-
MindArm: Mechanized Intelligent Non-Invasive Neuro-Driven Prosthetic Arm System
Authors:
Maha Nawaz,
Abdul Basit,
Muhammad Shafique
Abstract:
Currently, people with disability or difficulty to move their arms (referred to as "patients") have very limited technological solutions to efficiently address their physiological limitations. It is mainly due to two reasons: (1) the non-invasive solutions like mind-controlled prosthetic devices are typically very costly and require expensive maintenance; and (2) other solutions require costly inv…
▽ More
Currently, people with disability or difficulty to move their arms (referred to as "patients") have very limited technological solutions to efficiently address their physiological limitations. It is mainly due to two reasons: (1) the non-invasive solutions like mind-controlled prosthetic devices are typically very costly and require expensive maintenance; and (2) other solutions require costly invasive brain surgery, which is high risk to perform, expensive, and difficult to maintain. Therefore, current technological solutions are not accessible for all patients with different financial backgrounds. Toward this, we propose a low-cost technological solution called MindArm, a mechanized intelligent non-invasive neuro-driven prosthetic arm system. Our MindArm system employs a deep neural network (DNN) engine to translate brain signals into the intended prosthetic arm motion, thereby hel** patients to perform many activities despite their physiological limitations. Here, our MindArm system utilizes widely accessible and low-cost surface electroencephalogram (EEG) electrodes coupled with an Open Brain Computer Interface and UDP networking for acquiring brain signals and transmitting them to the compute module for signal processing. In the compute module, we run a trained DNN model to interpret normalized micro-voltage of the brain signals, and then translate them into a prosthetic arm action via serial communication seamlessly. The experimental results on a fully working prototype demonstrate that, from the three defined actions, our MindArm system achieves positive success rates, i.e., 91\% for idle/stationary, 85\% for shake hand, and 84\% for pick-up cup. This demonstrates that our MindArm provides a novel approach for an alternate low-cost mind-controlled prosthetic devices for all patients.
△ Less
Submitted 29 March, 2024;
originally announced March 2024.
-
Borrowing Treasures from Neighbors: In-Context Learning for Multimodal Learning with Missing Modalities and Data Scarcity
Authors:
Zhuo Zhi,
Ziquan Liu,
Moe Elbadawi,
Adam Daneshmend,
Mine Orlu,
Abdul Basit,
Andreas Demosthenous,
Miguel Rodrigues
Abstract:
Multimodal machine learning with missing modalities is an increasingly relevant challenge arising in various applications such as healthcare. This paper extends the current research into missing modalities to the low-data regime, i.e., a downstream task has both missing modalities and limited sample size issues. This problem setting is particularly challenging and also practical as it is often exp…
▽ More
Multimodal machine learning with missing modalities is an increasingly relevant challenge arising in various applications such as healthcare. This paper extends the current research into missing modalities to the low-data regime, i.e., a downstream task has both missing modalities and limited sample size issues. This problem setting is particularly challenging and also practical as it is often expensive to get full-modality data and sufficient annotated training samples. We propose to use retrieval-augmented in-context learning to address these two crucial issues by unleashing the potential of a transformer's in-context learning ability. Diverging from existing methods, which primarily belong to the parametric paradigm and often require sufficient training samples, our work exploits the value of the available full-modality data, offering a novel perspective on resolving the challenge. The proposed data-dependent framework exhibits a higher degree of sample efficiency and is empirically demonstrated to enhance the classification model's performance on both full- and missing-modality data in the low-data regime across various multimodal learning tasks. When only 1% of the training data are available, our proposed method demonstrates an average improvement of 6.1% over a recent strong baseline across various datasets and missing states. Notably, our method also reduces the performance gap between full-modality and missing-modality data compared with the baseline.
△ Less
Submitted 26 March, 2024; v1 submitted 14 March, 2024;
originally announced March 2024.
-
Eight-Partitioning Points in 3D, and Efficiently Too
Authors:
Boris Aronov,
Abdul Basit,
Indu Ramesh,
Gianluca Tasinato,
Uli Wagner
Abstract:
An \emph{eight-partition} of a finite set of points (respectively, of a continuous mass distribution) in $\mathbb{R}^3$ consists of three planes that divide the space into $8$ octants, such that each open octant contains at most $1/8$ of the points (respectively, of the mass). In 1966, Hadwiger showed that any mass distribution in $\mathbb{R}^3$ admits an eight-partition; moreover, one can prescri…
▽ More
An \emph{eight-partition} of a finite set of points (respectively, of a continuous mass distribution) in $\mathbb{R}^3$ consists of three planes that divide the space into $8$ octants, such that each open octant contains at most $1/8$ of the points (respectively, of the mass). In 1966, Hadwiger showed that any mass distribution in $\mathbb{R}^3$ admits an eight-partition; moreover, one can prescribe the normal direction of one of the three planes. The analogous result for finite point sets follows by a standard limit argument.
We prove the following variant of this result: Any mass distribution (or point set) in $\mathbb{R}^3$ admits an eight-partition for which the intersection of two of the planes is a line with a prescribed direction.
Moreover, we present an efficient algorithm for calculating an eight-partition of a set of $n$ points in~$\mathbb{R}^3$ (with prescribed normal direction of one of the planes) in time $O^{*}(n^{5/2})$.
△ Less
Submitted 16 March, 2024; v1 submitted 4 March, 2024;
originally announced March 2024.
