-
Fake Hilsa Fish Detection Using Machine Vision
Authors:
Mirajul Islam,
Jannatul Ferdous Ani,
Abdur Rahman,
Zakia Zaman
Abstract:
Hilsa is the national fish of Bangladesh. Bangladesh is earning a lot of foreign currency by exporting this fish. Unfortunately, in recent days, some unscrupulous businessmen are selling fake Hilsa fishes to gain profit. The Sardines and Sardinella are the most sold in the market as Hilsa. The government agency of Bangladesh, namely Bangladesh Food Safety Authority said that these fake Hilsa fish…
▽ More
Hilsa is the national fish of Bangladesh. Bangladesh is earning a lot of foreign currency by exporting this fish. Unfortunately, in recent days, some unscrupulous businessmen are selling fake Hilsa fishes to gain profit. The Sardines and Sardinella are the most sold in the market as Hilsa. The government agency of Bangladesh, namely Bangladesh Food Safety Authority said that these fake Hilsa fish contain high levels of cadmium and lead which are detrimental for humans. In this research, we have proposed a method that can readily identify original Hilsa fish and fake Hilsa fish. Based on the research available on online literature, we are the first to do research on identifying original Hilsa fish. We have collected more than 16,000 images of original and counterfeit Hilsa fish. To classify these images, we have used several deep learning-based models. Then, the performance has been compared between them. Among those models, DenseNet201 achieved the highest accuracy of 97.02%.
△ Less
Submitted 8 January, 2022;
originally announced January 2022.
-
Variational Stacked Local Attention Networks for Diverse Video Captioning
Authors:
Tonmoay Deb,
Akib Sadmanee,
Kishor Kumar Bhaumik,
Amin Ahsan Ali,
M Ashraful Amin,
A K M Mahbubur Rahman
Abstract:
While describing Spatio-temporal events in natural language, video captioning models mostly rely on the encoder's latent visual representation. Recent progress on the encoder-decoder model attends encoder features mainly in linear interaction with the decoder. However, growing model complexity for visual data encourages more explicit feature interaction for fine-grained information, which is curre…
▽ More
While describing Spatio-temporal events in natural language, video captioning models mostly rely on the encoder's latent visual representation. Recent progress on the encoder-decoder model attends encoder features mainly in linear interaction with the decoder. However, growing model complexity for visual data encourages more explicit feature interaction for fine-grained information, which is currently absent in the video captioning domain. Moreover, feature aggregations methods have been used to unveil richer visual representation, either by the concatenation or using a linear layer. Though feature sets for a video semantically overlap to some extent, these approaches result in objective mismatch and feature redundancy. In addition, diversity in captions is a fundamental component of expressing one event from several meaningful perspectives, currently missing in the temporal, i.e., video captioning domain. To this end, we propose Variational Stacked Local Attention Network (VSLAN), which exploits low-rank bilinear pooling for self-attentive feature interaction and stacking multiple video feature streams in a discount fashion. Each feature stack's learned attributes contribute to our proposed diversity encoding module, followed by the decoding query stage to facilitate end-to-end diverse and natural captions without any explicit supervision on attributes. We evaluate VSLAN on MSVD and MSR-VTT datasets in terms of syntax and diversity. The CIDEr score of VSLAN outperforms current off-the-shelf methods by $7.8\%$ on MSVD and $4.5\%$ on MSR-VTT, respectively. On the same datasets, VSLAN achieves competitive results in caption diversity metrics.
△ Less
Submitted 4 January, 2022;
originally announced January 2022.
-
A Gradient Mapping Guided Explainable Deep Neural Network for Extracapsular Extension Identification in 3D Head and Neck Cancer Computed Tomography Images
Authors:
Yibin Wang,
Abdur Rahman,
W. Neil. Duggar,
P. Russell Roberts,
Toms V. Thomas,
Linkan Bian,
Haifeng Wang
Abstract:
Diagnosis and treatment management for head and neck squamous cell carcinoma (HNSCC) is guided by routine diagnostic head and neck computed tomography (CT) scans to identify tumor and lymph node features. Extracapsular extension (ECE) is a strong predictor of patients' survival outcomes with HNSCC. It is essential to detect the occurrence of ECE as it changes staging and management for the patient…
▽ More
Diagnosis and treatment management for head and neck squamous cell carcinoma (HNSCC) is guided by routine diagnostic head and neck computed tomography (CT) scans to identify tumor and lymph node features. Extracapsular extension (ECE) is a strong predictor of patients' survival outcomes with HNSCC. It is essential to detect the occurrence of ECE as it changes staging and management for the patients. Current clinical ECE detection relies on visual identification and pathologic confirmation conducted by radiologists. Machine learning (ML)-based ECE diagnosis has shown high potential in the recent years. However, manual annotation of lymph node region is a required data preprocessing step in most of the current ML-based ECE diagnosis studies. In addition, this manual annotation process is time-consuming, labor-intensive, and error-prone. Therefore, in this paper, we propose a Gradient Mapping Guided Explainable Network (GMGENet) framework to perform ECE identification automatically without requiring annotated lymph node region information. The gradient-weighted class activation mapping (Grad-CAM) technique is proposed to guide the deep learning algorithm to focus on the regions that are highly related to ECE. Informative volumes of interest (VOIs) are extracted without labeled lymph node region information. In evaluation, the proposed method is well-trained and tested using cross validation, achieving test accuracy and AUC of 90.2% and 91.1%, respectively. The presence or absence of ECE has been analyzed and correlated with gold standard histopathological findings.
△ Less
Submitted 3 January, 2022;
originally announced January 2022.
-
Secure Spectrum and Resource Sharing for 5G Networks using a Blockchain-based Decentralized Trusted Computing Platform
Authors:
Hisham A. Kholidy,
Mohammad A. Rahman,
Andrew Karam,
Zahid Akhtar
Abstract:
The 5G network would fuel next-gen, bandwidth-heavy technologies such as automation, IoT, and AI on the factory floor. It will improve efficiency by powering AR overlays in workflows, as well as ensure safer practices and reduce the number of defects through predictive analytics and real-time detection of damage. The Dynamic Spectrum Sharing (DSS) in 5G networks will permit 5G NR and 4G LTE to coe…
▽ More
The 5G network would fuel next-gen, bandwidth-heavy technologies such as automation, IoT, and AI on the factory floor. It will improve efficiency by powering AR overlays in workflows, as well as ensure safer practices and reduce the number of defects through predictive analytics and real-time detection of damage. The Dynamic Spectrum Sharing (DSS) in 5G networks will permit 5G NR and 4G LTE to coexist and will provide cost-effective and efficient solutions that enable a smooth transition from 4G to 5G. However, this increases the attack surface in the 5G networks. To the best of our knowledge, none of the current works introduces a real-time secure spectrum-sharing mechanism for 5G networks to defend spectrum resources and applications. This paper aims to propose a Blockchain-based Decentralized Trusted Computing Platform (BTCP) to self-protect large-scale 5G spectrum resources against cyberattacks in a timely, dynamic, and accurate way. Furthermore, the platform provides a decentralized, trusted, and non-repudiating platform to enable secure spectrum sharing and data exchange between the 5G spectrum resources
△ Less
Submitted 3 January, 2022;
originally announced January 2022.
-
AI Assurance using Causal Inference: Application to Public Policy
Authors:
Andrei Svetovidov,
Abdul Rahman,
Feras A. Batarseh
Abstract:
Developing and implementing AI-based solutions help state and federal government agencies, research institutions, and commercial companies enhance decision-making processes, automate chain operations, and reduce the consumption of natural and human resources. At the same time, most AI approaches used in practice can only be represented as "black boxes" and suffer from the lack of transparency. Thi…
▽ More
Developing and implementing AI-based solutions help state and federal government agencies, research institutions, and commercial companies enhance decision-making processes, automate chain operations, and reduce the consumption of natural and human resources. At the same time, most AI approaches used in practice can only be represented as "black boxes" and suffer from the lack of transparency. This can eventually lead to unexpected outcomes and undermine trust in such systems. Therefore, it is crucial not only to develop effective and robust AI systems, but to make sure their internal processes are explainable and fair. Our goal in this chapter is to introduce the topic of designing assurance methods for AI systems with high-impact decisions using the example of the technology sector of the US economy. We explain how these fields would benefit from revealing cause-effect relationships between key metrics in the dataset by providing the causal experiment on technology economics dataset. Several causal inference approaches and AI assurance techniques are reviewed and the transformation of the data into a graph-structured dataset is demonstrated.
△ Less
Submitted 1 December, 2021;
originally announced December 2021.
-
MALIGN: Explainable Static Raw-byte Based Malware Family Classification using Sequence Alignment
Authors:
Shoumik Saha,
Sadia Afroz,
Atif Rahman
Abstract:
For a long time, malware classification and analysis have been an arms-race between antivirus systems and malware authors. Though static analysis is vulnerable to evasion techniques, it is still popular as the first line of defense in antivirus systems. But most of the static analyzers failed to gain the trust of practitioners due to their black-box nature. We propose MAlign, a novel static malwar…
▽ More
For a long time, malware classification and analysis have been an arms-race between antivirus systems and malware authors. Though static analysis is vulnerable to evasion techniques, it is still popular as the first line of defense in antivirus systems. But most of the static analyzers failed to gain the trust of practitioners due to their black-box nature. We propose MAlign, a novel static malware family classification approach inspired by genome sequence alignment that can not only classify malware families but can also provide explanations for its decision. MAlign encodes raw bytes using nucleotides and adopts genome sequence alignment approaches to create a signature of a malware family based on the conserved code segments in that family, without any human labor or expertise. We evaluate MAlign on two malware datasets, and it outperforms other state-of-the-art machine learning based malware classifiers (by 4.49% - 0.07%), especially on small datasets (by 19.48% - 1.2%). Furthermore, we explain the generated signatures by MAlign on different malware families illustrating the kinds of insights it can provide to analysts, and show its efficacy as an analysis tool. Additionally, we evaluate its theoretical and empirical robustness against some common attacks. In this paper, we approach static malware analysis from a unique perspective, aiming to strike a delicate balance among performance, interpretability, and robustness.
