June, 2021;
originally announced June 2021.
-
Carter-Penrose diagrams for emergent spacetime in axisymmetrically accreting black hole systems
Authors:
Susovan Maity,
Md Arif Shaikh,
Pratik Tarafdar,
Tapas K. Das
Abstract:
For general relativistic, inviscid, axisymmetric flow around Kerr black hole one may choose different flow thickness. The stationary flow equations can be solved using methods of dynamical system to get transonic accretion flows , i.e, flow infalling in the blackhole that turns supersonic from subsonic with decreasing radial distance, or vice versa. This transonic flows are obtained by choosing th…
▽ More
For general relativistic, inviscid, axisymmetric flow around Kerr black hole one may choose different flow thickness. The stationary flow equations can be solved using methods of dynamical system to get transonic accretion flows , i.e, flow infalling in the blackhole that turns supersonic from subsonic with decreasing radial distance, or vice versa. This transonic flows are obtained by choosing the particular flow passing through critical points of phase portrait. For certain flow thickness like the one maintaining conical shape, the sonic point coincide with the critical point. But there are certain flows maintaining hydrostatic equilibrium, such as the one described by Novikov-Thorne, where the sonic point is not same as the critical point. We perturb the flow for both kind of flow and study the behaviour of linear perturbation which behaves like massless scalar field in some curved spacetime, known as, analogue space time. We draw the compactified causal structure, i.e, Penrose Carter diagram for both kind of analogue metric and prove that for both cases critical points are the acoustic horizons, whereas in the case where sonic points do not coincide with critical points, the sonic points are not the acoustic horizon, as one may expect from the definition of sound speed.
△ Less
Submitted 22 May, 2022; v1 submitted 14 June, 2021;
originally announced June 2021.
-
A Bagging and Boosting Based Convexly Combined Optimum Mixture Probabilistic Model
Authors:
Mian Arif Shams Adnan,
H. M. Miraz Mahmud
Abstract:
Unlike previous studies on mixture distributions, a bagging and boosting based convexly combined mixture probabilistic model has been suggested. This model is a result of iteratively searching for obtaining the optimum probabilistic model that provides the maximum p value.
Unlike previous studies on mixture distributions, a bagging and boosting based convexly combined mixture probabilistic model has been suggested. This model is a result of iteratively searching for obtaining the optimum probabilistic model that provides the maximum p value.
△ Less
Submitted 8 June, 2021;
originally announced June 2021.
-
How Do Users Interact with an Error-Prone In-Air Gesture Recognizer?
Authors:
Ahmed Sabbir Arif,
Wolfgang Stuerzlinger,
Euclides Jose de Mendonca Filho,
Alec Gordynski
Abstract:
We present results of two pilot studies that investigated human error behaviours with an error prone in-air gesture recognizer. During the studies, users performed a small set of simple in-air gestures. In the first study, these gestures were abstract. The second study associated concrete tasks with each gesture. Interestingly, the error patterns observed in the two studies were substantially diff…
▽ More
We present results of two pilot studies that investigated human error behaviours with an error prone in-air gesture recognizer. During the studies, users performed a small set of simple in-air gestures. In the first study, these gestures were abstract. The second study associated concrete tasks with each gesture. Interestingly, the error patterns observed in the two studies were substantially different.
△ Less
Submitted 26 May, 2021;
originally announced May 2021.
-
The State of AI Ethics Report (January 2021)
Authors:
Abhishek Gupta,
Alexandrine Royer,
Connor Wright,
Falaah Arif Khan,
Victoria Heath,
Erick Galinkin,
Ryan Khurana,
Marianna Bergamaschi Ganapini,
Muriam Fancy,
Masa Sweidan,
Mo Akif,
Renjie Butalid
Abstract:
The 3rd edition of the Montreal AI Ethics Institute's The State of AI Ethics captures the most relevant developments in AI Ethics since October 2020. It aims to help anyone, from machine learning experts to human rights activists and policymakers, quickly digest and understand the field's ever-changing developments. Through research and article summaries, as well as expert commentary, this report…
▽ More
The 3rd edition of the Montreal AI Ethics Institute's The State of AI Ethics captures the most relevant developments in AI Ethics since October 2020. It aims to help anyone, from machine learning experts to human rights activists and policymakers, quickly digest and understand the field's ever-changing developments. Through research and article summaries, as well as expert commentary, this report distills the research and reporting surrounding various domains related to the ethics of AI, including: algorithmic injustice, discrimination, ethical AI, labor impacts, misinformation, privacy, risk and security, social media, and more.
In addition, The State of AI Ethics includes exclusive content written by world-class AI Ethics experts from universities, research institutes, consulting firms, and governments. Unique to this report is "The Abuse and Misogynoir Playbook," written by Dr. Katlyn Tuner (Research Scientist, Space Enabled Research Group, MIT), Dr. Danielle Wood (Assistant Professor, Program in Media Arts and Sciences; Assistant Professor, Aeronautics and Astronautics; Lead, Space Enabled Research Group, MIT) and Dr. Catherine D'Ignazio (Assistant Professor, Urban Science and Planning; Director, Data + Feminism Lab, MIT). The piece (and accompanying infographic), is a deep-dive into the historical and systematic silencing, erasure, and revision of Black women's contributions to knowledge and scholarship in the United Stations, and globally. Exposing and countering this Playbook has become increasingly important following the firing of AI Ethics expert Dr. Timnit Gebru (and several of her supporters) at Google.
