-
MedBike: A Cardiac Patient Monitoring System Enhanced through Gamification
Authors:
Tahmim Hossain,
Faisal Sayed,
Yugesh Rai,
Kalpak Bansod,
Md Nahid Sadik
Abstract:
The "MedBike" is an innovative project in the field of pediatric cardiac rehabilitation. It is a 2D interactive game created specifically for children under the age of 18 who have cardiac conditions. This game is part of the MedBike system, a novel rehabilitation tool combining physical exercise with the spirit of gaming. The MedBike game provides children with a safe, controlled, and engaging env…
▽ More
The "MedBike" is an innovative project in the field of pediatric cardiac rehabilitation. It is a 2D interactive game created specifically for children under the age of 18 who have cardiac conditions. This game is part of the MedBike system, a novel rehabilitation tool combining physical exercise with the spirit of gaming. The MedBike game provides children with a safe, controlled, and engaging environment in which to exercise and recover. It has three distinct levels of increasing intensity, each with its own set of environments and challenges that are tailored to different stages of rehabilitation. This report dives into the details of the MedBike game, highlighting its unique features and gameplay.
△ Less
Submitted 26 April, 2024;
originally announced April 2024.
-
Optimizing Universal Lesion Segmentation: State Space Model-Guided Hierarchical Networks with Feature Importance Adjustment
Authors:
Kazi Shahriar Sanjid,
Md. Tanzim Hossain,
Md. Shakib Shahariar Junayed,
M. Monir Uddin
Abstract:
Deep learning has revolutionized medical imaging by providing innovative solutions to complex healthcare challenges. Traditional models often struggle to dynamically adjust feature importance, resulting in suboptimal representation, particularly in tasks like semantic segmentation crucial for accurate structure delineation. Moreover, their static nature incurs high computational costs. To tackle t…
▽ More
Deep learning has revolutionized medical imaging by providing innovative solutions to complex healthcare challenges. Traditional models often struggle to dynamically adjust feature importance, resulting in suboptimal representation, particularly in tasks like semantic segmentation crucial for accurate structure delineation. Moreover, their static nature incurs high computational costs. To tackle these issues, we introduce Mamba-Ahnet, a novel integration of State Space Model (SSM) and Advanced Hierarchical Network (AHNet) within the MAMBA framework, specifically tailored for semantic segmentation in medical imaging.Mamba-Ahnet combines SSM's feature extraction and comprehension with AHNet's attention mechanisms and image reconstruction, aiming to enhance segmentation accuracy and robustness. By dissecting images into patches and refining feature comprehension through self-attention mechanisms, the approach significantly improves feature resolution. Integration of AHNet into the MAMBA framework further enhances segmentation performance by selectively amplifying informative regions and facilitating the learning of rich hierarchical representations. Evaluation on the Universal Lesion Segmentation dataset demonstrates superior performance compared to state-of-the-art techniques, with notable metrics such as a Dice similarity coefficient of approximately 98% and an Intersection over Union of about 83%. These results underscore the potential of our methodology to enhance diagnostic accuracy, treatment planning, and ultimately, patient outcomes in clinical practice. By addressing the limitations of traditional models and leveraging the power of deep learning, our approach represents a significant step forward in advancing medical imaging technology.
△ Less
Submitted 26 April, 2024;
originally announced April 2024.
-
Chronological Outlooks of Globe Illustrated with Web-Based Visualization
Authors:
Tahmim Hossain,
Sai Sarath Movva,
Ritika Ritika
Abstract:
Develo** visualizations with comprehensive annotations is crucial for research and educational purposes. We've been experimenting with various visualization tools like Plotly, Plotly.js, and D3.js to analyze global trends, focusing on areas such as Global Terrorism, the Global Air Quality Index (AQI), and Global Population dynamics. These visualizations help us gain insights into complex researc…
▽ More
Develo** visualizations with comprehensive annotations is crucial for research and educational purposes. We've been experimenting with various visualization tools like Plotly, Plotly.js, and D3.js to analyze global trends, focusing on areas such as Global Terrorism, the Global Air Quality Index (AQI), and Global Population dynamics. These visualizations help us gain insights into complex research topics, facilitating better understanding and analysis. We've created a single web homepage that links to three distinct visualization web pages, each exploring specific topics in depth. These webpages have been deployed on free cloud hosting servers such as Vercel and Render.
