-
Quantum Long Short-Term Memory (QLSTM) vs Classical LSTM in Time Series Forecasting: A Comparative Study in Solar Power Forecasting
Authors:
Saad Zafar Khan,
Nazeefa Muzammil,
Salman Ghafoor,
Haibat Khan,
Syed Mohammad Hasan Zaidi,
Abdulah Jeza Aljohani,
Imran Aziz
Abstract:
Accurate solar power forecasting is pivotal for the global transition towards sustainable energy systems. This study conducts a meticulous comparison between Quantum Long Short-Term Memory (QLSTM) and classical Long Short-Term Memory (LSTM) models for solar power production forecasting. The primary objective is to evaluate the potential advantages of QLSTMs, leveraging their exponential representa…
▽ More
Accurate solar power forecasting is pivotal for the global transition towards sustainable energy systems. This study conducts a meticulous comparison between Quantum Long Short-Term Memory (QLSTM) and classical Long Short-Term Memory (LSTM) models for solar power production forecasting. The primary objective is to evaluate the potential advantages of QLSTMs, leveraging their exponential representational capabilities, in capturing the intricate spatiotemporal patterns inherent in renewable energy data. Through controlled experiments on real-world photovoltaic datasets, our findings reveal promising improvements offered by QLSTMs, including accelerated training convergence and substantially reduced test loss within the initial epoch compared to classical LSTMs. These empirical results demonstrate QLSTM's potential to swiftly assimilate complex time series relationships, enabled by quantum phenomena like superposition. However, realizing QLSTM's full capabilities necessitates further research into model validation across diverse conditions, systematic hyperparameter optimization, hardware noise resilience, and applications to correlated renewable forecasting problems. With continued progress, quantum machine learning can offer a paradigm shift in renewable energy time series prediction, potentially ushering in an era of unprecedented accuracy and reliability in solar power forecasting worldwide. This pioneering work provides initial evidence substantiating quantum advantages over classical LSTM models while acknowledging present limitations. Through rigorous benchmarking grounded in real-world data, our study illustrates a promising trajectory for quantum learning in renewable forecasting.
△ Less
Submitted 9 April, 2024; v1 submitted 25 October, 2023;
originally announced October 2023.
-
Securing Automotive Architectures with Named Data Networking
Authors:
Zachariah Threet,
Christos Papadopoulos,
William Lambert,
Proyash Podder,
Spiros Thanasoulas,
Alex Afanasyev,
Sheikh Ghafoor,
Susmit Shannigrahi
Abstract:
As in-vehicle communication becomes more complex, the automotive community is exploring various architectural options such as centralized and zonal architectures for their numerous benefits. Zonal architecture reduces the wiring cost by physically locating related operations and ECUs near their intended functions and the number of physical ECUs through function consolidation. Centralized architect…
▽ More
As in-vehicle communication becomes more complex, the automotive community is exploring various architectural options such as centralized and zonal architectures for their numerous benefits. Zonal architecture reduces the wiring cost by physically locating related operations and ECUs near their intended functions and the number of physical ECUs through function consolidation. Centralized architectures consolidate the number of ECUs into few, powerful compute units. Common characteristics of these architectures include the need for high-bandwidth communication and security, which have been elusive with standard automotive architectures. Further, as automotive communication technologies evolve, it is also likely that multiple link-layer technologies such as CAN and Automotive Ethernet will co-exist. These alternative architectures promise to integrate these diverse sets of technologies. However, architectures that allow such co-existence have not been adequately explored.
In this work we explore a new network architecture called Named Data Networking (NDN) to achieve multiple goals: provide a foundational security infrastructure and bridge different link layer protocols such as CAN, LIN, and automotive Ethernet into a unified communication system.
We created a proof-of-concept bench-top testbed using CAN HATS and Raspberry PIs that replay real traffic over CAN and Ethernet to demonstrate how NDN can provide a secure, high-speed bridge between different automotive link layers. We also show how NDN can support communication between centralized or zonal high-power compute components. Security is achieved through digitally signing all Data packets between these components, preventing unauthorized ECUs from injecting arbitrary data into the network. We also demonstrate NDN's ability to prevent DoS and replay attacks between different network segments connected through NDN.
