-
3-D Position Optimization of Solar-Powered Hovering UAV Relay in Optical Wireless Backhaul
Authors:
Heyou Liu,
Muhammad Salman Bashir,
Mohamed-Slim Alouini
Abstract:
A major hurdle in widespread deployment of UAVs (unmanned aerial vehicle) in existing communications infrastructure is the limited UAV onboard energy. Therefore, this study considers solar energy harvesting UAVs for wireless communications. In this context, we consider three dimensional position optimization of a solar-powered UAV relay that connects a distant sensor field to an optical ground sta…
▽ More
A major hurdle in widespread deployment of UAVs (unmanned aerial vehicle) in existing communications infrastructure is the limited UAV onboard energy. Therefore, this study considers solar energy harvesting UAVs for wireless communications. In this context, we consider three dimensional position optimization of a solar-powered UAV relay that connects a distant sensor field to an optical ground station (OGS) for data processing. The integrated sensor-UAV-OGS network utilizes radio frequency band for sensor-to-UAV links and the optical band for the UAV-to-OGS feeder link. Since atmospheric conditions affect both the harvested solar energy as well as the optical wireless signal, this study tackles UAV position optimization problems under various channel conditions such as clouds, atmospheric turbulence and dirt. From this study, we discover that the optimum position of the UAV -- that maximizes the end-to-end channel capacity -- is heavily dependent on the atmospheric channel conditions.
△ Less
Submitted 29 January, 2024;
originally announced January 2024.
-
Towards providing reliable job completion time predictions using PCS
Authors:
Abdullah Bin Faisal,
Noah Martin,
Hafiz Mohsin Bashir,
Swaminathan Lamelas,
Fahad R. Dogar
Abstract:
In this paper we build a case for providing job completion time predictions to cloud users, similar to the delivery date of a package or arrival time of a booked ride. Our analysis reveals that providing predictability can come at the expense of performance and fairness. Existing cloud scheduling systems optimize for extreme points in the trade-off space, making them either extremely unpredictable…
▽ More
In this paper we build a case for providing job completion time predictions to cloud users, similar to the delivery date of a package or arrival time of a booked ride. Our analysis reveals that providing predictability can come at the expense of performance and fairness. Existing cloud scheduling systems optimize for extreme points in the trade-off space, making them either extremely unpredictable or impractical.
To address this challenge, we present PCS, a new scheduling framework that aims to provide predictability while balancing other traditional objectives. The key idea behind PCS is to use Weighted-Fair-Queueing (WFQ) and find a suitable configuration of different WFQ parameters (e.g., class weights) that meets specific goals for predictability. It uses a simulation-aided search strategy, to efficiently discover WFQ configurations that lie on the Pareto front of the trade-off space between these objectives. We implement and evaluate PCS in the context of DNN job scheduling on GPUs. Our evaluation, on a small scale GPU testbed and larger-scale simulations, shows that PCS can provide accurate completion time estimates while marginally compromising on performance and fairness.
△ Less
Submitted 18 January, 2024;
originally announced January 2024.
-
Characterizing TCP's Performance for Low-Priority Flows Inside a Cloud
Authors:
Hafiz Mohsin Bashir,
Abdullah Bin Faisal,
Fahad R. Dogar
Abstract:
Many cloud systems utilize low-priority flows to achieve various performance objectives (e.g., low latency, high utilization), relying on TCP as their preferred transport protocol. However, the suitability of TCP for such low-priority flows is relatively unexplored. Specifically, how prioritization-induced delays in packet transmission can cause spurious timeouts and low utilization. In this paper…
▽ More
Many cloud systems utilize low-priority flows to achieve various performance objectives (e.g., low latency, high utilization), relying on TCP as their preferred transport protocol. However, the suitability of TCP for such low-priority flows is relatively unexplored. Specifically, how prioritization-induced delays in packet transmission can cause spurious timeouts and low utilization. In this paper, we conduct an empirical study to investigate the performance of TCP for low-priority flows under a wide range of realistic scenarios: use-cases (with accompanying workloads) where the performance of low-priority flows is crucial to the functioning of the overall system as well as various network loads and other network parameters. Our findings yield two key insights: 1) for several popular use-cases (e.g., network scheduling), TCP's performance for low-priority flows is within 2x of a near-optimal scheme, 2) for emerging workloads that exhibit an on-off behavior in the high priority queue (e.g., distributed ML model training), TCP's performance for low-priority flows is poor. Finally, we discuss and conduct preliminary evaluation to show that two simple strategies -- weighted fair queuing (WFQ) and cross-queue congestion notification -- can substantially improve TCP's performance for low-priority flows.
△ Less
Submitted 16 January, 2024;
originally announced January 2024.
-
A personalized Uncertainty Quantification framework for patient survival models: estimating individual uncertainty of patients with metastatic brain tumors in the absence of ground truth
Authors:
Yuqi Wang,
Aarzu Gupta,
David Carpenter,
Trey Mullikin,
Zachary J. Reitman,
Scott Floyd,
John Kirkpatrick,
Joseph K. Salama,
Paul W. Sperduto,
Jian-Guo Liu,
Mustafa R. Bashir,
Kyle J. Lafata
Abstract:
TodevelopanovelUncertaintyQuantification (UQ) framework to estimate the uncertainty of patient survival models in the absence of ground truth, we developed and evaluated our approach based on a dataset of 1383 patients treated with stereotactic radiosurgery (SRS) for brain metastases between January 2015 and December 2020. Our motivating hypothesis is that a time-to-event prediction of a test pati…
▽ More
TodevelopanovelUncertaintyQuantification (UQ) framework to estimate the uncertainty of patient survival models in the absence of ground truth, we developed and evaluated our approach based on a dataset of 1383 patients treated with stereotactic radiosurgery (SRS) for brain metastases between January 2015 and December 2020. Our motivating hypothesis is that a time-to-event prediction of a test patient on inference is more certain given a higher feature-space-similarity to patients in the training set. Therefore, the uncertainty for a particular patient-of-interest is represented by the concordance index between a patient similarity rank and a prediction similarity rank. Model uncertainty was defined as the increased percentage of the max uncertainty-constrained-AUC compared to the model AUC. We evaluated our method on multiple clinically-relevant endpoints, including time to intracranial progression (ICP), progression-free survival (PFS) after SRS, overall survival (OS), and time to ICP and/or death (ICPD), on a variety of both statistical and non-statistical models, including CoxPH, conditional survival forest (CSF), and neural multi-task linear regression (NMTLR). Our results show that all models had the lowest uncertainty on ICP (2.21%) and the highest uncertainty (17.28%) on ICPD. OS models demonstrated high variation in uncertainty performance, where NMTLR had the lowest uncertainty(1.96%)and CSF had the highest uncertainty (14.29%). In conclusion, our method can estimate the uncertainty of individual patient survival modeling results. As expected, our data empirically demonstrate that as model uncertainty measured via our technique increases, the similarity between a feature-space and its predicted outcome decreases.
△ Less
Submitted 28 November, 2023;
originally announced November 2023.
-
What is in Your App? Uncovering Privacy Risks of Female Health Applications
Authors:
Muhammad Hassan,
Mahnoor Jameel,
Tian Wang,
Masooda Bashir
Abstract:
FemTech or Female Technology, is an expanding field dedicated to providing affordable and accessible healthcare solutions for women, prominently through Female Health Applications that monitor health and reproductive data. With the leading app exceeding 1 billion downloads, these applications are gaining widespread popularity. However, amidst contemporary challenges to women's reproductive rights…
▽ More
FemTech or Female Technology, is an expanding field dedicated to providing affordable and accessible healthcare solutions for women, prominently through Female Health Applications that monitor health and reproductive data. With the leading app exceeding 1 billion downloads, these applications are gaining widespread popularity. However, amidst contemporary challenges to women's reproductive rights and privacy, there is a noticeable lack of comprehensive studies on the security and privacy aspects of these applications. This exploratory study delves into the privacy risks associated with seven popular applications. Our initial quantitative static analysis reveals varied and potentially risky permissions and numerous third-party trackers. Additionally, a preliminary examination of privacy policies indicates non-compliance with fundamental data privacy principles. These early findings highlight a critical gap in establishing robust privacy and security safeguards for FemTech apps, especially significant in a climate where women's reproductive rights face escalating threats.
△ Less
Submitted 22 October, 2023;
originally announced October 2023.