△ Less
Submitted 17 April, 2024;
originally announced April 2024.
-
Perception and Localization of Macular Degeneration Applying Convolutional Neural Network, ResNet and Grad-CAM
Authors:
Tahmim Hossain,
Sagor Chandro Bakchy
Abstract:
A well-known retinal disease that sends blurry visions to the affected patients is Macular Degeneration. This research is based on classifying the healthy and macular degeneration fundus by localizing the affected region of the fundus. A CNN architecture and CNN with ResNet architecture (ResNet50, ResNet50v2, ResNet101, ResNet101v2, ResNet152, ResNet152v2) as the backbone are used to classify the…
▽ More
A well-known retinal disease that sends blurry visions to the affected patients is Macular Degeneration. This research is based on classifying the healthy and macular degeneration fundus by localizing the affected region of the fundus. A CNN architecture and CNN with ResNet architecture (ResNet50, ResNet50v2, ResNet101, ResNet101v2, ResNet152, ResNet152v2) as the backbone are used to classify the two types of fundus. The data are split into three categories including (a) Training set is 90% and Testing set is 10% (b) Training set is 80% and Testing set is 20%, (c) Training set is 50% and Testing set is 50%. After the training, the best model has been selected from the evaluation metrics. Among the models, CNN with a backbone of ResNet50 performs best which gives the training accuracy of 98.7% for 90% train and 10% test data split. With this model, we have performed the Grad-CAM visualization to get the region of the affected area of the fundus.
△ Less
Submitted 2 May, 2024; v1 submitted 24 April, 2024;
originally announced April 2024.
-
DyGCL: Dynamic Graph Contrastive Learning For Event Prediction
Authors:
Muhammed Ifte Khairul Islam,
Khaled Mohammed Saifuddin,
Tanvir Hossain,
Esra Akbas
Abstract:
Predicting events such as political protests, flu epidemics, and criminal activities is crucial to proactively taking necessary measures and implementing required responses to address emerging challenges. Capturing contextual information from textual data for event forecasting poses significant challenges due to the intricate structure of the documents and the evolving nature of events. Recently,…
▽ More
Predicting events such as political protests, flu epidemics, and criminal activities is crucial to proactively taking necessary measures and implementing required responses to address emerging challenges. Capturing contextual information from textual data for event forecasting poses significant challenges due to the intricate structure of the documents and the evolving nature of events. Recently, dynamic Graph Neural Networks (GNNs) have been introduced to capture the dynamic patterns of input text graphs. However, these models only utilize node-level representation, causing the loss of the global information from graph-level representation. On the other hand, both node-level and graph-level representations are essential for effective event prediction as node-level representation gives insight into the local structure, and the graph-level representation provides an understanding of the global structure of the temporal graph. To address these challenges, in this paper, we propose a Dynamic Graph Contrastive Learning (DyGCL) method for event prediction. Our model DyGCL employs a local view encoder to learn the evolving node representations, which effectively captures the local dynamic structure of input graphs. Additionally, it harnesses a global view encoder to perceive the hierarchical dynamic graph representation of the input graphs. Then we update the graph representations from both encoders using contrastive learning. In the final stage, DyGCL combines both representations using an attention mechanism and optimizes its capability to predict future events. Our extensive experiment demonstrates that our proposed method outperforms the baseline methods for event prediction on six real-world datasets.
△ Less
Submitted 23 April, 2024;
originally announced April 2024.
-
MisgenderMender: A Community-Informed Approach to Interventions for Misgendering
Authors:
Tamanna Hossain,
Sunipa Dev,
Sameer Singh
Abstract:
Content Warning: This paper contains examples of misgendering and erasure that could be offensive and potentially triggering.
Misgendering, the act of incorrectly addressing someone's gender, inflicts serious harm and is pervasive in everyday technologies, yet there is a notable lack of research to combat it. We are the first to address this lack of research into interventions for misgendering b…
▽ More
Content Warning: This paper contains examples of misgendering and erasure that could be offensive and potentially triggering.
