-
Quantum-Edge Cloud Computing: A Future Paradigm for IoT Applications
Authors:
Mohammad Ikbal Hossain,
Shaharier Arafat Sumon,
Habib Md. Hasan,
Fatema Akter,
Md Bahauddin Badhon,
Mohammad Nahid Ul Islam
Abstract:
The Internet of Things (IoT) is expanding rapidly, which has created a need for sophisticated computational frameworks that can handle the data and security requirements inherent in modern IoT applications. However, traditional cloud computing frameworks have struggled with latency, scalability, and security vulnerabilities. Quantum-Edge Cloud Computing (QECC) is a new paradigm that effectively ad…
▽ More
The Internet of Things (IoT) is expanding rapidly, which has created a need for sophisticated computational frameworks that can handle the data and security requirements inherent in modern IoT applications. However, traditional cloud computing frameworks have struggled with latency, scalability, and security vulnerabilities. Quantum-Edge Cloud Computing (QECC) is a new paradigm that effectively addresses these challenges by combining the computational power of quantum computing, the low-latency benefits of edge computing, and the scalable resources of cloud computing. This study has been conducted based on a published literature review, performance improvements, and metrics data from Bangladesh on smart city infrastructure, healthcare monitoring, and the industrial IoT sector. We have discussed the integration of quantum cryptography to enhance data integrity, the role of edge computing in reducing response times, and how cloud computing's resource abundance can support large IoT networks. We examine case studies, such as the use of quantum sensors in self-driving vehicles, to illustrate the real-world impact of QECC. Furthermore, the paper identifies future research directions, including develo** quantum-resistant encryption and optimizing quantum algorithms for edge computing. The convergence of these technologies in QECC promises to overcome the existing limitations of IoT frameworks and set a new standard for the future of IoT applications.
△ Less
Submitted 8 May, 2024;
originally announced May 2024.
-
BEnQA: A Question Answering and Reasoning Benchmark for Bengali and English
Authors:
Sheikh Shafayat,
H M Quamran Hasan,
Minhajur Rahman Chowdhury Mahim,
Rifki Afina Putri,
James Thorne,
Alice Oh
Abstract:
In this study, we introduce BEnQA, a dataset comprising parallel Bengali and English exam questions for middle and high school levels in Bangladesh. Our dataset consists of approximately 5K questions covering several subjects in science with different types of questions, including factual, application, and reasoning-based questions. We benchmark several Large Language Models (LLMs) with our parall…
▽ More
In this study, we introduce BEnQA, a dataset comprising parallel Bengali and English exam questions for middle and high school levels in Bangladesh. Our dataset consists of approximately 5K questions covering several subjects in science with different types of questions, including factual, application, and reasoning-based questions. We benchmark several Large Language Models (LLMs) with our parallel dataset and observe a notable performance disparity between the models in Bengali and English. We also investigate some prompting methods, and find that Chain-of-Thought prompting is beneficial mostly on reasoning questions, but not so much on factual ones. We also find that appending English translation helps to answer questions in Bengali. Our findings point to promising future research directions for improving the performance of LLMs in Bengali and more generally in low-resource languages.
△ Less
Submitted 16 March, 2024;
originally announced March 2024.
-
Data-driven reactivity prediction of targeted covalent inhibitors using computed quantum features for drug discovery
Authors:
Tom W. A. Montgomery,
Peter Pogány,
Alice Purdy,
Mike Harris,
Marek Kowalik,
Alex Ferraro,
Hikmatyar Hasan,
Darren V. S. Green,
Sam Genway
Abstract:
We present an approach to combine novel molecular features with experimental data within a data-driven pipeline. The method is applied to the challenge of predicting the reactivity of a series of sulfonyl fluoride molecular fragments used for drug discovery of targeted covalent inhibitors. We demonstrate utility in predicting reactivity using features extracted from a workflow which employs quantu…
▽ More
We present an approach to combine novel molecular features with experimental data within a data-driven pipeline. The method is applied to the challenge of predicting the reactivity of a series of sulfonyl fluoride molecular fragments used for drug discovery of targeted covalent inhibitors. We demonstrate utility in predicting reactivity using features extracted from a workflow which employs quantum embedding of the reactive warhead using density matrix embedding theory, followed by Hamiltonian simulation of the resulting fragment model from an initial reference state. These predictions are found to improve when studying both larger active spaces and longer evolution times. The calculated features form a `quantum fingerprint' which allows molecules to be clustered with regard to warhead properties. We identify that the quantum fingerprint is well suited to scalable calculation on future quantum computing hardware, and explore approaches to capture results on current quantum hardware using error mitigation and suppression techniques. We further discuss how this general framework may be applied to a wider range of challenges where the potential for future quantum utility exists.
△ Less
Submitted 18 July, 2023;
originally announced July 2023.
