-
TransNAS-TSAD: Harnessing Transformers for Multi-Objective Neural Architecture Search in Time Series Anomaly Detection
Authors:
Ijaz Ul Haq,
Byung Suk Lee,
Donna M. Rizzo
Abstract:
The surge in real-time data collection across various industries has underscored the need for advanced anomaly detection in both univariate and multivariate time series data. This paper introduces TransNAS-TSAD, a framework that synergizes the transformer architecture with neural architecture search (NAS), enhanced through NSGA-II algorithm optimization. This approach effectively tackles the compl…
▽ More
The surge in real-time data collection across various industries has underscored the need for advanced anomaly detection in both univariate and multivariate time series data. This paper introduces TransNAS-TSAD, a framework that synergizes the transformer architecture with neural architecture search (NAS), enhanced through NSGA-II algorithm optimization. This approach effectively tackles the complexities of time series data, balancing computational efficiency with detection accuracy. Our evaluation reveals that TransNAS-TSAD surpasses conventional anomaly detection models due to its tailored architectural adaptability and the efficient exploration of complex search spaces, leading to marked improvements in diverse data scenarios. We also introduce the Efficiency-Accuracy-Complexity Score (EACS) as a new metric for assessing model performance, emphasizing the balance between accuracy and computational resources. TransNAS-TSAD sets a new benchmark in time series anomaly detection, offering a versatile, efficient solution for complex real-world applications. This research highlights the TransNAS-TSAD potential across a wide range of industry applications and paves the way for future developments in the field.
△ Less
Submitted 4 March, 2024; v1 submitted 29 November, 2023;
originally announced November 2023.
-
Optimal Placement of Capacitor in Distribution System using Particle Swarm Optimization
Authors:
Izhar Ul Haq
Abstract:
In power systems, the incorporation of capacitors offers a wide range of established advantages. These benefits encompass the enhancement of the systems power factor, optimization of voltage profiles, increased capacity for current flow through cables and transformers, and the mitigation of losses attributed to the compensation of reactive power components. Different techniques have been applied t…
▽ More
In power systems, the incorporation of capacitors offers a wide range of established advantages. These benefits encompass the enhancement of the systems power factor, optimization of voltage profiles, increased capacity for current flow through cables and transformers, and the mitigation of losses attributed to the compensation of reactive power components. Different techniques have been applied to enhance the performance of the distribution system by reducing line losses. This paper focuses on reducing line losses through the optimal placement and sizing of capacitors. Optimal capacitor placement is analysed using load flow analysis with the Newton Raphson method. The placement of capacitor optimization is related to the sensitivity of the buses, which depends on the loss sensitivity factor. The optimal capacitor size is determined using Particle Swarm Optimization (PSO). The analysis is conducted using the IEEE 14 bus system in MATLAB. The results reveal that placing capacitors at the most sensitive bus locations leads to a significant reduction in line losses. Additionally, the optimal capacitor size has a substantial impact on improving the voltage profile and the power loss is reduced by 21.02 percent through the proposed method.
△ Less
Submitted 16 November, 2023; v1 submitted 15 November, 2023;
originally announced November 2023.
-
Impact of Augmented reality system on elementary school ESL learners in country side of china: Motivations, achievements, behaviors and cognitive attainment
Authors:
Ijaz Ul Haq
Abstract:
The English proficiency of students in rural areas of China tends to be lower than that of their urban counterparts, owing to outdated teaching methods, a lack of advanced technology resources, and low motivation for English learning. This study examines the impact of an Augmented Reality English Words Learning (AREWL) system on the learning motivation, achievement, behavioral patterns, and cognit…
▽ More
The English proficiency of students in rural areas of China tends to be lower than that of their urban counterparts, owing to outdated teaching methods, a lack of advanced technology resources, and low motivation for English learning. This study examines the impact of an Augmented Reality English Words Learning (AREWL) system on the learning motivation, achievement, behavioral patterns, and cognitive attainment of elementary school students in rural China. The study explores whether student motivation varies with their level of achievement and vice versa, and provides an analysis of behavioral patterns and cognitive attainment. The AREWL system employs 3D virtual objects, animations, and assessments to teach English pronunciation and spelling. Instructions are provided in both English and Chinese for ease of use.