-
Optimal Photodetector Size for High-Speed Free-Space Optics Receivers
Authors:
Muhammad Salman Bashir,
Qasim Zeeshan Ahmed,
Mohamed-Slim Alouini
Abstract:
The selection of an optimal photodetector area is closely linked to the attainment of higher data rates in optical wireless communication receivers. If the photodetector area is too large, the channel capacity degrades due to lower modulation bandwidth of the detector. A smaller photodetector maximizes the bandwidth, but minimizes the captured signal power and the subsequent signal-to-noise ratio.…
▽ More
The selection of an optimal photodetector area is closely linked to the attainment of higher data rates in optical wireless communication receivers. If the photodetector area is too large, the channel capacity degrades due to lower modulation bandwidth of the detector. A smaller photodetector maximizes the bandwidth, but minimizes the captured signal power and the subsequent signal-to-noise ratio. Therein lies an opportunity in this trade-off to maximize the channel rate by choosing the optimal photodetector area. In this study, we have optimized the photodetector area in order to maximize the channel capacity of a free-space optical link for a diverse set of communication scenarios. We believe that the study in this paper in general -- and the closed-form solutions derived in this study in particular -- will be helpful to maximize achievable data rates of a wide gamut of optical wireless communication systems: from long range deep space optical links to short range indoor visible light communication systems.
△ Less
Submitted 16 September, 2023;
originally announced September 2023.
-
Angle-of-Arrival Estimation of Narrow Gaussian Beams for Mobile FSO Platforms
Authors:
Ming-Cheng Tsai,
Muhammad Salman Bashir,
Mohamed-Slim Alouini
Abstract:
Due to the narrow beamwidths of laser Gaussian beams, accurate tracking of laser beam's angle-of-arrival is an important problem in mobile free-space optical communications. In most optical receivers today, fine tracking of angle-of-arrival involves estimating the location of the focused beam spot projected onto a focal plane array. However, for very thin Gaussian beams, both the location as well…
▽ More
Due to the narrow beamwidths of laser Gaussian beams, accurate tracking of laser beam's angle-of-arrival is an important problem in mobile free-space optical communications. In most optical receivers today, fine tracking of angle-of-arrival involves estimating the location of the focused beam spot projected onto a focal plane array. However, for very thin Gaussian beams, both the location as well as the energy of the spot varies considerably with the variation of angle-of-arrival. In this study, we have analyzed the relationship between the angle-of-arrival and the energy of laser spot on the focal plane. We then exploited this relationship to enhance the angle-of-arrival estimation performance of our proposed receiver that takes into account both the location as well as the energy of the laser spot while estimating the angle-of-arrival. The derived Cramer-Rao bounds indicate that the system performance can be enhanced significantly for narrow Gaussian beams when both the spot location and energy are exploited for angle-of-arrival estimation.
△ Less
Submitted 29 July, 2023;
originally announced July 2023.
-
A Fully Automated and Explainable Algorithm for the Prediction of Malignant Transformation in Oral Epithelial Dysplasia
Authors:
Adam J Shephard,
Raja Muhammad Saad Bashir,
Hanya Mahmood,
Mostafa Jahanifar,
Fayyaz Minhas,
Shan E Ahmed Raza,
Kris D McCombe,
Stephanie G Craig,
Jacqueline James,
Jill Brooks,
Paul Nankivell,
Hisham Mehanna,
Syed Ali Khurram,
Nasir M Rajpoot
Abstract:
Oral epithelial dysplasia (OED) is a premalignant histopathological diagnosis given to lesions of the oral cavity. Its grading suffers from significant inter-/intra- observer variability, and does not reliably predict malignancy progression, potentially leading to suboptimal treatment decisions. To address this, we developed a novel artificial intelligence algorithm that can assign an Oral Maligna…
▽ More
Oral epithelial dysplasia (OED) is a premalignant histopathological diagnosis given to lesions of the oral cavity. Its grading suffers from significant inter-/intra- observer variability, and does not reliably predict malignancy progression, potentially leading to suboptimal treatment decisions. To address this, we developed a novel artificial intelligence algorithm that can assign an Oral Malignant Transformation (OMT) risk score, based on histological patterns in the in Haematoxylin and Eosin stained whole slide images, to quantify the risk of OED progression. The algorithm is based on the detection and segmentation of nuclei within (and around) the epithelium using an in-house segmentation model. We then employed a shallow neural network fed with interpretable morphological/spatial features, emulating histological markers. We conducted internal cross-validation on our development cohort (Sheffield; n = 193 cases) followed by independent validation on two external cohorts (Birmingham and Belfast; n = 92 cases). The proposed OMTscore yields an AUROC = 0.74 in predicting whether an OED progresses to malignancy or not. Survival analyses showed the prognostic value of our OMTscore for predicting malignancy transformation, when compared to the manually-assigned WHO and binary grades. Analysis of the correctly predicted cases elucidated the presence of peri-epithelial and epithelium-infiltrating lymphocytes in the most predictive patches of cases that transformed (p < 0.0001). This is the first study to propose a completely automated algorithm for predicting OED transformation based on interpretable nuclear features, whilst being validated on external datasets. The algorithm shows better-than-human-level performance for prediction of OED malignant transformation and offers a promising solution to the challenges of grading OED in routine clinical practice.
△ Less
Submitted 6 July, 2023;
originally announced July 2023.
-
Paarl Africa Underground Laboratory (PAUL)
Authors:
Robert Adam,
Claire Antel,
Munirat Bashir,
Driss Benchekroun,
Xavier Bertou,
Markus Böttcher,
Andy Buffler,
Andrew Chen,
Rouven Essig,
Jules Gascon,
Mohamed Gouighri,
Trevor Hass,
Gregory Hillhouse,
Abdeslam Hoummada,
Anslyn John,
Pete Jones,
Youssef Khoulaki,
Luca Lavina,
Lerothodi Leeuw,
Mantile Lekala,
Robert Lindsay,
Roy Maartens,
Yin-Zhe Ma,
Fairouz Malek,
Peane Maleka
, et al. (21 additional authors not shown)
Abstract:
Establishing a deep underground physics laboratory to study, amongst others, double beta decay, geoneutrinos, reactor neutrinos and dark matter has been discussed for more than a decade within the austral African physicists' community. PAUL, the Paarl Africa Underground Laboratory, is an initiative foreseeing an open international laboratory devoted to the development of competitive science in the…
▽ More
Establishing a deep underground physics laboratory to study, amongst others, double beta decay, geoneutrinos, reactor neutrinos and dark matter has been discussed for more than a decade within the austral African physicists' community. PAUL, the Paarl Africa Underground Laboratory, is an initiative foreseeing an open international laboratory devoted to the development of competitive science in the austral region. It has the advantage that the location, the Huguenot tunnel, exists already and the geology and the environment of the site is appropriate for an experimental facility. The paper describes the PAUL initiative, presents the physics prospects and discusses the capacity for building the future experimental facility.
△ Less
Submitted 21 June, 2023;
originally announced June 2023.
-
Duke Spleen Data Set: A Publicly Available Spleen MRI and CT dataset for Training Segmentation
Authors:
Yuqi Wang,
Jacob A. Macdonald,
Katelyn R. Morgan,
Danielle Hom,
Sarah Cubberley,
Kassi Sollace,
Nicole Casasanto,
Islam H. Zaki,
Kyle J. Lafata,
Mustafa R. Bashir
Abstract:
Spleen volumetry is primarily associated with patients suffering from chronic liver disease and portal hypertension, as they often have spleens with abnormal shapes and sizes. However, manually segmenting the spleen to obtain its volume is a time-consuming process. Deep learning algorithms have proven to be effective in automating spleen segmentation, but a suitable dataset is necessary for traini…
▽ More
Spleen volumetry is primarily associated with patients suffering from chronic liver disease and portal hypertension, as they often have spleens with abnormal shapes and sizes. However, manually segmenting the spleen to obtain its volume is a time-consuming process. Deep learning algorithms have proven to be effective in automating spleen segmentation, but a suitable dataset is necessary for training such algorithms. To our knowledge, the few publicly available datasets for spleen segmentation lack confounding features such as ascites and abdominal varices. To address this issue, the Duke Spleen Data Set (DSDS) has been developed, which includes 109 CT and MRI volumes from patients with chronic liver disease and portal hypertension. The dataset includes a diverse range of image types, vendors, planes, and contrasts, as well as varying spleen shapes and sizes due to underlying disease states. The DSDS aims to facilitate the creation of robust spleen segmentation models that can take into account these variations and confounding factors.
△ Less
Submitted 9 May, 2023;
originally announced May 2023.