-
The James Webb Space Telescope Mission
Authors:
Jonathan P. Gardner,
John C. Mather,
Randy Abbott,
James S. Abell,
Mark Abernathy,
Faith E. Abney,
John G. Abraham,
Roberto Abraham,
Yasin M. Abul-Huda,
Scott Acton,
Cynthia K. Adams,
Evan Adams,
David S. Adler,
Maarten Adriaensen,
Jonathan Albert Aguilar,
Mansoor Ahmed,
Nasif S. Ahmed,
Tanjira Ahmed,
Rüdeger Albat,
Loïc Albert,
Stacey Alberts,
David Aldridge,
Mary Marsha Allen,
Shaune S. Allen,
Martin Altenburg
, et al. (983 additional authors not shown)
Abstract:
Twenty-six years ago a small committee report, building on earlier studies, expounded a compelling and poetic vision for the future of astronomy, calling for an infrared-optimized space telescope with an aperture of at least $4m$. With the support of their governments in the US, Europe, and Canada, 20,000 people realized that vision as the $6.5m$ James Webb Space Telescope. A generation of astrono…
▽ More
Twenty-six years ago a small committee report, building on earlier studies, expounded a compelling and poetic vision for the future of astronomy, calling for an infrared-optimized space telescope with an aperture of at least $4m$. With the support of their governments in the US, Europe, and Canada, 20,000 people realized that vision as the $6.5m$ James Webb Space Telescope. A generation of astronomers will celebrate their accomplishments for the life of the mission, potentially as long as 20 years, and beyond. This report and the scientific discoveries that follow are extended thank-you notes to the 20,000 team members. The telescope is working perfectly, with much better image quality than expected. In this and accompanying papers, we give a brief history, describe the observatory, outline its objectives and current observing program, and discuss the inventions and people who made it possible. We cite detailed reports on the design and the measured performance on orbit.
△ Less
Submitted 10 April, 2023;
originally announced April 2023.
-
Human-Robot Interaction using VAHR: Virtual Assistant, Human, and Robots in the Loop
Authors:
Ahmad Amine,
Mostafa Aldilati,
Hadi Hasan,
Noel Maalouf,
Imad H. Elhajj
Abstract:
Robots have become ubiquitous tools in various industries and households, highlighting the importance of human-robot interaction (HRI). This has increased the need for easy and accessible communication between humans and robots. Recent research has focused on the intersection of virtual assistant technology, such as Amazon's Alexa, with robots and its effect on HRI. This paper presents the Virtual…
▽ More
Robots have become ubiquitous tools in various industries and households, highlighting the importance of human-robot interaction (HRI). This has increased the need for easy and accessible communication between humans and robots. Recent research has focused on the intersection of virtual assistant technology, such as Amazon's Alexa, with robots and its effect on HRI. This paper presents the Virtual Assistant, Human, and Robots in the loop (VAHR) system, which utilizes bidirectional communication to control multiple robots through Alexa. VAHR's performance was evaluated through a human-subjects experiment, comparing objective and subjective metrics of traditional keyboard and mouse interfaces to VAHR. The results showed that VAHR required 41% less Robot Attention Demand and ensured 91% more Fan-out time compared to the standard method. Additionally, VAHR led to a 62.5% improvement in multi-tasking, highlighting the potential for efficient human-robot interaction in physically- and mentally-demanding scenarios. However, subjective metrics revealed a need for human operators to build confidence and trust with this new method of operation.
△ Less
Submitted 31 March, 2023; v1 submitted 30 March, 2023;
originally announced March 2023.
-
Dynamic Healthcare Embeddings for Improving Patient Care
Authors:
Hankyu Jang,
Sulyun Lee,
D. M. Hasibul Hasan,
Philip M. Polgreen,
Sriram V. Pemmaraju,
Bijaya Adhikari
Abstract:
As hospitals move towards automating and integrating their computing systems, more fine-grained hospital operations data are becoming available. These data include hospital architectural drawings, logs of interactions between patients and healthcare professionals, prescription data, procedures data, and data on patient admission, discharge, and transfers. This has opened up many fascinating avenue…
▽ More
As hospitals move towards automating and integrating their computing systems, more fine-grained hospital operations data are becoming available. These data include hospital architectural drawings, logs of interactions between patients and healthcare professionals, prescription data, procedures data, and data on patient admission, discharge, and transfers. This has opened up many fascinating avenues for healthcare-related prediction tasks for improving patient care. However, in order to leverage off-the-shelf machine learning software for these tasks, one needs to learn structured representations of entities involved from heterogeneous, dynamic data streams. Here, we propose DECENT, an auto-encoding heterogeneous co-evolving dynamic neural network, for learning heterogeneous dynamic embeddings of patients, doctors, rooms, and medications from diverse data streams. These embeddings capture similarities among doctors, rooms, patients, and medications based on static attributes and dynamic interactions. DECENT enables several applications in healthcare prediction, such as predicting mortality risk and case severity of patients, adverse events (e.g., transfer back into an intensive care unit), and future healthcare-associated infections. The results of using the learned patient embeddings in predictive modeling show that DECENT has a gain of up to 48.1% on the mortality risk prediction task, 12.6% on the case severity prediction task, 6.4% on the medical intensive care unit transfer task, and 3.8% on the Clostridioides difficile (C.diff) Infection (CDI) prediction task over the state-of-the-art baselines. In addition, case studies on the learned doctor, medication, and room embeddings show that our approach learns meaningful and interpretable embeddings.
△ Less
Submitted 20 March, 2023;
originally announced March 2023.
-
Quantization of Fractional Singular Lagrangian systems with Second-Order Derivatives Using Path Integral Method
Authors:
Eyad Hasan Hasan
Abstract:
The fractional quantization of singular systems with second order Lagrangian is examined. The fractional singular Lagrangian is presented. The equations of motion are written as total differential equations within fractional calculus. Also, the set of Hamilton Jacobi partial differential equations is constructed in fractional form. The path integral formulation and path integral quantization for t…
▽ More
The fractional quantization of singular systems with second order Lagrangian is examined. The fractional singular Lagrangian is presented. The equations of motion are written as total differential equations within fractional calculus. Also, the set of Hamilton Jacobi partial differential equations is constructed in fractional form. The path integral formulation and path integral quantization for these systems are constructed within fractional derivatives. We examined a mathematical singular Lagrangian with two primary first class constraints.