△ Less
Submitted 12 January, 2024; v1 submitted 28 November, 2021;
originally announced November 2021.
-
Quantum memory assisted entropic uncertainty and entanglement dynamics: Two qubits coupled with local fields and Ornstein Uhlenbeck noise
Authors:
Atta Ur Rahman,
Nour Zidan,
S. M. Zangi,
Hazrat Ali
Abstract:
Entropic uncertainty and entanglement are two distinct aspects of quantum mechanical procedures. To estimate entropic uncertainty relations, entropies are used: the greater the entropy bound, the less effective the quantum operations and entanglement are. In this regard, we analyze the entropic uncertainty, entropic uncertainty lower bound, and concurrence dynamics in two non-interacting qubits. T…
▽ More
Entropic uncertainty and entanglement are two distinct aspects of quantum mechanical procedures. To estimate entropic uncertainty relations, entropies are used: the greater the entropy bound, the less effective the quantum operations and entanglement are. In this regard, we analyze the entropic uncertainty, entropic uncertainty lower bound, and concurrence dynamics in two non-interacting qubits. The exposure of two qubits is studied in two different qubit-noise configurations, namely, common qubit-noise and independent qubit-noise interactions. To include the noisy effects of the local external fields, a Gaussian Ornstein Uhlenbeck process is considered. We show that the rise in entropic uncertainty gives rise to the disentanglement in the two-qubit Werner type state and both are directly proportional. Depending on the parameters adjustment and the number of environments coupled, different classical environments have varying capacities to induce entropic uncertainty and disentanglement in quantum systems. The entanglement is shown to be vulnerable to current external fields; however, by employing the ideal parameter ranges we provided, prolonged entanglement retention while preventing entropic uncertainty growth can be achieved. Besides, we have also analyzed the intrinsic behavior of the classical fields towards two-qubit entanglement without any imperfection with respect to different parameters
△ Less
Submitted 5 May, 2022; v1 submitted 22 November, 2021;
originally announced November 2021.
-
Network Graph Generation through Adaptive Clustering and Infection Dynamics: A Step Towards Global Connectivity
Authors:
Aniq Ur Rahman,
Fares Fourati,
Khac-Hoang Ngo,
Anish Jindal,
Mohamed-Slim Alouini
Abstract:
More than 40% of the world's population is not connected to the internet, majorly due to the lack of adequate infrastructure. Our work aims to bridge this digital divide by proposing solutions for network deployment in remote areas. Specifically, a number of access points (APs) are deployed as an interface between the users and backhaul nodes (BNs). The main challenges include designing the number…
▽ More
More than 40% of the world's population is not connected to the internet, majorly due to the lack of adequate infrastructure. Our work aims to bridge this digital divide by proposing solutions for network deployment in remote areas. Specifically, a number of access points (APs) are deployed as an interface between the users and backhaul nodes (BNs). The main challenges include designing the number and location of the APs, and connecting them to the BNs. In order to address these challenges, we first propose a metric called connectivity ratio to assess the quality of the deployment. Next, we propose an agile search algorithm to determine the number of APs that maximizes this metric and perform clustering to find the optimal locations of the APs. Furthermore, we propose a novel algorithm inspired by infection dynamics to connect all the deployed APs to the existing BNs economically. To support the existing terrestrial BNs, we investigate the deployment of non-terrestrial BNs, which further improves the network performance in terms of average hop count, traffic distribution, and backhaul length. Finally, we use real datasets from a remote village to test our solution.
△ Less
Submitted 20 November, 2021;
originally announced November 2021.
-
Improving Spectral Efficiency of Wireless Networks through Democratic Spectrum Sharing
Authors:
Aniq Ur Rahman,
Mustafa A. Kishk,
Mohamed-Slim Alouini
Abstract:
Wireless devices need spectrum to communicate. With the increase in the number of devices competing for the same spectrum, it has become nearly impossible to support the throughput requirements of all the devices through current spectrum sharing methods. In this work, we look at the problem of spectrum resource contention fundamentally, taking inspiration from the principles of globalization. We d…
▽ More
Wireless devices need spectrum to communicate. With the increase in the number of devices competing for the same spectrum, it has become nearly impossible to support the throughput requirements of all the devices through current spectrum sharing methods. In this work, we look at the problem of spectrum resource contention fundamentally, taking inspiration from the principles of globalization. We develop a distributed algorithm whereby the wireless nodes democratically share the spectrum resources and improve their spectral efficiency and throughput without additional power or spectrum resources. We validate the performance of our proposed democratic spectrum sharing (DSS) algorithm over real-world Wi-Fi networks and on synthetically generated networks with varying design parameters. Compared to the greedy approach, DSS achieves significant gains in throughput (~60%), area spectral efficiency ($\sim$50\%) and fairness in datarate distribution (~20%). Due to the distributed nature of the proposed algorithm, we can apply it to wireless networks of any size and density.
△ Less
Submitted 20 November, 2021;
originally announced November 2021.
-
Entanglement swapping under quantum information masking
Authors:
Zhaoxu Ji,
Peiru Fan,
Atta Ur Rahman,
Huanguo Zhang
Abstract:
Quantum information contained in single-particle states can be masked by mapping them to entangled states. In this paper, we consider entanglement swapping under the masking of quantum information. Our work can pave the way for developing the applications of quantum information masking schemes in entanglement-swappingbased quantum cryptography.
Quantum information contained in single-particle states can be masked by mapping them to entangled states. In this paper, we consider entanglement swapping under the masking of quantum information. Our work can pave the way for developing the applications of quantum information masking schemes in entanglement-swappingbased quantum cryptography.
△ Less
Submitted 12 November, 2021;
originally announced November 2021.
-
Multipartite entanglement and purity dynamics in classical channels influenced by fractional Gaussian noise
Authors:
Muhammad Javed,
Atta Ur Rahman,
Lionel Tenemeza Kenfack,
Salman Khan Safi
Abstract:
The dynamical map of entanglement and mixedness in four-qubit maximally entangled GHZ state paired with classical channels driven by fractional Gaussian noise is investigated. The qubit-channel coupling is assumed in four distinct ways: common, bipartite, tripartite, and independent local channel-qubit configurations comprising single, double, triple, or independent noisy sources. Using entangleme…
▽ More
The dynamical map of entanglement and mixedness in four-qubit maximally entangled GHZ state paired with classical channels driven by fractional Gaussian noise is investigated. The qubit-channel coupling is assumed in four distinct ways: common, bipartite, tripartite, and independent local channel-qubit configurations comprising single, double, triple, or independent noisy sources. Using entanglement witness, negativity, purity and von Neumann entropy, except for the independent configuration, we show that indefinite entanglement and purity preservation may be simulated in multipartite GHZ-like states. Quantum correlations and purity decrease exponentially in four qubits, and exact fluctuating local field behaviour, as well as entanglement sudden death and birth revivals, are completely suppressed. Entanglement and purity preservation are affected by noise and the number of independent channels utilised. The Hurst parameter of fractional Gaussian noise was discovered in the four qubits to improve entanglement and avoid mixedness. Different entanglement and mixedness criteria yield different results, emphasizing the need to investigate various approaches in order to uncover multipartite correlations.
△ Less
Submitted 7 February, 2022; v1 submitted 3 November, 2021;
originally announced November 2021.
-
Demonstration of entanglement and coherence in GHZ-like state when exposed to classical environments with power-law noise
Authors:
Atta Ur Rahman,
ZhaoXu Ji,
HuanGuo Zhang
Abstract:
Entanglement and coherence protection are investigated using the dynamical map of three non-interacting qubits that are initially prepared as maximally entangled GHZ-like states coupled to external fields in solid-state and superconducting materials. Thermal fluctuations and resistance in these materials produce power-law (PL) noise, which we assume controls external fields in three different conf…
▽ More
Entanglement and coherence protection are investigated using the dynamical map of three non-interacting qubits that are initially prepared as maximally entangled GHZ-like states coupled to external fields in solid-state and superconducting materials. Thermal fluctuations and resistance in these materials produce power-law (PL) noise, which we assume controls external fields in three different configurations with single or multiple noise sources. The genuine response of isolated environments to entanglement and coherence retention is analyzed. We also briefly discuss the initial purity and relative efficiency of the GHZ-like states. Unlike the multiple PL noise sources, exposure, the GHZ-class state remains partially entangled and coherent for an indefinite time when subject to single noise source. However, long-term non-local correlation and coherence are still feasible under multiple noise sources. Due to the lack of back-action of the environments, the conversion of the free state into the resource GHZ-class states is not allowed. The parameter optimization, in addition to the noise phase, regulates disorders, noise effects, and memory properties in the current environments. Unlike the bipartite states and tripartite W-type states, the GHZ-like state has been shown to have positive traits of preserving entanglement and coherence against PL noise.
△ Less
Submitted 2 November, 2021;
originally announced November 2021.
-
Spike-and-Slab LASSO Generalized Additive Models and Scalable Algorithms for High-Dimensional Data Analysis
Authors:
Boyi Guo,
Byron C. Jaeger,
A. K. M. Fazlur Rahman,
D. Leann Long,
Nengjun Yi
Abstract:
There are proposals that extend the classical generalized additive models (GAMs) to accommodate high-dimensional data ($p>>n$) using group sparse regularization. However, the sparse regularization may induce excess shrinkage when estimating smooth functions, damaging predictive performance. Moreover, most of these GAMs consider an "all-in-all-out" approach for functional selection, rendering them…
▽ More
There are proposals that extend the classical generalized additive models (GAMs) to accommodate high-dimensional data ($p>>n$) using group sparse regularization. However, the sparse regularization may induce excess shrinkage when estimating smooth functions, damaging predictive performance. Moreover, most of these GAMs consider an "all-in-all-out" approach for functional selection, rendering them difficult to answer if nonlinear effects are necessary. While some Bayesian models can address these shortcomings, using Markov chain Monte Carlo algorithms for model fitting creates a new challenge, scalability. Hence, we propose Bayesian hierarchical generalized additive models as a solution: we consider the smoothing penalty for proper shrinkage of curve interpolation via reparameterization. A novel two-part spike-and-slab LASSO prior for smooth functions is developed to address the sparsity of signals while providing extra flexibility to select the linear or nonlinear components of smooth functions. A scalable and deterministic algorithm, EM-Coordinate Descent, is implemented in an open-source R package BHAM. Simulation studies and metabolomics data analyses demonstrate improved predictive and computational performance against state-of-the-art models. Functional selection performance suggests trade-offs exist regarding the effect hierarchy assumption.