This report should be used not only as a point of reference and insight on the latest thinking in the field of AI Ethics, but should also be used as a tool for introspection as we aim to foster a more nuanced conversation regarding the impacts of AI on the world.
△ Less
Submitted 19 May, 2021;
originally announced May 2021.
-
Estimating Heterogeneous Causal Effect of Polysubstance Usage on Drug Overdose from Large-Scale Electronic Health Record
Authors:
Vaishali Mahipal,
Mohammad Arif Ul Alam
Abstract:
Drug overdose has become a public health crisis in the United States with devastating consequences. However, most of the drug overdose incidences are the consequence of recitative polysubstance usage over a defined period of time which can be happened by either the intentional usage of required drug with other drugs or by accident. Thus, predicting the effects of polysubstance usage is extremely i…
▽ More
Drug overdose has become a public health crisis in the United States with devastating consequences. However, most of the drug overdose incidences are the consequence of recitative polysubstance usage over a defined period of time which can be happened by either the intentional usage of required drug with other drugs or by accident. Thus, predicting the effects of polysubstance usage is extremely important for clinicians to decide which combination of drugs should be prescribed. Recent advancement of structural causal models can provide ample insights of causal effects from observational data via identifiable causal directed graphs. In this paper, we propose a system to estimate heterogeneous concurrent drug usage effects on overdose estimation, that consists of efficient co-variate selection, sub-group selection and heterogeneous causal effect estimation. We apply our framework to answer a critical question, can concurrent usage of benzodiazepines and opioids have heterogeneous causal effects on the opioid overdose epidemic? Using Truven MarketScan claim data collected from 2001 to 2013 have shown significant promise of our proposed framework's efficacy.
△ Less
Submitted 12 April, 2022; v1 submitted 15 May, 2021;
originally announced May 2021.
-
Knowledge Transfer across Imaging Modalities Via Simultaneous Learning of Adaptive Autoencoders for High-Fidelity Mobile Robot Vision
Authors:
Md Mahmudur Rahman,
Tauhidur Rahman,
Donghyun Kim,
Mohammad Arif Ul Alam
Abstract:
Enabling mobile robots for solving challenging and diverse shape, texture, and motion related tasks with high fidelity vision requires the integration of novel multimodal imaging sensors and advanced fusion techniques. However, it is associated with high cost, power, hardware modification, and computing requirements which limit its scalability. In this paper, we propose a novel Simultaneously Lear…
▽ More
Enabling mobile robots for solving challenging and diverse shape, texture, and motion related tasks with high fidelity vision requires the integration of novel multimodal imaging sensors and advanced fusion techniques. However, it is associated with high cost, power, hardware modification, and computing requirements which limit its scalability. In this paper, we propose a novel Simultaneously Learned Auto Encoder Domain Adaptation (SAEDA)-based transfer learning technique to empower noisy sensing with advanced sensor suite capabilities. In this regard, SAEDA trains both source and target auto-encoders together on a single graph to obtain the domain invariant feature space between the source and target domains on simultaneously collected data. Then, it uses the domain invariant feature space to transfer knowledge between different signal modalities. The evaluation has been done on two collected datasets (LiDAR and Radar) and one existing dataset (LiDAR, Radar and Video) which provides a significant improvement in quadruped robot-based classification (home floor and human activity recognition) and regression (surface roughness estimation) problems. We also integrate our sensor suite and SAEDA framework on two real-time systems (vacuum cleaning and Mini-Cheetah quadruped robots) for studying the feasibility and usability.
△ Less
Submitted 2 September, 2021; v1 submitted 11 May, 2021;
originally announced May 2021.
-
Activity-Aware Deep Cognitive Fatigue Assessment using Wearables
Authors:
Mohammad Arif Ul Alam
Abstract:
Cognitive fatigue has been a common problem among workers which has become an increasing global problem since the emergence of COVID-19 as a global pandemic. While existing multi-modal wearable sensors-aided automatic cognitive fatigue monitoring tools have focused on physical and physiological sensors (ECG, PPG, Actigraphy) analytic on specific group of people (say gamers, athletes, construction…
▽ More
Cognitive fatigue has been a common problem among workers which has become an increasing global problem since the emergence of COVID-19 as a global pandemic. While existing multi-modal wearable sensors-aided automatic cognitive fatigue monitoring tools have focused on physical and physiological sensors (ECG, PPG, Actigraphy) analytic on specific group of people (say gamers, athletes, construction workers), activity-awareness is utmost importance due to its different responses on physiology in different person. In this paper, we propose a novel framework, Activity-Aware Recurrent Neural Network (\emph{AcRoNN}), that can generalize individual activity recognition and improve cognitive fatigue estimation significantly. We evaluate and compare our proposed method with state-of-art methods using one real-time collected dataset from 5 individuals and another publicly available dataset from 27 individuals achieving max. 19% improvement.