-
Lidar-Assisted Acquisition of Mobile Airborne FSO Terminals in a GPS-Denied Environment
Authors:
Heyou Liu,
Muhammad Salman Bashir,
Mohamed-Slim Alouini
Abstract:
For acquisition of narrow-beam free-space optical (FSO) terminals, a Global Positioning System (GPS) is typically required for coarse localization of the terminal. However, the GPS signal may be shadowed, or may not be present at all, especially in rough or unnameable terrains. In this study, we propose a lidar-assisted acquisition of an unmanned aerial vehicle (UAV) for FSO communications in a po…
▽ More
For acquisition of narrow-beam free-space optical (FSO) terminals, a Global Positioning System (GPS) is typically required for coarse localization of the terminal. However, the GPS signal may be shadowed, or may not be present at all, especially in rough or unnameable terrains. In this study, we propose a lidar-assisted acquisition of an unmanned aerial vehicle (UAV) for FSO communications in a poor GPS environment. Such an acquisition system consists of a lidar subsystem and an FSO acquisition subsystem: The lidar subsystem is used for coarse acquisition of the UAV, whereas, the FSO subsystem is utilized for fine acquisition to obtain the UAV's accurate position. This study investigates the optimal allocation of energy between the lidar and FSO subsystems to minimize the acquisition time. Here, we minimize the average acquisition time, and maximize the cumulative distribution function of acquisition time for a fixed threshold. We learn that an optimal value of the energy allocation factor exists that provides the best performance for the proposed acquisition system.
△ Less
Submitted 5 April, 2023;
originally announced April 2023.
-
CoNIC Challenge: Pushing the Frontiers of Nuclear Detection, Segmentation, Classification and Counting
Authors:
Simon Graham,
Quoc Dang Vu,
Mostafa Jahanifar,
Martin Weigert,
Uwe Schmidt,
Wenhua Zhang,
Jun Zhang,
Sen Yang,
**xi Xiang,
Xiyue Wang,
Josef Lorenz Rumberger,
Elias Baumann,
Peter Hirsch,
Lihao Liu,
Chenyang Hong,
Angelica I. Aviles-Rivero,
Ayushi Jain,
Heeyoung Ahn,
Yiyu Hong,
Hussam Azzuni,
Min Xu,
Mohammad Yaqub,
Marie-Claire Blache,
Benoît Piégu,
Bertrand Vernay
, et al. (64 additional authors not shown)
Abstract:
Nuclear detection, segmentation and morphometric profiling are essential in hel** us further understand the relationship between histology and patient outcome. To drive innovation in this area, we setup a community-wide challenge using the largest available dataset of its kind to assess nuclear segmentation and cellular composition. Our challenge, named CoNIC, stimulated the development of repro…
▽ More
Nuclear detection, segmentation and morphometric profiling are essential in hel** us further understand the relationship between histology and patient outcome. To drive innovation in this area, we setup a community-wide challenge using the largest available dataset of its kind to assess nuclear segmentation and cellular composition. Our challenge, named CoNIC, stimulated the development of reproducible algorithms for cellular recognition with real-time result inspection on public leaderboards. We conducted an extensive post-challenge analysis based on the top-performing models using 1,658 whole-slide images of colon tissue. With around 700 million detected nuclei per model, associated features were used for dysplasia grading and survival analysis, where we demonstrated that the challenge's improvement over the previous state-of-the-art led to significant boosts in downstream performance. Our findings also suggest that eosinophils and neutrophils play an important role in the tumour microevironment. We release challenge models and WSI-level results to foster the development of further methods for biomarker discovery.
△ Less
Submitted 14 March, 2023; v1 submitted 10 March, 2023;
originally announced March 2023.
-
Mimicking a Pathologist: Dual Attention Model for Scoring of Gigapixel Histology Images
Authors:
Manahil Raza,
Ruqayya Awan,
Raja Muhammad Saad Bashir,
Talha Qaiser,
Nasir M. Rajpoot
Abstract:
Some major challenges associated with the automated processing of whole slide images (WSIs) includes their sheer size, different magnification levels and high resolution. Utilizing these images directly in AI frameworks is computationally expensive due to memory constraints, while downsampling WSIs incurs information loss and splitting WSIs into tiles and patches results in loss of important conte…
▽ More
Some major challenges associated with the automated processing of whole slide images (WSIs) includes their sheer size, different magnification levels and high resolution. Utilizing these images directly in AI frameworks is computationally expensive due to memory constraints, while downsampling WSIs incurs information loss and splitting WSIs into tiles and patches results in loss of important contextual information. We propose a novel dual attention approach, consisting of two main components, to mimic visual examination by a pathologist. The first component is a soft attention model which takes as input a high-level view of the WSI to determine various regions of interest. We employ a custom sampling method to extract diverse and spatially distinct image tiles from selected high attention areas. The second component is a hard attention classification model, which further extracts a sequence of multi-resolution glimpses from each tile for classification. Since hard attention is non-differentiable, we train this component using reinforcement learning and predict the location of glimpses without processing all patches of a given tile, thereby aligning with pathologist's way of diagnosis. We train our components both separately and in an end-to-end fashion using a joint loss function to demonstrate the efficacy of our proposed model. We employ our proposed model on two different IHC use cases: HER2 prediction on breast cancer and prediction of Intact/Loss status of two MMR biomarkers, for colorectal cancer. We show that the proposed model achieves accuracy comparable to state-of-the-art methods while only processing a small fraction of the WSI at highest magnification.
△ Less
Submitted 19 February, 2023;
originally announced February 2023.
-
Consistency Regularisation in Varying Contexts and Feature Perturbations for Semi-Supervised Semantic Segmentation of Histology Images
Authors:
Raja Muhammad Saad Bashir,
Talha Qaiser,
Shan E Ahmed Raza,
Nasir M. Rajpoot
Abstract:
Semantic segmentation of various tissue and nuclei types in histology images is fundamental to many downstream tasks in the area of computational pathology (CPath). In recent years, Deep Learning (DL) methods have been shown to perform well on segmentation tasks but DL methods generally require a large amount of pixel-wise annotated data. Pixel-wise annotation sometimes requires expert's knowledge…
▽ More
Semantic segmentation of various tissue and nuclei types in histology images is fundamental to many downstream tasks in the area of computational pathology (CPath). In recent years, Deep Learning (DL) methods have been shown to perform well on segmentation tasks but DL methods generally require a large amount of pixel-wise annotated data. Pixel-wise annotation sometimes requires expert's knowledge and time which is laborious and costly to obtain. In this paper, we present a consistency based semi-supervised learning (SSL) approach that can help mitigate this challenge by exploiting a large amount of unlabelled data for model training thus alleviating the need for a large annotated dataset. However, SSL models might also be susceptible to changing context and features perturbations exhibiting poor generalisation due to the limited training data. We propose an SSL method that learns robust features from both labelled and unlabelled images by enforcing consistency against varying contexts and feature perturbations. The proposed method incorporates context-aware consistency by contrasting pairs of overlap** images in a pixel-wise manner from changing contexts resulting in robust and context invariant features. We show that cross-consistency training makes the encoder features invariant to different perturbations and improves the prediction confidence. Finally, entropy minimisation is employed to further boost the confidence of the final prediction maps from unlabelled data. We conduct an extensive set of experiments on two publicly available large datasets (BCSS and MoNuSeg) and show superior performance compared to the state-of-the-art methods.
△ Less
Submitted 11 February, 2023; v1 submitted 30 January, 2023;
originally announced January 2023.
-
LYSTO: The Lymphocyte Assessment Hackathon and Benchmark Dataset
Authors:
Yi** Jiao,
Jeroen van der Laak,
Shadi Albarqouni,
Zhang Li,
Tao Tan,
Abhir Bhalerao,
Jiabo Ma,
Jiamei Sun,
Johnathan Pocock,
Josien P. W. Pluim,
Navid Alemi Koohbanani,
Raja Muhammad Saad Bashir,
Shan E Ahmed Raza,
Sibo Liu,
Simon Graham,
Suzanne Wetstein,
Syed Ali Khurram,
Thomas Watson,
Nasir Rajpoot,
Mitko Veta,
Francesco Ciompi
Abstract:
We introduce LYSTO, the Lymphocyte Assessment Hackathon, which was held in conjunction with the MICCAI 2019 Conference in Shenzen (China). The competition required participants to automatically assess the number of lymphocytes, in particular T-cells, in histopathological images of colon, breast, and prostate cancer stained with CD3 and CD8 immunohistochemistry. Differently from other challenges se…
▽ More
We introduce LYSTO, the Lymphocyte Assessment Hackathon, which was held in conjunction with the MICCAI 2019 Conference in Shenzen (China). The competition required participants to automatically assess the number of lymphocytes, in particular T-cells, in histopathological images of colon, breast, and prostate cancer stained with CD3 and CD8 immunohistochemistry. Differently from other challenges setup in medical image analysis, LYSTO participants were solely given a few hours to address this problem. In this paper, we describe the goal and the multi-phase organization of the hackathon; we describe the proposed methods and the on-site results. Additionally, we present post-competition results where we show how the presented methods perform on an independent set of lung cancer slides, which was not part of the initial competition, as well as a comparison on lymphocyte assessment between presented methods and a panel of pathologists. We show that some of the participants were capable to achieve pathologist-level performance at lymphocyte assessment. After the hackathon, LYSTO was left as a lightweight plug-and-play benchmark dataset on grand-challenge website, together with an automatic evaluation platform. LYSTO has supported a number of research in lymphocyte assessment in oncology. LYSTO will be a long-lasting educational challenge for deep learning and digital pathology, it is available at https://lysto.grand-challenge.org/.