△ Less
Submitted 16 May, 2022; v1 submitted 27 October, 2021;
originally announced October 2021.
-
Anonymous multi-party quantum computation with a third party
Authors:
Zhaoxu Ji,
Peiru Fan,
Atta Ur Rahman,
Huanguo Zhang
Abstract:
We reconsider and modify the second secure multi-party quantum addition protocol proposed in our original work. We show that the protocol is an anonymous multi-party quantum addition protocol rather than a secure multi-party quantum addition protocol. Through small changes, we develop the protocol to propose, for the first time, anonymous multiparty quantum computation with a third party, who fait…
▽ More
We reconsider and modify the second secure multi-party quantum addition protocol proposed in our original work. We show that the protocol is an anonymous multi-party quantum addition protocol rather than a secure multi-party quantum addition protocol. Through small changes, we develop the protocol to propose, for the first time, anonymous multiparty quantum computation with a third party, who faithfully executes protocol processes, but is interested in the identity of the data owners. Further, we propose a new anonymous multiparty quantum protocol based on our original protocol. We calculate the success probability of the proposed protocols, which is also a modification of the success probability of the original protocols.
△ Less
Submitted 23 October, 2021;
originally announced October 2021.
-
Intersonic Detachment Surface Waves in Elastomer Frictional Sliding
Authors:
Huifeng Du,
Emmanuel Virot,
Liying Wang,
Sam Kharchenko,
Md Arifur Rahman,
David A. Weitz,
Shmuel M. Rubinstein,
Nicholas X. Fang
Abstract:
Elastomeric materials when sliding on clean and rough surfaces generate wrinkles at the interface due to tangential stress gradients. These interfacial folds travel along the bottom of elastomer as surface detachment waves to facilitate the apparent sliding motion of elastomer. At very low sliding speed compared to elastic surface waves, the process is dominated by surface adhesion and relaxation…
▽ More
Elastomeric materials when sliding on clean and rough surfaces generate wrinkles at the interface due to tangential stress gradients. These interfacial folds travel along the bottom of elastomer as surface detachment waves to facilitate the apparent sliding motion of elastomer. At very low sliding speed compared to elastic surface waves, the process is dominated by surface adhesion and relaxation effects, and the phenomenon is historically referred to as Schallamach waves. We report in this letter the observation of fast-traveling intersonic detachment waves exceeding the Rayleigh and shear wave velocities of the soft material in contact. The spatio-temporal analysis revealed the accelerating nature of the detachment wave, and the scaling of wave speed with the elastic modului of the material suggests that this process is governed by elasticity and inertia. Multiple wave signatures on the plot were connected to different stages of surface wrinkles, as they exhibited distinctive slopes (from which velocities were derived) in the generation, propagation and rebound phases. We also characterized the frequencies of wrinkle generation in addition to the speeds and found a consistent scaling law of these two wave characteristics as the stiffness of elastomer increased. Physical implications of this new finding may further promote our understanding of elastomer noise generation mechanisms, as at macroscopic sliding velocity, the frequency of elastomer instability readily enters human audible ranges and interacts with other vibratory frequencies to cooperatively create harsh and detrimental noises in disc braking, wiper blade and shoe squeaking among many other elastomer applications.
△ Less
Submitted 26 October, 2021;
originally announced October 2021.
-
arXiv:2110.10387
[pdf]
physics.optics
cond-mat.mes-hall
cond-mat.mtrl-sci
cond-mat.soft
physics.app-ph
Mirror-Coupled Microsphere can narrow the Angular distribution of Photoluminescence from WS2 Monolayers
Authors:
Shailendra K. Chaubey,
Sunny Tiwari,
Gokul M. A.,
Diptabrata Paul,
Atikur Rahman,
G. V. Pavan Kumar
Abstract:
Engineering optical emission from two dimensional, transition metal dichalcogenides (TMDs) materials such as Tungsten disulphide (WS2) has implications in creating and understanding nanophotonic sources. One of the challenges in controlling the optical emission from 2D materials is to achieve narrow angular spread using a simple photonic geometry. In this paper, we study how the photoluminescence…
▽ More
Engineering optical emission from two dimensional, transition metal dichalcogenides (TMDs) materials such as Tungsten disulphide (WS2) has implications in creating and understanding nanophotonic sources. One of the challenges in controlling the optical emission from 2D materials is to achieve narrow angular spread using a simple photonic geometry. In this paper, we study how the photoluminescence of a monolayer WS2 can be controlled when coupled to film coupled microsphere dielectric antenna. Specifically, by employing Fourier plane microscopy and spectroscopic techniques, we quantify the wavevector distribution in the momentum space. As a result, we show beaming of the WS2 photoluminescence with angular divergence of θ1/2 = 4.6°. Furthermore, the experimental measurements have been supported by three-dimensional numerical simulations. We envisage that the discussed results can be generalized to a variety of nanophotonic 2D materials, and can be harnessed in nonlinear and quantum technology.
△ Less
Submitted 9 June, 2022; v1 submitted 20 October, 2021;
originally announced October 2021.
-
BLEnD: Improving NDN Performance Over Wireless Links Using Interest Bundling
Authors:
Md Ashiqur Rahman,
Teng Liang,
Beichuan Zhang
Abstract:
Named Data Networking (NDN) employs small-sized Interest packets to retrieve large-sized Data packets. Given the half-duplex nature of wireless links, Interest packets frequently contend for the channel with Data packets, leading to throughput degradation. In this work, we present a novel idea called BLEnD, an Interest-bundling technique that encodes multiple Interests into one at the sender and d…
▽ More
Named Data Networking (NDN) employs small-sized Interest packets to retrieve large-sized Data packets. Given the half-duplex nature of wireless links, Interest packets frequently contend for the channel with Data packets, leading to throughput degradation. In this work, we present a novel idea called BLEnD, an Interest-bundling technique that encodes multiple Interests into one at the sender and decodes at the receiver. The major design challenges are to reduce the number of Interest transmissions without impacting the one-Interest one-Data principle embedded everywhere in NDN architecture and implementation, and support flow/congestion control mechanisms that usually use Interest packets as signals. BLEnD achieves these by bundling/unbundling Interests at the link adaptation layer, keeping all NDN components unaware and unaffected. Over a one-hop WiFi link, BLEnD improves application throughput by 30%. It may also be used over multiple hops and be improved in a number of ways.
△ Less
Submitted 28 October, 2021; v1 submitted 3 October, 2021;
originally announced October 2021.
-
bqror: An R package for Bayesian Quantile Regression in Ordinal Models
Authors:
Prajual Maheshwari,
Mohammad Arshad Rahman
Abstract:
This article describes an R package bqror that estimates Bayesian quantile regression for ordinal models introduced in Rahman (2016). The paper classifies ordinal models into two types and offers computationally efficient, yet simple, Markov chain Monte Carlo (MCMC) algorithms for estimating ordinal quantile regression. The generic ordinal model with 3 or more outcomes (labeled ORI model) is estim…
▽ More
This article describes an R package bqror that estimates Bayesian quantile regression for ordinal models introduced in Rahman (2016). The paper classifies ordinal models into two types and offers computationally efficient, yet simple, Markov chain Monte Carlo (MCMC) algorithms for estimating ordinal quantile regression. The generic ordinal model with 3 or more outcomes (labeled ORI model) is estimated by a combination of Gibbs sampling and Metropolis-Hastings algorithm. Whereas an ordinal model with exactly 3 outcomes (labeled ORII model) is estimated using Gibbs sampling only. In line with the Bayesian literature, we suggest using marginal likelihood for comparing alternative quantile regression models and explain how to compute the same. The models and their estimation procedures are illustrated via multiple simulation studies and implemented in two applications. The article also describes several other functions contained within the bqror package, which are necessary for estimation, inference, and assessing model fit.
△ Less
Submitted 27 May, 2023; v1 submitted 28 September, 2021;
originally announced September 2021.
-
Modeling and Analysis of Discrete Response Data: Applications to Public Opinion on Marijuana Legalization in the United States
Authors:
Mohit Batham,
Soudeh Mirghasemi,
Mohammad Arshad Rahman,
Manini Ojha
Abstract:
This chapter presents an overview of a specific form of limited dependent variable models, namely discrete choice models, where the dependent (response or outcome) variable takes values which are discrete, inherently ordered, and characterized by an underlying continuous latent variable. Within this setting, the dependent variable may take only two discrete values (such as 0 and 1) giving rise to…
▽ More
This chapter presents an overview of a specific form of limited dependent variable models, namely discrete choice models, where the dependent (response or outcome) variable takes values which are discrete, inherently ordered, and characterized by an underlying continuous latent variable. Within this setting, the dependent variable may take only two discrete values (such as 0 and 1) giving rise to binary models (e.g., probit and logit models) or more than two values (say $j=1,2, \ldots, J$, where $J$ is some integer, typically small) giving rise to ordinal models (e.g., ordinal probit and ordinal logit models). In these models, the primary goal is to model the probability of responses/outcomes conditional on the covariates. We connect the outcomes of a discrete choice model to the random utility framework in economics, discuss estimation techniques, present the calculation of covariate effects and measures to assess model fitting. Some recent advances in discrete data modeling are also discussed. Following the theoretical review, we utilize the binary and ordinal models to analyze public opinion on marijuana legalization and the extent of legalization -- a socially relevant but controversial topic in the United States. We obtain several interesting results including that past use of marijuana, belief about legalization and political partisanship are important factors that shape the public opinion.