-
MedAide: Leveraging Large Language Models for On-Premise Medical Assistance on Edge Devices
Authors:
Abdul Basit,
Khizar Hussain,
Muhammad Abdullah Hanif,
Muhammad Shafique
Abstract:
Large language models (LLMs) are revolutionizing various domains with their remarkable natural language processing (NLP) abilities. However, deploying LLMs in resource-constrained edge computing and embedded systems presents significant challenges. Another challenge lies in delivering medical assistance in remote areas with limited healthcare facilities and infrastructure. To address this, we intr…
▽ More
Large language models (LLMs) are revolutionizing various domains with their remarkable natural language processing (NLP) abilities. However, deploying LLMs in resource-constrained edge computing and embedded systems presents significant challenges. Another challenge lies in delivering medical assistance in remote areas with limited healthcare facilities and infrastructure. To address this, we introduce MedAide, an on-premise healthcare chatbot. It leverages tiny-LLMs integrated with LangChain, providing efficient edge-based preliminary medical diagnostics and support. MedAide employs model optimizations for minimal memory footprint and latency on embedded edge devices without server infrastructure. The training process is optimized using low-rank adaptation (LoRA). Additionally, the model is trained on diverse medical datasets, employing reinforcement learning from human feedback (RLHF) to enhance its domain-specific capabilities. The system is implemented on various consumer GPUs and Nvidia Jetson development board. MedAide achieves 77\% accuracy in medical consultations and scores 56 in USMLE benchmark, enabling an energy-efficient healthcare assistance platform that alleviates privacy concerns due to edge-based deployment, thereby empowering the community.
△ Less
Submitted 28 February, 2024;
originally announced March 2024.
-
DRL-Based Dynamic Channel Access and SCLAR Maximization for Networks Under Jamming
Authors:
Abdul Basit,
Muddasir Rahim,
Georges Kaddoum,
Tri Nhu Do,
Nadir Adam
Abstract:
This paper investigates a deep reinforcement learning (DRL)-based approach for managing channel access in wireless networks. Specifically, we consider a scenario in which an intelligent user device (iUD) shares a time-varying uplink wireless channel with several fixed transmission schedule user devices (fUDs) and an unknown-schedule malicious jammer. The iUD aims to harmoniously coexist with the f…
▽ More
This paper investigates a deep reinforcement learning (DRL)-based approach for managing channel access in wireless networks. Specifically, we consider a scenario in which an intelligent user device (iUD) shares a time-varying uplink wireless channel with several fixed transmission schedule user devices (fUDs) and an unknown-schedule malicious jammer. The iUD aims to harmoniously coexist with the fUDs, avoid the jammer, and adaptively learn an optimal channel access strategy in the face of dynamic channel conditions, to maximize the network's sum cross-layer achievable rate (SCLAR). Through extensive simulations, we demonstrate that when we appropriately define the state space, action space, and rewards within the DRL framework, the iUD can effectively coexist with other UDs and optimize the network's SCLAR. We show that the proposed algorithm outperforms the tabular Q-learning and a fully connected deep neural network approach.
△ Less
Submitted 2 February, 2024;
originally announced February 2024.
-
HgbNet: predicting hemoglobin level/anemia degree from EHR data
Authors:
Zhuo Zhi,
Moe Elbadawi,
Adam Daneshmend,
Mine Orlu,
Abdul Basit,
Andreas Demosthenous,
Miguel Rodrigues
Abstract:
Anemia is a prevalent medical condition that typically requires invasive blood tests for diagnosis and monitoring. Electronic health records (EHRs) have emerged as valuable data sources for numerous medical studies. EHR-based hemoglobin level/anemia degree prediction is non-invasive and rapid but still faces some challenges due to the fact that EHR data is typically an irregular multivariate time…
▽ More
Anemia is a prevalent medical condition that typically requires invasive blood tests for diagnosis and monitoring. Electronic health records (EHRs) have emerged as valuable data sources for numerous medical studies. EHR-based hemoglobin level/anemia degree prediction is non-invasive and rapid but still faces some challenges due to the fact that EHR data is typically an irregular multivariate time series containing a significant number of missing values and irregular time intervals. To address these issues, we introduce HgbNet, a machine learning-based prediction model that emulates clinicians' decision-making processes for hemoglobin level/anemia degree prediction. The model incorporates a NanDense layer with a missing indicator to handle missing values and employs attention mechanisms to account for both local irregularity and global irregularity. We evaluate the proposed method using two real-world datasets across two use cases. In our first use case, we predict hemoglobin level/anemia degree at moment T+1 by utilizing records from moments prior to T+1. In our second use case, we integrate all historical records with additional selected test results at moment T+1 to predict hemoglobin level/anemia degree at the same moment, T+1. HgbNet outperforms the best baseline results across all datasets and use cases. These findings demonstrate the feasibility of estimating hemoglobin levels and anemia degree from EHR data, positioning HgbNet as an effective non-invasive anemia diagnosis solution that could potentially enhance the quality of life for millions of affected individuals worldwide. To our knowledge, HgbNet is the first machine learning model leveraging EHR data for hemoglobin level/anemia degree prediction.
△ Less
Submitted 22 January, 2024;
originally announced January 2024.