△ Less
Submitted 13 April, 2023; v1 submitted 16 January, 2023;
originally announced January 2023.
-
Energetic electron precipitation driven by electromagnetic ion cyclotron waves from ELFIN's low altitude perspective
Authors:
V. Angelopoulos,
X. -J. Zhang,
A. V. Artemyev,
D. Mourenas,
E. Tsai,
C. Wilkins,
A. Runov,
J. Liu,
D. L. Turner,
W. Li,
K. Khurana,
R. E. Wirz,
V. A. Sergeev,
X. Meng,
J. Wu,
M. D. Hartinger,
T. Raita,
Y. Shen,
X. An,
X. Shi,
M. F. Bashir,
X. Shen,
L. Gan,
M. Qin,
L. Capannolo
, et al. (61 additional authors not shown)
Abstract:
We review comprehensive observations of electromagnetic ion cyclotron (EMIC) wave-driven energetic electron precipitation using data from the energetic electron detector on the Electron Losses and Fields InvestigatioN (ELFIN) mission, two polar-orbiting low-altitude spinning CubeSats, measuring 50-5000 keV electrons with good pitch-angle and energy resolution. EMIC wave-driven precipitation exhibi…
▽ More
We review comprehensive observations of electromagnetic ion cyclotron (EMIC) wave-driven energetic electron precipitation using data from the energetic electron detector on the Electron Losses and Fields InvestigatioN (ELFIN) mission, two polar-orbiting low-altitude spinning CubeSats, measuring 50-5000 keV electrons with good pitch-angle and energy resolution. EMIC wave-driven precipitation exhibits a distinct signature in energy-spectrograms of the precipitating-to-trapped flux ratio: peaks at 0.5 MeV which are abrupt (bursty) with significant substructure (occasionally down to sub-second timescale). Multiple ELFIN passes over the same MLT sector allow us to study the spatial and temporal evolution of the EMIC wave - electron interaction region. Using two years of ELFIN data, we assemble a statistical database of 50 events of strong EMIC wave-driven precipitation. Most reside at L=5-7 at dusk, while a smaller subset exists at L=8-12 at post-midnight. The energies of the peak-precipitation ratio and of the half-peak precipitation ratio (our proxy for the minimum resonance energy) exhibit an L-shell dependence in good agreement with theoretical estimates based on prior statistical observations of EMIC wave power spectra. The precipitation ratio's spectral shape for the most intense events has an exponential falloff away from the peak (i.e., on either side of 1.45 MeV). It too agrees well with quasi-linear diffusion theory based on prior statistics of wave spectra. Sub-MeV electron precipitation observed concurrently with strong EMIC wave-driven 1MeV precipitation has a spectral shape that is consistent with efficient pitch-angle scattering down to 200-300 keV by much less intense higher frequency EMIC waves. These results confirm the critical role of EMIC waves in driving relativistic electron losses. Nonlinear effects may abound and require further investigation.
△ Less
Submitted 28 November, 2022;
originally announced November 2022.
-
Unsourced Random Access with Threshold$-$Based Feedback
Authors:
Murwan Bashir,
Ehsan Nassaji,
Dmitri Truhachev,
Alireza Bayesteh,
Monirosharieh Vameghestahbanati
Abstract:
In this paper we focus on a feedback mechanism for unsourced random access (URA) communications. We propose an algorithm to construct feedback packets broadcasted to the users by the base station (BS) as well as the feedback packet format that allows the users to estimate their channels and infer positive or negative feedback based on the presented thresholding algorithm. We demonstrate that the p…
▽ More
In this paper we focus on a feedback mechanism for unsourced random access (URA) communications. We propose an algorithm to construct feedback packets broadcasted to the users by the base station (BS) as well as the feedback packet format that allows the users to estimate their channels and infer positive or negative feedback based on the presented thresholding algorithm. We demonstrate that the proposed feedback imposes a much smaller complexity burden on the users compared to the feedback that positively acknowledges all successful or negatively acknowledges all undecoded users. We also show that the proposed feedback technique can lead to a substantial reduction in the packet error rates and signal-to-noise ratios (SNR)s required to support various numbers of active users in the system.
△ Less
Submitted 22 November, 2022;
originally announced November 2022.
-
A Privacy Glossary for Cloud Computing
Authors:
Tian Wang,
Masooda Bashir
Abstract:
Cloud computing is an evolving paradigm that is frequently changing the way humans share, store, and access their information in digital format. While cloud computing offers tremendous benefits (e.g., efficiency, flexibility, and reduced costs), it also brings both security and privacy challenges. Although cloud security has been extensively defined and developed, privacy protections in cloud envi…
▽ More
Cloud computing is an evolving paradigm that is frequently changing the way humans share, store, and access their information in digital format. While cloud computing offers tremendous benefits (e.g., efficiency, flexibility, and reduced costs), it also brings both security and privacy challenges. Although cloud security has been extensively defined and developed, privacy protections in cloud environments are often described in abstract or vague language, which makes it difficult to interpret and implement. In this study, we propose an initial approach of develo** a privacy glossary for cloud computing that provides a consistent and comprehensive set of terminologies for cloud privacy. We believe that this systematic and structured privacy glossary could serve as a first step towards implementing requirements for privacy protections in cloud computing, as well as providing more effective and consistent language in cloud privacy to researchers and professionals in the future.
△ Less
Submitted 19 January, 2023; v1 submitted 13 June, 2022;
originally announced June 2022.
-
Cellular Segmentation and Composition in Routine Histology Images using Deep Learning
Authors:
Muhammad Dawood,
Raja Muhammad Saad Bashir,
Srijay Deshpande,
Manahil Raza,
Adam Shephard
Abstract:
Identification and quantification of nuclei in colorectal cancer haematoxylin \& eosin (H\&E) stained histology images is crucial to prognosis and patient management. In computational pathology these tasks are referred to as nuclear segmentation, classification and composition and are used to extract meaningful interpretable cytological and architectural features for downstream analysis. The CoNIC…
▽ More
Identification and quantification of nuclei in colorectal cancer haematoxylin \& eosin (H\&E) stained histology images is crucial to prognosis and patient management. In computational pathology these tasks are referred to as nuclear segmentation, classification and composition and are used to extract meaningful interpretable cytological and architectural features for downstream analysis. The CoNIC challenge poses the task of automated nuclei segmentation, classification and composition into six different types of nuclei from the largest publicly known nuclei dataset - Lizard. In this regard, we have developed pipelines for the prediction of nuclei segmentation using HoVer-Net and ALBRT for cellular composition. On testing on the preliminary test set, HoVer-Net achieved a PQ of 0.58, a PQ+ of 0.58 and finally a mPQ+ of 0.35. For the prediction of cellular composition with ALBRT on the preliminary test set, we achieved an overall $R^2$ score of 0.53, consisting of 0.84 for lymphocytes, 0.70 for epithelial cells, 0.70 for plasma and .060 for eosinophils.
△ Less
Submitted 4 March, 2022;
originally announced March 2022.