Misgendering, the act of incorrectly addressing someone's gender, inflicts serious harm and is pervasive in everyday technologies, yet there is a notable lack of research to combat it. We are the first to address this lack of research into interventions for misgendering by conducting a survey of gender-diverse individuals in the US to understand perspectives about automated interventions for text-based misgendering. Based on survey insights on the prevalence of misgendering, desired solutions, and associated concerns, we introduce a misgendering interventions task and evaluation dataset, MisgenderMender. We define the task with two sub-tasks: (i) detecting misgendering, followed by (ii) correcting misgendering where misgendering is present in domains where editing is appropriate. MisgenderMender comprises 3790 instances of social media content and LLM-generations about non-cisgender public figures, annotated for the presence of misgendering, with additional annotations for correcting misgendering in LLM-generated text. Using this dataset, we set initial benchmarks by evaluating existing NLP systems and highlighting challenges for future models to address. We release the full dataset, code, and demo at https://tamannahossainkay.github.io/misgendermender/.
△ Less
Submitted 22 April, 2024;
originally announced April 2024.
-
Adaptive Local Binary Pattern: A Novel Feature Descriptor for Enhanced Analysis of Kidney Abnormalities in CT Scan Images using ensemble based Machine Learning Approach
Authors:
Tahmim Hossain,
Faisal Sayed,
Solehin Islam
Abstract:
The shortage of nephrologists and the growing public health concern over renal failure have spurred the demand for AI systems capable of autonomously detecting kidney abnormalities. Renal failure, marked by a gradual decline in kidney function, can result from factors like cysts, stones, and tumors. Chronic kidney disease may go unnoticed initially, leading to untreated cases until they reach an a…
▽ More
The shortage of nephrologists and the growing public health concern over renal failure have spurred the demand for AI systems capable of autonomously detecting kidney abnormalities. Renal failure, marked by a gradual decline in kidney function, can result from factors like cysts, stones, and tumors. Chronic kidney disease may go unnoticed initially, leading to untreated cases until they reach an advanced stage. The dataset, comprising 12,427 images from multiple hospitals in Dhaka, was categorized into four groups: cyst, tumor, stone, and normal. Our methodology aims to enhance CT scan image quality using Crop**, Resizing, and CALHE techniques, followed by feature extraction with our proposed Adaptive Local Binary Pattern (A-LBP) feature extraction method compared with the state-of-the-art local binary pattern (LBP) method. Our proposed features fed into classifiers such as Random Forest, Decision Tree, Naive Bayes, K-Nearest Neighbor, and SVM. We explored an ensemble model with soft voting to get a more robust model for our task. We got the highest of more than 99% in accuracy using our feature descriptor and ensembling five classifiers (Random Forest, Decision Tree, Naive Bayes, K-Nearest Neighbor, Support Vector Machine) with the soft voting method.
△ Less
Submitted 25 April, 2024; v1 submitted 22 April, 2024;
originally announced April 2024.
-
Real-Time Detection and Analysis of Vehicles and Pedestrians using Deep Learning
Authors:
Md Nahid Sadik,
Tahmim Hossain,
Faisal Sayeed
Abstract:
Computer vision, particularly vehicle and pedestrian identification is critical to the evolution of autonomous driving, artificial intelligence, and video surveillance. Current traffic monitoring systems confront major difficulty in recognizing small objects and pedestrians effectively in real-time, posing a serious risk to public safety and contributing to traffic inefficiency. Recognizing these…
▽ More
Computer vision, particularly vehicle and pedestrian identification is critical to the evolution of autonomous driving, artificial intelligence, and video surveillance. Current traffic monitoring systems confront major difficulty in recognizing small objects and pedestrians effectively in real-time, posing a serious risk to public safety and contributing to traffic inefficiency. Recognizing these difficulties, our project focuses on the creation and validation of an advanced deep-learning framework capable of processing complex visual input for precise, real-time recognition of cars and people in a variety of environmental situations. On a dataset representing complicated urban settings, we trained and evaluated different versions of the YOLOv8 and RT-DETR models. The YOLOv8 Large version proved to be the most effective, especially in pedestrian recognition, with great precision and robustness. The results, which include Mean Average Precision and recall rates, demonstrate the model's ability to dramatically improve traffic monitoring and safety. This study makes an important addition to real-time, reliable detection in computer vision, establishing new benchmarks for traffic management systems.
△ Less
Submitted 11 April, 2024;
originally announced April 2024.