△ Less
Submitted 31 January, 2023; v1 submitted 27 January, 2023;
originally announced January 2023.
-
Degradation of crude oil and pure hydrocarbon fractions by some wild bacterial and fungal species
Authors:
Srwa A. Mohammed,
Taha J. Omar,
Ayad H. Hasan
Abstract:
The use of biodegradation as a method for cleaning up soil that has been contaminated by spilt petroleum can be an effective strategy. So, this study investigated the existence of the wild microorganism in soil contaminated with oil and study their ability to degrade petroleum in vitro. Nineteen samples were collected from various locations near Taq Taq (TTOPCO) natural seeps in the Kurdistan Regi…
▽ More
The use of biodegradation as a method for cleaning up soil that has been contaminated by spilt petroleum can be an effective strategy. So, this study investigated the existence of the wild microorganism in soil contaminated with oil and study their ability to degrade petroleum in vitro. Nineteen samples were collected from various locations near Taq Taq (TTOPCO) natural seeps in the Kurdistan Region of Iraq. Morphological, cultural, biochemical tests and molecular identification were used to identify the microbial communities, in addition, spore texture and the colour of the fungal isolates were investigated on the fungal isolates. Out of the19 samples, 17 indigenous bacterial strains and 5 fungal strains were successfully isolated. From the absorption spectrophotometry, Bacillus anthracis, Bacillus cereus, Achromobacter sp. and Pseudomonas aeruginosa for the bacterial isolates grew well on a minimal salt medium supplemented with 1% crude oil. Results showed that these isolates mentioned above had a strong ability to degrade crude oil by reducing the colour of 2,6-dichlorophenol indophenol (DCPIP) from deep blue to colourless. However, for the fractions of hydrocarbon, the bacterial isolates failed and did not affect the colour of any of the fractions. The results for fungi showed that Aspergillus lentulus and Rhizopus arrhizus had a strong ability to degrade both crude oil and fraction F1 by reducing the colour of DCPIP. Each fungal isolates also had a great tolerance to different concentrations of crude oil when grown on solid MSM. This study showed these microorganisms have a strong ability to degrade crude oil and can be used to clean up soil and the environment.
△ Less
Submitted 20 January, 2023;
originally announced January 2023.
-
Fractional Quantization of Singular Lagrangian systems with Second-Order Derivatives Using WKB Approximation
Authors:
Eyad Hasan Hasan
Abstract:
In this paper, the theory of the fractional singular Lagrangian systems is investigated with second order derivatives. The fractional quantization for these systems is examined using the WKB approximation. The Hamilton Jacobi treatment can be applied for these systems. The equations of motion are obtained. The Hamilton Jacobi partial differential equations are solved to determine the action functi…
▽ More
In this paper, the theory of the fractional singular Lagrangian systems is investigated with second order derivatives. The fractional quantization for these systems is examined using the WKB approximation. The Hamilton Jacobi treatment can be applied for these systems. The equations of motion are obtained. The Hamilton Jacobi partial differential equations are solved to determine the action function. By finding the action function, the wave function for these systems is constructed. We achieved that the quantum results are agreement with the classical results. Besides, to demonstrate the theory; two mathematical examples are examined.
△ Less
Submitted 14 January, 2023;
originally announced January 2023.
-
An experimental study of algorithms for obtaining a singly connected subgraph
Authors:
Ahmed Zahloote,
Al-hasan Saleh,
Ayman Ghanem,
Hiba Hasan,
Asem Dreibaty,
Ali Abodaraa,
Nermeen Suleiman,
Nour Naameh,
Ali Ibrahim,
Zeinab mahfoud
Abstract:
A directed graph G = (V,E) is singly connected if for any two vertices v, u of V, the directed graph G contains at most one simple path from v to u. In this paper, we study different algorithms to find a feasible but necessarily optimal solution to the following problem. Given a directed acyclic graph G = (V, E), find a subset H of E of minimum size such that the subgraph (V, E-H) is singly connec…
▽ More
A directed graph G = (V,E) is singly connected if for any two vertices v, u of V, the directed graph G contains at most one simple path from v to u. In this paper, we study different algorithms to find a feasible but necessarily optimal solution to the following problem. Given a directed acyclic graph G = (V, E), find a subset H of E of minimum size such that the subgraph (V, E-H) is singly connected. Moreover, we prove that this problem can be solved in polynomial time for a special kind of directed graphs.
△ Less
Submitted 27 November, 2022; v1 submitted 1 October, 2022;
originally announced October 2022.
-
Harmony Search: Current Studies and Uses on Healthcare Systems
Authors:
Maryam T. Abdulkhaleq,
Tarik A. Rashid,
Abeer Alsadoon,
Bryar A. Hassan,
Mokhtar Mohammadi,
Jaza M. Abdullah,
Amit Chhabra,
Sazan L. Ali,
Rawshan N. Othman,
Hadil A. Hasan,
Sara Azad,
Naz A. Mahmood,
Sivan S. Abdalrahman,
Hezha O. Rasul,
Nebojsa Bacanin,
S. Vimal
Abstract:
One of the popular metaheuristic search algorithms is Harmony Search (HS). It has been verified that HS can find solutions to optimization problems due to its balanced exploratory and convergence behavior and its simple and flexible structure. This capability makes the algorithm preferable to be applied in several real-world applications in various fields, including healthcare systems, different e…
▽ More
One of the popular metaheuristic search algorithms is Harmony Search (HS). It has been verified that HS can find solutions to optimization problems due to its balanced exploratory and convergence behavior and its simple and flexible structure. This capability makes the algorithm preferable to be applied in several real-world applications in various fields, including healthcare systems, different engineering fields, and computer science. The popularity of HS urges us to provide a comprehensive survey of the literature on HS and its variants on health systems, analyze its strengths and weaknesses, and suggest future research directions. In this review paper, the current studies and uses of harmony search are studied in four main domains. (i) The variants of HS, including its modifications and hybridization. (ii) Summary of the previous review works. (iii) Applications of HS in healthcare systems. (iv) And finally, an operational framework is proposed for the applications of HS in healthcare systems. The main contribution of this review is intended to provide a thorough examination of HS in healthcare systems while also serving as a valuable resource for prospective scholars who want to investigate or implement this method.