-
Remote Sensing Image Super-resolution and Object Detection: Benchmark and State of the Art
Authors:
Yi Wang,
Syed Muhammad Arsalan Bashir,
Mahrukh Khan,
Qudrat Ullah,
Rui Wang,
Yilin Song,
Zhe Guo,
Yilong Niu
Abstract:
For the past two decades, there have been significant efforts to develop methods for object detection in Remote Sensing (RS) images. In most cases, the datasets for small object detection in remote sensing images are inadequate. Many researchers used scene classification datasets for object detection, which has its limitations; for example, the large-sized objects outnumber the small objects in ob…
▽ More
For the past two decades, there have been significant efforts to develop methods for object detection in Remote Sensing (RS) images. In most cases, the datasets for small object detection in remote sensing images are inadequate. Many researchers used scene classification datasets for object detection, which has its limitations; for example, the large-sized objects outnumber the small objects in object categories. Thus, they lack diversity; this further affects the detection performance of small object detectors in RS images. This paper reviews current datasets and object detection methods (deep learning-based) for remote sensing images. We also propose a large-scale, publicly available benchmark Remote Sensing Super-resolution Object Detection (RSSOD) dataset. The RSSOD dataset consists of 1,759 hand-annotated images with 22,091 instances of very high resolution (VHR) images with a spatial resolution of ~0.05 m. There are five classes with varying frequencies of labels per class. The image patches are extracted from satellite images, including real image distortions such as tangential scale distortion and skew distortion. We also propose a novel Multi-class Cyclic super-resolution Generative adversarial network with Residual feature aggregation (MCGR) and auxiliary YOLOv5 detector to benchmark image super-resolution-based object detection and compare with the existing state-of-the-art methods based on image super-resolution (SR). The proposed MCGR achieved state-of-the-art performance for image SR with an improvement of 1.2dB PSNR compared to the current state-of-the-art NLSN method. MCGR achieved best object detection mAPs of 0.758, 0.881, 0.841, and 0.983, respectively, for five-class, four-class, two-class, and single classes, respectively surpassing the performance of the state-of-the-art object detectors YOLOv5, EfficientDet, Faster RCNN, SSD, and RetinaNet.
△ Less
Submitted 5 November, 2021;
originally announced November 2021.
-
Stain-Robust Mitotic Figure Detection for the Mitosis Domain Generalization Challenge
Authors:
Mostafa Jahanifar,
Adam Shephard,
Neda Zamani Tajeddin,
R. M. Saad Bashir,
Mohsin Bilal,
Syed Ali Khurram,
Fayyaz Minhas,
Nasir Rajpoot
Abstract:
The detection of mitotic figures from different scanners/sites remains an important topic of research, owing to its potential in assisting clinicians with tumour grading. The MItosis DOmain Generalization (MIDOG) challenge aims to test the robustness of detection models on unseen data from multiple scanners for this task. We present a short summary of the approach employed by the TIA Centre team t…
▽ More
The detection of mitotic figures from different scanners/sites remains an important topic of research, owing to its potential in assisting clinicians with tumour grading. The MItosis DOmain Generalization (MIDOG) challenge aims to test the robustness of detection models on unseen data from multiple scanners for this task. We present a short summary of the approach employed by the TIA Centre team to address this challenge. Our approach is based on a hybrid detection model, where mitotic candidates are segmented on stain normalised images, before being refined by a deep learning classifier. Cross-validation on the training images achieved the F1-score of 0.786 and 0.765 on the preliminary test set, demonstrating the generalizability of our model to unseen data from new scanners.
△ Less
Submitted 29 September, 2021; v1 submitted 2 September, 2021;
originally announced September 2021.
-
Simultaneous Nuclear Instance and Layer Segmentation in Oral Epithelial Dysplasia
Authors:
Adam J. Shephard,
Simon Graham,
R. M. Saad Bashir,
Mostafa Jahanifar,
Hanya Mahmood,
Syed Ali Khurram,
Nasir M. Rajpoot
Abstract:
Oral epithelial dysplasia (OED) is a pre-malignant histopathological diagnosis given to lesions of the oral cavity. Predicting OED grade or whether a case will transition to malignancy is critical for early detection and appropriate treatment. OED typically begins in the lower third of the epithelium before progressing upwards with grade severity, thus we have suggested that segmenting intra-epith…
▽ More
Oral epithelial dysplasia (OED) is a pre-malignant histopathological diagnosis given to lesions of the oral cavity. Predicting OED grade or whether a case will transition to malignancy is critical for early detection and appropriate treatment. OED typically begins in the lower third of the epithelium before progressing upwards with grade severity, thus we have suggested that segmenting intra-epithelial layers, in addition to individual nuclei, may enable researchers to evaluate important layer-specific morphological features for grade/malignancy prediction. We present HoVer-Net+, a deep learning framework to simultaneously segment (and classify) nuclei and (intra-)epithelial layers in H&E stained slides from OED cases. The proposed architecture consists of an encoder branch and four decoder branches for simultaneous instance segmentation of nuclei and semantic segmentation of the epithelial layers. We show that the proposed model achieves the state-of-the-art (SOTA) performance in both tasks, with no additional costs when compared to previous SOTA methods for each task. To the best of our knowledge, ours is the first method for simultaneous nuclear instance segmentation and semantic tissue segmentation, with potential for use in computational pathology for other similar simultaneous tasks and for future studies into malignancy prediction.
△ Less
Submitted 1 September, 2021; v1 submitted 31 August, 2021;
originally announced August 2021.
-
A Comprehensive Review of Deep Learning-based Single Image Super-resolution
Authors:
Syed Muhammad Arsalan Bashir,
Yi Wang,
Mahrukh Khan,
Yilong Niu
Abstract:
Image super-resolution (SR) is one of the vital image processing methods that improve the resolution of an image in the field of computer vision. In the last two decades, significant progress has been made in the field of super-resolution, especially by utilizing deep learning methods. This survey is an effort to provide a detailed survey of recent progress in single-image super-resolution in the…
▽ More
Image super-resolution (SR) is one of the vital image processing methods that improve the resolution of an image in the field of computer vision. In the last two decades, significant progress has been made in the field of super-resolution, especially by utilizing deep learning methods. This survey is an effort to provide a detailed survey of recent progress in single-image super-resolution in the perspective of deep learning while also informing about the initial classical methods used for image super-resolution. The survey classifies the image SR methods into four categories, i.e., classical methods, supervised learning-based methods, unsupervised learning-based methods, and domain-specific SR methods. We also introduce the problem of SR to provide intuition about image quality metrics, available reference datasets, and SR challenges. Deep learning-based approaches of SR are evaluated using a reference dataset. Some of the reviewed state-of-the-art image SR methods include the enhanced deep SR network (EDSR), cycle-in-cycle GAN (CinCGAN), multiscale residual network (MSRN), meta residual dense network (Meta-RDN), recurrent back-projection network (RBPN), second-order attention network (SAN), SR feedback network (SRFBN) and the wavelet-based residual attention network (WRAN). Finally, this survey is concluded with future directions and trends in SR and open problems in SR to be addressed by the researchers.
△ Less
Submitted 5 September, 2022; v1 submitted 18 February, 2021;
originally announced February 2021.
-
Free-Space Optical MISO Communications With an Array of Detectors
Authors:
Muhammad Salman Bashir,
Mohamed-Slim Alouini
Abstract:
Multiple-input multiple-output (MIMO) and multiple-input single-output (MISO) schemes have yielded promising results in free space optical (FSO) communications by providing diversity against fading of the received signal intensity. In this paper, we have analyzed the probability of error performance of a \emph{muliple-input single-output} (MISO) free-space optical channel that employs array(s) of…
▽ More
Multiple-input multiple-output (MIMO) and multiple-input single-output (MISO) schemes have yielded promising results in free space optical (FSO) communications by providing diversity against fading of the received signal intensity. In this paper, we have analyzed the probability of error performance of a \emph{muliple-input single-output} (MISO) free-space optical channel that employs array(s) of detectors at the receiver. In this regard, we have considered the \emph{maximal ratio combiner} (MRC) and \emph{equal gain combiner} (EGC) fusion algorithms for the array of detectors, and we have examined the performance of these algorithms subject to phase and pointing errors for strong atmospheric turbulence conditions. It is concluded that when the variance of the phase and pointing errors are below certain thresholds, signal combining with a single array of detectors yields significantly better performance than a multiple arrays receiver. In the final part of the paper, we examine the probability of error of the single detector array receiver as a function of the beam radius, and the probability of error is minimized by (numerically) optimizing the beam radius of the received signal beams.
△ Less
Submitted 1 September, 2020;
originally announced September 2020.
-
HydraMix-Net: A Deep Multi-task Semi-supervised Learning Approach for Cell Detection and Classification
Authors:
R. M. Saad Bashir,
Talha Qaiser,
Shan E Ahmed Raza,
Nasir M. Rajpoot
Abstract:
Semi-supervised techniques have removed the barriers of large scale labelled set by exploiting unlabelled data to improve the performance of a model. In this paper, we propose a semi-supervised deep multi-task classification and localization approach HydraMix-Net in the field of medical imagining where labelling is time consuming and costly. Firstly, the pseudo labels are generated using the model…
▽ More
Semi-supervised techniques have removed the barriers of large scale labelled set by exploiting unlabelled data to improve the performance of a model. In this paper, we propose a semi-supervised deep multi-task classification and localization approach HydraMix-Net in the field of medical imagining where labelling is time consuming and costly. Firstly, the pseudo labels are generated using the model's prediction on the augmented set of unlabelled image with averaging. The high entropy predictions are further sharpened to reduced the entropy and are then mixed with the labelled set for training. The model is trained in multi-task learning manner with noise tolerant joint loss for classification localization and achieves better performance when given limited data in contrast to a simple deep model. On DLBCL data it achieves 80\% accuracy in contrast to simple CNN achieving 70\% accuracy when given only 100 labelled examples.