△ Less
Submitted 16 June, 2022;
originally announced June 2022.
-
A mathematical modelling portrait of Wnt signalling in early vertebrate embryogenesis
Authors:
Claudiu V. Giuraniuc,
Shabana Zain,
Shahmama Ghafoor,
Stefan Hoppler
Abstract:
There are two phases of Wnt signalling in early vertebrate embryogenesis: very early, maternal Wnt signalling promotes dorsal development, and slightly later, zygotic Wnt signalling promotes ventral and lateral mesoderm induction. However, recent molecular biology analysis has revealed more complexity among the direct Wnt target genes, with at least five classes. Here in order to test the logic an…
▽ More
There are two phases of Wnt signalling in early vertebrate embryogenesis: very early, maternal Wnt signalling promotes dorsal development, and slightly later, zygotic Wnt signalling promotes ventral and lateral mesoderm induction. However, recent molecular biology analysis has revealed more complexity among the direct Wnt target genes, with at least five classes. Here in order to test the logic and the dynamics of a new Gene Regulatory Network model suggested by these discoveries we use mathematical modelling based on ordinary differential equations (ODEs). Our mathematical modelling of this Gene Regulatory Network reveals that a simplified model, with one "super-gene" for each class is sufficient to a large extent to describe the regulatory behaviour previously observed experimentally.
△ Less
Submitted 1 July, 2022; v1 submitted 1 March, 2022;
originally announced March 2022.
-
Analogue Radio over Fiber aided Multi-service Communications for High Speed Trains
Authors:
Yichuan Li,
Salman Ghafoor,
Mohammed El-Hajjar
Abstract:
High speed trains (HST) have gradually become an essential means of transportation, where given our digital world, it is expected that passengers will be connected all the time. More specifically, the on-board passengers require fast mobile connections, which cannot be provided by the currently implemented cellular networks. Hence, in this article, we propose an analogue radio over fiber (A-RoF) a…
▽ More
High speed trains (HST) have gradually become an essential means of transportation, where given our digital world, it is expected that passengers will be connected all the time. More specifically, the on-board passengers require fast mobile connections, which cannot be provided by the currently implemented cellular networks. Hence, in this article, we propose an analogue radio over fiber (A-RoF) aided multi-service network architecture for high-speed trains, in order to enhance the quality of service as well as reduce the cost of the radio access network (RAN). The proposed design can simultaneously support sub- 6GHz as well as milimeter wave (mmWave) communications using the same architecture. Explicitly, we design a photonics aided beamforming technique in order to eliminate the bulky high-speed electronic phase-shifters and the hostile broadband mmWave mixers while providing a low-cost RAN solution. Finally, a beamforming range of 180 is demonstrated with a high resolution using our proposed system.
△ Less
Submitted 27 November, 2021;
originally announced November 2021.
-
Explainable Artificial Intelligence Approaches: A Survey
Authors:
Sheikh Rabiul Islam,
William Eberle,
Sheikh Khaled Ghafoor,
Mohiuddin Ahmed
Abstract:
The lack of explainability of a decision from an Artificial Intelligence (AI) based "black box" system/model, despite its superiority in many real-world applications, is a key stumbling block for adopting AI in many high stakes applications of different domain or industry. While many popular Explainable Artificial Intelligence (XAI) methods or approaches are available to facilitate a human-friendl…
▽ More
The lack of explainability of a decision from an Artificial Intelligence (AI) based "black box" system/model, despite its superiority in many real-world applications, is a key stumbling block for adopting AI in many high stakes applications of different domain or industry. While many popular Explainable Artificial Intelligence (XAI) methods or approaches are available to facilitate a human-friendly explanation of the decision, each has its own merits and demerits, with a plethora of open challenges. We demonstrate popular XAI methods with a mutual case study/task (i.e., credit default prediction), analyze for competitive advantages from multiple perspectives (e.g., local, global), provide meaningful insight on quantifying explainability, and recommend paths towards responsible or human-centered AI using XAI as a medium. Practitioners can use this work as a catalog to understand, compare, and correlate competitive advantages of popular XAI methods. In addition, this survey elicits future research directions towards responsible or human-centric AI systems, which is crucial to adopt AI in high stakes applications.
