-
Recurrent Super-Resolution Method for Enhancing Low Quality Thermal Facial Data
Authors:
David O'Callaghan,
Cian Ryan,
Waseem Shariff,
Muhammad Ali Farooq,
Joseph Lemley,
Peter Corcoran
Abstract:
The process of obtaining high-resolution images from single or multiple low-resolution images of the same scene is of great interest for real-world image and signal processing applications. This study is about exploring the potential usage of deep learning based image super-resolution algorithms on thermal data for producing high quality thermal imaging results for in-cabin vehicular driver monito…
▽ More
The process of obtaining high-resolution images from single or multiple low-resolution images of the same scene is of great interest for real-world image and signal processing applications. This study is about exploring the potential usage of deep learning based image super-resolution algorithms on thermal data for producing high quality thermal imaging results for in-cabin vehicular driver monitoring systems. In this work we have proposed and developed a novel multi-image super-resolution recurrent neural network to enhance the resolution and improve the quality of low-resolution thermal imaging data captured from uncooled thermal cameras. The end-to-end fully convolutional neural network is trained from scratch on newly acquired thermal data of 30 different subjects in indoor environmental conditions. The effectiveness of the thermally tuned super-resolution network is validated quantitatively as well as qualitatively on test data of 6 distinct subjects. The network was able to achieve a mean peak signal to noise ratio of 39.24 on the validation dataset for 4x super-resolution, outperforming bicubic interpolation both quantitatively and qualitatively.
△ Less
Submitted 21 September, 2022;
originally announced September 2022.
-
Mirror Prox Algorithm for Large-Scale Cell-Free Massive MIMO Uplink Power Control
Authors:
Muhammad Farooq,
Hien Quoc Ngo,
Le-Nam Tran
Abstract:
We consider the problem of max-min fairness for uplink cell-free massive multiple-input multiple-output (MIMO) subject to per-user power constraints. The standard framework for solving the considered problem is to separately solve two subproblems: the receiver filter coefficient design and the power control problem. While the former has a closed-form solution, the latter has been solved using eith…
▽ More
We consider the problem of max-min fairness for uplink cell-free massive multiple-input multiple-output (MIMO) subject to per-user power constraints. The standard framework for solving the considered problem is to separately solve two subproblems: the receiver filter coefficient design and the power control problem. While the former has a closed-form solution, the latter has been solved using either second-order methods of high computational complexity or a first-order method that provides an approximate solution. To deal with these drawbacks of the existing methods, we propose a mirror prox based method for the power control problem by equivalently reformulating it as a convex-concave problem and applying the mirror prox algorithm to find a saddle point. The simulation results establish the optimality of the proposed solution and demonstrate that it is more efficient than the known methods. We also conclude that for large-scale cell-free massive MIMO, joint optimization of linear receive combining and power control provides significantly better user fairness than the power control only scheme in which receiver coefficients are fixed to unity.
△ Less
Submitted 20 September, 2022;
originally announced September 2022.
-
On the Achievable Rate of IRS-Assisted Multigroup Multicast Systems
Authors:
Muhammad Farooq,
Vaibhav Kumar,
Markku Juntti,
Le-Nam Tran
Abstract:
Intelligent reflecting surfaces (IRSs) have shown huge advantages in many potential use cases and thus have been considered a promising candidate for next-generation wireless systems. In this paper, we consider an IRS-assisted multigroup multicast (IRS-MGMC) system in a multiple-input single-output (MISO) scenario, for which the related existing literature is rather limited. In particular, we aim…
▽ More
Intelligent reflecting surfaces (IRSs) have shown huge advantages in many potential use cases and thus have been considered a promising candidate for next-generation wireless systems. In this paper, we consider an IRS-assisted multigroup multicast (IRS-MGMC) system in a multiple-input single-output (MISO) scenario, for which the related existing literature is rather limited. In particular, we aim to jointly design the transmit beamformers and IRS phase shifts to maximize the sum rate of the system under consideration. In order to obtain a numerically efficient solution to the formulated non-convex optimization problem, we propose an alternating projected gradient (APG) method where each iteration admits a closed-form and is shown to be superior to a known solution that is derived from the majorization-minimization (MM) method in terms of both achievable sum rate and required complexity, i.e., run time. In particular, we show that the complexity of the proposed APG method grows linearly with the number of IRS tiles, while that of the known solution in comparison grows with the third power of the number of IRS tiles. The numerical results reported in this paper extend our understanding on the achievable rates of large-scale IRS-assisted multigroup multicast systems.
△ Less
Submitted 15 August, 2022;
originally announced August 2022.
-
Non-Linear Pairwise Language Map**s for Low-Resource Multilingual Acoustic Model Fusion
Authors:
Muhammad Umar Farooq,
Darshan Adiga Haniya Narayana,
Thomas Hain
Abstract:
Multilingual speech recognition has drawn significant attention as an effective way to compensate data scarcity for low-resource languages. End-to-end (e2e) modelling is preferred over conventional hybrid systems, mainly because of no lexicon requirement. However, hybrid DNN-HMMs still outperform e2e models in limited data scenarios. Furthermore, the problem of manual lexicon creation has been all…
▽ More
Multilingual speech recognition has drawn significant attention as an effective way to compensate data scarcity for low-resource languages. End-to-end (e2e) modelling is preferred over conventional hybrid systems, mainly because of no lexicon requirement. However, hybrid DNN-HMMs still outperform e2e models in limited data scenarios. Furthermore, the problem of manual lexicon creation has been alleviated by publicly available trained models of grapheme-to-phoneme (G2P) and text to IPA transliteration for a lot of languages. In this paper, a novel approach of hybrid DNN-HMM acoustic models fusion is proposed in a multilingual setup for the low-resource languages. Posterior distributions from different monolingual acoustic models, against a target language speech signal, are fused together. A separate regression neural network is trained for each source-target language pair to transform posteriors from source acoustic model to the target language. These networks require very limited data as compared to the ASR training. Posterior fusion yields a relative gain of 14.65% and 6.5% when compared with multilingual and monolingual baselines respectively. Cross-lingual model fusion shows that the comparable results can be achieved without using posteriors from the language dependent ASR.
△ Less
Submitted 7 July, 2022;
originally announced July 2022.
-
Investigating the Impact of Cross-lingual Acoustic-Phonetic Similarities on Multilingual Speech Recognition
Authors:
Muhammad Umar Farooq,
Thomas Hain
Abstract:
Multilingual automatic speech recognition (ASR) systems mostly benefit low resource languages but suffer degradation in performance across several languages relative to their monolingual counterparts. Limited studies have focused on understanding the languages behaviour in the multilingual speech recognition setups. In this paper, a novel data-driven approach is proposed to investigate the cross-l…
▽ More
Multilingual automatic speech recognition (ASR) systems mostly benefit low resource languages but suffer degradation in performance across several languages relative to their monolingual counterparts. Limited studies have focused on understanding the languages behaviour in the multilingual speech recognition setups. In this paper, a novel data-driven approach is proposed to investigate the cross-lingual acoustic-phonetic similarities. This technique measures the similarities between posterior distributions from various monolingual acoustic models against a target speech signal. Deep neural networks are trained as map** networks to transform the distributions from different acoustic models into a directly comparable form. The analysis observes that the languages closeness can not be truly estimated by the volume of overlap** phonemes set. Entropy analysis of the proposed map** networks exhibits that a language with lesser overlap can be more amenable to cross-lingual transfer, and hence more beneficial in the multilingual setup. Finally, the proposed posterior transformation approach is leveraged to fuse monolingual models for a target language. A relative improvement of ~8% over monolingual counterpart is achieved.
△ Less
Submitted 7 July, 2022;
originally announced July 2022.
-
Noether symmetries and first integrals of damped harmonic oscillator
Authors:
M. Umar Farooq,
M. Safdar
Abstract:
Noether theorem establishes an interesting connection between symmetries of the action integral and conservation laws of a dynamical system. The aim of the present work is to classify the damped harmonic oscillator problem with respect to Noether symmetries and to construct corresponding conservation laws for all over-damped, under damped and critical damped cases. For each case we obtain maximum…
▽ More
Noether theorem establishes an interesting connection between symmetries of the action integral and conservation laws of a dynamical system. The aim of the present work is to classify the damped harmonic oscillator problem with respect to Noether symmetries and to construct corresponding conservation laws for all over-damped, under damped and critical damped cases. For each case we obtain maximum five linearly independent group generators which provide related five conserved quantities. Remarkably, after obtaining complete set of invariant quantities we obtain analytical solutions for each case. In the current work, we also introduce a new Lagrangian for the damped harmonic oscillator. Though the form of this new Lagrangian and presented by Bateman are completely different, yet it generates same set of Noether symmetries and conserved quantities. So, this new form of Lagrangian we are presenting here may be seriously interesting for the physicists. Moreover, we also find the Lie algebras of Noether symmetries and point out some interesting aspects of results related to Noether symmetries and first integrals of damped harmonic oscillator which perhaps not reported in the earlier studies.
△ Less
Submitted 21 May, 2022;
originally announced May 2022.
-
Massive MIMO for Serving Federated Learning and Non-Federated Learning Users
Authors:
Muhammad Farooq,
Tung Thanh Vu,
Hien Quoc Ngo,
Le-Nam Tran
Abstract:
With its privacy preservation and communication efficiency, federated learning (FL) has emerged as a promising learning framework for beyond 5G wireless networks. It is anticipated that future wireless networks will jointly serve both FL and downlink non-FL user groups in the same time-frequency resource. While in the downlink of each FL iteration, both groups jointly receive data from the base st…
▽ More
With its privacy preservation and communication efficiency, federated learning (FL) has emerged as a promising learning framework for beyond 5G wireless networks. It is anticipated that future wireless networks will jointly serve both FL and downlink non-FL user groups in the same time-frequency resource. While in the downlink of each FL iteration, both groups jointly receive data from the base station in the same time-frequency resource, the uplink of each FL iteration requires bidirectional communication to support uplink transmission for FL users and downlink transmission for non-FL users. To overcome this challenge, we present half-duplex (HD) and full-duplex (FD) communication schemes to serve both groups. More specifically, we adopt the massive multiple-input multiple-output technology and aim to maximize the minimum effective rate of non-FL users under a quality of service (QoS) latency constraint for FL users. Since the formulated problem is highly nonconvex, we propose a power control algorithm based on successive convex approximation to find a stationary solution. Numerical results show that the proposed solutions perform significantly better than the considered baselines schemes. Moreover, the FD-based scheme outperforms the HD-based scheme in scenarios where the self-interference is small or moderate and/or the size of FL model updates is large.