△ Less
Submitted 11 August, 2020;
originally announced August 2020.
-
Are PETs (Privacy Enhancing Technologies) Giving Protection for Smartphones? -- A Case Study
Authors:
Tanusree Sharma,
Masooda Bashir
Abstract:
With smartphone technologies enhanced way of interacting with the world around us, it has also been paving the way for easier access to our private and personal information. This has been amplified by the existence of numerous embedded sensors utilized by millions of apps to users. While mobile apps have positively transformed many aspects of our lives with new functionalities, many of these appli…
▽ More
With smartphone technologies enhanced way of interacting with the world around us, it has also been paving the way for easier access to our private and personal information. This has been amplified by the existence of numerous embedded sensors utilized by millions of apps to users. While mobile apps have positively transformed many aspects of our lives with new functionalities, many of these applications are taking advantage of vast amounts of data, privacy apps, a form of Privacy Enhancing Technology can be an effective privacy management tool for smartphones. To protect against vulnerabilities related to the collection, storage, and sharing of sensitive data, developers are building numerous privacy apps. However, there has been a lack of discretion in this particular area which calls for a proper assessment to understand the far-reaching utilization of these apps among users. During this process we have conducted an evaluation of the most popular privacy apps from our total collection of five hundred and twelve to demonstrate their functionality specific data protections they are claiming to offer, both technologically and conventionally, measuring up to standards. Taking their offered security functionalities as a scale, we conducted forensic experiments to indicate where they are failing to be consistent in maintaining protection. For legitimate validation of security gaps in assessed privacy apps, we have also utilized NIST and OWASP guidelines. We believe this study will be efficacious for continuous improvement and can be considered as a foundation towards a common standard for privacy and security measures for an app's development stage.
△ Less
Submitted 8 July, 2020;
originally announced July 2020.
-
Smartphone Security Behavioral Scale: A New Psychometric Measurement for Smartphone Security
Authors:
Hsiao-Ying Huang,
Soteris Demetriou,
Rini Banerjee,
Güliz Seray Tuncay,
Carl A. Gunter,
Masooda Bashir
Abstract:
Despite widespread use of smartphones, there is no measurement standard targeted at smartphone security behaviors. In this paper we translate a well-known cybersecurity behavioral scale into the smartphone domain and show that we can improve on this translation by following an established psychometrics approach surveying 1011 participants. We design a new 14-item Smartphone Security Behavioral Sca…
▽ More
Despite widespread use of smartphones, there is no measurement standard targeted at smartphone security behaviors. In this paper we translate a well-known cybersecurity behavioral scale into the smartphone domain and show that we can improve on this translation by following an established psychometrics approach surveying 1011 participants. We design a new 14-item Smartphone Security Behavioral Scale (SSBS) exhibiting high reliability and good fit to a two-component behavioural model based on technical versus social protection strategies. We then demonstrate how SSBS can be applied to measure the influence of mental health issues on smartphone security behavior intentions. We found significant correlations that predict SSBS profiles from three types of MHIs. Conversely, we are able to predict presence of MHIs using SSBS profiles.We obtain prediction AUCs of 72.1% for Internet addiction,75.8% for depression and 66.2% for insomnia.
△ Less
Submitted 6 July, 2020; v1 submitted 3 July, 2020;
originally announced July 2020.
-
Perspective Texture Synthesis Based on Improved Energy Optimization
Authors:
Syed Muhammad Arsalan Bashir,
Farhan Ali Khan Ghouri
Abstract:
Perspective texture synthesis has great significance in many fields like video editing, scene capturing etc., due to its ability to read and control global feature information. In this paper, we present a novel example-based, specifically energy optimization-based algorithm, to synthesize perspective textures. Energy optimization technique is a pixel-based approach, so it is time-consuming. We imp…
▽ More
Perspective texture synthesis has great significance in many fields like video editing, scene capturing etc., due to its ability to read and control global feature information. In this paper, we present a novel example-based, specifically energy optimization-based algorithm, to synthesize perspective textures. Energy optimization technique is a pixel-based approach, so it is time-consuming. We improve it from two aspects with the purpose of achieving faster synthesis and high quality. Firstly, we change this pixel-based technique by replacing the pixel computation with a little patch. Secondly, we present a novel technique to accelerate searching nearest neighborhoods in energy optimization. Using k- means clustering technique to build a search tree to accelerate the search. Hence, we make use of principal component analysis (PCA) technique to reduce dimensions of input vectors. The high quality results prove that our approach is feasible. Besides, our proposed algorithm needs shorter time relative to other similar methods.
△ Less
Submitted 21 June, 2020;
originally announced June 2020.
-
Adaptive Acquisition Schemes for Photon-Limited Free-Space Optical Communications
Authors:
Muhammad Salman Bashir,
Mohamed-Slim Alouini
Abstract:
Acquisition and tracking systems form an important component of free-space optical communications due to directional nature of the optical signal. Acquisition subsystems are needed in order to search and locate the receiver terminal in an uncertainty/search region with very narrow laser beams. In this paper, we have proposed and analyzed two adaptive search schemes for acquisition systems that per…
▽ More
Acquisition and tracking systems form an important component of free-space optical communications due to directional nature of the optical signal. Acquisition subsystems are needed in order to search and locate the receiver terminal in an uncertainty/search region with very narrow laser beams. In this paper, we have proposed and analyzed two adaptive search schemes for acquisition systems that perform better---for the low probability of detection---than the spiral scanning approach. The first of these schemes, the adaptive spiral search, provides a better acquisition time performance by dividing the search region into a number of smaller subregions, and prioritizing search in regions of higher probability mass. The second technique---the shotgun approach---searches the region in a random manner by sampling the search region according to a Gaussian distribution. The adaptive spiral scheme outperforms the shotgun approach in terms of acquisition time, especially if the number of search subregions is large enough. However, a higher pointing accuracy is required by the adaptive spiral search in order to search the region precisely. On the other hand, the shotgun scanning approach does not require such stringent pointing accuracy.
△ Less
Submitted 12 January, 2020;
originally announced January 2020.
-
Beam Tracking with Photon-Counting Detector Arrays in Free-Space Optical Communications
Authors:
Muhammad Salman Bashir,
Mohamed-Slim Alouini
Abstract:
Optical beam center position on an array of detectors is an important (hidden) parameter that is essential not only from a tracking perspective, but is also important for optimal detection of Pulse Position Modulation symbols in free-space optical communications. In this paper, we have examined the beam position estimation problem for photon-counting detector arrays, and to this end, we have propo…
▽ More
Optical beam center position on an array of detectors is an important (hidden) parameter that is essential not only from a tracking perspective, but is also important for optimal detection of Pulse Position Modulation symbols in free-space optical communications. In this paper, we have examined the beam position estimation problem for photon-counting detector arrays, and to this end, we have proposed and analyzed a number of non-Bayesian beam position estimators. These estimators are compared in terms of their mean-square error, bias and the probability of error performance. Additionally, the Cramer-Rao Lower Bounds (CRLB) of the tracking error is also derived, and the CRLB curves give us additional insights concerning the effect of number of detectors and the beam radius on mean-square error performance. Finally, the effect of beam position estimation on the probability of error performance is investigated, and our study concludes that the probability of error of the system is minimized when the beam position on the array is estimated as accurately as possible.
△ Less
Submitted 12 January, 2020;
originally announced January 2020.
-
Signal Acquisition with Photon-Counting Detector Arrays in Free-Space Optical Communications
Authors:
Muhammad Salman Bashir,
Mohamed-Slim Alouini
Abstract:
Pointing and acquisition are an important aspect of free-space optical communications because of the narrow beamwidth associated with the optical signal. In this paper, we have analyzed the pointing and acquisition problem in free-space optical communications for photon-counting detector arrays and Gaussian beams. In this regard, we have considered the maximum likelihood detection for detecting th…
▽ More
Pointing and acquisition are an important aspect of free-space optical communications because of the narrow beamwidth associated with the optical signal. In this paper, we have analyzed the pointing and acquisition problem in free-space optical communications for photon-counting detector arrays and Gaussian beams. In this regard, we have considered the maximum likelihood detection for detecting the location of the array, and analyzed the one-shot probabilities of missed detection and false alarm using the scaled Poisson approximation. Moreover, the upper/lower bounds on the probabilities of missed detection and false alarm for one complete scan are also derived, and these probabilities are compared with Monte Carlo approximations for a few cases. Additionally, the upper bounds on the acquisition time and the mean acquisition time are also derived. The upper bound on mean acquisition time is minimized numerically with respect to the beam radius for a constant signal-to-noise ratio scenario. Finally, the complementary distribution function of an upper bound on acquisition time is also calculated in a closed form. Our study concludes that an array of smaller detectors gives a better acquisition performance (in terms of acquisition time) as compared to one large detector of similar dimensions as the array.