△ Less
Submitted 5 May, 2021;
originally announced May 2021.
-
Cleaning Label Noise with Clusters for Minimally Supervised Anomaly Detection
Authors:
Muhammad Zaigham Zaheer,
Jin-ha Lee,
Marcella Astrid,
Arif Mahmood,
Seung-Ik Lee
Abstract:
Learning to detect real-world anomalous events using video-level annotations is a difficult task mainly because of the noise present in labels. An anomalous labelled video may actually contain anomaly only in a short duration while the rest of the video can be normal. In the current work, we formulate a weakly supervised anomaly detection method that is trained using only video-level labels. To th…
▽ More
Learning to detect real-world anomalous events using video-level annotations is a difficult task mainly because of the noise present in labels. An anomalous labelled video may actually contain anomaly only in a short duration while the rest of the video can be normal. In the current work, we formulate a weakly supervised anomaly detection method that is trained using only video-level labels. To this end, we propose to utilize binary clustering which helps in mitigating the noise present in the labels of anomalous videos. Our formulation encourages both the main network and the clustering to complement each other in achieving the goal of weakly supervised training. The proposed method yields 78.27% and 84.16% frame-level AUC on UCF-crime and ShanghaiTech datasets respectively, demonstrating its superiority over existing state-of-the-art algorithms.
△ Less
Submitted 30 April, 2021;
originally announced April 2021.
-
A digital score of tumour-associated stroma infiltrating lymphocytes predicts survival in head and neck squamous cell carcinoma
Authors:
Muhammad Shaban,
Shan E Ahmed Raza,
Mariam Hassan,
Arif Jamshed,
Sajid Mushtaq,
Asif Loya,
Nikolaos Batis,
Jill Brooks,
Paul Nankivell,
Neil Sharma,
Max Robinson,
Hisham Mehanna,
Syed Ali Khurram,
Nasir Rajpoot
Abstract:
The infiltration of T-lymphocytes in the stroma and tumour is an indication of an effective immune response against the tumour, resulting in better survival. In this study, our aim is to explore the prognostic significance of tumour-associated stroma infiltrating lymphocytes (TASILs) in head and neck squamous cell carcinoma (HNSCC) through an AI based automated method. A deep learning based automa…
▽ More
The infiltration of T-lymphocytes in the stroma and tumour is an indication of an effective immune response against the tumour, resulting in better survival. In this study, our aim is to explore the prognostic significance of tumour-associated stroma infiltrating lymphocytes (TASILs) in head and neck squamous cell carcinoma (HNSCC) through an AI based automated method. A deep learning based automated method was employed to segment tumour, stroma and lymphocytes in digitally scanned whole slide images of HNSCC tissue slides. The spatial patterns of lymphocytes and tumour-associated stroma were digitally quantified to compute the TASIL-score. Finally, prognostic significance of the TASIL-score for disease-specific and disease-free survival was investigated with the Cox proportional hazard analysis. Three different cohorts of Haematoxylin & Eosin (H&E) stained tissue slides of HNSCC cases (n=537 in total) were studied, including publicly available TCGA head and neck cancer cases. The TASIL-score carries prognostic significance (p=0.002) for disease-specific survival of HNSCC patients. The TASIL-score also shows a better separation between low- and high-risk patients as compared to the manual TIL scoring by pathologists for both disease-specific and disease-free survival. A positive correlation of TASIL-score with molecular estimates of CD8+ T cells was also found, which is in line with existing findings. To the best of our knowledge, this is the first study to automate the quantification of TASIL from routine H&E slides of head and neck cancer. Our TASIL-score based findings are aligned with the clinical knowledge with the added advantages of objectivity, reproducibility and strong prognostic value. A comprehensive evaluation on large multicentric cohorts is required before the proposed digital score can be adopted in clinical practice.
△ Less
Submitted 16 April, 2021;
originally announced April 2021.
-
Spin liquid and ferroelectricity close to a quantum critical point in PbCuTe$_2$O$_6$
Authors:
Christian Thurn,
Paul Eibisch,
Arif Ata,
Maximilian Winkler,
Peter Lunkenheimer,
István Kézsmárki,
Ulrich Tutsch,
Yohei Saito,
Steffi Hartmann,
Jan Zimmermann,
Abanoub R. N. Hanna,
A. T. M. Nazmul Islam,
Shravani Chillal,
Bella Lake,
Bernd Wolf,
Michael Lang
Abstract:
Geometrical frustration among interacting spins combined with strong quantum fluctuations destabilize long-range magnetic order in favour of more exotic states such as spin liquids. By following this guiding principle, a number of spin liquid candidate systems were identified in quasi-two-dimensional (quasi-2D) systems. For 3D, however, the situation is less favourable as quantum fluctuations are…
▽ More
Geometrical frustration among interacting spins combined with strong quantum fluctuations destabilize long-range magnetic order in favour of more exotic states such as spin liquids. By following this guiding principle, a number of spin liquid candidate systems were identified in quasi-two-dimensional (quasi-2D) systems. For 3D, however, the situation is less favourable as quantum fluctuations are reduced and competing states become more relevant. Here we report a comprehensive study of thermodynamic, magnetic and dielectric properties on single crystalline and pressed-powder samples of PbCuTe$_2$O$_6$, a candidate material for a 3D frustrated quantum spin liquid featuring a hyperkagome lattice. Whereas the low-temperature properties of the powder samples are consistent with the recently proposed quantum spin liquid state, an even more exotic behaviour is revealed for the single crystals. These crystals show ferroelectric order at $T_{\text{FE}} \approx 1\,\text{K}$, accompanied by strong lattice distortions, and a modified magnetic response -- still consistent with a quantum spin liquid -- but with clear indications for quantum critical behaviour.