△ Less
Submitted 27 May, 2023; v1 submitted 21 September, 2021;
originally announced September 2021.
-
Interpretable Additive Recurrent Neural Networks For Multivariate Clinical Time Series
Authors:
Asif Rahman,
Yale Chang,
Jonathan Rubin
Abstract:
Time series models with recurrent neural networks (RNNs) can have high accuracy but are unfortunately difficult to interpret as a result of feature-interactions, temporal-interactions, and non-linear transformations. Interpretability is important in domains like healthcare where constructing models that provide insight into the relationships they have learned are required to validate and trust mod…
▽ More
Time series models with recurrent neural networks (RNNs) can have high accuracy but are unfortunately difficult to interpret as a result of feature-interactions, temporal-interactions, and non-linear transformations. Interpretability is important in domains like healthcare where constructing models that provide insight into the relationships they have learned are required to validate and trust model predictions. We want accurate time series models where users can understand the contribution of individual input features. We present the Interpretable-RNN (I-RNN) that balances model complexity and accuracy by forcing the relationship between variables in the model to be additive. Interactions are restricted between hidden states of the RNN and additively combined at the final step. I-RNN specifically captures the unique characteristics of clinical time series, which are unevenly sampled in time, asynchronously acquired, and have missing data. Importantly, the hidden state activations represent feature coefficients that correlate with the prediction target and can be visualized as risk curves that capture the global relationship between individual input features and the outcome. We evaluate the I-RNN model on the Physionet 2012 Challenge dataset to predict in-hospital mortality, and on a real-world clinical decision support task: predicting hemodynamic interventions in the intensive care unit. I-RNN provides explanations in the form of global and local feature importances comparable to highly intelligible models like decision trees trained on hand-engineered features while significantly outperforming them. I-RNN remains intelligible while providing accuracy comparable to state-of-the-art decay-based and interpolation-based recurrent time series models. The experimental results on real-world clinical datasets refute the myth that there is a tradeoff between accuracy and interpretability.
△ Less
Submitted 15 September, 2021;
originally announced September 2021.
-
Rapidity Distribution within Landau hydrodynamical model and EPOS event-generator at RHIC Energies
Authors:
R. M. Abdel Rahman,
Abdel Nasser Tawfik,
Mahmoud Y. El-Bakry,
D. M. Habashy,
Mahmoud Hanafy
Abstract:
The rapidity distribution of well-defined particles pions, Kaons, protons and their antiparticles measured in the BRAHMS experiment (Au+Au collisions), at $\sqrt{s_{NN}}$ = $62.4$ and $200$ GeV, are compared with huge statistical ensembles of 100, 000 events deduced from the Cosmic Ray MonteCarlo (CRMC) EPOS event-generator. All these data are then compared to the Landau hydrodynamical model. We c…
▽ More
The rapidity distribution of well-defined particles pions, Kaons, protons and their antiparticles measured in the BRAHMS experiment (Au+Au collisions), at $\sqrt{s_{NN}}$ = $62.4$ and $200$ GeV, are compared with huge statistical ensembles of 100, 000 events deduced from the Cosmic Ray MonteCarlo (CRMC) EPOS event-generator. All these data are then compared to the Landau hydrodynamical model. We conclude that the Landau hydrodynamical model is capable of describing both experimental data and EPOS $1.99$ event-generator results, and that they are in good agreement.
△ Less
Submitted 18 February, 2022; v1 submitted 15 September, 2021;
originally announced September 2021.
-
Particles Multiplicity Based on Rapidity in Landau and Artificial Neural Network(ANN) Models
Authors:
D. M. Habashy,
Mahmoud Y. El-Bakry,
Abdel Nasser Tawfik,
R. M. Abdel Rahman,
Mahmoud Hanafy
Abstract:
ANN model is used to estimate the multiplicity per rapidity for charged pions and kaons observed in various high-energy experiments from central Au+Au collisions with energies ranging from 2-200 GeV, and then compared to available experimental data, including RHIC-BRAHMS, and the future facilities at NICA and FAIR. We also used Landau hydrodynamical approach, which has a better describtion for the…
▽ More
ANN model is used to estimate the multiplicity per rapidity for charged pions and kaons observed in various high-energy experiments from central Au+Au collisions with energies ranging from 2-200 GeV, and then compared to available experimental data, including RHIC-BRAHMS, and the future facilities at NICA and FAIR. We also used Landau hydrodynamical approach, which has a better describtion for the evolution of hot and dense matter produced in ultra-relativistic heavy-ion collisions. The approach is fitted to both results estimated from experiment and ANN simulation. We noticed that the Landau model accurately reproduces the entire range of multiplicity per rapidity for all created particles at all energies. Also ANN model can reproduce the multiplicity per rapidity very well for all considered particles.
△ Less
Submitted 15 September, 2021;
originally announced September 2021.
-
Deep Dive into Semi-Supervised ELBO for Improving Classification Performance
Authors:
Fahim Faisal Niloy,
M. Ashraful Amin,
AKM Mahbubur Rahman,
Amin Ahsan Ali
Abstract:
Decomposition of the evidence lower bound (ELBO) objective of VAE used for density estimation revealed the deficiency of VAE for representation learning and suggested ways to improve the model. In this paper, we investigate whether we can get similar insights by decomposing the ELBO for semi-supervised classification using VAE model. Specifically, we show that mutual information between input and…
▽ More
Decomposition of the evidence lower bound (ELBO) objective of VAE used for density estimation revealed the deficiency of VAE for representation learning and suggested ways to improve the model. In this paper, we investigate whether we can get similar insights by decomposing the ELBO for semi-supervised classification using VAE model. Specifically, we show that mutual information between input and class labels decreases during maximization of ELBO objective. We propose a method to address this issue. We also enforce cluster assumption to aid in classification. Experiments on a diverse datasets verify that our method can be used to improve the classification performance of existing VAE based semi-supervised models. Experiments also show that, this can be achieved without sacrificing the generative power of the model.
△ Less
Submitted 20 November, 2022; v1 submitted 28 August, 2021;
originally announced August 2021.
-
Crown Jewels Analysis using Reinforcement Learning with Attack Graphs
Authors:
Rohit Gangupantulu,
Tyler Cody,
Abdul Rahman,
Christopher Redino,
Ryan Clark,
Paul Park
Abstract:
Cyber attacks pose existential threats to nations and enterprises. Current practice favors piece-wise analysis using threat-models in the stead of rigorous cyber terrain analysis and intelligence preparation of the battlefield. Automated penetration testing using reinforcement learning offers a new and promising approach for developing methodologies that are driven by network structure and cyber t…
▽ More
Cyber attacks pose existential threats to nations and enterprises. Current practice favors piece-wise analysis using threat-models in the stead of rigorous cyber terrain analysis and intelligence preparation of the battlefield. Automated penetration testing using reinforcement learning offers a new and promising approach for developing methodologies that are driven by network structure and cyber terrain, that can be later interpreted in terms of threat-models, but that are principally network-driven analyses. This paper presents a novel method for crown jewel analysis termed CJA-RL that uses reinforcement learning to identify key terrain and avenues of approach for exploiting crown jewels. In our experiment, CJA-RL identified ideal entry points, choke points, and pivots for exploiting a network with multiple crown jewels, exemplifying how CJA-RL and reinforcement learning for penetration testing generally can benefit computer network operations workflows.
△ Less
Submitted 20 August, 2021;
originally announced August 2021.
-
Stack Index Prediction Using Time-Series Analysis
Authors:
Raja CSP Raman,
Rohith Mahadevan,
Divya Perumal,
Vedha Sankar,
Talha Abdur Rahman
Abstract:
The Prevalence of Community support and engagement for different domains in the tech industry has changed and evolved throughout the years. In this study, we aim to understand, analyze and predict the trends of technology in a scientific manner, having collected data on numerous topics and their growth throughout the years in the past decade. We apply machine learning models on collected data, to…
▽ More
The Prevalence of Community support and engagement for different domains in the tech industry has changed and evolved throughout the years. In this study, we aim to understand, analyze and predict the trends of technology in a scientific manner, having collected data on numerous topics and their growth throughout the years in the past decade. We apply machine learning models on collected data, to understand, analyze and forecast the trends in the advancement of different fields. We show that certain technical concepts such as python, machine learning, and Keras have an undisputed uptrend, finally concluding that the Stackindex model forecasts with high accuracy and can be a viable tool for forecasting different tech domains.
△ Less
Submitted 18 August, 2021;
originally announced August 2021.
-
Using Cyber Terrain in Reinforcement Learning for Penetration Testing
Authors:
Rohit Gangupantulu,
Tyler Cody,
Paul Park,
Abdul Rahman,
Logan Eisenbeiser,
Dan Radke,
Ryan Clark
Abstract:
Reinforcement learning (RL) has been applied to attack graphs for penetration testing, however, trained agents do not reflect reality because the attack graphs lack operational nuances typically captured within the intelligence preparation of the battlefield (IPB) that include notions of (cyber) terrain. In particular, current practice constructs attack graphs exclusively using the Common Vulnerab…
▽ More
Reinforcement learning (RL) has been applied to attack graphs for penetration testing, however, trained agents do not reflect reality because the attack graphs lack operational nuances typically captured within the intelligence preparation of the battlefield (IPB) that include notions of (cyber) terrain. In particular, current practice constructs attack graphs exclusively using the Common Vulnerability Scoring System (CVSS) and its components. We present methods for constructing attack graphs using notions from IPB on cyber terrain analysis of obstacles, avenues of approach, key terrain, observation and fields of fire, and cover and concealment. We demonstrate our methods on an example where firewalls are treated as obstacles and represented in (1) the reward space and (2) the state dynamics. We show that terrain analysis can be used to bring realism to attack graphs for RL.
△ Less
Submitted 4 August, 2022; v1 submitted 16 August, 2021;
originally announced August 2021.