△ Less
Submitted 21 May, 2022; v1 submitted 17 May, 2022;
originally announced May 2022.
-
Serving Federated Learning and Non-Federated Learning Users: A Massive MIMO Approach
Authors:
Muhammad Farooq,
Tung T. Vu,
Hien Quoc Ngo,
Le-Nam Tran
Abstract:
Federated learning (FL) with its data privacy protection and communication efficiency has been considered as a promising learning framework for beyond-5G/6G systems. We consider a scenario where a group of downlink non-FL users are jointly served with a group of FL users using massive multiple-input multiple-output technology. The main challenge is how to utilise the resource to optimally serve bo…
▽ More
Federated learning (FL) with its data privacy protection and communication efficiency has been considered as a promising learning framework for beyond-5G/6G systems. We consider a scenario where a group of downlink non-FL users are jointly served with a group of FL users using massive multiple-input multiple-output technology. The main challenge is how to utilise the resource to optimally serve both FL and non-FL users. We propose a communication scheme that serves the downlink of the non-FL users (UEs) and the uplink of FL UEs in each half of the frequency band. We formulate an optimization problem for optimizing transmit power to maximize the minimum effective data rates for non-FL users, while guaranteeing a quality-of-service time of each FL communication round for FL users. Then, a successive convex approximation-based algorithm is proposed to solve the formulated problem. Numerical results confirm that our proposed scheme significantly outperforms the baseline scheme.
△ Less
Submitted 21 May, 2022; v1 submitted 17 May, 2022;
originally announced May 2022.
-
Machine Learning Aided Holistic Handover Optimization for Emerging Networks
Authors:
Muhammad Umar Bin Farooq,
Marvin Manalastas,
Syed Muhammad Asad Zaidi,
Adnan Abu-Dayya,
Ali Imran
Abstract:
In the wake of network densification and multi-band operation in emerging cellular networks, mobility and handover management is becoming a major bottleneck. The problem is further aggravated by the fact that holistic mobility management solutions for different types of handovers, namely inter-frequency and intra-frequency handovers, remain scarce. This paper presents a first mobility management s…
▽ More
In the wake of network densification and multi-band operation in emerging cellular networks, mobility and handover management is becoming a major bottleneck. The problem is further aggravated by the fact that holistic mobility management solutions for different types of handovers, namely inter-frequency and intra-frequency handovers, remain scarce. This paper presents a first mobility management solution that concurrently optimizes inter-frequency related A5 parameters and intra-frequency related A3 parameters. We analyze and optimize five parameters namely A5-time to trigger (TTT), A5-threshold1, A5-threshold2, A3-TTT, and A3-offset to jointly maximize three critical key performance indicators (KPIs): edge user reference signal received power (RSRP), handover success rate (HOSR) and load between frequency bands. In the absence of tractable analytical models due to system level complexity, we leverage machine learning to quantify the KPIs as a function of the mobility parameters. An XGBoost based model has the best performance for edge RSRP and HOSR while random forest outperforms others for load prediction. An analysis of the mobility parameters provides several insights: 1) there exists a strong coupling between A3 and A5 parameters; 2) an optimal set of parameters exists for each KPI; and 3) the optimal parameters vary for different KPIs. We also perform a SHAP based sensitivity to help resolve the parametric conflict between the KPIs. Finally, we formulate a maximization problem, show it is non-convex, and solve it utilizing simulated annealing (SA). Results indicate that ML-based SA-aided solution is more than 14x faster than the brute force approach with a slight loss in optimality.
△ Less
Submitted 6 February, 2022;
originally announced February 2022.
-
Power Control for Multigroup Multicast Cell-Free Massive MIMO Downlink
Authors:
Muhammad Farooq,
Markku Juntti,
Le-Nam Tran
Abstract:
We consider a multigroup multicast cell-free multiple-input multiple-output (MIMO) downlink system with short-term power constraints. In particular, the normalized conjugate beamforming scheme is adopted at each access point (AP) to keep the downlink power strictly under the power budget regardless of small scale fading. In the considered scenario, APs multicast signals to multiple groups of users…
▽ More
We consider a multigroup multicast cell-free multiple-input multiple-output (MIMO) downlink system with short-term power constraints. In particular, the normalized conjugate beamforming scheme is adopted at each access point (AP) to keep the downlink power strictly under the power budget regardless of small scale fading. In the considered scenario, APs multicast signals to multiple groups of users whereby users in the same group receive the same message. Under this setup, we are interested in maximizing the minimum achievable rate of all groups, commonly known as the max-min fairness problem, which has not been studied before in this context. To solve the considered problem, we first present a bisection method which in fact has been widely used in previous studies for cell-free massive MIMO, and then propose an accelerated projected gradient (APG) method. We show that the proposed APG method outperforms the bisection method requiring lesser run time while still achieving the same objective value. Moreover, the considered power control scheme provides significantly improved performance and more fairness among the users compared to the equal power allocation scheme.
△ Less
Submitted 13 January, 2022;
originally announced January 2022.
-
Accelerated Projected Gradient Method for the Optimization of Cell-Free Massive MIMO Downlink
Authors:
Muhammad Farooq,
Hien Quoc Ngo,
Le-Nam Tran
Abstract:
We consider the downlink of a cell-free massive multiple-input multiple-output (MIMO) system where large number of access points (APs) simultaneously serve a group of users. Two fundamental problems are of interest, namely (i) to maximize the total spectral efficiency (SE), and (ii) to maximize the minimum SE of all users. As the considered problems are non-convex, existing solutions rely on succe…
▽ More
We consider the downlink of a cell-free massive multiple-input multiple-output (MIMO) system where large number of access points (APs) simultaneously serve a group of users. Two fundamental problems are of interest, namely (i) to maximize the total spectral efficiency (SE), and (ii) to maximize the minimum SE of all users. As the considered problems are non-convex, existing solutions rely on successive convex approximation to find a sub-optimal solution. The known methods use off-the-shelf convex solvers, which basically implement an interior-point algorithm, to solve the derived convex problems. The main issue of such methods is that their complexity does not scale favorably with the problem size, limiting previous studies to cell-free massive MIMO of moderate scales. Thus the potential of cell-free massive MIMO has not been fully understood. To address this issue, we propose an accelerated projected gradient method to solve the considered problems. Particularly, the proposed solution is found in closed-form expressions and only requires the first order information of the objective, rather than the Hessian matrix as in known solutions, and thus is much more memory efficient. Numerical results demonstrate that our proposed solution achieves far less run-time, compared to other second-order methods.
△ Less
Submitted 12 January, 2022;
originally announced January 2022.
-
Evaluation of Thermal Imaging on Embedded GPU Platforms for Application in Vehicular Assistance Systems
Authors:
Muhammad Ali Farooq,
Waseem Shariff,
Peter Corcoran
Abstract:
This study is focused on evaluating the real-time performance of thermal object detection for smart and safe vehicular systems by deploying the trained networks on GPU & single-board EDGE-GPU computing platforms for onboard automotive sensor suite testing. A novel large-scale thermal dataset comprising of > 35,000 distinct frames is acquired, processed, and open-sourced in challenging weather and…
▽ More
This study is focused on evaluating the real-time performance of thermal object detection for smart and safe vehicular systems by deploying the trained networks on GPU & single-board EDGE-GPU computing platforms for onboard automotive sensor suite testing. A novel large-scale thermal dataset comprising of > 35,000 distinct frames is acquired, processed, and open-sourced in challenging weather and environmental scenarios. The dataset is a recorded from lost-cost yet effective uncooled LWIR thermal camera, mounted stand-alone and on an electric vehicle to minimize mechanical vibrations. State-of-the-art YOLO-V5 networks variants are trained using four different public datasets as well newly acquired local dataset for optimal generalization of DNN by employing SGD optimizer. The effectiveness of trained networks is validated on extensive test data using various quantitative metrics which include precision, recall curve, mean average precision, and frames per second. The smaller network variant of YOLO is further optimized using TensorRT inference accelerator to explicitly boost the frames per second rate. Optimized network engine increases the frames per second rate by 3.5 times when testing on low power edge devices thus achieving 11 fps on Nvidia Jetson Nano and 60 fps on Nvidia Xavier NX development boards.
△ Less
Submitted 5 January, 2022;
originally announced January 2022.
-
Object Detection in Thermal Spectrum for Advanced Driver-Assistance Systems (ADAS)
Authors:
Muhammad Ali Farooq,
Peter Corcoran,
Cosmin Rotariu,
Waseem Shariff
Abstract:
Object detection in thermal infrared spectrum provides more reliable data source in low-lighting conditions and different weather conditions, as it is useful both in-cabin and outside for pedestrian, animal, and vehicular detection as well as for detecting street-signs & lighting poles. This paper is about exploring and adapting state-of-the-art object detection and classifier framework on thermal…
▽ More
Object detection in thermal infrared spectrum provides more reliable data source in low-lighting conditions and different weather conditions, as it is useful both in-cabin and outside for pedestrian, animal, and vehicular detection as well as for detecting street-signs & lighting poles. This paper is about exploring and adapting state-of-the-art object detection and classifier framework on thermal vision with seven distinct classes for advanced driver-assistance systems (ADAS). The trained network variants on public datasets are validated on test data with three different test approaches which include test-time with no augmentation, test-time augmentation, and test-time with model ensembling. Additionally, the efficacy of trained networks is tested on locally gathered novel test-data captured with an uncooled LWIR prototype thermal camera in challenging weather and environmental scenarios. The performance analysis of trained models is investigated by computing precision, recall, and mean average precision scores (mAP). Furthermore, the trained model architecture is optimized using TensorRT inference accelerator and deployed on resource-constrained edge hardware Nvidia Jetson Nano to explicitly reduce the inference time on GPU as well as edge devices for further real-time onboard installations.