△ Less
Submitted 22 December, 2019;
originally announced December 2019.
-
Reducing Tail Latency via Safe and Simple Duplication
Authors:
Hafiz Mohsin Bashir,
Abdullah Bin Faisal,
Muhammad Asim Jamshed,
Peter Vondras,
Ali Musa Iftikhar,
Ihsan Ayyub Qazi,
Fahad R. Dogar
Abstract:
Duplication can be a powerful strategy for overcoming stragglers in cloud services, but is often used conservatively because of the risk of overloading the system. We present duplicate-aware scheduling or DAS, which makes duplication safe and easy to use, by leveraging the two well-known primitives of prioritization and purging. To support DAS across diverse layers of a cloud system (e.g., network…
▽ More
Duplication can be a powerful strategy for overcoming stragglers in cloud services, but is often used conservatively because of the risk of overloading the system. We present duplicate-aware scheduling or DAS, which makes duplication safe and easy to use, by leveraging the two well-known primitives of prioritization and purging. To support DAS across diverse layers of a cloud system (e.g., network, storage, etc), we propose the D-Stage abstraction, which decouples the duplication policy from the mechanism, and facilitates working with legacy layers of a system. Using this abstraction, we evaluate the benefits of DAS for two data parallel applications (HDFS, an in-memory workload generator) and a network function (snort-based IDS cluster). Our experiments on the public cloud and Emulab show that DAS is safe to use, and the tail latency improvement holds across a wide range of workloads
△ Less
Submitted 30 May, 2019;
originally announced May 2019.
-
Free-Space Optical Communications with Detector Arrays
Authors:
Muhammad Salman Bashir
Abstract:
Detector arrays are commonly used for free-space optical communications in deep space. Such detector arrays---by virtue of their size---help in the collection of the optical signal even when there is some misalignment between the transmitter and receiver systems. In this paper, we argue that for the common Gaussian beam profile, a detector array receiver is more useful for minimizing the probabili…
▽ More
Detector arrays are commonly used for free-space optical communications in deep space. Such detector arrays---by virtue of their size---help in the collection of the optical signal even when there is some misalignment between the transmitter and receiver systems. In this paper, we argue that for the common Gaussian beam profile, a detector array receiver is more useful for minimizing the probability of error than a single detector receiver of the same dimensions. Furthermore, the improvement in the error probability is more pronounced for low signal-to-noise ratio conditions, and the probability of error decreases monotonically as a function of the number of detectors in the array. However, communication with detector arrays results in a larger computational complexity at the receiver. Additionally, such detector arrays are also more advantageous for beam position tracking on the detector array in order to minimize the pointing loss.
△ Less
Submitted 19 November, 2018;
originally announced November 2018.
-
Tracing Information Flows Between Ad Exchanges Using Retargeted Ads
Authors:
Muhammad Ahmad Bashir,
Sajjad Arshad,
William Robertson,
Christo Wilson
Abstract:
Numerous surveys have shown that Web users are concerned about the loss of privacy associated with online tracking. Alarmingly, these surveys also reveal that people are also unaware of the amount of data sharing that occurs between ad exchanges, and thus underestimate the privacy risks associated with online tracking.
In reality, the modern ad ecosystem is fueled by a flow of user data between…
▽ More
Numerous surveys have shown that Web users are concerned about the loss of privacy associated with online tracking. Alarmingly, these surveys also reveal that people are also unaware of the amount of data sharing that occurs between ad exchanges, and thus underestimate the privacy risks associated with online tracking.
In reality, the modern ad ecosystem is fueled by a flow of user data between trackers and ad exchanges. Although recent work has shown that ad exchanges routinely perform cookie matching with other exchanges, these studies are based on brittle heuristics that cannot detect all forms of information sharing, especially under adversarial conditions.
In this study, we develop a methodology that is able to detect client- and server-side flows of information between arbitrary ad exchanges. Our key insight is to leverage retargeted ads as a tool for identifying information flows. Intuitively, our methodology works because it relies on the semantics of how exchanges serve ads, rather than focusing on specific cookie matching mechanisms. Using crawled data on 35,448 ad impressions, we show that our methodology can successfully categorize four different kinds of information sharing behavior between ad exchanges, including cases where existing heuristic methods fail.
We conclude with a discussion of how our findings and methodologies can be leveraged to give users more control over what kind of ads they see and how their information is shared between ad exchanges.
△ Less
Submitted 13 February, 2020; v1 submitted 2 November, 2018;
originally announced November 2018.
-
Deep learning in radiology: an overview of the concepts and a survey of the state of the art
Authors:
Maciej A. Mazurowski,
Mateusz Buda,
Ashirbani Saha,
Mustafa R. Bashir
Abstract:
Deep learning is a branch of artificial intelligence where networks of simple interconnected units are used to extract patterns from data in order to solve complex problems. Deep learning algorithms have shown groundbreaking performance in a variety of sophisticated tasks, especially those related to images. They have often matched or exceeded human performance. Since the medical field of radiolog…
▽ More
Deep learning is a branch of artificial intelligence where networks of simple interconnected units are used to extract patterns from data in order to solve complex problems. Deep learning algorithms have shown groundbreaking performance in a variety of sophisticated tasks, especially those related to images. They have often matched or exceeded human performance. Since the medical field of radiology mostly relies on extracting useful information from images, it is a very natural application area for deep learning, and research in this area has rapidly grown in recent years. In this article, we review the clinical reality of radiology and discuss the opportunities for application of deep learning algorithms. We also introduce basic concepts of deep learning including convolutional neural networks. Then, we present a survey of the research in deep learning applied to radiology. We organize the studies by the types of specific tasks that they attempt to solve and review the broad range of utilized deep learning algorithms. Finally, we briefly discuss opportunities and challenges for incorporating deep learning in the radiology practice of the future.
△ Less
Submitted 9 February, 2018;
originally announced February 2018.
-
Measuring nanoscale magnetic write head fields using a hybrid quantum register
Authors:
Ingmar Jakobi,
Philipp Neumann,
Ya Wang,
Durga Dasari,
Fadi El Hallak,
Muhammad Asif Bashir,
Matthew Markham,
Andrew Edmonds,
Daniel Twitchen,
Jörg Wrachtrup
Abstract:
The generation and control of nanoscale magnetic fields are of fundamental interest in material science and a wide range of applications. Nanoscale magnetic resonance imaging quantum spintronics for example require single spin control with high precision and nanoscale spatial resolution using fast switchable magnetic fields with large gradients. Yet, characterizing those fields on nanometer length…
▽ More
The generation and control of nanoscale magnetic fields are of fundamental interest in material science and a wide range of applications. Nanoscale magnetic resonance imaging quantum spintronics for example require single spin control with high precision and nanoscale spatial resolution using fast switchable magnetic fields with large gradients. Yet, characterizing those fields on nanometer length scales at high band width with arbitrary orientation has not been possible so far. Here we demonstrate single electron and nuclear spin coherent control using the magnetic field of a hard disc drive write head. We use single electron spins for measuring fields with high spatial resolution and single nuclear spins for large band width measurements. We are able to derive field profiles from coherent spin Rabi oscillations close to GHz in fields with gradients of up to 10 mT/nm and measure all components of a static and dynamic magnetic field independent of its orientation. Our method paves the way for precision measurement of the magnetic fields of nanoscale write heads important for future miniaturization of the devices.
△ Less
Submitted 9 February, 2016;
originally announced February 2016.
-
Drift wave stabilized by an additional streaming ion or plasma population
Authors:
M. F. Bashir,
J. Vranjes
Abstract:
It is shown that the universally unstable kinetic drift wave in an electron-ion plasma can very effectively be suppressed by adding an extra flowing ion (or plasma) population. The effect of the flow of the added ions is essential, their response is of the type (vph-vf0) exp[-(vph-vf0)^2], where vf0 is the flow speed and vph phase speed parallel to the magnetic field vector. The dam** is strong…
▽ More
It is shown that the universally unstable kinetic drift wave in an electron-ion plasma can very effectively be suppressed by adding an extra flowing ion (or plasma) population. The effect of the flow of the added ions is essential, their response is of the type (vph-vf0) exp[-(vph-vf0)^2], where vf0 is the flow speed and vph phase speed parallel to the magnetic field vector. The dam** is strong and it is mainly due to this ion exponential term, and this remains so for vf0 < vph.