-
Interpretable Goal Recognition in the Presence of Occluded Factors for Autonomous Vehicles
Authors:
Josiah P. Hanna,
Arrasy Rahman,
Elliot Fosong,
Francisco Eiras,
Mihai Dobre,
John Redford,
Subramanian Ramamoorthy,
Stefano V. Albrecht
Abstract:
Recognising the goals or intentions of observed vehicles is a key step towards predicting the long-term future behaviour of other agents in an autonomous driving scenario. When there are unseen obstacles or occluded vehicles in a scenario, goal recognition may be confounded by the effects of these unseen entities on the behaviour of observed vehicles. Existing prediction algorithms that assume rat…
▽ More
Recognising the goals or intentions of observed vehicles is a key step towards predicting the long-term future behaviour of other agents in an autonomous driving scenario. When there are unseen obstacles or occluded vehicles in a scenario, goal recognition may be confounded by the effects of these unseen entities on the behaviour of observed vehicles. Existing prediction algorithms that assume rational behaviour with respect to inferred goals may fail to make accurate long-horizon predictions because they ignore the possibility that the behaviour is influenced by such unseen entities. We introduce the Goal and Occluded Factor Inference (GOFI) algorithm which bases inference on inverse-planning to jointly infer a probabilistic belief over goals and potential occluded factors. We then show how these beliefs can be integrated into Monte Carlo Tree Search (MCTS). We demonstrate that jointly inferring goals and occluded factors leads to more accurate beliefs with respect to the true world state and allows an agent to safely navigate several scenarios where other baselines take unsafe actions leading to collisions.
△ Less
Submitted 5 August, 2021;
originally announced August 2021.
-
BIoTA Control-Aware Attack Analytics for Building Internet of Things
Authors:
Nur Imtiazul Haque,
Mohammad Ashiqur Rahman,
Dong Chen,
Hisham Kholidy
Abstract:
Modern building control systems adopt demand control heating, ventilation, and cooling (HVAC) for increased energy efficiency. The integration of the Internet of Things (IoT) in the building control system can determine real-time demand, which has made the buildings smarter, reliable, and efficient. As occupants in a building are the main source of continuous heat and $CO_2$ generation, estimating…
▽ More
Modern building control systems adopt demand control heating, ventilation, and cooling (HVAC) for increased energy efficiency. The integration of the Internet of Things (IoT) in the building control system can determine real-time demand, which has made the buildings smarter, reliable, and efficient. As occupants in a building are the main source of continuous heat and $CO_2$ generation, estimating the accurate number of people in real-time using building IoT (BIoT) system facilities is essential for optimal energy consumption and occupants' comfort. However, the incorporation of less secured IoT sensor nodes and open communication network in the building control system eventually increases the number of vulnerable points to be compromised. Exploiting these vulnerabilities, attackers can manipulate the controller with false sensor measurements and disrupt the system's consistency. The attackers with the knowledge of overall system topology and control logics can launch attacks without alarming the system. This paper proposes a building internet of things analyzer (BIoTA) framework\footnote{https://github.com/imtiazulhaque/research-implementations/tree/main/biota} that assesses the smart building HVAC control system's security using formal attack modeling. We evaluate the proposed attack analyzer's effectiveness on the commercial occupancy dataset (COD) and the KTH live-in lab dataset. To the best of our knowledge, this is the first research attempt to formally model a BIoT-based HVAC control system and perform an attack analysis.
△ Less
Submitted 23 July, 2021;
originally announced July 2021.
-
Decoherence Effects in a Three-Level System under Gaussian Process
Authors:
Sultan Mahmood Zangi,
Atta ur Rahman,
ZhaoXu Ji,
Hazrat Ai,
HuanGuo Zhang
Abstract:
When subjected to a classical fluctuating field characterized by a Gaussian process, we examine the {purity} and coherence protection in a three-level quantum system. This symmetry of the three-level system is examined when the local random field is investigated further in the noiseless and noisy regimes. In~particular, we consider fractional Gaussian, Gaussian, Ornstein--Uhlenbeck, and~power law…
▽ More
When subjected to a classical fluctuating field characterized by a Gaussian process, we examine the {purity} and coherence protection in a three-level quantum system. This symmetry of the three-level system is examined when the local random field is investigated further in the noiseless and noisy regimes. In~particular, we consider fractional Gaussian, Gaussian, Ornstein--Uhlenbeck, and~power law noisy regimes. We show that the destructive nature of the Ornstein--Uhlenbeck noise toward the symmetry of the qutrit to preserve encoded {purity and coherence} remains large. Our findings suggest that properly adjusting the noisy parameters to specifically provided values can facilitate optimal extended {purity and coherence} survival. Non-vanishing terms appear in the final density matrix of the single qutrit system, indicating that it is in a strong coherence regime. Because~of all of the Gaussian noises, monotonic decay with no revivals has been observed in the single qutrit system. In~terms of coherence and information preservation, we find that the current qutrit system outperforms systems with multiple qubits or qutrits using purity and von Neumann entropy. A~comparison of noisy and noiseless situations shows that the fluctuating nature of the local random fields is ultimately lost when influenced using the classical Gaussian noises
△ Less
Submitted 29 November, 2022; v1 submitted 29 July, 2021;
originally announced July 2021.
-
Probing tripartite entanglement and coherence dynamics in pure and mixed independent classical environments
Authors:
Atta Ur Rahman,
Muhammad Javed,
Arif Ullah,
Quantum Optics,
Quantum Information Research Group,
Department of Physics,
University of Malakand,
Chakdara Dir,
Pakistan
Abstract:
Quantum information processing exploits non-local functionality that has led to significant breakthroughs in the successful deployment of quantum mechanical protocols. In this regard, we address the dynamics of entanglement and coherence for three non-interacting qubits initially prepared as maximally entangled GHZ-like state coupled with independent classical environments. Two different Gaussian…
▽ More
Quantum information processing exploits non-local functionality that has led to significant breakthroughs in the successful deployment of quantum mechanical protocols. In this regard, we address the dynamics of entanglement and coherence for three non-interacting qubits initially prepared as maximally entangled GHZ-like state coupled with independent classical environments. Two different Gaussian noises in pure and mixed noisy situations, namely, pure power-law noise, pure fractional Gaussian noise, power-law noise maximized and fractional Gaussian noise maximized cases are assumed to characterize the environments. With the help of time-dependent entanglement witnesses, purity, and decoherence measures, within the full range of parameters, we show that the current mixed noise cases are more detrimental than pure ones where entanglement and coherence are found short-lived. The power-law noise phase, in particular, appears to be more flexible and exploitable for long-term preservation effects. In contrast, we find that in both pure and mixed noise cases, where entanglement and coherence degrade at a relatively high rate, there is no ultimate solution for avoiding the detrimental dephasing effects of fractional Gaussian noise. The three-qubit state becomes disentangled and decoherent within independent classical environments driven by both pure and mixed Gaussian noises, either in long or short interaction time. In addition, due to the lack of the entanglement revival phenomenon, there is no information exchange between the system and the environment. The three-qubit GHZ-like states have thus been realized to be an excellent resource for long enough quantum correlations, coherence, and quantum information preservation in classical independent channels driven by pure power-law noise with extremely low parameter values.
△ Less
Submitted 23 July, 2021;
originally announced July 2021.
-
Probing multipartite entanglement, coherence and quantum information preservation under classical Ornstein-Uhlenbeck noise
Authors:
Atta Ur Rahman,
Muhammad Javed,
Arif Ullah,
Khyber Pakhtunkhwa
Abstract:
We address entanglement, coherence, and information protection in a system of four non-interacting qubits coupled with different classical environments, namely: common, bipartite, tripartite, and independent environments described by Ornstein-Uhlenbeck (ORU) noise. We show that quantum information preserved by the four qubit state is more dependent on the coherence than the entanglement using time…
▽ More
We address entanglement, coherence, and information protection in a system of four non-interacting qubits coupled with different classical environments, namely: common, bipartite, tripartite, and independent environments described by Ornstein-Uhlenbeck (ORU) noise. We show that quantum information preserved by the four qubit state is more dependent on the coherence than the entanglement using time-dependent entanglement witness, purity, and Shannon entropy. We find these two quantum phenomena directly interrelated and highly vulnerable in environments with ORU noise, resulting in the pure exponential decay of a considerable amount. The current Markovian dynamical map, as well as suppression of the fluctuating character of the environments are observed to be entirely attributable to the Gaussian nature of the noise. Furthermore, the increasing number of environments are witnessed to accelerate the amount of decay. Unlike other noises, the current noise parameter's flexible range is readily exploitable, ensuring long enough preserved memory properties. The four-qubit GHZ state, besides having a large information storage potential, stands partially entangled and coherent in common environments for an indefinite duration. Thus, it appeared to be a more promising resource for functional quantum computing than bipartite and tripartite quantum systems. In addition, we derive computational values for each system-environment interaction, which will help quantum practitioners to optimize the related kind of classical environments.
△ Less
Submitted 23 July, 2021;
originally announced July 2021.
-
Effects of classical fluctuating environments on decoherence and bipartite quantum correlations dynamics
Authors:
Atta Ur Rahman,
Muhammad Javed,
Muhammad Noman,
Arif Ullah,
Chakdara Dir,
Ming-Xing Luo
Abstract:
We address the time evolution of the quantum correlations ($QCs$) such as entanglement, purity, and coherence for a model of two non-interacting qubits initially prepared as a maximally entangled bipartite state. We contrast the comparative potential of the classical fields to preserve these $QCs$ in the noisy and noiseless realms. We also disclose the characteristic dynamical behavior of the…
▽ More
We address the time evolution of the quantum correlations ($QCs$) such as entanglement, purity, and coherence for a model of two non-interacting qubits initially prepared as a maximally entangled bipartite state. We contrast the comparative potential of the classical fields to preserve these $QCs$ in the noisy and noiseless realms. We also disclose the characteristic dynamical behavior of the $QCs$ of the two-qubit state under the static noisy effects originating from the common and different configuration models. We show that there is a direct connection between the fluctuations allowed by an environment and the $QCs$ preservation. Due to the static noisy dephasing effects, the $QCs$ are suppressed, resulting in the separability of the two-qubit entangled state after a finite duration. Here, the $QCs$ decay effects are found much smaller in the common configuration model than that of the opponent. Furthermore, this protection of the $QCs$ under static noise for large intervals is entirely attributable to the existence of the entanglement sudden death and birth phenomenon. Most importantly, we found the bipartite $QCs$ less fragile than the tripartite ones in comparison under the static noise. In the case of the measures, the concurrence is found to be sharper for showing the entanglement sudden death and birth revivals in comparison to the purity and decoherence.