-
Effects of reservoir squeezing on the amplification of quantum correlation
Authors:
Zhaorui Peng,
Lucas C. Céleri,
Abdul Basit,
Gao Xianlong
Abstract:
The dynamics of quantum discord is studied in a system of two identical noninteracting qubits coupled to a common squeezed vacuum bath through non-demolition interactions. We concern on how reservoir squeezing influences the dynamical behaviors of quantum discord when both qubits are initially prepared in $X$-type states. We find that the critical time exhibits the sudden change of quantum discord…
▽ More
The dynamics of quantum discord is studied in a system of two identical noninteracting qubits coupled to a common squeezed vacuum bath through non-demolition interactions. We concern on how reservoir squeezing influences the dynamical behaviors of quantum discord when both qubits are initially prepared in $X$-type states. We find that the critical time exhibits the sudden change of quantum discord, which is of great significance for the quantum discord amplification. Furthermore, depending on the initial parameters of the system, we numerically calculate the interval when the critical time is finite or infinite. For the finite critical time, we show that the squeezing phase of the bath can prolong the critical time while the squeezing strength exhibits the opposite effect. For infinite critical time, even if there is no sudden transition point, reservoir squeezing still has an effect on the amplification of quantum discord, and the time to reach steady-state quantum discord can be changed by adjusting the squeezing parameters. Fianlly, we investigate the quantum speed limit time for a two-qubit system under squeezed reservoir, and find that the quantum speed limit time can be reduced via the adjustment of the squeezing parameters and the initial parameters. Remarkably, in the short time limit, reservoir squeezing has an obvious influence on the degree of amplification of quantum discord. Our study presents a promising approach to controlling the amplification of quantum correlation.
△ Less
Submitted 21 January, 2024;
originally announced January 2024.
-
A Risk-Ratio-Based Marginal Sensitivity Model for Causal Effects in Observational Studies
Authors:
Md Abdul Basit,
Mahbub A. H. M. Latif,
Abdus S Wahed
Abstract:
In observational studies, the identification of causal estimands depends on the no unmeasured confounding (NUC) assumption. As this assumption is not testable from observed data, sensitivity analysis plays an important role in observational studies to investigate the impact of unmeasured confounding on the causal conclusions. In this paper, we proposed a risk-ratio-based sensitivity analysis frame…
▽ More
In observational studies, the identification of causal estimands depends on the no unmeasured confounding (NUC) assumption. As this assumption is not testable from observed data, sensitivity analysis plays an important role in observational studies to investigate the impact of unmeasured confounding on the causal conclusions. In this paper, we proposed a risk-ratio-based sensitivity analysis framework by introducing a modified marginal sensitivity model for observational studies with binary treatments. We further extended the proposed framework to the multivalued treatment setting.We then showed how the point estimate intervals and the corresponding percentile bootstrap confidence intervals can be constructed efficiently under the proposed framework. Simulation results suggested that the proposed framework of sensitivity analysis performs well in the presence of adequate overlap among the treatment groups. Lastly, we demonstrated our proposed sensitivity analysis framework by estimating the causal effect of maternal education on female fertility in Bangladesh.
△ Less
Submitted 27 September, 2023;
originally announced September 2023.
-
Detection and Localization of Firearm Carriers in Complex Scenes for Improved Safety Measures
Authors:
Arif Mahmood,
Abdul Basit,
M. Akhtar Munir,
Mohsen Ali
Abstract:
Detecting firearms and accurately localizing individuals carrying them in images or videos is of paramount importance in security, surveillance, and content customization. However, this task presents significant challenges in complex environments due to clutter and the diverse shapes of firearms. To address this problem, we propose a novel approach that leverages human-firearm interaction informat…
▽ More
Detecting firearms and accurately localizing individuals carrying them in images or videos is of paramount importance in security, surveillance, and content customization. However, this task presents significant challenges in complex environments due to clutter and the diverse shapes of firearms. To address this problem, we propose a novel approach that leverages human-firearm interaction information, which provides valuable clues for localizing firearm carriers. Our approach incorporates an attention mechanism that effectively distinguishes humans and firearms from the background by focusing on relevant areas. Additionally, we introduce a saliency-driven locality-preserving constraint to learn essential features while preserving foreground information in the input image. By combining these components, our approach achieves exceptional results on a newly proposed dataset. To handle inputs of varying sizes, we pass paired human-firearm instances with attention masks as channels through a deep network for feature computation, utilizing an adaptive average pooling layer. We extensively evaluate our approach against existing methods in human-object interaction detection and achieve significant results (AP=77.8\%) compared to the baseline approach (AP=63.1\%). This demonstrates the effectiveness of leveraging attention mechanisms and saliency-driven locality preservation for accurate human-firearm interaction detection. Our findings contribute to advancing the fields of security and surveillance, enabling more efficient firearm localization and identification in diverse scenarios.
△ Less
Submitted 17 September, 2023;
originally announced September 2023.
-
Sensitivity Analysis of Inverse Probability Weighting Estimators of Causal Effects in Observational Studies with Multivalued Treatments
Authors:
Md Abdul Basit,
Mahbub A. H. M. Latif,
Abdus S Wahed
Abstract:
One of the fundamental challenges in drawing causal inferences from observational studies is that the assumption of no unmeasured confounding is not testable from observed data. Therefore, assessing sensitivity to this assumption's violation is important to obtain valid causal conclusions in observational studies. Although several sensitivity analysis frameworks are available in the casual inferen…
▽ More
One of the fundamental challenges in drawing causal inferences from observational studies is that the assumption of no unmeasured confounding is not testable from observed data. Therefore, assessing sensitivity to this assumption's violation is important to obtain valid causal conclusions in observational studies. Although several sensitivity analysis frameworks are available in the casual inference literature, very few of them are applicable to observational studies with multivalued treatments. To address this issue, we propose a sensitivity analysis framework for performing sensitivity analysis in multivalued treatment settings. Within this framework, a general class of additive causal estimands has been proposed. We demonstrate that the estimation of the causal estimands under the proposed sensitivity model can be performed very efficiently. Simulation results show that the proposed framework performs well in terms of bias of the point estimates and coverage of the confidence intervals when there is sufficient overlap in the covariate distributions. We illustrate the application of our proposed method by conducting an observational study that estimates the causal effect of fish consumption on blood mercury levels.
△ Less
Submitted 23 June, 2024; v1 submitted 30 August, 2023;
originally announced August 2023.