△ Less
Submitted 19 July, 2022;
originally announced July 2022.
-
The JWST Early Release Observations
Authors:
Klaus Pontoppidan,
Jaclyn Barrientes,
Claire Blome,
Hannah Braun,
Matthew Brown,
Margaret Carruthers,
Dan Coe,
Joseph DePasquale,
Nestor Espinoza,
Macarena Garcia Marin,
Karl D. Gordon,
Alaina Henry,
Leah Hustak,
Andi James,
Anton M. Koekemoer,
Stephanie LaMassa,
David Law,
Alexandra Lockwood,
Amaya Moro-Martin,
Susan E. Mullally,
Alyssa Pagan,
Dani Player,
Charles Proffitt,
Christine Pulliam,
Leah Ramsay
, et al. (11 additional authors not shown)
Abstract:
The James Webb Space Telescope (JWST) Early Release Observations (EROs) is a set of public outreach products created to mark the end of commissioning and the beginning of science operations for JWST. Colloquially known as the "Webb First Images and Spectra", these products were intended to demonstrate to the worldwide public that JWST is ready for science, and is capable of producing spectacular r…
▽ More
The James Webb Space Telescope (JWST) Early Release Observations (EROs) is a set of public outreach products created to mark the end of commissioning and the beginning of science operations for JWST. Colloquially known as the "Webb First Images and Spectra", these products were intended to demonstrate to the worldwide public that JWST is ready for science, and is capable of producing spectacular results. The package was released on July 12, 2022, and included images and spectra of the galaxy cluster SMACS~J0723.3-7327 and distant lensed galaxies, the interacting galaxy group Stephan's Quintet, NGC 3324 in the Carina star-forming complex, the Southern Ring planetary nebula NGC 3132, and the transiting hot Jupiter WASP 96b. This paper describes the ERO technical design, observations, and scientific processing of data underlying the colorful outreach products.
△ Less
Submitted 11 September, 2022; v1 submitted 26 July, 2022;
originally announced July 2022.
-
Bengali Handwritten Grapheme Classification: Deep Learning Approach
Authors:
Tarun Roy,
Hasib Hasan,
Kowsar Hossain,
Masuma Akter Rumi
Abstract:
Despite being one of the most spoken languages in the world ($6^{th}$ based on population), research regarding Bengali handwritten grapheme (smallest functional unit of a writing system) classification has not been explored widely compared to other prominent languages. Moreover, the large number of combinations of graphemes in the Bengali language makes this classification task very challenging. W…
▽ More
Despite being one of the most spoken languages in the world ($6^{th}$ based on population), research regarding Bengali handwritten grapheme (smallest functional unit of a writing system) classification has not been explored widely compared to other prominent languages. Moreover, the large number of combinations of graphemes in the Bengali language makes this classification task very challenging. With an effort to contribute to this research problem, we participate in a Kaggle competition \cite{kaggle_link} where the challenge is to separately classify three constituent elements of a Bengali grapheme in the image: grapheme root, vowel diacritics, and consonant diacritics. We explore the performances of some existing neural network models such as Multi-Layer Perceptron (MLP) and state of the art ResNet50. To further improve the performance we propose our own convolution neural network (CNN) model for Bengali grapheme classification with validation root accuracy 95.32\%, vowel accuracy 98.61\%, and consonant accuracy 98.76\%. We also explore Region Proposal Network (RPN) using VGGNet with a limited setting that can be a potential future direction to improve the performance.
△ Less
Submitted 16 November, 2021;
originally announced November 2021.
-
Crawling Twitter data through API: A technical/legal perspective
Authors:
Shahab Saquib Sohail,
Mohammad Muzammil Khan,
Mohd Arsalan,
Aslam Khan,
Jamshed Siddiqui,
Syed Hamid Hasan,
M. Afshar Alam
Abstract:
The popularity of the online media-driven social network relation is proven in today's digital era. The many challenges that these emergence has created include a huge growing network of social relations, and the large amount of data which is continuously been generated via the different platform of social networking sites, viz. Facebook, Twitter, LinkedIn, Instagram, etc. These data are Personall…
▽ More
The popularity of the online media-driven social network relation is proven in today's digital era. The many challenges that these emergence has created include a huge growing network of social relations, and the large amount of data which is continuously been generated via the different platform of social networking sites, viz. Facebook, Twitter, LinkedIn, Instagram, etc. These data are Personally Identifiable Information (PII) of the users which are also publicly available for some platform, and others allow with some restricted permission to download it for research purposes. The users' accessible data help in providing with better recommendation services to users, however, the PII can be used to embezzle the users and cause severe detriment to them. Hence, it is crucial to maintain the users' privacy while providing their PII accessible for various services. Therefore, it is a burning issue to come up with an approach that can help the users in getting better recommendation services without their privacy being harmed. In this paper, a framework is suggested for the same. Further, how data through Twitter API can be crawled and used has been extensively discussed. In addition to this, various security and legal perspectives regarding PII while crawling the data is highlighted. We believe the presented approach in this paper can serve as a benchmark for future research in the field of data privacy.