△ Less
Submitted 23 July, 2021;
originally announced July 2021.
-
CURE: Enabling RF Energy Harvesting using Cell-Free Massive MIMO UAVs Assisted by RIS
Authors:
Alvi Ataur Khalil,
Mohamed Y. Selim,
Mohammad Ashiqur Rahman
Abstract:
The ever-evolving internet of things (IoT) has led to the growth of numerous wireless sensors, communicating through the internet infrastructure. When designing a network using these sensors, one critical aspect is the longevity and self-sustainability of these devices. For extending the lifetime of these sensors, radio frequency energy harvesting (RFEH) technology has proved to be promising. In t…
▽ More
The ever-evolving internet of things (IoT) has led to the growth of numerous wireless sensors, communicating through the internet infrastructure. When designing a network using these sensors, one critical aspect is the longevity and self-sustainability of these devices. For extending the lifetime of these sensors, radio frequency energy harvesting (RFEH) technology has proved to be promising. In this paper, we propose CURE, a novel framework for RFEH that effectively combines the benefits of cell-free massive MIMO (CFmMIMO), unmanned aerial vehicles (UAVs), and reconfigurable intelligent surfaces (RISs) to provide seamless energy harvesting to IoT devices. We consider UAV as an access point (AP) in the CFmMIMO framework. To enhance the signal strength of the RFEH and information transfer, we leverage RISs owing to their passive reflection capability. Based on an extensive simulation, we validate our framework's performance by comparing the max-min fairness (MMF) algorithm for the amount of harvested energy.
△ Less
Submitted 21 July, 2021;
originally announced July 2021.
-
A Literature Review on Blockchain-enabled Security and Operation of Cyber-Physical Systems
Authors:
Alvi Ataur Khalil,
Javier Franco,
Imtiaz Parvez,
Selcuk Uluagac,
Mohammad Ashiqur Rahman
Abstract:
Blockchain has become a key technology in a plethora of application domains owing to its decentralized public nature. The cyber-physical systems (CPS) is one of the prominent application domains that leverage blockchain for myriad operations, where the Internet of Things (IoT) is utilized for data collection. Although some of the CPS problems can be solved by simply adopting blockchain for its sec…
▽ More
Blockchain has become a key technology in a plethora of application domains owing to its decentralized public nature. The cyber-physical systems (CPS) is one of the prominent application domains that leverage blockchain for myriad operations, where the Internet of Things (IoT) is utilized for data collection. Although some of the CPS problems can be solved by simply adopting blockchain for its secure and distributed nature, others require complex considerations for overcoming blockchain-imposed limitations while maintaining the core aspect of CPS. Even though a number of studies focus on either the utilization of blockchains for different CPS applications or the blockchain-enabled security of CPS, there is no comprehensive survey including both perspectives together. To fill this gap, we present a comprehensive overview of contemporary advancement in using blockchain for enhancing different CPS operations as well as improving CPS security. To the best of our knowledge, this is the first paper that presents an in-depth review of research on blockchain-enabled CPS operation and security.
△ Less
Submitted 16 July, 2021;
originally announced July 2021.
-
On the Analysis of Adaptive-Rate Applications in Data-Centric Wireless Ad-Hoc Networks
Authors:
Md Ashiqur Rahman,
Beichuan Zhang
Abstract:
Adapting applications' data rates in multi-hop wireless ad-hoc networks is inherently challenging. Packet collision, channel contention, and queue buildup contribute to packet loss but are difficult to manage in conventional TCP/IP architecture. This work explores a data-centric approach based on Name Data Networking (NDN) architecture, which is considered more suitable for wireless ad-hoc network…
▽ More
Adapting applications' data rates in multi-hop wireless ad-hoc networks is inherently challenging. Packet collision, channel contention, and queue buildup contribute to packet loss but are difficult to manage in conventional TCP/IP architecture. This work explores a data-centric approach based on Name Data Networking (NDN) architecture, which is considered more suitable for wireless ad-hoc networks. We show that the default NDN transport offers better performance in linear topologies but struggles in more extensive networks due to high collision and contention caused by excessive Interests from out-of-order data retrieval and redundant data transmission from improper Interest lifetime setting as well as in-network caching. To fix these, we use round-trip hop count to limit Interest rate and Dynamic Interest Lifetime to minimize the negative effect of improper Interest lifetime. Finally, we analyze the effect of in-network caching on transport performance and which scenarios may benefit or suffer from it.
△ Less
Submitted 14 July, 2021;
originally announced July 2021.
-
Objective task-based evaluation of artificial intelligence-based medical imaging methods: Framework, strategies and role of the physician
Authors:
Abhinav K. Jha,
Kyle J. Myers,
Nancy A. Obuchowski,
Ziping Liu,
Md Ashequr Rahman,
Babak Saboury,
Arman Rahmim,
Barry A. Siegel
Abstract:
Artificial intelligence (AI)-based methods are showing promise in multiple medical-imaging applications. Thus, there is substantial interest in clinical translation of these methods, requiring in turn, that they be evaluated rigorously. In this paper, our goal is to lay out a framework for objective task-based evaluation of AI methods. We will also provide a list of tools available in the literatu…
▽ More
Artificial intelligence (AI)-based methods are showing promise in multiple medical-imaging applications. Thus, there is substantial interest in clinical translation of these methods, requiring in turn, that they be evaluated rigorously. In this paper, our goal is to lay out a framework for objective task-based evaluation of AI methods. We will also provide a list of tools available in the literature to conduct this evaluation. Further, we outline the important role of physicians in conducting these evaluation studies. The examples in this paper will be proposed in the context of PET with a focus on neural-network-based methods. However, the framework is also applicable to evaluate other medical-imaging modalities and other types of AI methods.
△ Less
Submitted 20 July, 2021; v1 submitted 9 July, 2021;
originally announced July 2021.
-
CVEH: A Dynamic Framework To Profile Vehicle Movements To Mitigate Hit And Run Cases Using Crowdsourcing
Authors:
Attiq ur Rehman,
Asad Waqar Malik,
Anis ur Rahman,
Sohail Iqbal,
Ghalib Ahmed Tahir
Abstract:
In developed countries like the USA, Germany, and the UK, the security forces used highly sophisticated equipment, fast vehicles, drones, and helicopters to catch offenders' vehicles. Whereas, in developing countries with limited resources such schemes cannot be utilized due to management cost and other constraints. In this paper, we proposed a framework called CVEH that enables developing countri…
▽ More
In developed countries like the USA, Germany, and the UK, the security forces used highly sophisticated equipment, fast vehicles, drones, and helicopters to catch offenders' vehicles. Whereas, in developing countries with limited resources such schemes cannot be utilized due to management cost and other constraints. In this paper, we proposed a framework called CVEH that enables developing countries to profile the offender vehicle movements through crowdsourcing technique and act as an early warning system to the law forcing agencies. It also engages citizens to play their role in improving security conditions. The proposed CVEH framework allows Vehicle-to-Infrastructure (V2I) communication to monitor the movement of the offender's vehicle and shared its information with the Command and Control (CC) centre. The CC centre projects the path and engages nearly located law enforcement agencies. CVEH is developed and evaluated on android smartphones. Simulations conducted for this study exhibit the effectiveness of our framework.
△ Less
Submitted 28 June, 2021;
originally announced July 2021.
-
The RSNA-ASNR-MICCAI BraTS 2021 Benchmark on Brain Tumor Segmentation and Radiogenomic Classification
Authors:
Ujjwal Baid,
Satyam Ghodasara,
Suyash Mohan,
Michel Bilello,
Evan Calabrese,
Errol Colak,
Keyvan Farahani,
Jayashree Kalpathy-Cramer,
Felipe C. Kitamura,
Sarthak Pati,
Luciano M. Prevedello,
Jeffrey D. Rudie,
Chiharu Sako,
Russell T. Shinohara,
Timothy Bergquist,
Rong Chai,
James Eddy,
Julia Elliott,
Walter Reade,
Thomas Schaffter,
Thomas Yu,
Jiaxin Zheng,
Ahmed W. Moawad,
Luiz Otavio Coelho,
Olivia McDonnell
, et al. (78 additional authors not shown)
Abstract:
The BraTS 2021 challenge celebrates its 10th anniversary and is jointly organized by the Radiological Society of North America (RSNA), the American Society of Neuroradiology (ASNR), and the Medical Image Computing and Computer Assisted Interventions (MICCAI) society. Since its inception, BraTS has been focusing on being a common benchmarking venue for brain glioma segmentation algorithms, with wel…
▽ More
The BraTS 2021 challenge celebrates its 10th anniversary and is jointly organized by the Radiological Society of North America (RSNA), the American Society of Neuroradiology (ASNR), and the Medical Image Computing and Computer Assisted Interventions (MICCAI) society. Since its inception, BraTS has been focusing on being a common benchmarking venue for brain glioma segmentation algorithms, with well-curated multi-institutional multi-parametric magnetic resonance imaging (mpMRI) data. Gliomas are the most common primary malignancies of the central nervous system, with varying degrees of aggressiveness and prognosis. The RSNA-ASNR-MICCAI BraTS 2021 challenge targets the evaluation of computational algorithms assessing the same tumor compartmentalization, as well as the underlying tumor's molecular characterization, in pre-operative baseline mpMRI data from 2,040 patients. Specifically, the two tasks that BraTS 2021 focuses on are: a) the segmentation of the histologically distinct brain tumor sub-regions, and b) the classification of the tumor's O[6]-methylguanine-DNA methyltransferase (MGMT) promoter methylation status. The performance evaluation of all participating algorithms in BraTS 2021 will be conducted through the Sage Bionetworks Synapse platform (Task 1) and Kaggle (Task 2), concluding in distributing to the top ranked participants monetary awards of $60,000 collectively.