-
Covering triangular grids with multiplicity
Authors:
Abdul Basit,
Alexander Clifton,
Paul Horn
Abstract:
Motivated by classical work of Alon and Füredi, we introduce and address the following problem: determine the minimum number of affine hyperplanes in $\mathbb{R}^d$ needed to cover every point of the triangular grid $T_d(n) := \{(x_1,\dots,x_d)\in\mathbb{Z}_{\ge 0}^d\mid x_1+\dots+x_d\le n-1\}$ at least $k$ times. For $d = 2$, we solve the problem exactly for $k \leq 4$, and obtain a partial solut…
▽ More
Motivated by classical work of Alon and Füredi, we introduce and address the following problem: determine the minimum number of affine hyperplanes in $\mathbb{R}^d$ needed to cover every point of the triangular grid $T_d(n) := \{(x_1,\dots,x_d)\in\mathbb{Z}_{\ge 0}^d\mid x_1+\dots+x_d\le n-1\}$ at least $k$ times. For $d = 2$, we solve the problem exactly for $k \leq 4$, and obtain a partial solution for $k > 4$. We also obtain an asymptotic formula (in $n$) for all $d \geq k - 2$. The proofs rely on combinatorial arguments and linear programming.
△ Less
Submitted 25 July, 2023;
originally announced July 2023.
-
Generalized Tuza's conjecture for random hypergraphs
Authors:
Abdul Basit,
David Galvin
Abstract:
A celebrated conjecture of Tuza states that in any finite graph the minimum size of a cover of triangles by edges is at most twice the maximum size of a set of edge-disjoint triangles. For an $r$-uniform hypergraph ($r$-graph) $G$, let $τ(G)$ be the minimum size of a cover of edges by $(r-1)$-sets of vertices, and let $ν(G)$ be the maximum size of a set of edges pairwise intersecting in fewer than…
▽ More
A celebrated conjecture of Tuza states that in any finite graph the minimum size of a cover of triangles by edges is at most twice the maximum size of a set of edge-disjoint triangles. For an $r$-uniform hypergraph ($r$-graph) $G$, let $τ(G)$ be the minimum size of a cover of edges by $(r-1)$-sets of vertices, and let $ν(G)$ be the maximum size of a set of edges pairwise intersecting in fewer than $r-1$ vertices. Aharoni and Zerbib proposed the following generalization of Tuza's conjecture: $$ \text{For any $r$-graph $G$, $τ(G)/ν(G) \leq \lceil(r+1)/2\rceil$.} $$
Let $H_r(n,p)$ be the uniformly random $r$-graph on $n$ vertices. We show that, for $r \in \{3, 4, 5\}$ and any $p = p(n)$, $H_r(n,p)$ satisfies the Aharoni-Zerbib conjecture with high probability (i.e., with probability approaching 1 as $n \rightarrow \infty$). We also show that there is a $C < 1$ such that, for any $r \geq 6$ and any $p = p(n)$, $τ(H_r(n, p))/ν(H_r(n, p)) \leq C r$ with high probability. Furthermore, we may take $C < 1/2 + \varepsilon$, for any $\varepsilon > 0$, by restricting to sufficiently large $r$ (depending on $\varepsilon$).
△ Less
Submitted 14 May, 2024; v1 submitted 9 April, 2022;
originally announced April 2022.
-
Partitioning axis-parallel lines in 3D
Authors:
Boris Aronov,
Abdul Basit,
Mark de Berg,
Joachim Gudmundsson
Abstract:
Let $L$ be a set of $n$ axis-parallel lines in $\mathbb{R}^3$. We are are interested in partitions of $\mathbb{R}^3$ by a set $H$ of three planes such that each open cell in the arrangement $\mathcal{A}(H)$ is intersected by as few lines from $L$ as possible. We study such partitions in three settings, depending on the type of splitting planes that we allow. We obtain the following results.…
▽ More
Let $L$ be a set of $n$ axis-parallel lines in $\mathbb{R}^3$. We are are interested in partitions of $\mathbb{R}^3$ by a set $H$ of three planes such that each open cell in the arrangement $\mathcal{A}(H)$ is intersected by as few lines from $L$ as possible. We study such partitions in three settings, depending on the type of splitting planes that we allow. We obtain the following results.
$\bullet$ There are sets $L$ of $n$ axis-parallel lines such that, for any set $H$ of three splitting planes, there is an open cell in $\mathcal{A}(H)$ that intersects at least~$\lfloor n/3 \rfloor-1 \approx \frac{1}{3}n$ lines.
$\bullet$ If we require the splitting planes to be axis-parallel, then there are sets $L$ of $n$ axis-parallel lines such that, for any set $H$ of three splitting planes, there is an open cell in $\mathcal{A}(H)$ that intersects at least $\frac{3}{2}\lfloor n/4 \rfloor -1 \approx \left( \frac{1}{3}+\frac{1}{24}\right) n$ lines. Furthermore, for any set $L$ of $n$ axis-parallel lines, there exists a set $H$ of three axis-parallel splitting planes such that each open cell in $\mathcal{A}(H)$ intersects at most $\frac{7}{18} n = \left( \frac{1}{3}+\frac{1}{18}\right) n$ lines.
$\bullet$ For any set $L$ of $n$ axis-parallel lines, there exists a set $H$ of three axis-parallel and mutually orthogonal splitting planes, such that each open cell in $\mathcal{A}(H)$ intersects at most $\lceil \frac{5}{12} n \rceil \approx \left( \frac{1}{3}+\frac{1}{12}\right) n$ lines.
△ Less
Submitted 21 December, 2023; v1 submitted 4 April, 2022;
originally announced April 2022.