△ Less
Submitted 27 October, 2021; v1 submitted 20 September, 2021;
originally announced September 2021.
-
High-Accuracy Absolute Magnetometry with Application to the Fermilab Muon $g-2$ Experiment
Authors:
D. Flay,
D. Kawall,
T. Chupp,
S. Corrodi,
M. Farooq,
M. Fertl,
J. George,
J. Grange,
R. Hong,
R. Osofsky,
S. Ramachandran,
E. Swanson,
P. Winter
Abstract:
We present details of a high-accuracy absolute scalar magnetometer based on pulsed proton NMR. The $B$-field magnitude is determined from the precession frequency of proton spins in a cylindrical sample of water after accounting for field perturbations from probe materials, sample shape, and other corrections. Features of the design, testing procedures, and corrections necessary for qualification…
▽ More
We present details of a high-accuracy absolute scalar magnetometer based on pulsed proton NMR. The $B$-field magnitude is determined from the precession frequency of proton spins in a cylindrical sample of water after accounting for field perturbations from probe materials, sample shape, and other corrections. Features of the design, testing procedures, and corrections necessary for qualification as an absolute scalar magnetometer are described. The device was tested at $B = 1.45$\,T but can be modified for a range exceeding 1--3\,T. The magnetometer was used to calibrate other NMR magnetometers and measure absolute magnetic field magnitudes to an accuracy of 19 parts per billion as part of a measurement of the muon magnetic moment anomaly at Fermilab.
△ Less
Submitted 22 December, 2021; v1 submitted 18 September, 2021;
originally announced September 2021.
-
Effectiveness of State-of-the-Art Super Resolution Algorithms in Surveillance Environment
Authors:
Muhammad Ali Farooq,
Ammar Ali Khan,
Ansar Ahmad,
Rana Hammad Raza
Abstract:
Image Super Resolution (SR) finds applications in areas where images need to be closely inspected by the observer to extract enhanced information. One such focused application is an offline forensic analysis of surveillance feeds. Due to the limitations of camera hardware, camera pose, limited bandwidth, varying illumination conditions, and occlusions, the quality of the surveillance feed is signi…
▽ More
Image Super Resolution (SR) finds applications in areas where images need to be closely inspected by the observer to extract enhanced information. One such focused application is an offline forensic analysis of surveillance feeds. Due to the limitations of camera hardware, camera pose, limited bandwidth, varying illumination conditions, and occlusions, the quality of the surveillance feed is significantly degraded at times, thereby compromising monitoring of behavior, activities, and other sporadic information in the scene. For the proposed research work, we have inspected the effectiveness of four conventional yet effective SR algorithms and three deep learning-based SR algorithms to seek the finest method that executes well in a surveillance environment with limited training data op-tions. These algorithms generate an enhanced resolution output image from a sin-gle low-resolution (LR) input image. For performance analysis, a subset of 220 images from six surveillance datasets has been used, consisting of individuals with varying distances from the camera, changing illumination conditions, and complex backgrounds. The performance of these algorithms has been evaluated and compared using both qualitative and quantitative metrics. These SR algo-rithms have also been compared based on face detection accuracy. By analyzing and comparing the performance of all the algorithms, a Convolutional Neural Network (CNN) based SR technique using an external dictionary proved to be best by achieving robust face detection accuracy and scoring optimal quantitative metric results under different surveillance conditions. This is because the CNN layers progressively learn more complex features using an external dictionary.
△ Less
Submitted 8 July, 2021;
originally announced July 2021.
-
Measurement of the Positive Muon Anomalous Magnetic Moment to 0.46 ppm
Authors:
B. Abi,
T. Albahri,
S. Al-Kilani,
D. Allspach,
L. P. Alonzi,
A. Anastasi,
A. Anisenkov,
F. Azfar,
K. Badgley,
S. Baeßler,
I. Bailey,
V. A. Baranov,
E. Barlas-Yucel,
T. Barrett,
E. Barzi,
A. Basti,
F. Bedeschi,
A. Behnke,
M. Berz,
M. Bhattacharya,
H. P. Binney,
R. Bjorkquist,
P. Bloom,
J. Bono,
E. Bottalico
, et al. (212 additional authors not shown)
Abstract:
We present the first results of the Fermilab Muon g-2 Experiment for the positive muon magnetic anomaly $a_μ\equiv (g_μ-2)/2$. The anomaly is determined from the precision measurements of two angular frequencies. Intensity variation of high-energy positrons from muon decays directly encodes the difference frequency $ω_a$ between the spin-precession and cyclotron frequencies for polarized muons in…
▽ More
We present the first results of the Fermilab Muon g-2 Experiment for the positive muon magnetic anomaly $a_μ\equiv (g_μ-2)/2$. The anomaly is determined from the precision measurements of two angular frequencies. Intensity variation of high-energy positrons from muon decays directly encodes the difference frequency $ω_a$ between the spin-precession and cyclotron frequencies for polarized muons in a magnetic storage ring. The storage ring magnetic field is measured using nuclear magnetic resonance probes calibrated in terms of the equivalent proton spin precession frequency ${\tildeω'^{}_p}$ in a spherical water sample at 34.7$^{\circ}$C. The ratio $ω_a / {\tildeω'^{}_p}$, together with known fundamental constants, determines $a_μ({\rm FNAL}) = 116\,592\,040(54)\times 10^{-11}$ (0.46\,ppm). The result is 3.3 standard deviations greater than the standard model prediction and is in excellent agreement with the previous Brookhaven National Laboratory (BNL) E821 measurement. After combination with previous measurements of both $μ^+$ and $μ^-$, the new experimental average of $a_μ({\rm Exp}) = 116\,592\,061(41)\times 10^{-11}$ (0.35\,ppm) increases the tension between experiment and theory to 4.2 standard deviations
△ Less
Submitted 7 April, 2021;
originally announced April 2021.
-
Measurement of the anomalous precession frequency of the muon in the Fermilab Muon g-2 experiment
Authors:
T. Albahri,
A. Anastasi,
A. Anisenkov,
K. Badgley,
S. Baeßler,
I. Bailey,
V. A. Baranov,
E. Barlas-Yucel,
T. Barrett,
A. Basti,
F. Bedeschi,
M. Berz,
M. Bhattacharya,
H. P. Binney,
P. Bloom,
J. Bono,
E. Bottalico,
T. Bowcock,
G. Cantatore,
R. M. Carey,
B. C. K. Casey,
D. Cauz,
R. Chakraborty,
S. P. Chang,
A. Chapelain
, et al. (153 additional authors not shown)
Abstract:
The Muon g-2 Experiment at Fermi National Accelerator Laboratory (FNAL) has measured the muon anomalous precession frequency $ω_a$ to an uncertainty of 434 parts per billion (ppb), statistical, and 56 ppb, systematic, with data collected in four storage ring configurations during its first physics run in 2018. When combined with a precision measurement of the magnetic field of the experiment's muo…
▽ More
The Muon g-2 Experiment at Fermi National Accelerator Laboratory (FNAL) has measured the muon anomalous precession frequency $ω_a$ to an uncertainty of 434 parts per billion (ppb), statistical, and 56 ppb, systematic, with data collected in four storage ring configurations during its first physics run in 2018. When combined with a precision measurement of the magnetic field of the experiment's muon storage ring, the precession frequency measurement determines a muon magnetic anomaly of $a_μ({\rm FNAL}) = 116\,592\,040(54) \times 10^{-11}$ (0.46 ppm). This article describes the multiple techniques employed in the reconstruction, analysis and fitting of the data to measure the precession frequency. It also presents the averaging of the results from the eleven separate determinations of ω_a, and the systematic uncertainties on the result.
△ Less
Submitted 7 April, 2021;
originally announced April 2021.
-
Beam dynamics corrections to the Run-1 measurement of the muon anomalous magnetic moment at Fermilab
Authors:
T. Albahri,
A. Anastasi,
K. Badgley,
S. Baeßler,
I. Bailey,
V. A. Baranov,
E. Barlas-Yucel,
T. Barrett,
F. Bedeschi,
M. Berz,
M. Bhattacharya,
H. P. Binney,
P. Bloom,
J. Bono,
E. Bottalico,
T. Bowcock,
G. Cantatore,
R. M. Carey,
B. C. K. Casey,
D. Cauz,
R. Chakraborty,
S. P. Chang,
A. Chapelain,
S. Charity,
R. Chislett
, et al. (152 additional authors not shown)
Abstract:
This paper presents the beam dynamics systematic corrections and their uncertainties for the Run-1 data set of the Fermilab Muon g-2 Experiment. Two corrections to the measured muon precession frequency $ω_a^m$ are associated with well-known effects owing to the use of electrostatic quadrupole (ESQ) vertical focusing in the storage ring. An average vertically oriented motional magnetic field is fe…
▽ More
This paper presents the beam dynamics systematic corrections and their uncertainties for the Run-1 data set of the Fermilab Muon g-2 Experiment. Two corrections to the measured muon precession frequency $ω_a^m$ are associated with well-known effects owing to the use of electrostatic quadrupole (ESQ) vertical focusing in the storage ring. An average vertically oriented motional magnetic field is felt by relativistic muons passing transversely through the radial electric field components created by the ESQ system. The correction depends on the stored momentum distribution and the tunes of the ring, which has relatively weak vertical focusing. Vertical betatron motions imply that the muons do not orbit the ring in a plane exactly orthogonal to the vertical magnetic field direction. A correction is necessary to account for an average pitch angle associated with their trajectories. A third small correction is necessary because muons that escape the ring during the storage time are slightly biased in initial spin phase compared to the parent distribution. Finally, because two high-voltage resistors in the ESQ network had longer than designed RC time constants, the vertical and horizontal centroids and envelopes of the stored muon beam drifted slightly, but coherently, during each storage ring fill. This led to the discovery of an important phase-acceptance relationship that requires a correction. The sum of the corrections to $ω_a^m$ is 0.50 $\pm$ 0.09 ppm; the uncertainty is small compared to the 0.43 ppm statistical precision of $ω_a^m$.