△ Less
Submitted 23 January, 2021;
originally announced January 2021.
-
Towards Quantification of Explainability in Explainable Artificial Intelligence Methods
Authors:
Sheikh Rabiul Islam,
William Eberle,
Sheikh K. Ghafoor
Abstract:
Artificial Intelligence (AI) has become an integral part of domains such as security, finance, healthcare, medicine, and criminal justice. Explaining the decisions of AI systems in human terms is a key challenge--due to the high complexity of the model, as well as the potential implications on human interests, rights, and lives . While Explainable AI is an emerging field of research, there is no c…
▽ More
Artificial Intelligence (AI) has become an integral part of domains such as security, finance, healthcare, medicine, and criminal justice. Explaining the decisions of AI systems in human terms is a key challenge--due to the high complexity of the model, as well as the potential implications on human interests, rights, and lives . While Explainable AI is an emerging field of research, there is no consensus on the definition, quantification, and formalization of explainability. In fact, the quantification of explainability is an open challenge. In our previous work, we incorporated domain knowledge for better explainability, however, we were unable to quantify the extent of explainability. In this work, we (1) briefly analyze the definitions of explainability from the perspective of different disciplines (e.g., psychology, social science), properties of explanation, explanation methods, and human-friendly explanations; and (2) propose and formulate an approach to quantify the extent of explainability. Our experimental result suggests a reasonable and model-agnostic way to quantify explainability
△ Less
Submitted 22 November, 2019;
originally announced November 2019.
-
Investigating bankruptcy prediction models in the presence of extreme class imbalance and multiple stages of economy
Authors:
Sheikh Rabiul Islam,
William Eberle,
Sheikh K. Ghafoor,
Sid C. Bundy,
Douglas A. Talbert,
Ambareen Siraj
Abstract:
In the area of credit risk analytics, current Bankruptcy Prediction Models (BPMs) struggle with (a) the availability of comprehensive and real-world data sets and (b) the presence of extreme class imbalance in the data (i.e., very few samples for the minority class) that degrades the performance of the prediction model. Moreover, little research has compared the relative performance of well-known…
▽ More
In the area of credit risk analytics, current Bankruptcy Prediction Models (BPMs) struggle with (a) the availability of comprehensive and real-world data sets and (b) the presence of extreme class imbalance in the data (i.e., very few samples for the minority class) that degrades the performance of the prediction model. Moreover, little research has compared the relative performance of well-known BPM's on public datasets addressing the class imbalance problem. In this work, we apply eight classes of well-known BPMs, as suggested by a review of decades of literature, on a new public dataset named Freddie Mac Single-Family Loan-Level Dataset with resampling (i.e., adding synthetic minority samples) of the minority class to tackle class imbalance. Additionally, we apply some recent AI techniques (e.g., tree-based ensemble techniques) that demonstrate potentially better results on models trained with resampled data. In addition, from the analysis of 19 years (1999-2017) of data, we discover that models behave differently when presented with sudden changes in the economy (e.g., a global financial crisis) resulting in abrupt fluctuations in the national default rate. In summary, this study should aid practitioners/researchers in determining the appropriate model with respect to data that contains a class imbalance and various economic stages.
△ Less
Submitted 22 November, 2019;
originally announced November 2019.