-
Improved bounds on a generalization of Tuza's conjecture
Authors:
Abdul Basit,
Daniel McGinnis,
Henry Simmons,
Matt Sinnwell,
Shira Zerbib
Abstract:
For an $r$-uniform hypergraph $H$, let $ν^{(m)}(H)$ denote the maximum size of a set~$M$ of edges in $H$ such that every two edges in $M$ intersect in less than $m$ vertices, and let $τ^{(m)}(H)$ denote the minimum size of a collection $C$ of $m$-sets of vertices such that every edge in $H$ contains an element of $C$. The fractional analogues of these parameters are denoted by $ν^{*(m)}(H)$ and…
▽ More
For an $r$-uniform hypergraph $H$, let $ν^{(m)}(H)$ denote the maximum size of a set~$M$ of edges in $H$ such that every two edges in $M$ intersect in less than $m$ vertices, and let $τ^{(m)}(H)$ denote the minimum size of a collection $C$ of $m$-sets of vertices such that every edge in $H$ contains an element of $C$. The fractional analogues of these parameters are denoted by $ν^{*(m)}(H)$ and $τ^{*(m)}(H)$, respectively. Generalizing a famous conjecture of Tuza on covering triangles in a graph, Aharoni and Zerbib conjectured that for every $r$-uniform hypergraph $H$, $τ^{(r-1)}(H)/ν^{(r-1)}(H) \leq \lceil{\frac{r+1}{2}}\rceil$. In this paper we prove bounds on the ratio between the parameters $τ^{(m)}$ and $ν^{(m)}$, and their fractional analogues. Our main result is that, for every $r$-uniform hypergraph~$H$, \[ τ^{*(r-1)}(H)/ν^{(r-1)}(H) \le \begin{cases} \frac{3}{4}r - \frac{r}{4(r+1)} &\text{for }r\text{ even,}\\ \frac{3}{4}r - \frac{r}{4(r+2)} &\text{for }r\text{ odd.} \\ \end{cases} \] This improves the known bound of $r-1$. We also prove that, for every $r$-uniform hypergraph $H$, $τ^{(m)}(H)/ν^{*(m)}(H) \le \operatorname{ex}_m(r, m+1)$, where the Turán number $\operatorname{ex}_r(n, k)$ is the maximum number of edges in an $r$-uniform hypergraph on $n$ vertices that does not contain a copy of the complete $r$-uniform hypergraph on $k$ vertices. Finally, we prove further bounds in the special cases $(r,m)=(4,2)$ and $(r,m)=(4,3)$.
△ Less
Submitted 10 October, 2022; v1 submitted 19 October, 2021;
originally announced October 2021.
-
Clone-Seeker: Effective Code Clone Search Using Annotations
Authors:
Muhammad Hammad,
Önder Babur,
Hamid Abdul Basit,
Mark van den Brand
Abstract:
Source code search plays an important role in software development, e.g. for exploratory development or opportunistic reuse of existing code from a code base. Often, exploration of different implementations with the same functionality is needed for tasks like automated software transplantation, software diversification, and software repair. Code clones, which are syntactically or semantically simi…
▽ More
Source code search plays an important role in software development, e.g. for exploratory development or opportunistic reuse of existing code from a code base. Often, exploration of different implementations with the same functionality is needed for tasks like automated software transplantation, software diversification, and software repair. Code clones, which are syntactically or semantically similar code fragments, are perfect candidates for such tasks. Searching for code clones involves a given search query to retrieve the relevant code fragments. We propose a novel approach called Clone-Seeker that focuses on utilizing clone class features in retrieving code clones. For this purpose, we generate metadata for each code clone in the form of a natural language document. The metadata includes a pre-processed list of identifiers from the code clones augmented with a list of keywords indicating the semantics of the code clone. This keyword list can be extracted from a manually annotated general description of the clone class, or automatically generated from the source code of the entire clone class. This approach helps developers to perform code clone search based on a search query written either as source code terms, or as natural language. In our quantitative evaluation, we show that (1) Clone-Seeker has a higher recall when searching for semantic code clones (i.e., Type-4) in BigCloneBench than the state-of-the-art; and (2) Clone-Seeker can accurately search for relevant code clones by applying natural language queries.
△ Less
Submitted 6 June, 2021;
originally announced June 2021.
-
Augmenting Machine Learning with Information Retrieval to Recommend Real Cloned Code Methods for Code Completion
Authors:
Muhammad Hammad,
Önder Babur,
Hamid Abdul Basit
Abstract:
Software developers frequently reuse source code from repositories as it saves development time and effort. Code clones accumulated in these repositories hence represent often repeated functionalities and are candidates for reuse in an exploratory or rapid development. In previous work, we introduced DeepClone, a deep neural network model trained by fine tuning GPT-2 model over the BigCloneBench d…
▽ More
Software developers frequently reuse source code from repositories as it saves development time and effort. Code clones accumulated in these repositories hence represent often repeated functionalities and are candidates for reuse in an exploratory or rapid development. In previous work, we introduced DeepClone, a deep neural network model trained by fine tuning GPT-2 model over the BigCloneBench dataset to predict code clone methods. The probabilistic nature of DeepClone output generation can lead to syntax and logic errors that requires manual editing of the output for final reuse. In this paper, we propose a novel approach of applying an information retrieval (IR) technique on top of DeepClone output to recommend real clone methods closely matching the predicted output. We have quantitatively evaluated our strategy, showing that the proposed approach significantly improves the quality of recommendation.
△ Less
Submitted 2 October, 2020;
originally announced October 2020.