The sample group consisted of 20 students from grades 1 and 2, selected based on low pretest scores, along with five non-native teachers. Data were collected through pretests and posttests, questionnaires, surveys, video recordings, and in-app evaluations. Quantitative methods were used to analyze test scores and teacher opinions, while qualitative methods were employed to study student behavior and its relationship with cognitive attainment.
Results indicate that both teachers and students responded favorably to the AREWL system. Students exhibited both intrinsic and extrinsic motivation, which correlated significantly with their learning achievements. While behavioral analysis showed interactive engagement with the AREWL system, cognitive attainment was found to be relatively low. The study concludes that AR-based learning applications can play an important role in motivating English learning among young learners in China. The findings contribute to the field of educational technology by introducing a new AR-based English words learning application.
△ Less
Submitted 18 September, 2023;
originally announced September 2023.
-
An Automated Machine Learning Approach for Detecting Anomalous Peak Patterns in Time Series Data from a Research Watershed in the Northeastern United States Critical Zone
Authors:
Ijaz Ul Haq,
Byung Suk Lee,
Donna M. Rizzo,
Julia N Perdrial
Abstract:
This paper presents an automated machine learning framework designed to assist hydrologists in detecting anomalies in time series data generated by sensors in a research watershed in the northeastern United States critical zone. The framework specifically focuses on identifying peak-pattern anomalies, which may arise from sensor malfunctions or natural phenomena. However, the use of classification…
▽ More
This paper presents an automated machine learning framework designed to assist hydrologists in detecting anomalies in time series data generated by sensors in a research watershed in the northeastern United States critical zone. The framework specifically focuses on identifying peak-pattern anomalies, which may arise from sensor malfunctions or natural phenomena. However, the use of classification methods for anomaly detection poses challenges, such as the requirement for labeled data as ground truth and the selection of the most suitable deep learning model for the given task and dataset. To address these challenges, our framework generates labeled datasets by injecting synthetic peak patterns into synthetically generated time series data and incorporates an automated hyperparameter optimization mechanism. This mechanism generates an optimized model instance with the best architectural and training parameters from a pool of five selected models, namely Temporal Convolutional Network (TCN), InceptionTime, MiniRocket, Residual Networks (ResNet), and Long Short-Term Memory (LSTM). The selection is based on the user's preferences regarding anomaly detection accuracy and computational cost. The framework employs Time-series Generative Adversarial Networks (TimeGAN) as the synthetic dataset generator. The generated model instances are evaluated using a combination of accuracy and computational cost metrics, including training time and memory, during the anomaly detection process. Performance evaluation of the framework was conducted using a dataset from a watershed, demonstrating consistent selection of the most fitting model instance that satisfies the user's preferences.
△ Less
Submitted 5 December, 2023; v1 submitted 14 September, 2023;
originally announced September 2023.