△ Less
Submitted 23 April, 2021; v1 submitted 7 April, 2021;
originally announced April 2021.
-
Magnetic Field Measurement and Analysis for the Muon g-2 Experiment at Fermilab
Authors:
T. Albahri,
A. Anastasi,
K. Badgley,
S. Baeßler,
I. Bailey,
V. A. Baranov,
E. Barlas-Yucel,
T. Barrett,
F. Bedeschi,
M. Berz,
M. Bhattacharya,
H. P. Binney,
P. Bloom,
J. Bono,
E. Bottalico,
T. Bowcock,
G. Cantatore,
R. M. Carey,
B. C. K. Casey,
D. Cauz,
R. Chakraborty,
S. P. Chang,
A. Chapelain,
S. Charity,
R. Chislett
, et al. (148 additional authors not shown)
Abstract:
The Fermi National Accelerator Laboratory has measured the anomalous precession frequency $a^{}_μ= (g^{}_μ-2)/2$ of the muon to a combined precision of 0.46 parts per million with data collected during its first physics run in 2018. This paper documents the measurement of the magnetic field in the muon storage ring. The magnetic field is monitored by nuclear magnetic resonance systems and calibrat…
▽ More
The Fermi National Accelerator Laboratory has measured the anomalous precession frequency $a^{}_μ= (g^{}_μ-2)/2$ of the muon to a combined precision of 0.46 parts per million with data collected during its first physics run in 2018. This paper documents the measurement of the magnetic field in the muon storage ring. The magnetic field is monitored by nuclear magnetic resonance systems and calibrated in terms of the equivalent proton spin precession frequency in a spherical water sample at 34.7$^\circ$C. The measured field is weighted by the muon distribution resulting in $\tildeω'^{}_p$, the denominator in the ratio $ω^{}_a$/$\tildeω'^{}_p$ that together with known fundamental constants yields $a^{}_μ$. The reported uncertainty on $\tildeω'^{}_p$ for the Run-1 data set is 114 ppb consisting of uncertainty contributions from frequency extraction, calibration, map**, tracking, and averaging of 56 ppb, and contributions from fast transient fields of 99 ppb.
△ Less
Submitted 17 June, 2022; v1 submitted 7 April, 2021;
originally announced April 2021.
-
Intelligent Resource Allocation in Dense LoRa Networks using Deep Reinforcement Learning
Authors:
Inaam Ilahi,
Muhammad Usama,
Muhammad Omer Farooq,
Muhammad Umar Janjua,
Junaid Qadir
Abstract:
The anticipated increase in the count of IoT devices in the coming years motivates the development of efficient algorithms that can help in their effective management while kee** the power consumption low. In this paper, we propose an intelligent multi-channel resource allocation algorithm for dense LoRa networks termed LoRaDRL and provide a detailed performance evaluation. Our results demonstra…
▽ More
The anticipated increase in the count of IoT devices in the coming years motivates the development of efficient algorithms that can help in their effective management while kee** the power consumption low. In this paper, we propose an intelligent multi-channel resource allocation algorithm for dense LoRa networks termed LoRaDRL and provide a detailed performance evaluation. Our results demonstrate that the proposed algorithm not only significantly improves LoRaWAN's packet delivery ratio (PDR) but is also able to support mobile end-devices (EDs) while ensuring lower power consumption hence increasing both the lifetime and capacity of the network.} Most previous works focus on proposing different MAC protocols for improving the network capacity, i.e., LoRaWAN, delay before transmit etc. We show that through the use of LoRaDRL, we can achieve the same efficiency with ALOHA \textcolor{black}{compared to LoRaSim, and LoRa-MAB while moving the complexity from EDs to the gateway thus making the EDs simpler and cheaper. Furthermore, we test the performance of LoRaDRL under large-scale frequency jamming attacks and show its adaptiveness to the changes in the environment. We show that LoRaDRL's output improves the performance of state-of-the-art techniques resulting in some cases an improvement of more than 500\% in terms of PDR compared to learning-based techniques.
△ Less
Submitted 1 November, 2021; v1 submitted 22 December, 2020;
originally announced December 2020.
-
A Low-Complexity Approach for Max-Min Fairness in Uplink Cell-Free Massive MIMO
Authors:
Muhammad Farooq,
Hien Quoc Ngo,
Le Nam Tran
Abstract:
We consider the problem of max-min fairness for uplink cell-free massive multiple-input multiple-output which is a potential technology for beyond 5G networks. More specifically, we aim to maximize the minimum spectral efficiency of all users subject to the per-user power constraint, assuming linear receive combining technique at access points. The considered problem can be further divided into tw…
▽ More
We consider the problem of max-min fairness for uplink cell-free massive multiple-input multiple-output which is a potential technology for beyond 5G networks. More specifically, we aim to maximize the minimum spectral efficiency of all users subject to the per-user power constraint, assuming linear receive combining technique at access points. The considered problem can be further divided into two subproblems: the receiver filter coefficient design and the power control problem. While the receiver coefficient design turns out to be a generalized eigenvalue problem, and thus, admits a closed-form solution, the power control problem is numerically troublesome. To solve the power control problem, existing approaches rely on geometric programming (GP) which is not suitable for large-scale systems. To overcome the high-complexity issue of the GP method, we first reformulate the power control problem intro a convex program, and then apply a smoothing technique in combination with an accelerated projected gradient method to solve it. The simulation results demonstrate that the proposed solution can achieve almost the same objective but in much lesser time than the existing GP-based method.
△ Less
Submitted 10 November, 2020;
originally announced November 2020.
-
Utility Maximization for Large-Scale Cell-Free Massive MIMO Downlink
Authors:
Muhammad Farooq,
Hien Quoc Ngo,
Een-Kee Hong,
Le-Nam Tran
Abstract:
We consider the system-wide utility maximization problem in the downlink of a cell-free massive multiple-input multiple-output (MIMO) system whereby a very large number of access points (APs) simultaneously serve a group of users. Specifically, four fundamental problems with increasing order of user fairness are of interest: (i) to maximize the average spectral efficiency (SE), (ii) to maximize th…
▽ More
We consider the system-wide utility maximization problem in the downlink of a cell-free massive multiple-input multiple-output (MIMO) system whereby a very large number of access points (APs) simultaneously serve a group of users. Specifically, four fundamental problems with increasing order of user fairness are of interest: (i) to maximize the average spectral efficiency (SE), (ii) to maximize the proportional fairness, (iii) to maximize the harmonic-rate of all users, and lastly (iv) to maximize the minimum SE of all users, subject to a sum power constraint at each AP. As the considered problems are non-convex, existing solutions normally rely on successive convex approximation to find a sub-optimal solution. More specifically, these known methods use off-the-shelf convex solvers, which basically implement an interior-point algorithm, to solve the derived convex problems. The main issue of such methods is that their complexity does not scale favorably with the problem size, limiting previous studies to cell-free massive MIMO of moderate scales. Thus the potential of cell-free massive MIMO has not been fully understood. To address this issue, we propose a unified framework based on an accelerated projected gradient method to solve the considered problems. Particularly, the proposed solution is found in closed-form expressions and only requires the first order oracle of the objective, rather than the Hessian matrix as in known solutions, and thus is much more memory efficient. Numerical results demonstrate that our proposed solution achieves the same utility performance but with far less run-time, compared to other second-order methods. Simulation results for large-scale cell-free massive MIMO show that the four utility functions can deliver nearly uniformed services to all users. In other words, user fairness is not a great concern in large-scale cell-free massive MIMO.
△ Less
Submitted 20 September, 2020; v1 submitted 15 September, 2020;
originally announced September 2020.
-
Data Driven Optimization of Inter-Frequency Mobility Parameters for Emerging Multi-band Networks
Authors:
Muhammad Umar Bin Farooq,
Marvin Manalastas,
Waseem Raza,
Aneeqa Ijaz,
Syed Muhammad Asad Zaidi,
Adnan Abu-Dayya,
Ali Imran
Abstract:
Densification and multi-band operation in 5G and beyond pose an unprecedented challenge for mobility management, particularly for inter-frequency handovers. The challenge is aggravated by the fact that the impact of key inter-frequency mobility parameters, namely A5 time to trigger (TTT), A5 threshold1 and A5 threshold2 on the system's performance is not fully understood. These parameters are fixe…
▽ More
Densification and multi-band operation in 5G and beyond pose an unprecedented challenge for mobility management, particularly for inter-frequency handovers. The challenge is aggravated by the fact that the impact of key inter-frequency mobility parameters, namely A5 time to trigger (TTT), A5 threshold1 and A5 threshold2 on the system's performance is not fully understood. These parameters are fixed to a gold standard value or adjusted through hit and trial. This paper presents a first study to analyze and optimize A5 parameters for jointly maximizing two key performance indicators (KPIs): Reference signal received power (RSRP) and handover success rate (HOSR). As analytical modeling cannot capture the system-level complexity, a data driven approach is used. By develo** XGBoost based model, that outperforms other models in terms of accuracy, we first analyze the concurrent impact of the three parameters on the two KPIs. The results reveal three key insights: 1) there exist optimal parameter values for each KPI; 2) these optimal values do not necessarily belong to the current gold standard; 3) the optimal parameter values for the two KPIs do not overlap. We then leverage the Sobol variance-based sensitivity analysis to draw some insights which can be used to avoid the parametric conflict while jointly maximizing both KPIs. We formulate the joint RSRP and HOSR optimization problem, show that it is non-convex and solve it using the genetic algorithm (GA). Comparison with the brute force-based results show that the proposed data driven GA-aided solution is 48x faster with negligible loss in optimality.