△ Less
Submitted 9 April, 2015;
originally announced April 2015.
-
Grid-based Search Technique for Massive Academic Publications
Authors:
Mohammed Bakri Bashir,
Muhammad Shafie Abd Latiff,
Shafii Muhammad Abdulhamid,
Cheah Tek Loon
Abstract:
The numerical size of academic publications that are being published in recent years had grown rapidly. Accessing and searching massive academic publications that are distributed over several locations need large amount of computing resources to increase the system performance. Therefore, many grid-based search techniques were proposed to provide flexible methods for searching the distributed exte…
▽ More
The numerical size of academic publications that are being published in recent years had grown rapidly. Accessing and searching massive academic publications that are distributed over several locations need large amount of computing resources to increase the system performance. Therefore, many grid-based search techniques were proposed to provide flexible methods for searching the distributed extensive data. This paper proposes search technique that is capable of searching the extensive publications by utilizing grid computing technology. The search technique is implemented as interconnected grid services to offer a mechanism to access different data locations. The experimental result shows that the grid-based search technique has enhanced the performance of the search.
△ Less
Submitted 30 March, 2014;
originally announced May 2014.
-
On-Demand Grid Provisioning Using Cloud Infrastructures and Related Virtualization Tools: A Survey and Taxonomy
Authors:
Shafii Muhammad Abdulhamid,
Muhammad Shafie Abd Latiff,
Mohammed Bakri Bashir
Abstract:
Recent researches have shown that grid resources can be accessed by client on-demand, with the help of virtualization technology in the Cloud. The virtual machines hosted by the hypervisors are being utilized to build the grid network within the cloud environment. The aim of this study is to survey some concepts used for the on-demand grid provisioning using Infrastructure as a Service Cloud and t…
▽ More
Recent researches have shown that grid resources can be accessed by client on-demand, with the help of virtualization technology in the Cloud. The virtual machines hosted by the hypervisors are being utilized to build the grid network within the cloud environment. The aim of this study is to survey some concepts used for the on-demand grid provisioning using Infrastructure as a Service Cloud and the taxonomy of its related components. This paper, discusses the different approaches for on-demand grid using infrastructural Cloud, the issues it tries to address and the implementation tools. The paper also, proposed an extended classification for the virtualization technology used and a new classification for the Grid-Cloud integration which was based on the architecture, communication flow and the user demand for the Grid resources. This survey, tools and taxonomies presented here will contribute as a guide in the design of future architectures for further researches.
△ Less
Submitted 4 February, 2014;
originally announced February 2014.
-
Font Acknowledgment and Character Extraction of Digital and Scanned Images
Authors:
Syed Muhammad Arsalan Bashir
Abstract:
The font recognition and character extraction is of immense importance as these are many scenarios where data are in such a form, which cannot be processed like in image form or as a hard copy. So the procedure developed in this paper is basically related to identifying the font (Times New Roman, Arial and Comic Sans MS) and afterwards recovering the text using simple correlation based method wher…
▽ More
The font recognition and character extraction is of immense importance as these are many scenarios where data are in such a form, which cannot be processed like in image form or as a hard copy. So the procedure developed in this paper is basically related to identifying the font (Times New Roman, Arial and Comic Sans MS) and afterwards recovering the text using simple correlation based method where the binary templates are correlated to the input image text characters. All of this extraction is done in the presence of a little noise as images may have noisy patterns due to photocopying. The significance of this method exists in extraction of data from various monitoring (Surveillance) camera footages or even more. The method is developed on Matlab\c{opyright} which takes input image and recovers text and font information from it in a text file.
△ Less
Submitted 17 May, 2013;
originally announced May 2013.
-
Whistler instability in a semi-relativistic bi-Maxwellian plasma
Authors:
M. F. Bashir,
S. Zaheer,
Z. Iqbal,
G. Murtaza
Abstract:
Employing linearized Vlasov-Maxwell system, the Weibel instability embedded in an ambient magnetic field is discussed for a semi-relativistic bi-Maxwellian distribution ho** such a scenario occurs in some relativistic environments e.g., gamma-ray burst sources and relativistic jet sources, supernovae, and galactic cosmic rays where the perpendicular temperature is much dominated over the paralle…
▽ More
Employing linearized Vlasov-Maxwell system, the Weibel instability embedded in an ambient magnetic field is discussed for a semi-relativistic bi-Maxwellian distribution ho** such a scenario occurs in some relativistic environments e.g., gamma-ray burst sources and relativistic jet sources, supernovae, and galactic cosmic rays where the perpendicular temperature is much dominated over the parallel . The dispersion relations are analyzed analytically along with the graphical representation and the estimates of the growth rate are presented along with the instability threshold condition in the limiting cases i.e., xi<=1 (resonant case) and xi>>1 (non-resonant case). It is observed that the relativistic effect suppresses the instability and also lowers the threshold for the instability to set in. The ambient magnetic field contribution to instability appears only in non-resonant case resulting in reduction of growth rate. However, the effect of the ambient magnetic field is diminished as we go from the weak relativistic regime to the highly relativistic one. We also note that the ambient magnetic field generates real oscillations and the reletivistic effect reduces these oscillations. Further for field free case i.e., B0=0, the growth rates for Weibel instabilities are also presented in a semi-relativistic bi- Maxwellian plasma for both the limiting cases.
△ Less
Submitted 9 April, 2013;
originally announced April 2013.
-
Effect of temperature anisotropy on various modes and instabilities for a magnetized non-relativistic bi-Maxwellian plasma
Authors:
M. F. Bashir,
G. Murtaza
Abstract:
Using kinetic theory for homogeneous collisionless magnetized plasmas, we present an extended review of the plasma waves and instabilities and discuss the anisotropic response of generalized relativistic dielectric tensor and Onsager symmetry properties for arbitrary distribution functions. In general, we observe that for such plasmas only those electromagnetic modes whose magnetic field perturbat…
▽ More
Using kinetic theory for homogeneous collisionless magnetized plasmas, we present an extended review of the plasma waves and instabilities and discuss the anisotropic response of generalized relativistic dielectric tensor and Onsager symmetry properties for arbitrary distribution functions. In general, we observe that for such plasmas only those electromagnetic modes whose magnetic field perturbations are perpendicular to the ambient magneticeld, i.e.,B1 \perp B0, are effected by the anisotropy. However, in oblique propagation all modes do show such anisotropic effects. Considering the non-relativistic bi-Maxwellian distribution and studying the relevant components of the general dielectric tensor under appropriate conditions, we derive the dispersion relations for various modes and instabilities. We show that only the electromagnetic R- and L- waves, those derived from them and the O-mode are affected by thermal anisotropies, since they satisfy the required condition B1\perpB0. By contrast, the perpendicularly propagating X-mode and the modes derived from it (the pure transverse X-mode and Bernstein mode) show no such effect. In general, we note that the thermal anisotropy modifies the parallel propagating modes via the parallel acoustic effect, while it modifies the perpendicular propagating modes via the Larmor-radius effect. In oblique propagation for kinetic Alfven waves, the thermal anisotropy affects the kinetic regime more than it affects the inertial regime. The generalized fast mode exhibits two distinct acoustic effects, one in the direction parallel to the ambient magnetic field and the other in the direction perpendicular to it. In the fast-mode instability, the magneto-sonic wave causes suppression of the firehose instability. We discuss all these propagation characteristics and present graphic illustrations.
△ Less
Submitted 31 May, 2012;
originally announced May 2012.
-
Clustering of Content Supporting Computer Mediated Courseware Development
Authors:
G. M. M. Bashir,
M. J. Hossain,
M. R. Karim
Abstract:
Computer Mediated Courseware (CMC) has been developed so far for individual courses considering single or multiple text books. A group of courseware can be developed by using multiple text books and in this case, it is a requirement to cluster the contents of different books to form a generalized clustered content. No work has been found to develop courseware applying generalized clustered content…
▽ More
Computer Mediated Courseware (CMC) has been developed so far for individual courses considering single or multiple text books. A group of courseware can be developed by using multiple text books and in this case, it is a requirement to cluster the contents of different books to form a generalized clustered content. No work has been found to develop courseware applying generalized clustered content. We have proposed a clustering of content supporting computer mediated courseware development based on data mining techniques to construct a hierarchical general structure of a group of courseware combining the individual structure of a set of books. The clustering will help the courseware developer to dynamically allocate contents to develop different courses using a group of books. The authors have applied this methodology for different level of courses on database. The methodology is generalized and can be applied to any other courses.
△ Less
Submitted 26 April, 2010;
originally announced April 2010.