-
Diverse Misinformation: Impacts of Human Biases on Detection of Deepfakes on Networks
Authors:
Juniper Lovato,
Laurent Hébert-Dufresne,
Jonathan St-Onge,
Randall Harp,
Gabriela Salazar Lopez,
Sean P. Rogers,
Ijaz Ul Haq,
Jeremiah Onaolapo
Abstract:
Social media platforms often assume that users can self-correct against misinformation. However, social media users are not equally susceptible to all misinformation as their biases influence what types of misinformation might thrive and who might be at risk. We call "diverse misinformation" the complex relationships between human biases and demographics represented in misinformation. To investiga…
▽ More
Social media platforms often assume that users can self-correct against misinformation. However, social media users are not equally susceptible to all misinformation as their biases influence what types of misinformation might thrive and who might be at risk. We call "diverse misinformation" the complex relationships between human biases and demographics represented in misinformation. To investigate how users' biases impact their susceptibility and their ability to correct each other, we analyze classification of deepfakes as a type of diverse misinformation. We chose deepfakes as a case study for three reasons: 1) their classification as misinformation is more objective; 2) we can control the demographics of the personas presented; 3) deepfakes are a real-world concern with associated harms that must be better understood. Our paper presents an observational survey (N=2,016) where participants are exposed to videos and asked questions about their attributes, not knowing some might be deepfakes. Our analysis investigates the extent to which different users are duped and which perceived demographics of deepfake personas tend to mislead. We find that accuracy varies by demographics, and participants are generally better at classifying videos that match them. We extrapolate from these results to understand the potential population-level impacts of these biases using a mathematical model of the interplay between diverse misinformation and crowd correction. Our model suggests that diverse contacts might provide "herd correction" where friends can protect each other. Altogether, human biases and the attributes of misinformation matter greatly, but having a diverse social group may help reduce susceptibility to misinformation.
△ Less
Submitted 13 January, 2024; v1 submitted 18 October, 2022;
originally announced October 2022.
-
Traffic Management of Autonomous Vehicles using Policy Based Deep Reinforcement Learning and Intelligent Routing
Authors:
Anum Mushtaq,
Irfan ul Haq,
Muhammad Azeem Sarwar,
Asifullah Khan,
Omair Shafiq
Abstract:
Deep Reinforcement Learning (DRL) uses diverse, unstructured data and makes RL capable of learning complex policies in high dimensional environments. Intelligent Transportation System (ITS) based on Autonomous Vehicles (AVs) offers an excellent playground for policy-based DRL. Deep learning architectures solve computational challenges of traditional algorithms while hel** in real-world adoption…
▽ More
Deep Reinforcement Learning (DRL) uses diverse, unstructured data and makes RL capable of learning complex policies in high dimensional environments. Intelligent Transportation System (ITS) based on Autonomous Vehicles (AVs) offers an excellent playground for policy-based DRL. Deep learning architectures solve computational challenges of traditional algorithms while hel** in real-world adoption and deployment of AVs. One of the main challenges in AVs implementation is that it can worsen traffic congestion on roads if not reliably and efficiently managed. Considering each vehicle's holistic effect and using efficient and reliable techniques could genuinely help optimise traffic flow management and congestion reduction. For this purpose, we proposed a intelligent traffic control system that deals with complex traffic congestion scenarios at intersections and behind the intersections. We proposed a DRL-based signal control system that dynamically adjusts traffic signals according to the current congestion situation on intersections. To deal with the congestion on roads behind the intersection, we used re-routing technique to load balance the vehicles on road networks. To achieve the actual benefits of the proposed approach, we break down the data silos and use all the data coming from sensors, detectors, vehicles and roads in combination to achieve sustainable results. We used SUMO micro-simulator for our simulations. The significance of our proposed approach is manifested from the results.
△ Less
Submitted 27 June, 2022;
originally announced June 2022.
-
An overview of deep learning in medical imaging
Authors:
Imran Ul Haq
Abstract:
Machine learning (ML) has seen enormous consideration during the most recent decade. This success started in 2012 when an ML model accomplished a remarkable triumph in the ImageNet Classification, the world's most famous competition for computer vision. This model was a kind of convolutional neural system (CNN) called deep learning (DL). Since then, researchers have started to participate efficien…
▽ More
Machine learning (ML) has seen enormous consideration during the most recent decade. This success started in 2012 when an ML model accomplished a remarkable triumph in the ImageNet Classification, the world's most famous competition for computer vision. This model was a kind of convolutional neural system (CNN) called deep learning (DL). Since then, researchers have started to participate efficiently in DL's fastest develo** area of research. These days, DL systems are cutting-edge ML systems spanning a broad range of disciplines, from human language processing to video analysis, and commonly used in the scholarly world and enterprise sector. Recent advances can bring tremendous improvement to the medical field. Improved and innovative methods for data processing, image analysis and can significantly improve the diagnostic technologies and medicinal services gradually. A quick review of current developments with relevant problems in the field of DL used for medical imaging has been provided. The primary purposes of the review are four: (i) provide a brief prolog to DL by discussing different DL models, (ii) review of the DL usage for medical image analysis (classification, detection, segmentation, and registration), (iii) review seven main application fields of DL in medical imaging, (iv) give an initial stage to those keen on adding to the research area about DL in clinical imaging by providing links of some useful informative assets, such as freely available DL codes, public datasets Table 7, and medical imaging competition sources Table 8 and end our survey by outlining distinct continuous difficulties, lessons learned and future of DL in the field of medical science.