△ Less
Submitted 18 August, 2020;
originally announced August 2020.
-
Accretion on High Derivative Asymptotically Safe Black Holes
Authors:
M. Umar Farooq,
Ayyesha K. Ahmed,
Rong-Jia Yang,
Mubasher Jamil
Abstract:
Asymptotically safe gravity is one effective approach to quantum gravity. It is important to differentiate the modified gravity inspired by asymptotically safe gravity. In this paper, we examine the matter particles dynamics near the improved version of Schwarzschild black hole. We assume that in the context of asymptotically safe gravity scenario the ambient matter surrounding the black hole is o…
▽ More
Asymptotically safe gravity is one effective approach to quantum gravity. It is important to differentiate the modified gravity inspired by asymptotically safe gravity. In this paper, we examine the matter particles dynamics near the improved version of Schwarzschild black hole. We assume that in the context of asymptotically safe gravity scenario the ambient matter surrounding the black hole is of isothermal in nature and investigate the spherical accretion of matter by deriving solutions at critical points. The analysis for the various values of the state parameter for isothermal test fluids, viz., $k=1,~1/2,~1/3,~1/4$ show the possibility of accretion onto asymptotically safe black hole. We formulate the accretion problem as Hamiltonian dynamical system and explain its phase flow in detail which reveals interesting results in asymptotically safe gravity theory.
△ Less
Submitted 30 June, 2020;
originally announced July 2020.
-
QoE Based Revenue Maximizing Dynamic Resource Allocation and Pricing for Fog-Enabled Mission-Critical IoT Applications
Authors:
Muhammad Junaid Farooq,
Quanyan Zhu
Abstract:
Fog computing is becoming a vital component for Internet of things (IoT) applications, acting as its computational engine. Mission-critical IoT applications are highly sensitive to latency, which depends on the physical location of the cloud server. Fog nodes of varying response rates are available to the cloud service provider (CSP) and it is faced with a challenge of forwarding the sequentially…
▽ More
Fog computing is becoming a vital component for Internet of things (IoT) applications, acting as its computational engine. Mission-critical IoT applications are highly sensitive to latency, which depends on the physical location of the cloud server. Fog nodes of varying response rates are available to the cloud service provider (CSP) and it is faced with a challenge of forwarding the sequentially received IoT data to one of the fog nodes for processing. Since the arrival times and nature of requests is random, it is important to optimally classify the requests in real-time and allocate available virtual machine instances (VMIs) at the fog nodes to provide a high QoE to the users and consequently generate higher revenues for the CSP. In this paper, we use a pricing policy based on the QoE of the applications as a result of the allocation and obtain an optimal dynamic allocation rule based on the statistical information of the computational requests. The developed solution is statistically optimal, dynamic, and implementable in real-time as opposed to other static matching schemes in the literature. The performance of the proposed framework has been evaluated using simulations and the results show significant improvement as compared with benchmark schemes.
△ Less
Submitted 2 June, 2020;
originally announced June 2020.
-
The Effect of Coupling Memory and Block Length on Spatially Coupled Serially Concatenated Codes
Authors:
Mojtaba Mahdavi,
Muhammad Umar Farooq,
Liang Liu,
Ove Edfors,
Viktor Öwall,
Michael Lentmaier
Abstract:
Spatially coupled serially concatenated codes (SC-SCCs) are a class of spatially coupled turbo-like codes, which have a close-to-capacity performance and low error floor. In this paper we investigate the impact of coupling memory, block length, decoding window size, and number of iterations on the performance, complexity, and latency of SC-SCCs. Several design tradeoffs are presented to see the re…
▽ More
Spatially coupled serially concatenated codes (SC-SCCs) are a class of spatially coupled turbo-like codes, which have a close-to-capacity performance and low error floor. In this paper we investigate the impact of coupling memory, block length, decoding window size, and number of iterations on the performance, complexity, and latency of SC-SCCs. Several design tradeoffs are presented to see the relation between these parameters in a wide range. Also, our analysis provides design guidelines for SC-SCCs in different scenarios to make the code design independent of block length. As a result, block length and coupling memory can be exchanged flexibly without changing the latency and complexity. Also, we observe that the performance of SC-SCCs is improved with respect to the uncoupled ensembles for a fixed latency and complexity.
△ Less
Submitted 25 July, 2021; v1 submitted 23 June, 2020;
originally announced June 2020.
-
Generic detection-based error-mitigation using quantum autoencoders
Authors:
Xiao-Ming Zhang,
Weicheng Kong,
Muhammad Usman Farooq,
Man-Hong Yung,
Guo** Guo,
Xin Wang
Abstract:
Efficient error-mitigation techniques demanding minimal resources is key to quantum information processing. We propose a generic protocol to mitigate quantum errors using detection-based quantum autoencoders. In our protocol, the quantum data are compressed into a latent subspace while leaving errors outside, the latter of which is then removed by a measurement and post-selection. Compared to prev…
▽ More
Efficient error-mitigation techniques demanding minimal resources is key to quantum information processing. We propose a generic protocol to mitigate quantum errors using detection-based quantum autoencoders. In our protocol, the quantum data are compressed into a latent subspace while leaving errors outside, the latter of which is then removed by a measurement and post-selection. Compared to previously developed methods, our protocol on the one hand requires no extra qubits, and on the other hand has a near-optimal denoising power, in which under reasonable requirements all errors detected outside of the latent subspace can be removed, while those inside the subspace cannot be removed by any means. Our detection-based quantum autoencoders are therefore particularly useful for near-term quantum devices in which controllable qubits are limited while noise reduction is important.
△ Less
Submitted 23 April, 2021; v1 submitted 8 May, 2020;
originally announced May 2020.
-
Analysis and Prediction of COVID-19 Pandemic in Pakistan using Time-dependent SIR Model
Authors:
Muhammad Waqas,
Muhammad Farooq,
Rashid Ahmad,
Ashfaq Ahmad
Abstract:
The current outbreak is known as Coronavirus Disease or COVID-19 caused by the virus SAR-COV-2 which continues to wreak havoc across the globe. The World Health Organization (WHO) has declared the outbreak a Public Health Emergency of International Concern. In Pakistan, the spread of the virus is on the rise with the number of infected people and causalities rapidly increasing. In the absence of p…
▽ More
The current outbreak is known as Coronavirus Disease or COVID-19 caused by the virus SAR-COV-2 which continues to wreak havoc across the globe. The World Health Organization (WHO) has declared the outbreak a Public Health Emergency of International Concern. In Pakistan, the spread of the virus is on the rise with the number of infected people and causalities rapidly increasing. In the absence of proper vaccination and treatment, to reduce the number of infections and casualties, the only option so far is to educate people regarding preventive measures and to enforce countrywide lock-down. Any strategy about the preventive measures needs to be based upon detailed analysis of the COVID-19 outbreak and accurate scientific predictions. In this paper, we conduct mathematical and numerical analysis to come up with reliable and accurate predictions of the outbreak in Pakistan. The time-dependent Susceptible-Infected-Recovered (SIR) model is used to fit the data and provide future predictions. The turning point of the peak of the pandemic is defined as the day when the transmission rate becomes less than the recovering rate. We have predicted that the outbreak will reach its maximum peak occurring from late May to 9 June with unrecovered number of Infectives in the range 20000-47000 and the cumulative number of infected cases in the range of 57500-153100. The number of Infectives will remain at the lower end in the lock-down scenario but can rapidly double or triple if the spread of the epidemic is not curtailed and localized. The uncertainty on single day projection in our analysis after April 15 is found to be within 5\%.
△ Less
Submitted 10 May, 2020; v1 submitted 5 May, 2020;
originally announced May 2020.
-
On the existence-uniqueness and exponential estimate for solutions to stochastic functional differential equations driven by G-Lévy process
Authors:
Faiz Faizullah,
Muhammad Farooq,
MA Rana,
Rahman Ullah
Abstract:
The existence-uniqueness theory for solutions to stochastic dynamic systems is always a significant theme and has received a huge attention. The objective of this article is to study the mentioned theory for stochastic functional differential equations (SFDEs) driven by G-Lévy process. The existence-uniqueness theorem for solutions to SFDEs driven by G-Lévy process has been determined. The error e…
▽ More
The existence-uniqueness theory for solutions to stochastic dynamic systems is always a significant theme and has received a huge attention. The objective of this article is to study the mentioned theory for stochastic functional differential equations (SFDEs) driven by G-Lévy process. The existence-uniqueness theorem for solutions to SFDEs driven by G-Lévy process has been determined. The error estimation between the exact solution and Picard approximate solutions has been shown. In addition, the exponential estimate has been derived.
△ Less
Submitted 4 May, 2020;
originally announced May 2020.
-
Generating Thermal Image Data Samples using 3D Facial Modelling Techniques and Deep Learning Methodologies
Authors:
Muhammad Ali Farooq,
Peter Corcoran
Abstract:
Methods for generating synthetic data have become of increasing importance to build large datasets required for Convolution Neural Networks (CNN) based deep learning techniques for a wide range of computer vision applications. In this work, we extend existing methodologies to show how 2D thermal facial data can be mapped to provide 3D facial models. For the proposed research work we have used tuft…
▽ More
Methods for generating synthetic data have become of increasing importance to build large datasets required for Convolution Neural Networks (CNN) based deep learning techniques for a wide range of computer vision applications. In this work, we extend existing methodologies to show how 2D thermal facial data can be mapped to provide 3D facial models. For the proposed research work we have used tufts datasets for generating 3D varying face poses by using a single frontal face pose. The system works by refining the existing image quality by performing fusion based image preprocessing operations. The refined outputs have better contrast adjustments, decreased noise level and higher exposedness of the dark regions. It makes the facial landmarks and temperature patterns on the human face more discernible and visible when compared to original raw data. Different image quality metrics are used to compare the refined version of images with original images. In the next phase of the proposed study, the refined version of images is used to create 3D facial geometry structures by using Convolution Neural Networks (CNN). The generated outputs are then imported in blender software to finally extract the 3D thermal facial outputs of both males and females. The same technique is also used on our thermal face data acquired using prototype thermal camera (developed under Heliaus EU project) in an indoor lab environment which is then used for generating synthetic 3D face data along with varying yaw face angles and lastly facial depth map is generated.