△ Less
Submitted 19 November, 2021; v1 submitted 31 March, 2021;
originally announced March 2021.
-
Çukurova University Space Sciences and Solar Energy Research and Application Center (UZAYMER): I. Observing Conditions and Ongoing Projects
Authors:
Arif Solmaz,
Nazım Aksaker,
Aysun Akyüz,
Zuhal Kurt,
Sinan Allak,
Yasemin Aladağ,
Mehmet Karakılçık,
Nuri Emrahoğlu,
Mehmet Emin Özel
Abstract:
Çukurova University Space Sciences and Solar Energy Research and Application Center (UZAYMER) was founded in 1991. In this work, we present current research in the fields of astronomy, astrophysics and solar energy and the astronomical infrastructure of the center. In addition, the astrometrological status of UZAYMER was investigated using long-term (20 years) data from the AstroGIS database and m…
▽ More
Çukurova University Space Sciences and Solar Energy Research and Application Center (UZAYMER) was founded in 1991. In this work, we present current research in the fields of astronomy, astrophysics and solar energy and the astronomical infrastructure of the center. In addition, the astrometrological status of UZAYMER was investigated using long-term (20 years) data from the AstroGIS database and moderate-term (7 years) measurements taken from the meteorological station. Astronomical extinction coefficients, seeing conditions and light pollution measurements of UZAYMER were also obtained. Furthermore, the observation limits were determined for the UZAYMER 50 cm telescope (UT50) and the observation efficiency was evaluated. UZAYMER has reached a level that can support both national and international scientific collaborations with its improved technical infrastructure and increased human resources. With its annual number of clear nights, favorable weather conditions and dark sky values, UZAYMER ranks 972 in Group A of the Suitability Index for Astronomical Sites (SIAS) among the 2141 observatories.
△ Less
Submitted 8 March, 2021;
originally announced March 2021.
-
How Can Human Values Be Addressed in Agile Methods? A Case Study on SAFe
Authors:
Waqar Hussain,
Mojtaba Shahin,
Rashina Hoda,
Jon Whittle,
Harsha Perera,
Arif Nurwidyantoro,
Rifat Ara Shams,
Gillian Oliver
Abstract:
Agile methods are predominantly focused on delivering business values. But can Agile methods be adapted to effectively address and deliver human values such as social justice, privacy, and sustainability in the software they produce? Human values are what an individual or a society considers important in life. Ignoring these human values in software can pose difficulties or risks for all stakehold…
▽ More
Agile methods are predominantly focused on delivering business values. But can Agile methods be adapted to effectively address and deliver human values such as social justice, privacy, and sustainability in the software they produce? Human values are what an individual or a society considers important in life. Ignoring these human values in software can pose difficulties or risks for all stakeholders (e.g., user dissatisfaction, reputation damage, financial loss). To answer this question, we selected the Scaled Agile Framework (SAFe), one of the most commonly used Agile methods in the industry, and conducted a qualitative case study to identify possible intervention points within SAFe that are the most natural to address and integrate human values in software. We present five high-level empirically-justified sets of interventions in SAFe: artefacts, roles, ceremonies, practices, and culture. We elaborate how some current Agile artefacts (e.g., user story), roles (e.g., product owner), ceremonies (e.g., stand-up meeting), and practices (e.g., business-facing testing) in SAFe can be modified to support the inclusion of human values in software. Further, our study suggests new and exclusive values-based artefacts (e.g., legislative requirement), ceremonies (e.g., values conversation), roles (e.g., values champion), and cultural practices (e.g., induction and hiring) to be introduced in SAFe for this purpose. Guided by our findings, we argue that existing Agile methods can account for human values in software delivery with some evolutionary adaptations.
△ Less
Submitted 12 November, 2021; v1 submitted 24 February, 2021;
originally announced February 2021.
-
Construction of networks by associating with submanifolds of almost Hermitian manifolds
Authors:
Arif Gursoy
Abstract:
The idea that data lies on a non-linear space has brought up the concept of manifold learning as a part of machine learning.
The idea that data lies on a non-linear space has brought up the concept of manifold learning as a part of machine learning.
△ Less
Submitted 25 March, 2021; v1 submitted 28 January, 2021;
originally announced February 2021.