-
Integrating Mamba Sequence Model and Hierarchical Upsampling Network for Accurate Semantic Segmentation of Multiple Sclerosis Legion
Authors:
Kazi Shahriar Sanjid,
Md. Tanzim Hossain,
Md. Shakib Shahariar Junayed,
Dr. Mohammad Monir Uddin
Abstract:
Integrating components from convolutional neural networks and state space models in medical image segmentation presents a compelling approach to enhance accuracy and efficiency. We introduce Mamba HUNet, a novel architecture tailored for robust and efficient segmentation tasks. Leveraging strengths from Mamba UNet and the lighter version of Hierarchical Upsampling Network (HUNet), Mamba HUNet comb…
▽ More
Integrating components from convolutional neural networks and state space models in medical image segmentation presents a compelling approach to enhance accuracy and efficiency. We introduce Mamba HUNet, a novel architecture tailored for robust and efficient segmentation tasks. Leveraging strengths from Mamba UNet and the lighter version of Hierarchical Upsampling Network (HUNet), Mamba HUNet combines convolutional neural networks local feature extraction power with state space models long range dependency modeling capabilities. We first converted HUNet into a lighter version, maintaining performance parity and then integrated this lighter HUNet into Mamba HUNet, further enhancing its efficiency. The architecture partitions input grayscale images into patches, transforming them into 1D sequences for processing efficiency akin to Vision Transformers and Mamba models. Through Visual State Space blocks and patch merging layers, hierarchical features are extracted while preserving spatial information. Experimental results on publicly available Magnetic Resonance Imaging scans, notably in Multiple Sclerosis lesion segmentation, demonstrate Mamba HUNet's effectiveness across diverse segmentation tasks. The model's robustness and flexibility underscore its potential in handling complex anatomical structures. These findings establish Mamba HUNet as a promising solution in advancing medical image segmentation, with implications for improving clinical decision making processes.
△ Less
Submitted 26 March, 2024;
originally announced March 2024.
-
Stress-controlled medium-amplitude oscillatory shear (MAOStress) of PVA-Borax
Authors:
Nabil Ramlawi,
Mohammad Tanver Hossain,
Abhishek Shetty,
Randy H. Ewoldt
Abstract:
We report the first-ever complete measurement of MAOStress material functions, which reveal that stress can be more fundamental than strain or strain rate for understanding linearity limits as a function of Deborah number. The material used is a canonical viscoelastic liquid with a single dominant relaxation time: Polyvinyl alcohol (PVA) polymer solution crosslinked with tetrahydroborate (Borax) s…
▽ More
We report the first-ever complete measurement of MAOStress material functions, which reveal that stress can be more fundamental than strain or strain rate for understanding linearity limits as a function of Deborah number. The material used is a canonical viscoelastic liquid with a single dominant relaxation time: Polyvinyl alcohol (PVA) polymer solution crosslinked with tetrahydroborate (Borax) solution. We outline experimental limit lines and their dependence on geometry and test conditions. These MAOStress measurements enable us to observe the frequency dependence of the weakly nonlinear deviation as a function of stress amplitude. The observed features of MAOStress material functions are distinctly simpler than MAOStrain, where the frequency dependence is much more dramatic. The strain-stiffening transient network model (SSTNM) was used to derive a model-informed normalization of the nonlinear material functions that accounts for their scaling with the linear material properties. Moreover, we compare the frequency-dependence of the critical stress, strain, and strain-rate for the linearity limit, which are rigorously computed from the MAOStress and MAOStrain material functions. While critical strain and strain-rate change by orders of magnitude throughout the Deborah number range, the critical stress changes by a factor of about two, showing that stress is a more fundamental measure of nonlinearity strength. This work extends the experimental accessibility of the weakly nonlinear regime to stress-controlled instruments and deformations, which reveal material physics beyond linear viscoelasticity but at conditions that are accessible to theory and detailed simulation.
△ Less
Submitted 29 February, 2024;
originally announced February 2024.