△ Less
Submitted 22 May, 2021;
originally announced May 2021.
-
Modeling and Evaluation of Clustering Patient Care into Bubbles
Authors:
D. M. Hasibul Hasan,
Alex Rohwer,
Hankyu Jang,
Ted Herman,
Philip M. Polgreen,
Daniel K. Sewell,
Bijaya Adhikari,
Sriram V. Pemmaraju
Abstract:
COVID-19 has caused an enormous burden on healthcare facilities around the world. Cohorting patients and healthcare professionals (HCPs) into "bubbles" has been proposed as an infection-control mechanism. In this paper, we present a novel and flexible model for clustering patient care in healthcare facilities into bubbles in order to minimize infection spread. Our model aims to control a variety o…
▽ More
COVID-19 has caused an enormous burden on healthcare facilities around the world. Cohorting patients and healthcare professionals (HCPs) into "bubbles" has been proposed as an infection-control mechanism. In this paper, we present a novel and flexible model for clustering patient care in healthcare facilities into bubbles in order to minimize infection spread. Our model aims to control a variety of costs to patients/residents and HCPs so as to avoid hidden, downstream adverse effects of clustering patient care. This model leads to a discrete optimization problem that we call the BubbleClustering problem. This problem takes as input a temporal visit graph, representing HCP mobility, including visits by HCPs to patient/resident rooms. The output of the problem is a rewired visit graph, obtained by partitioning HCPs and patient rooms into bubbles and rewiring HCP visits to patient rooms so that patient-care is largely confined to the constructed bubbles. Even though the BubbleClustering problem is intractable in general, we present an integer linear programming (ILP) formulation of the problem that can be solved optimally for problem instances that arise from typical hospital units and long-term-care facilities. We call our overall solution approach Cost-aware Rewiring of Networks (CoRN). We evaluate CoRN using fine-grained-movement data from a hospital-medical-intensive-care unit as well as two long-term-care facilities. These data were obtained using sensor systems we built and deployed. The main takeaway from our experimental results is that it is possible to use CoRN to substantially reduce infection spread by cohorting patients and HCPs without sacrificing patient-care, and with minimal excess costs to HCPs in terms of time and distances traveled during a shift.
△ Less
Submitted 13 May, 2021;
originally announced May 2021.
-
Can we aggregate human intelligence? an approach for human centric aggregation using ordered weighted averaging operators
Authors:
Shahab Saquib Sohail,
Jamshed Siddiqui,
Rashid Ali,
S. Hamid Hasan,
M. Afshar Alam
Abstract:
The primary objective of this paper is to present an approach for recommender systems that can assimilate ranking to the voters or rankers so that recommendation can be made by giving priority to experts suggestion over usual recommendation. To accomplish this, we have incorporated the concept of human-centric aggregation via Ordered Weighted Aggregation (OWA). Here, we are advocating ranked recom…
▽ More
The primary objective of this paper is to present an approach for recommender systems that can assimilate ranking to the voters or rankers so that recommendation can be made by giving priority to experts suggestion over usual recommendation. To accomplish this, we have incorporated the concept of human-centric aggregation via Ordered Weighted Aggregation (OWA). Here, we are advocating ranked recommendation where rankers are assigned weights according to their place in the ranking. Further, the recommendation process which is presented here for the recommendation of books to university students exploits linguistic data summaries and Ordered Weighted Aggregation (OWA) technique. In the suggested approach, the weights are assigned in a way that it associates higher weights to best ranked university. The approach has been evaluated over eight different parameters. The superiority of the proposed approach is evident from the evaluation results. We claim that proposed scheme saves storage spaces required in traditional recommender systems as well as it does not need users prior preferences and hence produce a solution for cold start problem. This envisaged that the proposed scheme can be very useful in decision making problems, especially for recommender systems. In addition, it emphasizes on how human-centric aggregation can be useful in recommendation researches, and also it gives a new direction about how various human specific tasks can be numerically aggregated.
△ Less
Submitted 1 May, 2021;
originally announced May 2021.
-
Characterization and Newton Complementary Dual of Quasi $f$-Ideals
Authors:
F. U. Rehman,
H. Hasan,
H. Mahmood,
M. A. Binyamin
Abstract:
The notion of quasi $f$-ideals was first presented in $[14]$ which generalize the idea of $f$-ideals. In this paper, we give the complete characterization of quasi $f$-ideals of degree greater or equal to $2$. Additionally, we show that the property of being quasi $f$-ideals remains the same after taking the Newton complementary dual of a squarefree monomial ideal $I$ provided that the minimal gen…
▽ More
The notion of quasi $f$-ideals was first presented in $[14]$ which generalize the idea of $f$-ideals. In this paper, we give the complete characterization of quasi $f$-ideals of degree greater or equal to $2$. Additionally, we show that the property of being quasi $f$-ideals remains the same after taking the Newton complementary dual of a squarefree monomial ideal $I$ provided that the minimal generating set of $I$ is perfect.
△ Less
Submitted 5 January, 2021;
originally announced January 2021.