-
Growth and Strain Relaxation Mechanisms of InAs/InP/GaAsSb Core-Dual-Shell Nanowires
Authors:
Omer Arif,
Valentina Zannier,
Ang Li,
Francesca Rossi,
Daniele Ercolani,
Fabio Beltram,
Lucia Sorba
Abstract:
The combination of core/shell geometry and band gap engineering in nanowire heterostructures can be employed to realize systems with novel transport and optical properties. Here, we report on the growth of InAs/InP/GaAsSb core-dual-shell nanowires by catalyst-free chemical beam epitaxy on Si(111) substrates. Detailed morphological, structural, and compositional analyses of the nanowires as a funct…
▽ More
The combination of core/shell geometry and band gap engineering in nanowire heterostructures can be employed to realize systems with novel transport and optical properties. Here, we report on the growth of InAs/InP/GaAsSb core-dual-shell nanowires by catalyst-free chemical beam epitaxy on Si(111) substrates. Detailed morphological, structural, and compositional analyses of the nanowires as a function of growth parameters were carried out by scanning and transmission electron microscopy and by energy-dispersive X-ray spectroscopy. Furthermore, by combining the scanning transmission electron microscopy-Moire technique with geometric phase analysis, we studied the residual strain and the relaxation mechanisms in this system. We found that InP shell facets are well-developed along all the crystallographic directions only when the nominal thickness is above 1 nm, suggesting an island-growth mode. Moreover, the crystallographic analysis indicates that both InP and GaAsSb shells grow almost coherently to the InAs core along the 112 direction and elastically compressed along the 110 direction. For InP shell thickness above 8 nm, some dislocations and roughening occur at the interfaces. This study provides useful general guidelines for the fabrication of high-quality devices based on these core-dual-shell nanowires.
△ Less
Submitted 3 February, 2021;
originally announced February 2021.
-
Heterogeneous Hand Guise Classification Based on Surface Electromyographic Signals Using Multichannel Convolutional Neural Network
Authors:
Niloy Sikder,
Abu Shamim Mohammad Arif,
Abdullah-Al Nahid
Abstract:
Electromyography (EMG) is a way of measuring the bioelectric activities that take place inside the muscles. EMG is usually performed to detect abnormalities within the nerves or muscles of a target area. The recent developments in the field of Machine Learning allow us to use EMG signals to teach machines the complex properties of human movements. Modern machines are capable of detecting numerous…
▽ More
Electromyography (EMG) is a way of measuring the bioelectric activities that take place inside the muscles. EMG is usually performed to detect abnormalities within the nerves or muscles of a target area. The recent developments in the field of Machine Learning allow us to use EMG signals to teach machines the complex properties of human movements. Modern machines are capable of detecting numerous human activities and distinguishing among them solely based on the EMG signals produced by those activities. However, success in accomplishing this task mostly depends on the learning technique used by the machine to analyze EMG signals; and even the latest algorithms do not result in flawless classification. In this study, a novel classification method has been described employing a multichannel Convolutional Neural Network (CNN) that interprets surface EMG signals by the properties they exhibit in the power domain. The proposed method was tested on a well-established EMG dataset, and the result yields very high classification accuracy. This learning model will help researchers to develop prosthetic arms capable of detecting various hand gestures to mimic them afterwards.
△ Less
Submitted 17 January, 2021;
originally announced January 2021.
-
Human Activity Recognition Using Multichannel Convolutional Neural Network
Authors:
Niloy Sikder,
Md. Sanaullah Chowdhury,
Abu Shamim Mohammad Arif,
Abdullah-Al Nahid
Abstract:
Human Activity Recognition (HAR) simply refers to the capacity of a machine to perceive human actions. HAR is a prominent application of advanced Machine Learning and Artificial Intelligence techniques that utilize computer vision to understand the semantic meanings of heterogeneous human actions. This paper describes a supervised learning method that can distinguish human actions based on data co…
▽ More
Human Activity Recognition (HAR) simply refers to the capacity of a machine to perceive human actions. HAR is a prominent application of advanced Machine Learning and Artificial Intelligence techniques that utilize computer vision to understand the semantic meanings of heterogeneous human actions. This paper describes a supervised learning method that can distinguish human actions based on data collected from practical human movements. The primary challenge while working with HAR is to overcome the difficulties that come with the cyclostationary nature of the activity signals. This study proposes a HAR classification model based on a two-channel Convolutional Neural Network (CNN) that makes use of the frequency and power features of the collected human action signals. The model was tested on the UCI HAR dataset, which resulted in a 95.25% classification accuracy. This approach will help to conduct further researches on the recognition of human activities based on their biomedical signals.
△ Less
Submitted 17 January, 2021;
originally announced January 2021.