-
Zarankiewicz's problem for semilinear hypergraphs
Authors:
Abdul Basit,
Artem Chernikov,
Sergei Starchenko,
Terence Tao,
Chieu-Minh Tran
Abstract:
A bipartite graph $H = \left(V_1, V_2; E \right)$ with $|V_1| + |V_2| = n$ is semilinear if $V_i \subseteq \mathbb{R}^{d_i}$ for some $d_i$ and the edge relation $E$ consists of the pairs of points $(x_1, x_2) \in V_1 \times V_2$ satisfying a fixed Boolean combination of $s$ linear equalities and inequalities in $d_1 + d_2$ variables for some $s$. We show that for a fixed $k$, the number of edges…
▽ More
A bipartite graph $H = \left(V_1, V_2; E \right)$ with $|V_1| + |V_2| = n$ is semilinear if $V_i \subseteq \mathbb{R}^{d_i}$ for some $d_i$ and the edge relation $E$ consists of the pairs of points $(x_1, x_2) \in V_1 \times V_2$ satisfying a fixed Boolean combination of $s$ linear equalities and inequalities in $d_1 + d_2$ variables for some $s$. We show that for a fixed $k$, the number of edges in a $K_{k,k}$-free semilinear $H$ is almost linear in $n$, namely $|E| = O_{s,k,\varepsilon}(n^{1+\varepsilon})$ for any $\varepsilon > 0$; and more generally, $|E| = O_{s,k,r,\varepsilon}(n^{r-1 + \varepsilon})$ for a $K_{k, \ldots,k}$-free semilinear $r$-partite $r$-uniform hypergraph. As an application, we obtain the following incidence bound: given $n_1$ points and $n_2$ open boxes with axis parallel sides in $\mathbb{R}^d$ such that their incidence graph is $K_{k,k}$-free, there can be at most $O_{k,\varepsilon}(n^{1+\varepsilon})$ incidences. The same bound holds if instead of boxes one takes polytopes cut out by the translates of an arbitrary fixed finite set of halfspaces. We also obtain matching upper and (superlinear) lower bounds in the case of dyadic boxes on the plane, and point out some connections to the model-theoretic trichotomy in $o$-minimal structures (showing that the failure of an almost linear bound for some definable graph allows one to recover the field operations from that graph in a definable manner).
△ Less
Submitted 23 July, 2021; v1 submitted 7 September, 2020;
originally announced September 2020.
-
DeepClone: Modeling Clones to Generate Code Predictions
Authors:
Muhammad Hammad,
Önder Babur,
Hamid Abdul Basit,
Mark van den Brand
Abstract:
Programmers often reuse code from source code repositories to reduce the development effort. Code clones are candidates for reuse in exploratory or rapid development, as they represent often repeated functionality in software systems. To facilitate code clone reuse, we propose DeepClone, a novel approach utilizing a deep learning algorithm for modeling code clones to predict the next set of tokens…
▽ More
Programmers often reuse code from source code repositories to reduce the development effort. Code clones are candidates for reuse in exploratory or rapid development, as they represent often repeated functionality in software systems. To facilitate code clone reuse, we propose DeepClone, a novel approach utilizing a deep learning algorithm for modeling code clones to predict the next set of tokens (possibly a complete clone method body) based on the code written so far. The predicted tokens require minimal customization to fit the context. DeepClone applies natural language processing techniques to learn from a large code corpus, and generates code tokens using the model learned. We have quantitatively evaluated our solution to assess (1) our model's quality and its accuracy in token prediction, and (2) its performance and effectiveness in clone method prediction. We also discuss various application scenarios for our approach.
△ Less
Submitted 5 December, 2020; v1 submitted 22 July, 2020;
originally announced July 2020.
-
On the independent set sequence of a tree
Authors:
Abdul Basit,
David Galvin
Abstract:
Alavi, Malde, Schwenk and Erdős asked whether the independent set sequence of every tree is unimodal. Here we make some observations about this question. We show that for the uniformly random (labelled) tree, asymptotically almost surely (a.a.s.) the initial approximately 49.5\% of the sequence is increasing while the terminal approximately 38.8\% is decreasing. Our approach uses the Matrix Tree T…
▽ More
Alavi, Malde, Schwenk and Erdős asked whether the independent set sequence of every tree is unimodal. Here we make some observations about this question. We show that for the uniformly random (labelled) tree, asymptotically almost surely (a.a.s.) the initial approximately 49.5\% of the sequence is increasing while the terminal approximately 38.8\% is decreasing. Our approach uses the Matrix Tree Theorem, combined with computation. We also present a generalization of a result of Levit and Mandrescu, concerning the final one-third of the independent set sequence of a König-Egerváry graph.
△ Less
Submitted 3 July, 2021; v1 submitted 22 June, 2020;
originally announced June 2020.
-
Localizing Firearm Carriers by Identifying Human-Object Pairs
Authors:
Abdul Basit,
Muhammad Akhtar Munir,
Mohsen Ali,
Arif Mahmood
Abstract:
Visual identification of gunmen in a crowd is a challenging problem, that requires resolving the association of a person with an object (firearm). We present a novel approach to address this problem, by defining human-object interaction (and non-interaction) bounding boxes. In a given image, human and firearms are separately detected. Each detected human is paired with each detected firearm, allow…
▽ More
Visual identification of gunmen in a crowd is a challenging problem, that requires resolving the association of a person with an object (firearm). We present a novel approach to address this problem, by defining human-object interaction (and non-interaction) bounding boxes. In a given image, human and firearms are separately detected. Each detected human is paired with each detected firearm, allowing us to create a paired bounding box that contains both object and the human. A network is trained to classify these paired-bounding-boxes into human carrying the identified firearm or not. Extensive experiments were performed to evaluate effectiveness of the algorithm, including exploiting full pose of the human, hand key-points, and their association with the firearm. The knowledge of spatially localized features is key to success of our method by using multi-size proposals with adaptive average pooling. We have also extended a previously firearm detection dataset, by adding more images and tagging in extended dataset the human-firearm pairs (including bounding boxes for firearms and gunmen). The experimental results ($AP_{hold} = 78.5$) demonstrate effectiveness of the proposed method.