-
Commuting with Autonomous Vehicles: A Branch and Cut Algorithm with Redundant Modeling
Authors:
Mohd. Hafiz Hasan,
Pascal Van Hentenryck
Abstract:
This paper studies the benefits of autonomous vehicles in ride-sharing platforms dedicated to serving commuting needs. It considers the Commute Trip Sharing Problem with Autonomous Vehicles (CTSPAV), the optimization problem faced by a reservation-based platform that receives daily commute-trip requests and serves them with a fleet of autonomous vehicles. The CTSPAV can be viewed as a special case…
▽ More
This paper studies the benefits of autonomous vehicles in ride-sharing platforms dedicated to serving commuting needs. It considers the Commute Trip Sharing Problem with Autonomous Vehicles (CTSPAV), the optimization problem faced by a reservation-based platform that receives daily commute-trip requests and serves them with a fleet of autonomous vehicles. The CTSPAV can be viewed as a special case of the Dial- A-Ride Problem (DARP). However, this paper recognizes that commuting trips exhibit special spatial and temporal properties that can be exploited in a branch and cut algorithm that leverages a redundant modeling approach. In particular, the branch and cut algorithm relies on a MIP formulation that schedules mini routes representing inbound or outbound trips. This formulation is effective in finding high-quality solutions quickly but its relaxation is relatively weak. To remedy this limitation, the mini-route MIP is complemented by a DARP formulation which is not as effective in obtaining primal solutions but has a stronger relaxation. The benefits of the proposed approach are demonstrated by comparing it with another, more traditional, exact branch and cut procedure and a heuristic method based on mini routes.
The methodological contribution is complemented by a comprehensive analysis of a CTSPAV platform for reducing vehicle counts, travel distances, and congestion. In particular, the case study for a medium-sized city reveals that a CTSPAV platform can reduce daily vehicle counts by a staggering 92% and decrease vehicles miles by 30%. The platform also significantly reduces congestion, measured as the number of vehicles on the road per unit time, by 60% during peak times. These benefits, however, come at the expense of introducing empty miles. Hence the paper also highlights the tradeoffs between future ride-sharing and car-pooling platforms.
△ Less
Submitted 4 January, 2021;
originally announced January 2021.
-
The Benefits of Autonomous Vehicles for Community-Based Trip Sharing
Authors:
Mohd. Hafiz Hasan,
Pascal Van Hentenryck
Abstract:
This work reconsiders the concept of community-based trip sharing proposed by Hasan et al. (2018) that leverages the structure of commuting patterns and urban communities to optimize trip sharing. It aims at quantifying the benefits of autonomous vehicles for community-based trip sharing, compared to a car-pooling platform where vehicles are driven by their owners. In the considered problem, each…
▽ More
This work reconsiders the concept of community-based trip sharing proposed by Hasan et al. (2018) that leverages the structure of commuting patterns and urban communities to optimize trip sharing. It aims at quantifying the benefits of autonomous vehicles for community-based trip sharing, compared to a car-pooling platform where vehicles are driven by their owners. In the considered problem, each rider specifies a desired arrival time for her inbound trip (commuting to work) and a departure time for her outbound trip (commuting back home). In addition, her commute time cannot deviate too much from the duration of a direct trip. Prior work motivated by reducing parking pressure and congestion in the city of Ann Arbor, Michigan, showed that a car-pooling platform for community-based trip sharing could reduce the number of vehicles by close to 60%.
This paper studies the potential benefits of autonomous vehicles in further reducing the number of vehicles needed to serve all these commuting trips. It proposes a column-generation procedure that generates and assembles mini routes to serve inbound and outbound trips, using a lexicographic objective that first minimizes the required vehicle count and then the total travel distance. The optimization algorithm is evaluated on a large-scale, real-world dataset of commute trips from the city of Ann Arbor, Michigan. The results of the optimization show that it can leverage autonomous vehicles to reduce the daily vehicle usage by 92%, improving upon the results of the original Commute Trip Sharing Problem by 34%, while also reducing daily vehicle miles traveled by approximately 30%. These results demonstrate the significant potential of autonomous vehicles for the shared commuting of a community to a common work destination.
△ Less
Submitted 24 October, 2020; v1 submitted 28 August, 2020;
originally announced August 2020.
-
Evolving Antennas for Ultra-High Energy Neutrino Detection
Authors:
Julie Rolla,
Amy Connolly,
Kai Staats,
Stephanie Wissel,
Dean Arakaki,
Ian Best,
Adam Blenk,
Brian Clark,
Maximillian Clowdus,
Suren Gourapura,
Corey Harris,
Hannah Hasan,
Luke Letwin,
David Liu,
Carl Pfendner,
Jordan Potter,
Cade Sbrocco,
Tom Sinha,
Jacob Trevithick
Abstract:
Evolutionary algorithms borrow from biology the concepts of mutation and selection in order to evolve optimized solutions to known problems. The GENETIS collaboration is develo** genetic algorithms for designing antennas that are more sensitive to ultra-high energy neutrino induced radio pulses than current designs. There are three aspects of this investigation. The first is to evolve simple wir…
▽ More
Evolutionary algorithms borrow from biology the concepts of mutation and selection in order to evolve optimized solutions to known problems. The GENETIS collaboration is develo** genetic algorithms for designing antennas that are more sensitive to ultra-high energy neutrino induced radio pulses than current designs. There are three aspects of this investigation. The first is to evolve simple wire antennas to test the concept and different algorithms. Second, optimized antenna response patterns are evolved for a given array geometry. Finally, antennas themselves are evolved using neutrino sensitivity as a measure of fitness. This is achieved by integrating the XFdtd finite-difference time-domain modeling program with simulations of neutrino experiments.