-
BO Ari Light Curve Analysis using Ground-Based and TESS Data
Authors:
Atila Poro,
Shiva Zamanpour,
Maryam Hashemi,
Yasemin Aladağ,
Nazim Aksaker,
Samaneh Rezaei,
Arif Solmaz
Abstract:
We present new BVR band photometric light curves of BO Aries obtained in 2020 and combined them with the Transiting Exoplanet Survey Satellite (TESS) light curves. We obtained times of minima based on Gaussian and Cauchy distributions and then applied the Monte Carlo Markov Chain (MCMC) method to measure the amount of uncertainty from our CCD photometry and TESS data. A new ephemeris of the binary…
▽ More
We present new BVR band photometric light curves of BO Aries obtained in 2020 and combined them with the Transiting Exoplanet Survey Satellite (TESS) light curves. We obtained times of minima based on Gaussian and Cauchy distributions and then applied the Monte Carlo Markov Chain (MCMC) method to measure the amount of uncertainty from our CCD photometry and TESS data. A new ephemeris of the binary system was computed employing 204 times of minimum. The light curves were analyzed using the Wilson-Devinney binary code combined with the Monte Carlo (MC) simulation. For this light curve solution, we considered a dark spot on the primary component. We conclude that this binary is an A-type system with a mass ratio of q=0.2074+-0.0001, an orbital inclination of i=82.18+-0.02 deg, and a fillout factor of f=75.7+-0.8%. Our results for the a(Rsun) and q parameters are consistent with the results of the Xu-Dong Zhang and Sheng-Bang Qian (2020) model. The absolute parameters of the two components were calculated and the distance estimate of the binary system was found to be 142+-9 pc.
△ Less
Submitted 14 January, 2021;
originally announced January 2021.
-
A Critical Look at Coulomb Counting Towards Improving the Kalman Filter Based State of Charge Tracking Algorithms in Rechargeable Batteries
Authors:
Kiarash Movassagh,
Sheikh Arif Raihan,
Balakumar Balasingam,
Krishna Pattipati
Abstract:
In this paper, we consider the problem of state of charge estimation for rechargeable batteries. Coulomb counting is one of the traditional approaches to state of charge estimation and it is considered reliable as long as the battery capacity and initial state of charge are known. However, the Coulomb counting method is susceptible to errors from several sources and the extent of these errors are…
▽ More
In this paper, we consider the problem of state of charge estimation for rechargeable batteries. Coulomb counting is one of the traditional approaches to state of charge estimation and it is considered reliable as long as the battery capacity and initial state of charge are known. However, the Coulomb counting method is susceptible to errors from several sources and the extent of these errors are not studied in the literature. In this paper, we formally derive and quantify the state of charge estimation error during Coulomb counting due to the following four types of error sources: (i) current measurement error; (ii) current integration approximation error; (iii) battery capacity uncertainty; and (iv) the timing oscillator error/drift. It is shown that the resulting state of charge error can either be of the time-cumulative or of state-of-charge-proportional type. Time-cumulative errors increase with time and has the potential to completely invalidate the state of charge estimation in the long run. State-of-charge-proportional errors increase with the accumulated state of charge and reach its worst value within one charge/discharge cycle. Simulation analyses are presented to demonstrate the extent of these errors under several realistic scenarios and the paper discusses approaches to reduce the time-cumulative and state of charge-proportional errors.
△ Less
Submitted 15 January, 2021; v1 submitted 13 January, 2021;
originally announced January 2021.
-
DBTagger: Multi-Task Learning for Keyword Mapping in NLIDBs Using Bi-Directional Recurrent Neural Networks
Authors:
Arif Usta,
Akifhan Karakayali,
Özgür Ulusoy
Abstract:
Translating Natural Language Queries (NLQs) to Structured Query Language (SQL) in interfaces deployed in relational databases is a challenging task, which has been widely studied in database community recently. Conventional rule based systems utilize series of solutions as a pipeline to deal with each step of this task, namely stop word filtering, tokenization, stemming/lemmatization, parsing, tag…
▽ More
Translating Natural Language Queries (NLQs) to Structured Query Language (SQL) in interfaces deployed in relational databases is a challenging task, which has been widely studied in database community recently. Conventional rule based systems utilize series of solutions as a pipeline to deal with each step of this task, namely stop word filtering, tokenization, stemming/lemmatization, parsing, tagging, and translation. Recent works have mostly focused on the translation step overlooking the earlier steps by using ad-hoc solutions. In the pipeline, one of the most critical and challenging problems is keyword mapping; constructing a mapping between tokens in the query and relational database elements (tables, attributes, values, etc.). We define the keyword mapping problem as a sequence tagging problem, and propose a novel deep learning based supervised approach that utilizes POS tags of NLQs. Our proposed approach, called \textit{DBTagger} (DataBase Tagger), is an end-to-end and schema independent solution, which makes it practical for various relational databases. We evaluate our approach on eight different datasets, and report new state-of-the-art accuracy results, $92.4\%$ on the average. Our results also indicate that DBTagger is faster than its counterparts up to $10000$ times and scalable for bigger databases.
△ Less
Submitted 11 January, 2021;
originally announced January 2021.