△ Less
Submitted 20 May, 2020; v1 submitted 19 May, 2020;
originally announced May 2020.
-
Dynamic Matrix Decomposition for Action Recognition
Authors:
Abdul Basit
Abstract:
Designing a technique for the automatic analysis of different actions in videos in order to detect the presence of interested activities is of high significance nowadays. In this paper, we explore a robust and dynamic appearance technique for the purpose of identifying different action activities. We also exploit a low-rank and structured sparse matrix decomposition (LSMD) method to better model t…
▽ More
Designing a technique for the automatic analysis of different actions in videos in order to detect the presence of interested activities is of high significance nowadays. In this paper, we explore a robust and dynamic appearance technique for the purpose of identifying different action activities. We also exploit a low-rank and structured sparse matrix decomposition (LSMD) method to better model these activities.. Our method is effective in encoding localized spatio-temporal features which enables the analysis of local motion taking place in the video. Our proposed model use adjacent frame differences as the input to the method thereby forcing it to capture the changes occurring in the video. The performance of our model is tested on a benchmark dataset in terms of detection accuracy. Results achieved with our model showed the promising capability of our model in detecting action activities.
△ Less
Submitted 20 February, 2019;
originally announced February 2019.
-
Transfer Learning and Meta Classification Based Deep Churn Prediction System for Telecom Industry
Authors:
Uzair Ahmed,
Asifullah Khan,
Saddam Hussain Khan,
Abdul Basit,
Irfan Ul Haq,
Yeon Soo Lee
Abstract:
A churn prediction system guides telecom service providers to reduce revenue loss. However, the development of a churn prediction system for a telecom industry is a challenging task, mainly due to the large size of the data, high dimensional features, and imbalanced distribution of the data. In this paper, we present a solution to the inherent problems of churn prediction, using the concept of Tra…
▽ More
A churn prediction system guides telecom service providers to reduce revenue loss. However, the development of a churn prediction system for a telecom industry is a challenging task, mainly due to the large size of the data, high dimensional features, and imbalanced distribution of the data. In this paper, we present a solution to the inherent problems of churn prediction, using the concept of Transfer Learning (TL) and Ensemble-based Meta-Classification. The proposed method TL-DeepE is applied in two stages. The first stage employs TL by fine-tuning multiple pre-trained Deep Convolution Neural Networks (CNNs). Telecom datasets are normally in vector form, which is converted into 2D images because Deep CNNs have high learning capacity on images. In the second stage, predictions from these Deep CNNs are appended to the original feature vector and thus are used to build a final feature vector for the high-level Genetic Programming (GP) and AdaBoost based ensemble classifier. Thus, the experiments are conducted using various CNNs as base classifiers and the GP-AdaBoost as a meta-classifier. By using 10-fold cross-validation, the performance of the proposed TL-DeepE system is compared with existing techniques, for two standard telecommunication datasets; Orange and Cell2cell. Performing experiments on Orange and Cell2cell datasets, the prediction accuracy obtained was 75.4% and 68.2%, while the area under the curve was 0.83 and 0.74, respectively.
△ Less
Submitted 5 March, 2019; v1 submitted 18 January, 2019;
originally announced January 2019.
-
An improved sum-product bound for quaternions
Authors:
Abdul Basit,
Ben Lund
Abstract:
We show that there exists an absolute constant $c > 0$, such that, for any finite set $A$ of quaternions, \[ \max\{|A+A, |AA| \} \gtrsim |A|^{4/3 + c}. \] This generalizes a sum-product bound for real numbers proved by Konyagin and Shkredov.
We show that there exists an absolute constant $c > 0$, such that, for any finite set $A$ of quaternions, \[ \max\{|A+A, |AA| \} \gtrsim |A|^{4/3 + c}. \] This generalizes a sum-product bound for real numbers proved by Konyagin and Shkredov.
△ Less
Submitted 10 November, 2021; v1 submitted 6 September, 2018;
originally announced September 2018.
-
Lightweight Cryptography for Distributed PKI Based MANETS
Authors:
N Chaitanya Kumar,
Abdul Basit,
Priyadarshi Singh,
V. Ch. Venkaiah
Abstract:
Because of lack of infrastructure and Central Authority(CA), secure communication is a challenging job in MANETs. A lightweight security solution is needed in MANET to balance its nodes resource tightness and mobility feature. The role of CA should be decentralized in MANET because the network is managed by the nodes themselves without any fixed infrastructure and centralized authority. In this pa…
▽ More
Because of lack of infrastructure and Central Authority(CA), secure communication is a challenging job in MANETs. A lightweight security solution is needed in MANET to balance its nodes resource tightness and mobility feature. The role of CA should be decentralized in MANET because the network is managed by the nodes themselves without any fixed infrastructure and centralized authority. In this paper, we created a distributed Public Key Infrastructure (PKI) using Shamir secret sharing mechanism which allows the nodes of the MANET to have a share of its private key. The traditional PKI protocols require centralized authority and heavy computing power to manage public and private keys, thus making them not suitable for MANETs. To establish a secure communication for the MANET nodes, we proposed a lightweight crypto protocol which requires limited resources, making it suitable for MANETs.
△ Less
Submitted 9 April, 2018;
originally announced April 2018.