△ Less
Submitted 7 May, 2020; v1 submitted 4 May, 2020;
originally announced May 2020.
-
COVID-ResNet: A Deep Learning Framework for Screening of COVID19 from Radiographs
Authors:
Muhammad Farooq,
Abdul Hafeez
Abstract:
In the last few months, the novel COVID19 pandemic has spread all over the world. Due to its easy transmission, develo** techniques to accurately and easily identify the presence of COVID19 and distinguish it from other forms of flu and pneumonia is crucial. Recent research has shown that the chest Xrays of patients suffering from COVID19 depicts certain abnormalities in the radiography. However…
▽ More
In the last few months, the novel COVID19 pandemic has spread all over the world. Due to its easy transmission, develo** techniques to accurately and easily identify the presence of COVID19 and distinguish it from other forms of flu and pneumonia is crucial. Recent research has shown that the chest Xrays of patients suffering from COVID19 depicts certain abnormalities in the radiography. However, those approaches are closed source and not made available to the research community for re-producibility and gaining deeper insight. The goal of this work is to build open source and open access datasets and present an accurate Convolutional Neural Network framework for differentiating COVID19 cases from other pneumonia cases. Our work utilizes state of the art training techniques including progressive resizing, cyclical learning rate finding and discriminative learning rates to training fast and accurate residual neural networks. Using these techniques, we showed the state of the art results on the open-access COVID-19 dataset. This work presents a 3-step technique to fine-tune a pre-trained ResNet-50 architecture to improve model performance and reduce training time. We call it COVIDResNet. This is achieved through progressively re-sizing of input images to 128x128x3, 224x224x3, and 229x229x3 pixels and fine-tuning the network at each stage. This approach along with the automatic learning rate selection enabled us to achieve the state of the art accuracy of 96.23% (on all the classes) on the COVIDx dataset with only 41 epochs. This work presented a computationally efficient and highly accurate model for multi-class classification of three different infection types from along with Normal individuals. This model can help in the early screening of COVID19 cases and help reduce the burden on healthcare systems.
△ Less
Submitted 31 March, 2020;
originally announced March 2020.
-
Modeling and Assessment of IoT Supply Chain Security Risks: The Role of Structural and Parametric Uncertainties
Authors:
Timothy Kieras,
Muhammad Junaid Farooq,
Quanyan Zhu
Abstract:
Supply chain security threats pose new challenges to security risk modeling techniques for complex ICT systems such as the IoT. With established techniques drawn from attack trees and reliability analysis providing needed points of reference, graph-based analysis can provide a framework for considering the role of suppliers in such systems. We present such a framework here while highlighting the n…
▽ More
Supply chain security threats pose new challenges to security risk modeling techniques for complex ICT systems such as the IoT. With established techniques drawn from attack trees and reliability analysis providing needed points of reference, graph-based analysis can provide a framework for considering the role of suppliers in such systems. We present such a framework here while highlighting the need for a component-centered model. Given resource limitations when applying this model to existing systems, we study various classes of uncertainties in model development, including structural uncertainties and uncertainties in the magnitude of estimated event probabilities. Using case studies, we find that structural uncertainties constitute a greater challenge to model utility and as such should receive particular attention. Best practices in the face of these uncertainties are proposed.
△ Less
Submitted 20 March, 2020;
originally announced March 2020.
-
Performance Evaluation of Advanced Deep Learning Architectures for Offline Handwritten Character Recognition
Authors:
Moazam Soomro,
Muhammad Ali Farooq,
Rana Hammad Raza
Abstract:
This paper presents a hand-written character recognition comparison and performance evaluation for robust and precise classification of different hand-written characters. The system utilizes advanced multilayer deep neural network by collecting features from raw pixel values. The hidden layers stack deep hierarchies of non-linear features since learning complex features from conventional neural ne…
▽ More
This paper presents a hand-written character recognition comparison and performance evaluation for robust and precise classification of different hand-written characters. The system utilizes advanced multilayer deep neural network by collecting features from raw pixel values. The hidden layers stack deep hierarchies of non-linear features since learning complex features from conventional neural networks is very challenging. Two state of the art deep learning architectures were used which includes Caffe AlexNet and GoogleNet models in NVIDIA DIGITS.The frameworks were trained and tested on two different datasets for incorporating diversity and complexity. One of them is the publicly available dataset i.e. Chars74K comprising of 7705 characters and has upper and lowercase English alphabets, along with numerical digits. While the other dataset created locally consists of 4320 characters. The local dataset consists of 62 classes and was created by 40 subjects. It also consists upper and lowercase English alphabets, along with numerical digits. The overall dataset is divided in the ratio of 80% for training and 20% for testing phase. The time required for training phase is approximately 90 minutes. For validation part, the results obtained were compared with the groundtruth. The accuracy level achieved with AlexNet was 77.77% and 88.89% with Google Net. The higher accuracy level of GoogleNet is due to its unique combination of inception modules, each including pooling, convolutions at various scales and concatenation procedures.
△ Less
Submitted 15 March, 2020;
originally announced March 2020.
-
Advanced Deep Learning Methodologies for Skin Cancer Classification in Prodromal Stages
Authors:
Muhammad Ali Farooq,
Asma Khatoon,
Viktor Varkarakis,
Peter Corcoran
Abstract:
Technology-assisted platforms provide reliable solutions in almost every field these days. One such important application in the medical field is the skin cancer classification in preliminary stages that need sensitive and precise data analysis. For the proposed study the Kaggle skin cancer dataset is utilized. The proposed study consists of two main phases. In the first phase, the images are prep…
▽ More
Technology-assisted platforms provide reliable solutions in almost every field these days. One such important application in the medical field is the skin cancer classification in preliminary stages that need sensitive and precise data analysis. For the proposed study the Kaggle skin cancer dataset is utilized. The proposed study consists of two main phases. In the first phase, the images are preprocessed to remove the clutters thus producing a refined version of training images. To achieve that, a sharpening filter is applied followed by a hair removal algorithm. Different image quality measurement metrics including Peak Signal to Noise (PSNR), Mean Square Error (MSE), Maximum Absolute Squared Deviation (MXERR) and Energy Ratio/ Ratio of Squared Norms (L2RAT) are used to compare the overall image quality before and after applying preprocessing operations. The results from the aforementioned image quality metrics prove that image quality is not compromised however it is upgraded by applying the preprocessing operations. The second phase of the proposed research work incorporates deep learning methodologies that play an imperative role in accurate, precise and robust classification of the lesion mole. This has been reflected by using two state of the art deep learning models: Inception-v3 and MobileNet. The experimental results demonstrate notable improvement in train and validation accuracy by using the refined version of images of both the networks, however, the Inception-v3 network was able to achieve better validation accuracy thus it was finally selected to evaluate it on test data. The final test accuracy using state of art Inception-v3 network was 86%.
△ Less
Submitted 13 March, 2020;
originally announced March 2020.
-
Automatic Lesion Detection System (ALDS) for Skin Cancer Classification Using SVM and Neural Classifiers
Authors:
Muhammad Ali Farooq,
Muhammad Aatif Mobeen Azhar,
Rana Hammad Raza
Abstract:
Technology aided platforms provide reliable tools in almost every field these days. These tools being supported by computational power are significant for applications that need sensitive and precise data analysis. One such important application in the medical field is Automatic Lesion Detection System (ALDS) for skin cancer classification. Computer aided diagnosis helps physicians and dermatologi…
▽ More
Technology aided platforms provide reliable tools in almost every field these days. These tools being supported by computational power are significant for applications that need sensitive and precise data analysis. One such important application in the medical field is Automatic Lesion Detection System (ALDS) for skin cancer classification. Computer aided diagnosis helps physicians and dermatologists to obtain a second opinion for proper analysis and treatment of skin cancer. Precise segmentation of the cancerous mole along with surrounding area is essential for proper analysis and diagnosis. This paper is focused towards the development of improved ALDS framework based on probabilistic approach that initially utilizes active contours and watershed merged mask for segmenting out the mole and later SVM and Neural Classifier are applied for the classification of the segmented mole. After lesion segmentation, the selected features are classified to ascertain that whether the case under consideration is melanoma or non-melanoma. The approach is tested for varying datasets and comparative analysis is performed that reflects the effectiveness of the proposed system.
△ Less
Submitted 13 March, 2020;
originally announced March 2020.
-
Generalized LDPC Codes with Convolutional Code Constraints
Authors:
Muhammad Umar Farooq,
Saeedeh Moloudi,
Michael Lentmaier
Abstract:
Braided convolutional codes (BCCs) are a class of spatially coupled turbo-like codes that can be described by a $(2,3)$-regular compact graph. In this paper, we introduce a family of $(d_v,d_c)$-regular GLDPC codes with convolutional code constraints (CC-GLDPC codes), which form an extension of classical BCCs to arbitrary regular graphs. In order to characterize the performance in the waterfall an…
▽ More
Braided convolutional codes (BCCs) are a class of spatially coupled turbo-like codes that can be described by a $(2,3)$-regular compact graph. In this paper, we introduce a family of $(d_v,d_c)$-regular GLDPC codes with convolutional code constraints (CC-GLDPC codes), which form an extension of classical BCCs to arbitrary regular graphs. In order to characterize the performance in the waterfall and error floor regions, we perform an analysis of the density evolution thresholds as well as the finite-length ensemble weight enumerators and minimum distances of the ensembles. In particular, we consider various ensembles of overall rate $R=1/3$ and $R=1/2$ and study the trade-off between variable node degree and strength of the component codes. We also compare the results to corresponding classical LDPC codes with equal degrees and rates. It is observed that for the considered LDPC codes with variable node degree $d_v>2$, we can find a CC-GLDPC code with smaller $d_v$ that offers similar or better performance in terms of BP and MAP thresholds at the expense of a negligible loss in the minimum distance.