△ Less
Submitted 12 September, 2021; v1 submitted 5 July, 2021;
originally announced July 2021.
-
A Novel Disaster Image Dataset and Characteristics Analysis using Attention Model
Authors:
Fahim Faisal Niloy,
Arif,
Abu Bakar Siddik Nayem,
Anis Sarker,
Ovi Paul,
M. Ashraful Amin,
Amin Ahsan Ali,
Moinul Islam Zaber,
AKM Mahbubur Rahman
Abstract:
The advancement of deep learning technology has enabled us to develop systems that outperform any other classification technique. However, success of any empirical system depends on the quality and diversity of the data available to train the proposed system. In this research, we have carefully accumulated a relatively challenging dataset that contains images collected from various sources for thr…
▽ More
The advancement of deep learning technology has enabled us to develop systems that outperform any other classification technique. However, success of any empirical system depends on the quality and diversity of the data available to train the proposed system. In this research, we have carefully accumulated a relatively challenging dataset that contains images collected from various sources for three different disasters: fire, water and land. Besides this, we have also collected images for various damaged infrastructure due to natural or man made calamities and damaged human due to war or accidents. We have also accumulated image data for a class named non-damage that contains images with no such disaster or sign of damage in them. There are 13,720 manually annotated images in this dataset, each image is annotated by three individuals. We are also providing discriminating image class information annotated manually with bounding box for a set of 200 test images. Images are collected from different news portals, social media, and standard datasets made available by other researchers. A three layer attention model (TLAM) is trained and average five fold validation accuracy of 95.88% is achieved. Moreover, on the 200 unseen test images this accuracy is 96.48%. We also generate and compare attention maps for these test images to determine the characteristics of the trained attention model. Our dataset is available at https://niloy193.github.io/Disaster-Dataset
△ Less
Submitted 2 July, 2021;
originally announced July 2021.
-
Attention Toward Neighbors: A Context Aware Framework for High Resolution Image Segmentation
Authors:
Fahim Faisal Niloy,
M. Ashraful Amin,
Amin Ahsan Ali,
AKM Mahbubur Rahman
Abstract:
High-resolution image segmentation remains challenging and error-prone due to the enormous size of intermediate feature maps. Conventional methods avoid this problem by using patch based approaches where each patch is segmented independently. However, independent patch segmentation induces errors, particularly at the patch boundary due to the lack of contextual information in very high-resolution…
▽ More
High-resolution image segmentation remains challenging and error-prone due to the enormous size of intermediate feature maps. Conventional methods avoid this problem by using patch based approaches where each patch is segmented independently. However, independent patch segmentation induces errors, particularly at the patch boundary due to the lack of contextual information in very high-resolution images where the patch size is much smaller compared to the full image. To overcome these limitations, in this paper, we propose a novel framework to segment a particular patch by incorporating contextual information from its neighboring patches. This allows the segmentation network to see the target patch with a wider field of view without the need of larger feature maps. Comparative analysis from a number of experiments shows that our proposed framework is able to segment high resolution images with significantly improved mean Intersection over Union and overall accuracy.
△ Less
Submitted 24 June, 2021;
originally announced June 2021.
-
Spin-glass state induced by Mn-doping into a moderate gap layered semiconductor SnSe$_2$
Authors:
Hongrui Huang,
Azizur Rahman,
Jianlin Wang,
Yalin Lu,
Ryota Akiyama,
Shuji Hasegawa
Abstract:
Various types of magnetism can appear in emerging quantum materials such as van der Waals layered ones. Here, we report the successful doping of manganese atoms into a post-transition metal dichalcogenide semiconductor: SnSe$_2$. We synthesized a single crystal Sn$_{1-x}$Mn$_x$Se$_{2}$ with $\textit{x}$ = 0.04 by the chemical vapor transport (CVT) method and characterized it by x-ray diffraction (…
▽ More
Various types of magnetism can appear in emerging quantum materials such as van der Waals layered ones. Here, we report the successful doping of manganese atoms into a post-transition metal dichalcogenide semiconductor: SnSe$_2$. We synthesized a single crystal Sn$_{1-x}$Mn$_x$Se$_{2}$ with $\textit{x}$ = 0.04 by the chemical vapor transport (CVT) method and characterized it by x-ray diffraction (XRD) and energy-dispersive x-ray spectroscopy (EDS). The magnetic properties indicated a competition between coexisting ferromagnetic and antiferromagnetic interactions, from the temperature dependence of the magnetization, together with magnetic hysteresis loops. This means that magnetic clusters having ferromagnetic interaction within a cluster form and the short-range antiferromagnetic interaction works between the clusters; a spin-glass state appears below ~ 60 K. Furthermore, we confirmed by $\textit{ab initio}$ calculations that the ferromagnetic interaction comes from the 3$\textit{d}$ electrons of the manganese dopant. Our results offer a new material platform to understand and utilize the magnetism in the van der Waals layered materials.
△ Less
Submitted 23 June, 2021;
originally announced June 2021.
-
Quantization of Gravity in the Black Hole Background
Authors:
Renata Kallosh,
Adel A. Rahman
Abstract:
We perform a covariant (Lagrangian) quantization of perturbative gravity in the background of a Schwarzschild black hole. The key tool is a decomposition of the field into spherical harmonics. We fix Regge-Wheeler gauge for modes with angular momentum quantum number $l \geq 2$, while for low multipole modes with $l$ $=$ $0$ or $1$ -- for which Regge-Wheeler gauge is inapplicable -- we propose a se…
▽ More
We perform a covariant (Lagrangian) quantization of perturbative gravity in the background of a Schwarzschild black hole. The key tool is a decomposition of the field into spherical harmonics. We fix Regge-Wheeler gauge for modes with angular momentum quantum number $l \geq 2$, while for low multipole modes with $l$ $=$ $0$ or $1$ -- for which Regge-Wheeler gauge is inapplicable -- we propose a set of gauge fixing conditions which are 2D background covariant and perturbatively well-defined. We find that the corresponding Faddeev-Popov ghosts are non-propagating for the $l\geq2$ modes, but are in general nontrivial for the low multipole modes with $l = 0,1$. However, in Schwarzschild coordinates, all time derivatives acting on the ghosts drop from the action and the low multipole ghosts have instantaneous propagators. Up to possible subtleties related to quantizing gravity in a space with a horizon, Faddeev's theorem suggests the possibility of an underlying canonical (Hamiltonian) quantization with a manifestly ghost-free Hilbert space.
△ Less
Submitted 6 October, 2021; v1 submitted 3 June, 2021;
originally announced June 2021.
-
Kolmogorov-Smirnov Test-Based Actively-Adaptive Thompson Sampling for Non-Stationary Bandits
Authors:
Gourab Ghatak,
Hardhik Mohanty,
Aniq Ur Rahman
Abstract:
We consider the non-stationary multi-armed bandit (MAB) framework and propose a Kolmogorov-Smirnov (KS) test based Thompson Sampling (TS) algorithm named TS-KS, that actively detects change points and resets the TS parameters once a change is detected. In particular, for the two-armed bandit case, we derive bounds on the number of samples of the reward distribution to detect the change once it occ…
▽ More
We consider the non-stationary multi-armed bandit (MAB) framework and propose a Kolmogorov-Smirnov (KS) test based Thompson Sampling (TS) algorithm named TS-KS, that actively detects change points and resets the TS parameters once a change is detected. In particular, for the two-armed bandit case, we derive bounds on the number of samples of the reward distribution to detect the change once it occurs. Consequently, we show that the proposed algorithm has sub-linear regret. Contrary to existing works, our algorithm is able to detect a change when the underlying reward distribution changes even though the mean reward remains the same. Finally, to test the efficacy of the proposed algorithm, we employ it in two case-studies: i) task-offloading scenario in wireless edge-computing, and ii) portfolio optimization. Our results show that the proposed TS-KS algorithm outperforms not only the static TS algorithm but also it performs better than other bandit algorithms designed for non-stationary environments. Moreover, the performance of TS-KS is at par with the state-of-the-art forecasting algorithms such as Facebook-PROPHET and ARIMA.
△ Less
Submitted 21 October, 2021; v1 submitted 30 May, 2021;
originally announced May 2021.
-
ViPTT-Net: Video pretraining of spatio-temporal model for tuberculosis type classification from chest CT scans
Authors:
Hasib Zunair,
Aimon Rahman,
Nabeel Mohammed
Abstract:
Pretraining has sparked groundswell of interest in deep learning workflows to learn from limited data and improve generalization. While this is common for 2D image classification tasks, its application to 3D medical imaging tasks like chest CT interpretation is limited. We explore the idea of whether pretraining a model on realistic videos could improve performance rather than training the model f…
▽ More
Pretraining has sparked groundswell of interest in deep learning workflows to learn from limited data and improve generalization. While this is common for 2D image classification tasks, its application to 3D medical imaging tasks like chest CT interpretation is limited. We explore the idea of whether pretraining a model on realistic videos could improve performance rather than training the model from scratch, intended for tuberculosis type classification from chest CT scans. To incorporate both spatial and temporal features, we develop a hybrid convolutional neural network (CNN) and recurrent neural network (RNN) model, where the features are extracted from each axial slice of the CT scan by a CNN, these sequence of image features are input to a RNN for classification of the CT scan. Our model termed as ViPTT-Net, was trained on over 1300 video clips with labels of human activities, and then fine-tuned on chest CT scans with labels of tuberculosis type. We find that pretraining the model on videos lead to better representations and significantly improved model validation performance from a kappa score of 0.17 to 0.35, especially for under-represented class samples. Our best method achieved 2nd place in the ImageCLEF 2021 Tuberculosis - TBT classification task with a kappa score of 0.20 on the final test set with only image information (without using clinical meta-data). All codes and models are made available.