-
Collision-induced torque mediates transition of chiral dynamic patterns formed by active particles
Authors:
Tetsuya Hiraiwa,
Ryo Akiyama,
Daisuke Inoue,
Arif Md. Rashedul Kabir,
Akira Kakugo
Abstract:
It is still challenging to control dynamic self-organization patterns of self-propelled particles. Although varieties of patterns associated with chirality have been observed, essential control factors determining patterns remain unclear. Here, we explore numerically how torque upon particle collision affects dynamic self-organization. Based on the particle-based model with both collision-induced…
▽ More
It is still challenging to control dynamic self-organization patterns of self-propelled particles. Although varieties of patterns associated with chirality have been observed, essential control factors determining patterns remain unclear. Here, we explore numerically how torque upon particle collision affects dynamic self-organization. Based on the particle-based model with both collision-induced torque and torque in self-propulsion, we find that introducing collision-induced torque turns homogeneous bi-polar orientation templated by bi-directional alignment into rotating mono-polar flocks.
△ Less
Submitted 15 October, 2022; v1 submitted 6 January, 2021;
originally announced January 2021.
-
Fake Visual Content Detection Using Two-Stream Convolutional Neural Networks
Authors:
Bilal Yousaf,
Muhammad Usama,
Waqas Sultani,
Arif Mahmood,
Junaid Qadir
Abstract:
Rapid progress in adversarial learning has enabled the generation of realistic-looking fake visual content. To distinguish between fake and real visual content, several detection techniques have been proposed. The performance of most of these techniques however drops off significantly if the test and the training data are sampled from different distributions. This motivates efforts towards improvi…
▽ More
Rapid progress in adversarial learning has enabled the generation of realistic-looking fake visual content. To distinguish between fake and real visual content, several detection techniques have been proposed. The performance of most of these techniques however drops off significantly if the test and the training data are sampled from different distributions. This motivates efforts towards improving the generalization of fake detectors. Since current fake content generation techniques do not accurately model the frequency spectrum of the natural images, we observe that the frequency spectrum of the fake visual data contains discriminative characteristics that can be used to detect fake content. We also observe that the information captured in the frequency spectrum is different from that of the spatial domain. Using these insights, we propose to complement frequency and spatial domain features using a two-stream convolutional neural network architecture called TwoStreamNet. We demonstrate the improved generalization of the proposed two-stream network to several unseen generation architectures, datasets, and techniques. The proposed detector has demonstrated significant performance improvement compared to the current state-of-the-art fake content detectors and fusing the frequency and spatial domain streams has also improved generalization of the detector.
△ Less
Submitted 3 January, 2021;
originally announced January 2021.
-
PHOENIX: Device-Centric Cellular Network Protocol Monitoring using Runtime Verification
Authors:
Mitziu Echeverria,
Zeeshan Ahmed,
Bincheng Wang,
M. Fareed Arif,
Syed Rafiul Hussain,
Omar Chowdhury
Abstract:
End-user-devices in the current cellular ecosystem are prone to many different vulnerabilities across different generations and protocol layers. Fixing these vulnerabilities retrospectively can be expensive, challenging, or just infeasible. A pragmatic approach for dealing with such a diverse set of vulnerabilities would be to identify attack attempts at runtime on the device side, and thwart them…
▽ More
End-user-devices in the current cellular ecosystem are prone to many different vulnerabilities across different generations and protocol layers. Fixing these vulnerabilities retrospectively can be expensive, challenging, or just infeasible. A pragmatic approach for dealing with such a diverse set of vulnerabilities would be to identify attack attempts at runtime on the device side, and thwart them with mitigating and corrective actions. Towards this goal, in the paper we propose a general and extendable approach called Phoenix for identifying n-day cellular network control-plane vulnerabilities as well as dangerous practices of network operators from the device vantage point. Phoenix monitors the device-side cellular network traffic for performing signature-based unexpected behavior detection through lightweight runtime verification techniques. Signatures in Phoenix can be manually-crafted by a cellular network security expert or can be automatically synthesized using an optional component of Phoenix, which reduces the signature synthesis problem to the language learning from the informant problem. Based on the corrective actions that are available to Phoenix when an undesired behavior is detected, different instantiations of Phoenix are possible: a full-fledged defense when deployed inside a baseband processor; a user warning system when deployed as a mobile application; a probe for identifying attacks in the wild. One such instantiation of Phoenix was able to identify all 15 representative n-day vulnerabilities and unsafe practices of 4G LTE networks considered in our evaluation with a high packet processing speed (~68000 packets/second) while inducing only a moderate amount of energy overhead (~4mW).
△ Less
Submitted 1 January, 2021;
originally announced January 2021.