-
Domain Knowledge Aided Explainable Artificial Intelligence for Intrusion Detection and Response
Authors:
Sheikh Rabiul Islam,
William Eberle,
Sheikh K. Ghafoor,
Ambareen Siraj,
Mike Rogers
Abstract:
Artificial Intelligence (AI) has become an integral part of modern-day security solutions for its ability to learn very complex functions and handling "Big Data". However, the lack of explainability and interpretability of successful AI models is a key stumbling block when trust in a model's prediction is critical. This leads to human intervention, which in turn results in a delayed response or de…
▽ More
Artificial Intelligence (AI) has become an integral part of modern-day security solutions for its ability to learn very complex functions and handling "Big Data". However, the lack of explainability and interpretability of successful AI models is a key stumbling block when trust in a model's prediction is critical. This leads to human intervention, which in turn results in a delayed response or decision. While there have been major advancements in the speed and performance of AI-based intrusion detection systems, the response is still at human speed when it comes to explaining and interpreting a specific prediction or decision. In this work, we infuse popular domain knowledge (i.e., CIA principles) in our model for better explainability and validate the approach on a network intrusion detection test case. Our experimental results suggest that the infusion of domain knowledge provides better explainability as well as a faster decision or response. In addition, the infused domain knowledge generalizes the model to work well with unknown attacks, as well as opens the path to adapt to a large stream of network traffic from numerous IoT devices.
△ Less
Submitted 22 February, 2020; v1 submitted 21 November, 2019;
originally announced November 2019.
-
Extending the Message Passing Interface (MPI) with User-Level Schedules
Authors:
Derek Schafer,
Sheikh Ghafoor,
Daniel Holmes,
Martin Ruefenacht,
Anthony Skjellum
Abstract:
Composability is one of seven reasons for the long-standing and continuing success of MPI. Extending MPI by composing its operations with user-level operations provides useful integration with the progress engine and completion notification methods of MPI. However, the existing extensibility mechanism in MPI (generalized requests) is not widely utilized and has significant drawbacks.
MPI can be…
▽ More
Composability is one of seven reasons for the long-standing and continuing success of MPI. Extending MPI by composing its operations with user-level operations provides useful integration with the progress engine and completion notification methods of MPI. However, the existing extensibility mechanism in MPI (generalized requests) is not widely utilized and has significant drawbacks.
MPI can be generalized via scheduled communication primitives, for example, by utilizing implementation techniques from existing MPI-3 nonblocking collectives and from forthcoming MPI-4 persistent and partitioned APIs. Non-trivial schedules are used internally in some MPI libraries; but, they are not accessible to end-users.
Message-based communication patterns can be built as libraries on top of MPI. Such libraries can have comparable implementation maturity and potentially higher performance than MPI library code, but do not require intimate knowledge of the MPI implementation. Libraries can provide performance-portable interfaces that cross MPI implementation boundaries. The ability to compose additional user-defined operations using the same progress engine benefits all kinds of general purpose HPC libraries.
We propose a definition for MPI schedules: a user-level programming model suitable for creating persistent collective communication composed with new application-specific sequences of user-defined operations managed by MPI and fully integrated with MPI progress and completion notification. The API proposed offers a path to standardization for extensible communication schedules involving user-defined operations. Our approach has the potential to introduce event-driven programming into MPI (beyond the tools interface), although connecting schedules with events comprises future work.
Early performance results described here are promising and indicate strong overlap potential.
△ Less
Submitted 25 September, 2019;
originally announced September 2019.
-
Infusing domain knowledge in AI-based "black box" models for better explainability with application in bankruptcy prediction
Authors:
Sheikh Rabiul Islam,
William Eberle,
Sid Bundy,
Sheikh Khaled Ghafoor
Abstract:
Although "black box" models such as Artificial Neural Networks, Support Vector Machines, and Ensemble Approaches continue to show superior performance in many disciplines, their adoption in the sensitive disciplines (e.g., finance, healthcare) is questionable due to the lack of interpretability and explainability of the model. In fact, future adoption of "black box" models is difficult because of…
▽ More
Although "black box" models such as Artificial Neural Networks, Support Vector Machines, and Ensemble Approaches continue to show superior performance in many disciplines, their adoption in the sensitive disciplines (e.g., finance, healthcare) is questionable due to the lack of interpretability and explainability of the model. In fact, future adoption of "black box" models is difficult because of the recent rule of "right of explanation" by the European Union where a user can ask for an explanation behind an algorithmic decision, and the newly proposed bill by the US government, the "Algorithmic Accountability Act", which would require companies to assess their machine learning systems for bias and discrimination and take corrective measures. Top Bankruptcy Prediction Models are A.I.-based and are in need of better explainability -the extent to which the internal working mechanisms of an AI system can be explained in human terms. Although explainable artificial intelligence is an emerging field of research, infusing domain knowledge for better explainability might be a possible solution. In this work, we demonstrate a way to collect and infuse domain knowledge into a "black box" model for bankruptcy prediction. Our understanding from the experiments reveals that infused domain knowledge makes the output from the black box model more interpretable and explainable.