△ Less
Submitted 13 February, 2020;
originally announced February 2020.
-
PhD Forum: Enabling Autonomic IoT for Smart Urban Services
Authors:
Muhammad Junaid Farooq,
Quanyan Zhu
Abstract:
The development of autonomous cyber-physical systems (CPS) and advances towards the fifth generation (5G) of wireless technology is promising to revolutionize many industry verticals such as Healthcare, Transportation, Energy, Retail Services, Building Automation, Education, etc., leading to the realization of the smart city paradigm. The Internet of Things (IoT), enables powerful and unprecedente…
▽ More
The development of autonomous cyber-physical systems (CPS) and advances towards the fifth generation (5G) of wireless technology is promising to revolutionize many industry verticals such as Healthcare, Transportation, Energy, Retail Services, Building Automation, Education, etc., leading to the realization of the smart city paradigm. The Internet of Things (IoT), enables powerful and unprecedented capabilities for intelligent and autonomous operation. We leverage ideas from Network Science, Optimization & Decision Theory, Incentive Mechanism Design, and Data Science/Machine Learning to achieve key design goals, in IoT-enabled urban systems, such as efficiency, security & resilience, and economics.
△ Less
Submitted 24 December, 2019;
originally announced January 2020.
-
RIoTS: Risk Analysis of IoT Supply Chain Threats
Authors:
Timothy Kieras,
Muhammad Junaid Farooq,
Quanyan Zhu
Abstract:
Securing the supply chain of information and communications technology (ICT) has recently emerged as a critical concern for national security and integrity. With the proliferation of Internet of Things (IoT) devices and their increasing role in controlling real world infrastructure, there is a need to analyze risks in networked systems beyond established security analyses. Existing methods in lite…
▽ More
Securing the supply chain of information and communications technology (ICT) has recently emerged as a critical concern for national security and integrity. With the proliferation of Internet of Things (IoT) devices and their increasing role in controlling real world infrastructure, there is a need to analyze risks in networked systems beyond established security analyses. Existing methods in literature typically leverage attack and fault trees to analyze malicious activity and its impact. In this paper, we develop RIoTS, a security risk assessment framework borrowing from system reliability theory to incorporate the supply chain. We also analyze the impact of grou** within suppliers that may pose hidden risks to the systems from malicious supply chain actors. The results show that the proposed analysis is able to reveal hidden threats posed to the IoT ecosystem from potential supplier collusion.
△ Less
Submitted 28 November, 2019;
originally announced November 2019.
-
IoT Supply Chain Security: Overview, Challenges, and the Road Ahead
Authors:
Muhammad Junaid Farooq,
Quanyan Zhu
Abstract:
Supply chain is emerging as the next frontier of threats in the rapidly evolving IoT ecosystem. It is fundamentally more complex compared to traditional ICT systems. We analyze supply chain risks in IoT systems and their unique aspects, discuss research challenges in supply chain security, and identify future research directions.
Supply chain is emerging as the next frontier of threats in the rapidly evolving IoT ecosystem. It is fundamentally more complex compared to traditional ICT systems. We analyze supply chain risks in IoT systems and their unique aspects, discuss research challenges in supply chain security, and identify future research directions.
△ Less
Submitted 21 July, 2019;
originally announced August 2019.
-
Motion Corrected Multishot MRI Reconstruction Using Generative Networks with Sensitivity Encoding
Authors:
Muhammad Usman,
Muhammad Umar Farooq,
Siddique Latif,
Muhammad Asim,
Junaid Qadir
Abstract:
Multishot Magnetic Resonance Imaging (MRI) is a promising imaging modality that can produce a high-resolution image with relatively less data acquisition time. The downside of multishot MRI is that it is very sensitive to subject motion and even small amounts of motion during the scan can produce artifacts in the final MR image that may cause misdiagnosis. Numerous efforts have been made to addres…
▽ More
Multishot Magnetic Resonance Imaging (MRI) is a promising imaging modality that can produce a high-resolution image with relatively less data acquisition time. The downside of multishot MRI is that it is very sensitive to subject motion and even small amounts of motion during the scan can produce artifacts in the final MR image that may cause misdiagnosis. Numerous efforts have been made to address this issue; however, all of these proposals are limited in terms of how much motion they can correct and the required computational time. In this paper, we propose a novel generative networks based conjugate gradient SENSE (CG-SENSE) reconstruction framework for motion correction in multishot MRI. The proposed framework first employs CG-SENSE reconstruction to produce the motion-corrupted image and then a generative adversarial network (GAN) is used to correct the motion artifacts. The proposed method has been rigorously evaluated on synthetically corrupted data on varying degrees of motion, numbers of shots, and encoding trajectories. Our analyses (both quantitative as well as qualitative/visual analysis) establishes that the proposed method significantly robust and outperforms state-of-the-art motion correction techniques and also reduces severalfold of computational times.
△ Less
Submitted 11 March, 2020; v1 submitted 20 February, 2019;
originally announced February 2019.
-
Dynamic Spatio-Temporal Resource Provisioning for On-Demand Urban Services in Smart Cities
Authors:
Muhammad Junaid Farooq,
Quanyan Zhu
Abstract:
Efficient allocation of finite resources is a crucial problem in a wide variety of on-demand smart city applications. Service requests often appear randomly over time and space with varying intensity. Resource provisioning decisions need to be made strategically in real-time, particularly when there is incomplete information about the time, location, and intensity of future requests. In this paper…
▽ More
Efficient allocation of finite resources is a crucial problem in a wide variety of on-demand smart city applications. Service requests often appear randomly over time and space with varying intensity. Resource provisioning decisions need to be made strategically in real-time, particularly when there is incomplete information about the time, location, and intensity of future requests. In this paper, we develop a systematic approach to the dynamic resource provisioning problem at a centralized source node to spatio-temporal service requests. The spatial statistics are combined with dynamically optimal decision-making to derive recursive threshold based allocation policies. The developed results are easy to compute and implement in real-time applications. For illustrative purposes, we present examples of commonly used utility functions, based on the power law decay and exponential decay coupled with exponentially, and uniformly distributed intensity of stochastic arrivals to demonstrate the efficacy of the developed framework. Semi-closed form expressions along with recursive computational procedure has been provided. Simulation results demonstrate the effectiveness of the proposed policies in comparison with less strategic methodologies.
△ Less
Submitted 24 January, 2019;
originally announced January 2019.
-
Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks
Authors:
Muhammad Junaid Farooq,
Quanyan Zhu
Abstract:
The Internet of Things (IoT) relies heavily on wireless communication devices that are able to discover and interact with other wireless devices in their vicinity. The communication flexibility coupled with software vulnerabilities in devices, due to low cost and short time-to-market, exposes them to a high risk of malware infiltration. Malware may infect a large number of network devices using de…
▽ More
The Internet of Things (IoT) relies heavily on wireless communication devices that are able to discover and interact with other wireless devices in their vicinity. The communication flexibility coupled with software vulnerabilities in devices, due to low cost and short time-to-market, exposes them to a high risk of malware infiltration. Malware may infect a large number of network devices using device-to-device (D2D) communication resulting in the formation of a botnet, i.e., a network of infected devices controlled by a common malware. A botmaster may exploit it to launch a network-wide attack sabotaging infrastructure and facilities, or for malicious purposes such as collecting ransom. In this paper, we propose an analytical model to study the D2D propagation of malware in wireless IoT networks. Leveraging tools from dynamic population processes and point process theory, we capture malware infiltration and coordination process over a network topology. The analysis of mean-field equilibrium in the population is used to construct and solve an optimization problem for the network defender to prevent botnet formation by patching devices while causing minimum overhead to network operation. The developed analytical model serves as a basis for assisting the planning, design, and defense of such networks from a defender's standpoint.
△ Less
Submitted 28 December, 2018;
originally announced January 2019.
-
Real-Time Transmission Mechanism Design for Wireless IoT Sensors with Energy Harvesting under Power Saving Mode
Authors:
** Shang,
Muhammad Junaid Farooq,
Quanyan Zhu
Abstract:
The Internet of things (IoT) comprises of wireless sensors and actuators connected via access points to the Internet. Often, the sensing devices are remotely deployed with limited battery power and are equipped with energy harvesting equipment. These devices transmit real-time data to the base station (BS), which is used in applications such as anomaly detection. Under sufficient power availabilit…
▽ More
The Internet of things (IoT) comprises of wireless sensors and actuators connected via access points to the Internet. Often, the sensing devices are remotely deployed with limited battery power and are equipped with energy harvesting equipment. These devices transmit real-time data to the base station (BS), which is used in applications such as anomaly detection. Under sufficient power availability, wireless transmissions from sensors can be scheduled at regular time intervals to maintain real-time data acquisition. However, once the battery is significantly depleted, the devices enter into power saving mode and need to be more selective in transmitting information to the BS. Transmitting a particular piece of sensed data consumes power while discarding it may result in loss of utility at the BS. The goal is to design an optimal dynamic policy which enables the device to decide whether to transmit or to discard a piece of sensing data particularly under the power saving mode. This will enable the sensor to prolong its operation while causing minimum loss of utility to the application. We develop an analytical framework to capture the utility of the IoT sensor transmissions and leverage dynamic programming based approach to derive an optimal real-time transmission policy that is based on the statistics of information arrival, the likelihood of harvested energy, and designed lifetime of the sensors. Numerical results show that if the statistics of future data valuation are accurately predicted, there is a significant increase in utility obtained at the BS as well as the battery lifetime.