△ Less
Submitted 26 May, 2021;
originally announced May 2021.
-
On Data-centric Forwarding in Mobile Ad-hoc Networks: Baseline Design and Simulation Analysis
Authors:
Md Ashiqur Rahman,
Beichuan Zhang
Abstract:
IP networking deals with end-to-end communication where the network layer routing protocols maintain the reachability from one address to another. However, challenging environments, such as mobile ad-hoc networks or MANETs, lead to frequent path failures and changes between the sender and receiver, incurring higher packet loss. The obligatory route setup and maintenance of a device-to-device stabl…
▽ More
IP networking deals with end-to-end communication where the network layer routing protocols maintain the reachability from one address to another. However, challenging environments, such as mobile ad-hoc networks or MANETs, lead to frequent path failures and changes between the sender and receiver, incurring higher packet loss. The obligatory route setup and maintenance of a device-to-device stable path in MANETs incur significant data retrieval delay and transmission overhead. Such overhead exaggerates the packet loss manifold.
Named Data Networking (NDN) can avoid such delays and overhead and significantly improve the overall network performance. It does so with direct application-controlled named-data retrieval from any node in a network instead of reaching a specific IP address with protocol message exchange. However, existing works lack any explicit or systematic analysis to justify such claims. Our work analyzes the core NDN and IP architectures in a MANET at a baseline level. The extensive simulations show that NDN, when applied correctly, yields much lower data retrieval latency than IP and can lower the network transmission overhead in most cases. As a result, NDN's stateful forwarder can significantly increase the retrieval rate, offering a better trade-off at the network layer. Such performance comes from its caching, built-in multicast, and request aggregation without requiring an IP-like separate routing control plane.
△ Less
Submitted 16 May, 2021;
originally announced May 2021.
-
Resource Allocation and Service Provisioning in Multi-Agent Cloud Robotics: A Comprehensive Survey
Authors:
Mahbuba Afrin,
Jiong Jin,
Akhlaqur Rahman,
Ashfaqur Rahman,
Jiafu Wan,
Ekram Hossain
Abstract:
Robotic applications nowadays are widely adopted to enhance operational automation and performance of real-world Cyber-Physical Systems (CPSs) including Industry 4.0, agriculture, healthcare, and disaster management. These applications are composed of latency-sensitive, data-heavy, and compute-intensive tasks. The robots, however, are constrained in the computational power and storage capacity. Th…
▽ More
Robotic applications nowadays are widely adopted to enhance operational automation and performance of real-world Cyber-Physical Systems (CPSs) including Industry 4.0, agriculture, healthcare, and disaster management. These applications are composed of latency-sensitive, data-heavy, and compute-intensive tasks. The robots, however, are constrained in the computational power and storage capacity. The concept of multi-agent cloud robotics enables robot-to-robot cooperation and creates a complementary environment for the robots in executing large-scale applications with the capability to utilize the edge and cloud resources. However, in such a collaborative environment, the optimal resource allocation for robotic tasks is challenging to achieve. Heterogeneous energy consumption rates and application of execution costs associated with the robots and computing instances make it even more complex. In addition, the data transmission delay between local robots, edge nodes, and cloud data centres adversely affects the real-time interactions and impedes service performance guarantee. Taking all these issues into account, this paper comprehensively surveys the state-of-the-art on resource allocation and service provisioning in multi-agent cloud robotics. The paper presents the application domains of multi-agent cloud robotics through explicit comparison with the contemporary computing paradigms and identifies the specific research challenges. A complete taxonomy on resource allocation is presented for the first time, together with the discussion of resource pooling, computation offloading, and task scheduling for efficient service provisioning. Furthermore, we highlight the research gaps from the learned lessons, and present future directions deemed beneficial to further advance this emerging field.
△ Less
Submitted 29 April, 2021;
originally announced April 2021.
-
Node Embedding using Mutual Information and Self-Supervision based Bi-level Aggregation
Authors:
Kashob Kumar Roy,
Amit Roy,
A K M Mahbubur Rahman,
M Ashraful Amin,
Amin Ahsan Ali
Abstract:
Graph Neural Networks (GNNs) learn low dimensional representations of nodes by aggregating information from their neighborhood in graphs. However, traditional GNNs suffer from two fundamental shortcomings due to their local ($l$-hop neighborhood) aggregation scheme. First, not all nodes in the neighborhood carry relevant information for the target node. Since GNNs do not exclude noisy nodes in the…
▽ More
Graph Neural Networks (GNNs) learn low dimensional representations of nodes by aggregating information from their neighborhood in graphs. However, traditional GNNs suffer from two fundamental shortcomings due to their local ($l$-hop neighborhood) aggregation scheme. First, not all nodes in the neighborhood carry relevant information for the target node. Since GNNs do not exclude noisy nodes in their neighborhood, irrelevant information gets aggregated, which reduces the quality of the representation. Second, traditional GNNs also fail to capture long-range non-local dependencies between nodes. To address these limitations, we exploit mutual information (MI) to define two types of neighborhood, 1) \textit{Local Neighborhood} where nodes are densely connected within a community and each node would share higher MI with its neighbors, and 2) \textit{Non-Local Neighborhood} where MI-based node clustering is introduced to assemble informative but graphically distant nodes in the same cluster. To generate node presentations, we combine the embeddings generated by bi-level aggregation - local aggregation to aggregate features from local neighborhoods to avoid noisy information and non-local aggregation to aggregate features from non-local neighborhoods. Furthermore, we leverage self-supervision learning to estimate MI with few labeled data. Finally, we show that our model significantly outperforms the state-of-the-art methods in a wide range of assortative and disassortative graphs.
△ Less
Submitted 27 April, 2021;
originally announced April 2021.
-
Structure-Aware Hierarchical Graph Pooling using Information Bottleneck
Authors:
Kashob Kumar Roy,
Amit Roy,
A K M Mahbubur Rahman,
M Ashraful Amin,
Amin Ahsan Ali
Abstract:
Graph pooling is an essential ingredient of Graph Neural Networks (GNNs) in graph classification and regression tasks. For these tasks, different pooling strategies have been proposed to generate a graph-level representation by downsampling and summarizing nodes' features in a graph. However, most existing pooling methods are unable to capture distinguishable structural information effectively. Be…
▽ More
Graph pooling is an essential ingredient of Graph Neural Networks (GNNs) in graph classification and regression tasks. For these tasks, different pooling strategies have been proposed to generate a graph-level representation by downsampling and summarizing nodes' features in a graph. However, most existing pooling methods are unable to capture distinguishable structural information effectively. Besides, they are prone to adversarial attacks. In this work, we propose a novel pooling method named as {HIBPool} where we leverage the Information Bottleneck (IB) principle that optimally balances the expressiveness and robustness of a model to learn representations of input data. Furthermore, we introduce a novel structure-aware Discriminative Pooling Readout ({DiP-Readout}) function to capture the informative local subgraph structures in the graph. Finally, our experimental results show that our model significantly outperforms other state-of-art methods on several graph classification benchmarks and more resilient to feature-perturbation attack than existing pooling methods.
△ Less
Submitted 27 April, 2021;
originally announced April 2021.
-
Unified Spatio-Temporal Modeling for Traffic Forecasting using Graph Neural Network
Authors:
Amit Roy,
Kashob Kumar Roy,
Amin Ahsan Ali,
M Ashraful Amin,
A K M Mahbubur Rahman
Abstract:
Research in deep learning models to forecast traffic intensities has gained great attention in recent years due to their capability to capture the complex spatio-temporal relationships within the traffic data. However, most state-of-the-art approaches have designed spatial-only (e.g. Graph Neural Networks) and temporal-only (e.g. Recurrent Neural Networks) modules to separately extract spatial and…
▽ More
Research in deep learning models to forecast traffic intensities has gained great attention in recent years due to their capability to capture the complex spatio-temporal relationships within the traffic data. However, most state-of-the-art approaches have designed spatial-only (e.g. Graph Neural Networks) and temporal-only (e.g. Recurrent Neural Networks) modules to separately extract spatial and temporal features. However, we argue that it is less effective to extract the complex spatio-temporal relationship with such factorized modules. Besides, most existing works predict the traffic intensity of a particular time interval only based on the traffic data of the previous one hour of that day. And thereby ignores the repetitive daily/weekly pattern that may exist in the last hour of data. Therefore, we propose a Unified Spatio-Temporal Graph Convolution Network (USTGCN) for traffic forecasting that performs both spatial and temporal aggregation through direct information propagation across different timestamp nodes with the help of spectral graph convolution on a spatio-temporal graph. Furthermore, it captures historical daily patterns in previous days and current-day patterns in current-day traffic data. Finally, we validate our work's effectiveness through experimental analysis, which shows that our model USTGCN can outperform state-of-the-art performances in three popular benchmark datasets from the Performance Measurement System (PeMS). Moreover, the training time is reduced significantly with our proposed USTGCN model.
△ Less
Submitted 28 April, 2021; v1 submitted 26 April, 2021;
originally announced April 2021.
-
Realising Einstein's mirror: Optomechanical damping with a thermal photon gas
Authors:
A. T. M. Anishur Rahman,
P. F. Barker
Abstract:
In 1909 Einstein described the thermalization of a mirror within a blackbody cavity by collisions with thermal photons. While the time to thermalize the motion of even a microscale or nanoscale object is so long that it is not feasible, we show that it is using the high intensity light from an amplified thermal light source with a well-defined chemical potential. We predict damping of the center-o…
▽ More
In 1909 Einstein described the thermalization of a mirror within a blackbody cavity by collisions with thermal photons. While the time to thermalize the motion of even a microscale or nanoscale object is so long that it is not feasible, we show that it is using the high intensity light from an amplified thermal light source with a well-defined chemical potential. We predict damping of the center-of mass motion due to this effect on times scales of seconds for small optomechanical systems, such as levitated nanoparticles, allowing experimental observation.
△ Less
Submitted 14 June, 2021; v1 submitted 6 April, 2021;
originally announced April 2021.