-
HOACS: Homomorphic Obfuscation Assisted Concealing of Secrets to Thwart Trojan Attacks in COTS Processor
Authors:
Tanvir Hossain,
Matthew Showers,
Mahmudul Hasan,
Tamzidul Hoque
Abstract:
Commercial-off-the-shelf (COTS) components are often preferred over custom Integrated Circuits (ICs) to achieve reduced system development time and cost, easy adoption of new technologies, and replaceability. Unfortunately, the integration of COTS components introduces serious security concerns. None of the entities in the COTS IC supply chain are trusted from a consumer's perspective, leading to…
▽ More
Commercial-off-the-shelf (COTS) components are often preferred over custom Integrated Circuits (ICs) to achieve reduced system development time and cost, easy adoption of new technologies, and replaceability. Unfortunately, the integration of COTS components introduces serious security concerns. None of the entities in the COTS IC supply chain are trusted from a consumer's perspective, leading to a ''zero trust'' threat model. Any of these entities could introduce hidden malicious circuits or hardware Trojans within the component, allowing an attacker in the field to extract secret information (e.g., cryptographic keys) or cause a functional failure. Existing solutions to counter hardware Trojans are inapplicable in such a zero-trust scenario as they assume either the design house or the foundry to be trusted and consider the design to be available for either analysis or modification. In this work, we have proposed a software-oriented countermeasure to ensure the confidentiality of secret assets against hardware Trojans that can be seamlessly integrated in existing COTS microprocessors. The proposed solution does not require any supply chain entity to be trusted and does not require analysis or modification of the IC design. To protect secret assets in an untrusted microprocessor, the proposed method leverages the concept of residue number coding (RNC) to transform the software functions operating on the asset to be fully homomorphic. We have implemented the proposed solution to protect the secret key within the Advanced Encryption Standard (AES) program and presented a detailed security analysis. We also have developed a plugin for the LLVM compiler toolchain that automatically integrates the solution in AES. Finally, we compare the execution time overhead of the operations in the RNC-based technique with comparable homomorphic solutions and demonstrate significant improvement.
△ Less
Submitted 14 February, 2024;
originally announced February 2024.
-
MGAug: Multimodal Geometric Augmentation in Latent Spaces of Image Deformations
Authors:
Tonmoy Hossain,
Miaomiao Zhang
Abstract:
Geometric transformations have been widely used to augment the size of training images. Existing methods often assume a unimodal distribution of the underlying transformations between images, which limits their power when data with multimodal distributions occur. In this paper, we propose a novel model, Multimodal Geometric Augmentation (MGAug), that for the first time generates augmenting transfo…
▽ More
Geometric transformations have been widely used to augment the size of training images. Existing methods often assume a unimodal distribution of the underlying transformations between images, which limits their power when data with multimodal distributions occur. In this paper, we propose a novel model, Multimodal Geometric Augmentation (MGAug), that for the first time generates augmenting transformations in a multimodal latent space of geometric deformations. To achieve this, we first develop a deep network that embeds the learning of latent geometric spaces of diffeomorphic transformations (a.k.a. diffeomorphisms) in a variational autoencoder (VAE). A mixture of multivariate Gaussians is formulated in the tangent space of diffeomorphisms and serves as a prior to approximate the hidden distribution of image transformations. We then augment the original training dataset by deforming images using randomly sampled transformations from the learned multimodal latent space of VAE. To validate the efficiency of our model, we jointly learn the augmentation strategy with two distinct domain-specific tasks: multi-class classification on 2D synthetic datasets and segmentation on real 3D brain magnetic resonance images (MRIs). We also compare MGAug with state-of-the-art transformation-based image augmentation algorithms. Experimental results show that our proposed approach outperforms all baselines by significantly improved prediction accuracy. Our code is publicly available at https://github.com/tonmoy-hossain/MGAug.
△ Less
Submitted 25 January, 2024; v1 submitted 20 December, 2023;
originally announced December 2023.
-
HeTriNet: Heterogeneous Graph Triplet Attention Network for Drug-Target-Disease Interaction
Authors:
Farhan Tanvir,
Khaled Mohammed Saifuddin,
Tanvir Hossain,
Arunkumar Bagavathi,
Esra Akbas
Abstract:
Modeling the interactions between drugs, targets, and diseases is paramount in drug discovery and has significant implications for precision medicine and personalized treatments. Current approaches frequently consider drug-target or drug-disease interactions individually, ignoring the interdependencies among all three entities. Within human metabolic systems, drugs interact with protein targets in…
▽ More
Modeling the interactions between drugs, targets, and diseases is paramount in drug discovery and has significant implications for precision medicine and personalized treatments. Current approaches frequently consider drug-target or drug-disease interactions individually, ignoring the interdependencies among all three entities. Within human metabolic systems, drugs interact with protein targets in cells, influencing target activities and subsequently impacting biological pathways to promote healthy functions and treat diseases. Moving beyond binary relationships and exploring tighter triple relationships is essential to understanding drugs' mechanism of action (MoAs). Moreover, identifying the heterogeneity of drugs, targets, and diseases, along with their distinct characteristics, is critical to model these complex interactions appropriately. To address these challenges, we effectively model the interconnectedness of all entities in a heterogeneous graph and develop a novel Heterogeneous Graph Triplet Attention Network (\texttt{HeTriNet}). \texttt{HeTriNet} introduces a novel triplet attention mechanism within this heterogeneous graph structure. Beyond pairwise attention as the importance of an entity for the other one, we define triplet attention to model the importance of pairs for entities in the drug-target-disease triplet prediction problem. Experimental results on real-world datasets show that \texttt{HeTriNet} outperforms several baselines, demonstrating its remarkable proficiency in uncovering novel drug-target-disease relationships.