△ Less
Submitted 17 February, 2022;
originally announced February 2022.
-
A Survey of Binary Code Similarity
Authors:
Irfan Ul Haq,
Juan Caballero
Abstract:
Binary code similarity approaches compare two or more pieces of binary code to identify their similarities and differences. The ability to compare binary code enables many real-world applications on scenarios where source code may not be available such as patch analysis, bug search, and malware detection and analysis. Over the past 20 years numerous binary code similarity approaches have been prop…
▽ More
Binary code similarity approaches compare two or more pieces of binary code to identify their similarities and differences. The ability to compare binary code enables many real-world applications on scenarios where source code may not be available such as patch analysis, bug search, and malware detection and analysis. Over the past 20 years numerous binary code similarity approaches have been proposed, but the research area has not yet been systematically analyzed. This paper presents a first survey of binary code similarity. It analyzes 61 binary code similarity approaches, which are systematized on four aspects: (1) the applications they enable, (2) their approach characteristics, (3) how the approaches are implemented, and (4) the benchmarks and methodologies used to evaluate them. In addition, the survey discusses the scope and origins of the area, its evolution over the past two decades, and the challenges that lie ahead.
△ Less
Submitted 25 September, 2019;
originally announced September 2019.
-
Transfer Learning and Meta Classification Based Deep Churn Prediction System for Telecom Industry
Authors:
Uzair Ahmed,
Asifullah Khan,
Saddam Hussain Khan,
Abdul Basit,
Irfan Ul Haq,
Yeon Soo Lee
Abstract:
A churn prediction system guides telecom service providers to reduce revenue loss. However, the development of a churn prediction system for a telecom industry is a challenging task, mainly due to the large size of the data, high dimensional features, and imbalanced distribution of the data. In this paper, we present a solution to the inherent problems of churn prediction, using the concept of Tra…
▽ More
A churn prediction system guides telecom service providers to reduce revenue loss. However, the development of a churn prediction system for a telecom industry is a challenging task, mainly due to the large size of the data, high dimensional features, and imbalanced distribution of the data. In this paper, we present a solution to the inherent problems of churn prediction, using the concept of Transfer Learning (TL) and Ensemble-based Meta-Classification. The proposed method TL-DeepE is applied in two stages. The first stage employs TL by fine-tuning multiple pre-trained Deep Convolution Neural Networks (CNNs). Telecom datasets are normally in vector form, which is converted into 2D images because Deep CNNs have high learning capacity on images. In the second stage, predictions from these Deep CNNs are appended to the original feature vector and thus are used to build a final feature vector for the high-level Genetic Programming (GP) and AdaBoost based ensemble classifier. Thus, the experiments are conducted using various CNNs as base classifiers and the GP-AdaBoost as a meta-classifier. By using 10-fold cross-validation, the performance of the proposed TL-DeepE system is compared with existing techniques, for two standard telecommunication datasets; Orange and Cell2cell. Performing experiments on Orange and Cell2cell datasets, the prediction accuracy obtained was 75.4% and 68.2%, while the area under the curve was 0.83 and 0.74, respectively.
△ Less
Submitted 5 March, 2019; v1 submitted 18 January, 2019;
originally announced January 2019.