△ Less
Submitted 8 April, 2019; v1 submitted 6 December, 2018;
originally announced December 2018.
-
A Multi-Layer Feedback System Approach to Resilient Connectivity of Remotely Deployed Mobile Internet of Things
Authors:
Muhammad Junaid Farooq,
Quanyan Zhu
Abstract:
Enabling the Internet of things in remote environments without traditional communication infrastructure requires a multi-layer network architecture. Devices in the overlay network such as unmanned aerial vehicles (UAVs) are required to provide coverage to underlay devices as well as remain connected to other overlay devices to exploit device-to-device (D2D) communication. The coordination, plannin…
▽ More
Enabling the Internet of things in remote environments without traditional communication infrastructure requires a multi-layer network architecture. Devices in the overlay network such as unmanned aerial vehicles (UAVs) are required to provide coverage to underlay devices as well as remain connected to other overlay devices to exploit device-to-device (D2D) communication. The coordination, planning, and design of such overlay networks constrained by the underlay devices is a challenging problem. Existing frameworks for placement of UAVs do not consider the lack of backhaul connectivity and the need for D2D communication. Furthermore, they ignore the dynamical aspects of connectivity in such networks which presents additional challenges. For instance, the connectivity of devices can be affected by changes in the network, e.g., the mobility of underlay devices or unavailability of overlay devices due to failure or adversarial attacks. To this end, this work proposes a feedback based adaptive, self-configurable, and resilient framework for the overlay network that cognitively adapts to the changes in the network to provide reliable connectivity between spatially dispersed smart devices. Results show that the proposed framework requires significantly lower number of aerial base stations to provide higher coverage and connectivity to remotely deployed mobile devices as compared to existing approaches.
△ Less
Submitted 14 May, 2018;
originally announced May 2018.
-
Optimal Dynamic Contract for Spectrum Reservation in Mission-Critical UNB-IoT Systems
Authors:
Muhammad Junaid Farooq,
Quanyan Zhu
Abstract:
Spectrum reservation is emerging as one of the potential solutions to cater for the communication needs of massive number of wireless Internet of Things (IoT) devices with reliability constraints particularly in mission-critical scenarios. In most mission-critical systems, the true utility of a reservation may not be completely known ahead of time as the unforseen events might not be completely pr…
▽ More
Spectrum reservation is emerging as one of the potential solutions to cater for the communication needs of massive number of wireless Internet of Things (IoT) devices with reliability constraints particularly in mission-critical scenarios. In most mission-critical systems, the true utility of a reservation may not be completely known ahead of time as the unforseen events might not be completely predictable. In this paper, we present a dynamic contract approach where an advance payment is made at the time of reservation based on partial information about spectrum reservation utility. Once the complete information is obtained, a rebate on the payment is made if the reservation is released. In this paper, we present a contract theoretic approach to design an incentivized mechanism that coerces the applications to reveal their true application type resulting in greater profitability of the IoT network operator. The operator offers a menu of contracts with advanced payments and rebate to the IoT applications without having knowledge about the types of applications. The decision of the applications in selecting a contract leads to a revelation of their true type to the operator which allows it to generate higher profits than a traditional spectrum auction mechanism. Under some assumptions on distribution of the utility of the applications, closed form solutions for the optimal dynamic spectrum reservation contract are provided and the sensitivity against system parameters is analyzed.
△ Less
Submitted 21 March, 2018;
originally announced March 2018.
-
Thresholds of Braided Convolutional Codes on the AWGN Channel
Authors:
Muhammad Umar Farooq,
Saeedeh Moloudi,
Michael Lentmaier
Abstract:
In this paper, we perform a threshold analysis of braided convolutional codes (BCCs) on the additive white Gaussian noise (AWGN) channel. The decoding thresholds are estimated by Monte-Carlo density evolution (MC-DE) techniques and compared with approximate thresholds from an erasure channel prediction. The results show that, with spatial coupling, the predicted thresholds are very accurate and qu…
▽ More
In this paper, we perform a threshold analysis of braided convolutional codes (BCCs) on the additive white Gaussian noise (AWGN) channel. The decoding thresholds are estimated by Monte-Carlo density evolution (MC-DE) techniques and compared with approximate thresholds from an erasure channel prediction. The results show that, with spatial coupling, the predicted thresholds are very accurate and quickly approach capacity if the coupling memory is increased. For uncoupled ensembles with random puncturing, the prediction can be improved with help of the AWGN threshold of the unpunctured ensemble.
△ Less
Submitted 28 February, 2018;
originally announced February 2018.
-
On the Secure and Reconfigurable Multi-Layer Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT)
Authors:
Muhammad Junaid Farooq,
Quanyan Zhu
Abstract:
The Internet of things (IoT) is revolutionizing the management and control of automated systems leading to a paradigm shift in areas such as smart homes, smart cities, health care, transportation, etc. The IoT technology is also envisioned to play an important role in improving the effectiveness of military operations in battlefields. The interconnection of combat equipment and other battlefield r…
▽ More
The Internet of things (IoT) is revolutionizing the management and control of automated systems leading to a paradigm shift in areas such as smart homes, smart cities, health care, transportation, etc. The IoT technology is also envisioned to play an important role in improving the effectiveness of military operations in battlefields. The interconnection of combat equipment and other battlefield resources for coordinated automated decisions is referred to as the Internet of battlefield things (IoBT). IoBT networks are significantly different from traditional IoT networks due to battlefield specific challenges such as the absence of communication infrastructure, heterogeneity of devices, and susceptibility to cyber-physical attacks. The combat efficiency and coordinated decision-making in war scenarios depends highly on real-time data collection, which in turn relies on the connectivity of the network and information dissemination in the presence of adversaries. This work aims to build the theoretical foundations of designing secure and reconfigurable IoBT networks. Leveraging the theories of stochastic geometry and mathematical epidemiology, we develop an integrated framework to quantify the information dissemination among heterogeneous network devices. Consequently, a tractable optimization problem is formulated that can assist commanders in cost effectively planning the network and reconfiguring it according to the changing mission requirements.
△ Less
Submitted 26 January, 2018;
originally announced January 2018.
-
An Optimized Information-Preserving Relational Database Watermarking Scheme for Ownership Protection of Medical Data
Authors:
Muhammad Kamran,
Muddassar Farooq
Abstract:
Recently, a significant amount of interest has been developed in motivating physicians to use e-health technology (especially Electronic Medical Records (EMR) systems). An important utility of such EMR systems is: a next generation of Clinical Decision Support Systems (CDSS) will extract knowledge from these electronic medical records to enable physicians to do accurate and effective diagnosis. It…
▽ More
Recently, a significant amount of interest has been developed in motivating physicians to use e-health technology (especially Electronic Medical Records (EMR) systems). An important utility of such EMR systems is: a next generation of Clinical Decision Support Systems (CDSS) will extract knowledge from these electronic medical records to enable physicians to do accurate and effective diagnosis. It is anticipated that in future such medical records will be shared through cloud among different physicians to improve the quality of health care. Therefore, right protection of medical records is important to protect their ownership once they are shared with third parties. Watermarking is a proven well known technique to achieve this objective. The challenges associated with watermarking of EMR systems are: (1) some fields in EMR are more relevant in the diagnosis process; as a result, small variations in them could change the diagnosis, and (2) a misdiagnosis might not only result in a life threatening scenario but also might lead to significant costs of the treatment for the patients. The major contribution of this paper is an information-preserving watermarking scheme to address the above-mentioned challenges. We model the watermarking process as a constrained optimization problem. We demonstrate, through experiments, that our scheme not only preserves the diagnosis accuracy but is also resilient to well known attacks for corrupting the watermark. Last but not least, we also compare our scheme with a well known threshold-based scheme to evaluate relative merits of a classifier. Our pilot studies reveal that -- using proposed information-preserving scheme -- the overall classification accuracy is never degraded by more than 1%. In comparison, the diagnosis accuracy, using the threshold-based technique, is degraded by more than 18% in a worst case scenario.
△ Less
Submitted 29 January, 2018;
originally announced January 2018.
-
A Comprehensive Survey of Watermarking Relational Databases Research
Authors:
Muhammad Kamran,
Muddassar Farooq
Abstract:
Watermarking and fingerprinting of relational databases are quite proficient for ownership protection, tamper proofing, and proving data integrity. In past few years several such techniques have been proposed. A survey of almost all the work done, till date, in these fields has been presented in this paper. The techniques have been classified on the basis of how and where they embed the watermark.…
▽ More
Watermarking and fingerprinting of relational databases are quite proficient for ownership protection, tamper proofing, and proving data integrity. In past few years several such techniques have been proposed. A survey of almost all the work done, till date, in these fields has been presented in this paper. The techniques have been classified on the basis of how and where they embed the watermark. The analysis and comparison of these techniques on different merits has also been provided. In the end, this paper points out the direction of future research in these fields.
△ Less
Submitted 24 January, 2018;
originally announced January 2018.
-
First Integrals of Dynamical Systems And Their Numerical Preservation
Authors:
W. Irshad,
Y. Habib,
M. U. Farooq
Abstract:
We calculate Noether like operators and first integrals of scalar equation y'' = -k^2 y using complex Lie symmetry method, by taking values of k and y to be real as well as complex. We numerically integrate the equations using a symplectic Runge-Kutta method and check for preservation of these first integrals. It is seen that these structure preserving numerical methods provide qualitatively corre…
▽ More
We calculate Noether like operators and first integrals of scalar equation y'' = -k^2 y using complex Lie symmetry method, by taking values of k and y to be real as well as complex. We numerically integrate the equations using a symplectic Runge-Kutta method and check for preservation of these first integrals. It is seen that these structure preserving numerical methods provide qualitatively correct numerical results and good preservation of first integrals is obtained.
△ Less
Submitted 2 November, 2017;
originally announced November 2017.