△ Less
Submitted 30 May, 2019; v1 submitted 27 May, 2019;
originally announced May 2019.
-
MAC Protocols for Terahertz Communication: A Comprehensive Survey
Authors:
Saim Ghafoor,
Noureddine Boujnah,
Mubashir Husain Rehmani,
Alan Davy
Abstract:
Terahertz communication is emerging as a future technology to support Terabits per second link with highlighting features as high throughput and negligible latency. However, the unique features of the Terahertz band such as high path loss, scattering and reflection pose new challenges and results in short communication distance. The antenna directionality, in turn, is required to enhance the commu…
▽ More
Terahertz communication is emerging as a future technology to support Terabits per second link with highlighting features as high throughput and negligible latency. However, the unique features of the Terahertz band such as high path loss, scattering and reflection pose new challenges and results in short communication distance. The antenna directionality, in turn, is required to enhance the communication distance and to overcome the high path loss. However, these features in combine negate the use of traditional Medium access protocols. Therefore novel MAC protocol designs are required to fully exploit their potential benefits including efficient channel access, control message exchange, link establishment, mobility management, and line-of-sight blockage mitigation. An in-depth survey of Terahertz MAC protocols is presented in this paper. The paper highlights the key features of the Terahertz band which should be considered while designing an efficient Terahertz MAC protocol, and the decisions which if taken at Terahertz MAC layer can enhance the network performance. Different Terahertz applications at macro and nano scales are highlighted with design requirements for their MAC protocols. The MAC protocol design issues and considerations are highlighted. Further, the existing MAC protocols are also classified based on network topology, channel access mechanisms, and link establishment strategies as Transmitter and Receiver initiated communication. The open challenges and future research directions on Terahertz MAC protocols are also highlighted.
△ Less
Submitted 16 July, 2020; v1 submitted 25 April, 2019;
originally announced April 2019.
-
Injecting and removing malignant features in mammography with CycleGAN: Investigation of an automated adversarial attack using neural networks
Authors:
Anton S. Becker,
Lukas Jendele,
Ondrej Skopek,
Nicole Berger,
Soleen Ghafoor,
Magda Marcon,
Ender Konukoglu
Abstract:
$\textbf{Purpose}$ To train a cycle-consistent generative adversarial network (CycleGAN) on mammographic data to inject or remove features of malignancy, and to determine whether these AI-mediated attacks can be detected by radiologists. $\textbf{Material and Methods}…
▽ More
$\textbf{Purpose}$ To train a cycle-consistent generative adversarial network (CycleGAN) on mammographic data to inject or remove features of malignancy, and to determine whether these AI-mediated attacks can be detected by radiologists. $\textbf{Material and Methods}$ From the two publicly available datasets, BCDR and INbreast, we selected images from cancer patients and healthy controls. An internal dataset served as test data, withheld during training. We ran two experiments training CycleGAN on low and higher resolution images ($256 \times 256$ px and $512 \times 408$ px). Three radiologists read the images and rated the likelihood of malignancy on a scale from 1-5 and the likelihood of the image being manipulated. The readout was evaluated by ROC analysis (Area under the ROC curve = AUC). $\textbf{Results}$ At the lower resolution, only one radiologist exhibited markedly lower detection of cancer (AUC=0.85 vs 0.63, p=0.06), while the other two were unaffected (0.67 vs. 0.69 and 0.75 vs. 0.77, p=0.55). Only one radiologist could discriminate between original and modified images slightly better than guessing/chance (0.66, p=0.008). At the higher resolution, all radiologists showed significantly lower detection rate of cancer in the modified images (0.77-0.84 vs. 0.59-0.69, p=0.008), however, they were now able to reliably detect modified images due to better visibility of artifacts (0.92, 0.92 and 0.97). $\textbf{Conclusion}$ A CycleGAN can implicitly learn malignant features and inject or remove them so that a substantial proportion of small mammographic images would consequently be misdiagnosed. At higher resolutions, however, the method is currently limited and has a clear trade-off between manipulation of images and introduction of artifacts.