-
Automatic Identification of Closely-related Indian Languages: Resources and Experiments
Authors:
Ritesh Kumar,
Bornini Lahiri,
Deepak Alok,
Atul Kr. Ojha,
Mayank Jain,
Abdul Basit,
Yogesh Dawer
Abstract:
In this paper, we discuss an attempt to develop an automatic language identification system for 5 closely-related Indo-Aryan languages of India, Awadhi, Bhojpuri, Braj, Hindi and Magahi. We have compiled a comparable corpora of varying length for these languages from various resources. We discuss the method of creation of these corpora in detail. Using these corpora, a language identification syst…
▽ More
In this paper, we discuss an attempt to develop an automatic language identification system for 5 closely-related Indo-Aryan languages of India, Awadhi, Bhojpuri, Braj, Hindi and Magahi. We have compiled a comparable corpora of varying length for these languages from various resources. We discuss the method of creation of these corpora in detail. Using these corpora, a language identification system was developed, which currently gives state of the art accuracy of 96.48\%. We also used these corpora to study the similarity between the 5 languages at the lexical level, which is the first data-based study of the extent of closeness of these languages.
△ Less
Submitted 26 March, 2018;
originally announced March 2018.
-
Training large margin host-pathogen protein-protein interaction predictors
Authors:
Abdul Hannan Basit,
Wajid Arshad Abbasi,
Amina Asif,
Fayyaz Ul Amir Afsar Minhas
Abstract:
Detection of protein-protein interactions (PPIs) plays a vital role in molecular biology. Particularly, infections are caused by the interactions of host and pathogen proteins. It is important to identify host-pathogen interactions (HPIs) to discover new drugs to counter infectious diseases. Conventional wet lab PPI prediction techniques have limitations in terms of large scale application and bud…
▽ More
Detection of protein-protein interactions (PPIs) plays a vital role in molecular biology. Particularly, infections are caused by the interactions of host and pathogen proteins. It is important to identify host-pathogen interactions (HPIs) to discover new drugs to counter infectious diseases. Conventional wet lab PPI prediction techniques have limitations in terms of large scale application and budget. Hence, computational approaches are developed to predict PPIs. This study aims to develop large margin machine learning models to predict interspecies PPIs with a special interest in host-pathogen protein interactions (HPIs). Especially, we focus on seeking answers to three queries that arise while develo** an HPI predictor. 1) How should we select negative samples? 2) What should be the size of negative samples as compared to the positive samples? 3) What type of margin violation penalty should be used to train the predictor? We compare two available methods for negative sampling. Moreover, we propose a new method of assigning weights to each training example in weighted SVM depending on the distance of the negative examples from the positive examples. We have also developed a web server for our HPI predictor called HoPItor (Host Pathogen Interaction predicTOR) that can predict interactions between human and viral proteins. This webserver can be accessed at the URL: http://faculty.pieas.edu.pk/fayyaz/software.html#HoPItor.
△ Less
Submitted 21 November, 2017;
originally announced November 2017.
-
Node Authentication Using BLS Signature in Distributed PKI Based MANETS
Authors:
N Chaitanya Kumar,
Abdul Basit,
Priyadarshi Singh,
V. Ch. Venkaiah,
Y. V. Subba Rao
Abstract:
Authenticating a node in mobile ad-hoc networks is a challenging task due to their dynamic and resource constraint infrastructure. For this purpose, MANETS adopt two kinds of approaches Public key cryptography and identity-based cryptography. In Public Key Infrastructure (PKI), Certificate Authority (CA) is responsible for key management. In order to adapt it to MANET, the job of the CA must be di…
▽ More
Authenticating a node in mobile ad-hoc networks is a challenging task due to their dynamic and resource constraint infrastructure. For this purpose, MANETS adopt two kinds of approaches Public key cryptography and identity-based cryptography. In Public Key Infrastructure (PKI), Certificate Authority (CA) is responsible for key management. In order to adapt it to MANET, the job of the CA must be distributed. The master secret key is shared among the nodes of the MANET, to self-organize the network without a central authority.The key is shared based on Shamir secret sharing scheme with bivariate polynomial to make the MANET fully self-managed by nodes.In this paper, we considered PKI based scenario and proposed a new scheme to authenticate a node using BLS signature which is light weight compared to the existing schemes thus making it suitable for MANET.
△ Less
Submitted 29 August, 2017;
originally announced August 2017.
-
On the number of ordinary lines determined by sets in complex space
Authors:
Abdul Basit,
Zeev Dvir,
Shubhangi Saraf,
Charles Wolf
Abstract:
Kelly's theorem states that a set of $n$ points affinely spanning $\mathbb{C}^3$ must determine at least one ordinary complex line (a line passing through exactly two of the points). Our main theorem shows that such sets determine at least $3n/2$ ordinary lines, unless the configuration has $n-1$ points in a plane and one point outside the plane (in which case there are at least $n-1$ ordinary lin…
▽ More
Kelly's theorem states that a set of $n$ points affinely spanning $\mathbb{C}^3$ must determine at least one ordinary complex line (a line passing through exactly two of the points). Our main theorem shows that such sets determine at least $3n/2$ ordinary lines, unless the configuration has $n-1$ points in a plane and one point outside the plane (in which case there are at least $n-1$ ordinary lines). In addition, when at most $2n/3$ points are contained in any plane, we prove a theorem giving stronger bounds that take advantage of the existence of lines with 4 and more points (in the spirit of Melchior's and Hirzebruch's inequalities). Furthermore, when the points span 4 or more dimensions, with at most $2n/3$ points contained in any three dimensional affine subspace, we show that there must be a quadratic number of ordinary lines.
△ Less
Submitted 10 November, 2021; v1 submitted 26 November, 2016;
originally announced November 2016.