-
Malware Lineage in the Wild
Authors:
Irfan Ul Haq,
Sergio Chica,
Juan Caballero,
Somesh Jha
Abstract:
Malware lineage studies the evolutionary relationships among malware and has important applications for malware analysis. A persistent limitation of prior malware lineage approaches is to consider every input sample a separate malware version. This is problematic since a majority of malware are packed and the packing process produces many polymorphic variants (i.e., executables with different file…
▽ More
Malware lineage studies the evolutionary relationships among malware and has important applications for malware analysis. A persistent limitation of prior malware lineage approaches is to consider every input sample a separate malware version. This is problematic since a majority of malware are packed and the packing process produces many polymorphic variants (i.e., executables with different file hash) of the same malware version. Thus, many samples correspond to the same malware version and it is challenging to identify distinct malware versions from polymorphic variants. This problem does not manifest in prior malware lineage approaches because they work on synthetic malware, malware that are not packed, or packed malware for which unpackers are available. In this work, we propose a novel malware lineage approach that works on malware samples collected in the wild. Given a set of malware executables from the same family, for which no source code is available and which may be packed, our approach produces a lineage graph where nodes are versions of the family and edges describe the relationships between versions. To enable our malware lineage approach, we propose the first technique to identify the versions of a malware family and a scalable code indexing technique for determining shared functions between any pair of input samples. We have evaluated the accuracy of our approach on 13 open-source programs and have applied it to produce lineage graphs for 10 popular malware families. Our malware lineage graphs achieve on average a 26 times reduction from number of input samples to number of versions.
△ Less
Submitted 14 October, 2017;
originally announced October 2017.
-
Application of single walled carbon nanotubes for heating agent in photothermal therapy
Authors:
Syahril Siregar,
Israr Ul Haq,
Ryo Nagaoka,
Yoshifumi Saijo
Abstract:
We present the theoretical investigation of the single walled carbon nanotubes (SWNTs) as the heating agent of photothermal therapy. In our model, the SWNT is modeled by rigid tube surrounded by cancer cells. In this model, we neglect the angle dependence of temperature and assume that the length of SWNT is much longer than the radius of tube. We calculated the temperature rise of the SWNT and its…
▽ More
We present the theoretical investigation of the single walled carbon nanotubes (SWNTs) as the heating agent of photothermal therapy. In our model, the SWNT is modeled by rigid tube surrounded by cancer cells. In this model, we neglect the angle dependence of temperature and assume that the length of SWNT is much longer than the radius of tube. We calculated the temperature rise of the SWNT and its surrounding cancer cells during the laser heating by solving one-dimensional heat conduction equation in steady state condition. We found that the maximum temperature is located at the interface between SWNT and cancer cells. This maximum temperature is proportional to the square of SWNTs diameter and diameter of SWNTs depends on their chirality. These results extend our understanding of the temperature distribution in SWNT during the laser heating process and provide the suggested specification of SWNT for the improvement the photothermal therapy in the future.
△ Less
Submitted 24 November, 2016;
originally announced November 2016.
-
Business in the Grid
Authors:
Erich Schikuta,
Thomas Weishaeupl,
Flavia Donno,
Heinz Stockinger,
Elisabeth Vinek,
Helmut Wanek,
Christoph Witzany,
Irfan Ul Haq
Abstract:
From 2004 to 2007 the Business In the Grid (BIG) project took place and was driven by the following goals: Firstly, make business aware of Grid technology and, secondly, try to explore new business models. We disseminated Grid computing by mainly concentrating on the central European market and interviewed several companies in order to gain insights into the Grid acceptance in industrial environ…
▽ More
From 2004 to 2007 the Business In the Grid (BIG) project took place and was driven by the following goals: Firstly, make business aware of Grid technology and, secondly, try to explore new business models. We disseminated Grid computing by mainly concentrating on the central European market and interviewed several companies in order to gain insights into the Grid acceptance in industrial environments. In this article we present the results of the project, elaborate on a critical discussion on business adaptations, and describe a novel dynamic authorization workflow for business processes in the Grid.
△ Less
Submitted 10 September, 2009;
originally announced September 2009.