-
A Cascaded Residual UNET for Fully Automated Segmentation of Prostate and Peripheral Zone in T2-weighted 3D Fast Spin Echo Images
Authors:
Lavanya Umapathy,
Wyatt Unger,
Faryal Shareef,
Hina Arif,
Diego Martin,
Maria Altbach,
Ali Bilgin
Abstract:
Multi-parametric MR images have been shown to be effective in the non-invasive diagnosis of prostate cancer. Automated segmentation of the prostate eliminates the need for manual annotation by a radiologist which is time consuming. This improves efficiency in the extraction of imaging features for the characterization of prostate tissues. In this work, we propose a fully automated cascaded deep le…
▽ More
Multi-parametric MR images have been shown to be effective in the non-invasive diagnosis of prostate cancer. Automated segmentation of the prostate eliminates the need for manual annotation by a radiologist which is time consuming. This improves efficiency in the extraction of imaging features for the characterization of prostate tissues. In this work, we propose a fully automated cascaded deep learning architecture with residual blocks, Cascaded MRes-UNET, for segmentation of the prostate gland and the peripheral zone in one pass through the network. The network yields high Dice scores ($0.91\pm.02$), precision ($0.91\pm.04$), and recall scores ($0.92\pm.03$) in prostate segmentation compared to manual annotations by an experienced radiologist. The average difference in total prostate volume estimation is less than 5%.
△ Less
Submitted 24 December, 2020;
originally announced December 2020.
-
Stochastic Pre-Event Preparation for Enhancing Resilience of Distribution Systems with High DER Penetration
Authors:
Qianzhi Zhang,
Zhaoyu Wang,
Shanshan Ma,
Anmar Arif
Abstract:
This paper proposes a stochastic optimal preparation and resource allocation method for upcoming extreme weather events in distribution systems, which can assist utilities to achieve faster and more efficient post-event restoration. With the objective of maximizing served load and minimizing operation cost, this paper develops a two-stage stochastic mixed-integer linear programming (SMILP) model.…
▽ More
This paper proposes a stochastic optimal preparation and resource allocation method for upcoming extreme weather events in distribution systems, which can assist utilities to achieve faster and more efficient post-event restoration. With the objective of maximizing served load and minimizing operation cost, this paper develops a two-stage stochastic mixed-integer linear programming (SMILP) model. The first-stage determines the optimal positions and numbers of mobile resources, fuel resources, and labor resources. The second-stage considers network operational constraints and repair crew scheduling constraints. The proposed stochastic pre-event preparation model is solved by a scenario decomposition method, Progressive Hedging (PH), to ease the computational complexity introduced by a large number of scenarios. Furthermore, to show the impact of solar photovoltaic (PV) generation on system resilience, we consider three types of PV systems during power outage and compare the resilience improvements with different PV penetration levels. Numerical results from simulations on a large-scale (more than 10,000 nodes) distribution feeder have been used to validate the scalability and effectiveness of the proposed method.
△ Less
Submitted 23 December, 2020;
originally announced December 2020.
-
Enabling Input on Tiny/Headless Systems Using Morse Code
Authors:
Anna-Maria Gueorguieva,
Gulnar Rakhmetulla,
Ahmed Sabbir Arif
Abstract:
This paper presents results of a pilot study that explored the potential of Morse code as a method for text entry on mobile devices. In the study, participants without prior experience with Morse code reached 6.7 wpm with a Morse code keyboard in three short sessions. Learning was observed both in terms of text entry speed and accuracy, which suggests that the overall performance of the keyboard i…
▽ More
This paper presents results of a pilot study that explored the potential of Morse code as a method for text entry on mobile devices. In the study, participants without prior experience with Morse code reached 6.7 wpm with a Morse code keyboard in three short sessions. Learning was observed both in terms of text entry speed and accuracy, which suggests that the overall performance of the keyboard is likely to improve with practice.
△ Less
Submitted 11 December, 2020;
originally announced December 2020.
-
Deep Learning with Quantized Neural Networks for Gravitational Wave Forecasting of Eccentric Compact Binary Coalescence
Authors:
Wei Wei,
E. A. Huerta,
Mengshen Yun,
Nicholas Loutrel,
Md Arif Shaikh,
Prayush Kumar,
Roland Haas,
Volodymyr Kindratenko
Abstract:
We present the first application of deep learning forecasting for binary neutron stars, neutron star - black hole systems, and binary black hole mergers that span an eccentricity range e <= 0.9. We train neural networks that describe these astrophysical populations, and then test their performance by injecting simulated eccentric signals in advanced LIGO noise available at the \texttt{Gravitationa…
▽ More
We present the first application of deep learning forecasting for binary neutron stars, neutron star - black hole systems, and binary black hole mergers that span an eccentricity range e <= 0.9. We train neural networks that describe these astrophysical populations, and then test their performance by injecting simulated eccentric signals in advanced LIGO noise available at the \texttt{Gravitational Wave Open Science Center} to: 1) quantify how fast neural networks identify these signals before the binary components merge; 2) quantify how accurately neural networks estimate the time to merger once gravitational waves are identified; and 3) estimate the time-dependent sky localization of these events from early detection to merger. Our findings show that deep learning can identify eccentric signals from a few seconds (for binary black holes) up to tens of seconds (for binary neutron stars) prior to merger. A quantized version of our neural networks achieves 4x reduction in model size, and up to 2.5x inference speed up. These novel algorithms may be used to facilitate time-sensitive multi-messenger astrophysics observations of compact binaries in dense stellar environments.
△ Less
Submitted 17 October, 2021; v1 submitted 7 December, 2020;
originally announced December 2020.