△ Less
Submitted 15 May, 2020;
originally announced May 2020.
-
Large-Scale Zone-Based Evacuation Planning: Models, Algorithms, and Evaluation
Authors:
Mohd. Hafiz Hasan,
Pascal Van Hentenryck
Abstract:
In zone-based evacuation planning, the region to evacuate is divided into zones and each zone must be assigned a path to safety and departure times along the path. Zone-based evacuations are highly desirable in practice because they allow emergency services to communicate evacuation orders and to control the evacuation more accurately. Zone-based evacuations may also be combined with contraflows (…
▽ More
In zone-based evacuation planning, the region to evacuate is divided into zones and each zone must be assigned a path to safety and departure times along the path. Zone-based evacuations are highly desirable in practice because they allow emergency services to communicate evacuation orders and to control the evacuation more accurately. Zone-based evacuations may also be combined with contraflows (to maximize the network capacities) and may impose additional constraints on the evacuation path (e,g,. path convergence) and the departure times (e.g., non-preemption).
This paper presents a systematic study large-scale zone-based evacuation planning, both from an effectiveness and a computational standpoint. It reviews existing optimization algorithms, and presents new ones, and evaluates them, on a real, large-scale case study, both from a macroscopic standpoint and through microscopic simulations under a variety of assumptions. The results provide some unique perspectives on the strengths and weaknesses of each approach and the implications of evacuation functionalities. The paper also suggests new directions for future research in zone-based evacuation and beyond in order to address the fundamental challenges by emergency services around the world.
△ Less
Submitted 24 March, 2020;
originally announced March 2020.
-
Generation and Application of Constrained Interaction Test Suites Using Base Forbidden Tuples With Mixed Neighborhood Tabu Search
Authors:
Imad H. Hasan,
Bestoun S. Ahmed,
Moayad Y. Potrus,
Kamal Z. Zamli
Abstract:
Nowadays, ensuring the quality becomes challenging for most modern software systems when constraints are given for the combinations of configurations. Combinatorial interaction strategies can systematically reduce the number of test cases to construct a minimal test suite without affecting the effectiveness of the tests. This paper presents a new efficient search-based strategy to generate constra…
▽ More
Nowadays, ensuring the quality becomes challenging for most modern software systems when constraints are given for the combinations of configurations. Combinatorial interaction strategies can systematically reduce the number of test cases to construct a minimal test suite without affecting the effectiveness of the tests. This paper presents a new efficient search-based strategy to generate constrained interaction test suites to cover all possible combinations. The paper also shows a new application of constrained interaction testing in software fault searches. The proposed strategy initially generates the set of all possible t-tuple combinations; then, it filters out the set by removing the forbidden t-tuples using the base forbidden tuple (BFT) approach. The strategy also utilizes a mixed neighborhood tabu search (TS) to construct optimal or near-optimal constrained test suites. The efficiency of the proposed method is evaluated through a comparison against two well-known state-of-the-art tools. The evaluation consists of three sets of experiments for 35 standard benchmarks. Additionally, the effectiveness and quality of the results are assessed using a real-world case study. Experimental results show that the proposed strategy outperforms one of the competitive strategies, ACTS, for approximately 83% of the benchmarks and achieves similar results to CASA for 65% of the benchmarks when the interaction strength is 2. For an interaction strength of 3, the proposed method outperforms other competitive strategies for approximately 60% and 42% of the benchmarks. The proposed strategy can also generate constrained interaction test suites for an interaction strength of 4, which is not possible for many strategies. Real-world case study shows that the generated test suites can effectively detect injected faults using mutation testing.
△ Less
Submitted 16 September, 2019;
originally announced September 2019.
-
The Commute Trip Sharing Problem
Authors:
Mohd Hafiz Hasan,
Pascal Van Hentenryck,
Antoine Legrain
Abstract:
Parking pressure has been steadily increasing in cities as well as in university and corporate campuses. To relieve this pressure, this paper studies a car-pooling platform that would match riders and drivers, while guaranteeing a ride back and exploiting spatial and temporal locality. In particular, the paper formalizes the Commute Trip Sharing Problem (CTSP) to find a routing plan that maximizes…
▽ More
Parking pressure has been steadily increasing in cities as well as in university and corporate campuses. To relieve this pressure, this paper studies a car-pooling platform that would match riders and drivers, while guaranteeing a ride back and exploiting spatial and temporal locality. In particular, the paper formalizes the Commute Trip Sharing Problem (CTSP) to find a routing plan that maximizes ride sharing for a set of commute trips. The CTSP is a generalization of the vehicle routing problem with routes that satisfy time window, capacity, pairing, precedence, ride duration, and driver constraints. The paper introduces two exact algorithms for the CTPS: A route-enumeration algorithm and a branch-and-price algorithm. Experimental results show that, on a high-fidelity, real-world dataset of commute trips from a mid-size city, both algorithms optimally solve small and medium-sized problems and produce high-quality solutions for larger problem instances. The results show that car pooling, if widely adopted, has the potential to reduce vehicle usage by up to 57% and decrease vehicle miles traveled by up to 46% while only incurring a 22% increase in average ride time per commuter for the trips considered.
△ Less
Submitted 15 September, 2019; v1 submitted 24 April, 2019;
originally announced April 2019.