△ Less
Submitted 19 November, 2018;
originally announced November 2018.
-
Credit Default Mining Using Combined Machine Learning and Heuristic Approach
Authors:
Sheikh Rabiul Islam,
William Eberle,
Sheikh Khaled Ghafoor
Abstract:
Predicting potential credit default accounts in advance is challenging. Traditional statistical techniques typically cannot handle large amounts of data and the dynamic nature of fraud and humans. To tackle this problem, recent research has focused on artificial and computational intelligence based approaches. In this work, we present and validate a heuristic approach to mine potential default acc…
▽ More
Predicting potential credit default accounts in advance is challenging. Traditional statistical techniques typically cannot handle large amounts of data and the dynamic nature of fraud and humans. To tackle this problem, recent research has focused on artificial and computational intelligence based approaches. In this work, we present and validate a heuristic approach to mine potential default accounts in advance where a risk probability is precomputed from all previous data and the risk probability for recent transactions are computed as soon they happen. Beside our heuristic approach, we also apply a recently proposed machine learning approach that has not been applied previously on our targeted dataset [15]. As a result, we find that these applied approaches outperform existing state-of-the-art approaches.
△ Less
Submitted 2 July, 2018;
originally announced July 2018.
-
Mining Illegal Insider Trading of Stocks: A Proactive Approach
Authors:
Sheikh Rabiul Islam,
Sheikh Khaled Ghafoor,
William Eberle
Abstract:
Illegal insider trading of stocks is based on releasing non-public information (e.g., new product launch, quarterly financial report, acquisition or merger plan) before the information is made public. Detecting illegal insider trading is difficult due to the complex, nonlinear, and non-stationary nature of the stock market. In this work, we present an approach that detects and predicts illegal ins…
▽ More
Illegal insider trading of stocks is based on releasing non-public information (e.g., new product launch, quarterly financial report, acquisition or merger plan) before the information is made public. Detecting illegal insider trading is difficult due to the complex, nonlinear, and non-stationary nature of the stock market. In this work, we present an approach that detects and predicts illegal insider trading proactively from large heterogeneous sources of structured and unstructured data using a deep-learning based approach combined with discrete signal processing on the time series data. In addition, we use a tree-based approach that visualizes events and actions to aid analysts in their understanding of large amounts of unstructured data. Using existing data, we have discovered that our approach has a good success rate in detecting illegal insider trading patterns.
△ Less
Submitted 7 November, 2018; v1 submitted 2 July, 2018;
originally announced July 2018.
-
Mining Bad Credit Card Accounts from OLAP and OLTP
Authors:
Sheikh Rabiul Islam,
William Eberle,
Sheikh Khaled Ghafoor
Abstract:
Credit card companies classify accounts as a good or bad based on historical data where a bad account may default on payments in the near future. If an account is classified as a bad account, then further action can be taken to investigate the actual nature of the account and take preventive actions. In addition, marking an account as "good" when it is actually bad, could lead to loss of revenue -…
▽ More
Credit card companies classify accounts as a good or bad based on historical data where a bad account may default on payments in the near future. If an account is classified as a bad account, then further action can be taken to investigate the actual nature of the account and take preventive actions. In addition, marking an account as "good" when it is actually bad, could lead to loss of revenue - and marking an account as "bad" when it is actually good, could lead to loss of business. However, detecting bad credit card accounts in real time from Online Transaction Processing (OLTP) data is challenging due to the volume of data needed to be processed to compute the risk factor. We propose an approach which precomputes and maintains the risk probability of an account based on historical transactions data from offline data or data from a data warehouse. Furthermore, using the most recent OLTP transactional data, risk probability is calculated for the latest transaction and combined with the previously computed risk probability from the data warehouse. If accumulated risk probability crosses a predefined threshold, then the account is treated as a bad account and is flagged for manual verification.
△ Less
Submitted 2 July, 2018;
originally announced July 2018.