-
Analysis of the Veracities of Industry Used Software Development Life Cycle Methodologies
Authors:
AZM Ehtesham Chowdhury,
Abhijit Bhowmik,
Hasibul Hasan,
Md Shamsur Rahim
Abstract:
Currently, software industries are using different SDLC (software development life cycle) models which are designed for specific purposes. The use of technology is booming in every perspective of life and the software behind the technology plays an enormous role. As the technical complexities are increasing, successful development of software solely depends on the proper management of development…
▽ More
Currently, software industries are using different SDLC (software development life cycle) models which are designed for specific purposes. The use of technology is booming in every perspective of life and the software behind the technology plays an enormous role. As the technical complexities are increasing, successful development of software solely depends on the proper management of development processes. So, it is inevitable to introduce improved methodologies in the industry so that modern human centred software applications development can be managed and delivered to the user successfully. So, in this paper, we have explored the facts of different SDLC models and perform their comparative analysis.
△ Less
Submitted 15 July, 2018; v1 submitted 22 May, 2018;
originally announced May 2018.
-
Multimedia Traffic Routing in Multilayer WDM Networks
Authors:
Angela Amphawan,
Mohd Amirol Md Khair,
Hassanuddin Hasan
Abstract:
The advent of real-time multimedia services over the Internet has stimulated new technologies for expanding the information carrying capacity of optical network backbones. Multilayer wavelength division multiplexing (WDM) packet switching is an emerging technology for increasing the bandwidth of optical networks. Two algorithms for the routing of the multimedia traffic flows were applied: (i) Capa…
▽ More
The advent of real-time multimedia services over the Internet has stimulated new technologies for expanding the information carrying capacity of optical network backbones. Multilayer wavelength division multiplexing (WDM) packet switching is an emerging technology for increasing the bandwidth of optical networks. Two algorithms for the routing of the multimedia traffic flows were applied: (i) Capacitated Shortest Path First (CSPF) routing, which minimizes the distance of each flow linking the given source and destination nodes and satisfying capacity constraints; and (ii) Flow Deviation Algorithm (FDA) routing, which minimizes the network-wide average packet delay.
△ Less
Submitted 2 July, 2012;
originally announced July 2012.
-
A RFID-based Campus Context-Aware Notification System
Authors:
Nazleeni S. Haron,
Nur S. Saleem,
Mohd H. Hasan,
Mazeyanti M. Ariffin,
Izzatdin A. Aziz
Abstract:
This paper presents the design and development of a context-aware notification system for university students using RFID technology. This system is leveraging on the student's matrix card as the RFID tag (sensor), RFID reader and server as the processors and screen monitor at the various locations in the campus as the actuator of the output. This system aims to deliver urgent notifications to the…
▽ More
This paper presents the design and development of a context-aware notification system for university students using RFID technology. This system is leveraging on the student's matrix card as the RFID tag (sensor), RFID reader and server as the processors and screen monitor at the various locations in the campus as the actuator of the output. This system aims to deliver urgent notifications to the intended students immediately at their respective locations. In addition, the system is also able to display personalized information based on the students' preferences and current location when accessing the system. The background of the study, the design approaches for this system and the preliminary evaluation of the prototype are presented in this paper. The evaluation results have indicated that the the proposed system is useful and easy to use.
△ Less
Submitted 22 March, 2010;
originally announced March 2010.
-
The Emergence of the Modern Universe: Tracing the Cosmic Web
Authors:
J. M. Shull,
B. D. Savage,
J. A. Morse,
S. G. Neff,
J. T. Clarke,
T. Heckman,
A. L. Kinney,
E. B. Jenkins,
A. K. Dupree,
S. A. Baum,
H. Hasan
Abstract:
This is the report of the Ultraviolet-Optical Working Group (UVOWG) commissioned by NASA to study the scientific rationale for new missions in ultraviolet/optical space astronomy approximately ten years from now, when the Hubble Space Telescope (HST) is de-orbited. The UVOWG focused on a scientific theme, The Emergence of the Modern Universe, the period from redshifts z = 3 to 0, occupying over…
▽ More
This is the report of the Ultraviolet-Optical Working Group (UVOWG) commissioned by NASA to study the scientific rationale for new missions in ultraviolet/optical space astronomy approximately ten years from now, when the Hubble Space Telescope (HST) is de-orbited. The UVOWG focused on a scientific theme, The Emergence of the Modern Universe, the period from redshifts z = 3 to 0, occupying over 80% of cosmic time and beginning after the first galaxies, quasars, and stars emerged into their present form. We considered high-throughput UV spectroscopy (10-50x throughput of HST/COS) and wide-field optical imaging (at least 10 arcmin square). The exciting science to be addressed in the post-HST era includes studies of dark matter and baryons, the origin and evolution of the elements, and the major construction phase of galaxies and quasars. Key unanswered questions include: Where is the rest of the unseen universe? What is the interplay of the dark and luminous universe? How did the IGM collapse to form the galaxies and clusters? When were galaxies, clusters, and stellar populations assembled into their current form? What is the history of star formation and chemical evolution? Are massive black holes a natural part of most galaxies? A large-aperture UV/O telescope in space (ST-2010) will provide a major facility in the 21st century for solving these scientific problems. The UVOWG recommends that the first mission be a 4m aperture, SIRTF-class mission that focuses on UV spectroscopy and wide-field imaging. In the coming decade, NASA should investigate the feasibility of an 8m telescope, by 2010, with deployable optics similar to NGST. No high-throughput UV/Optical mission will be possible without significant NASA investments in technology, including UV detectors, gratings, mirrors, and imagers.
△ Less
Submitted 7 July, 1999;
originally announced July 1999.