△ Less
Submitted 30 November, 2023;
originally announced December 2023.
-
Microlensing of halo objects in the exterior part of the Galaxy
Authors:
Tabib Rayed Hossain,
Prabir Kumar Haldar,
Mehedi Kalam
Abstract:
In the context of this paper, microlenses present as oblate clusters of dark matter structures called massive astrophysical compact halo object(MACHO) in the galactic halo are considered. The NFW density profile [1] is derived from the observational data and works best in the halo region of the exterior part of the galaxy. Hence this profile is used to plot the potential, deflection angle, and cri…
▽ More
In the context of this paper, microlenses present as oblate clusters of dark matter structures called massive astrophysical compact halo object(MACHO) in the galactic halo are considered. The NFW density profile [1] is derived from the observational data and works best in the halo region of the exterior part of the galaxy. Hence this profile is used to plot the potential, deflection angle, and critical and caustic curves for the aforementioned microlenses using numerical methods. Moreover, this model is compared with an older density profile model [2], and the differences in their caustic and critical curves are pointed out. This leads to the conclusion that the NFW model produces caustic and critical curves that occupy a smaller region than portrayed by the caustic and critical curves produced by the older density profile model. However, the differences are not that significant to these structures act as microlenses as they are so small and beyond the scope of modern telescopes, and thus only the light curves can be detected from these structures.
△ Less
Submitted 16 November, 2023;
originally announced November 2023.
-
SADIR: Shape-Aware Diffusion Models for 3D Image Reconstruction
Authors:
Nivetha Jayakumar,
Tonmoy Hossain,
Miaomiao Zhang
Abstract:
3D image reconstruction from a limited number of 2D images has been a long-standing challenge in computer vision and image analysis. While deep learning-based approaches have achieved impressive performance in this area, existing deep networks often fail to effectively utilize the shape structures of objects presented in images. As a result, the topology of reconstructed objects may not be well pr…
▽ More
3D image reconstruction from a limited number of 2D images has been a long-standing challenge in computer vision and image analysis. While deep learning-based approaches have achieved impressive performance in this area, existing deep networks often fail to effectively utilize the shape structures of objects presented in images. As a result, the topology of reconstructed objects may not be well preserved, leading to the presence of artifacts such as discontinuities, holes, or mismatched connections between different parts. In this paper, we propose a shape-aware network based on diffusion models for 3D image reconstruction, named SADIR, to address these issues. In contrast to previous methods that primarily rely on spatial correlations of image intensities for 3D reconstruction, our model leverages shape priors learned from the training data to guide the reconstruction process. To achieve this, we develop a joint learning network that simultaneously learns a mean shape under deformation models. Each reconstructed image is then considered as a deformed variant of the mean shape. We validate our model, SADIR, on both brain and cardiac magnetic resonance images (MRIs). Experimental results show that our method outperforms the baselines with lower reconstruction error and better preservation of the shape structure of objects within the images.
△ Less
Submitted 3 October, 2023; v1 submitted 6 September, 2023;
originally announced September 2023.
-
BRNES: Enabling Security and Privacy-aware Experience Sharing in Multiagent Robotic and Autonomous Systems
Authors:
Md Tamjid Hossain,
Hung Manh La,
Shahriar Badsha,
Anton Netchaev
Abstract:
Although experience sharing (ES) accelerates multiagent reinforcement learning (MARL) in an advisor-advisee framework, attempts to apply ES to decentralized multiagent systems have so far relied on trusted environments and overlooked the possibility of adversarial manipulation and inference. Nevertheless, in a real-world setting, some Byzantine attackers, disguised as advisors, may provide false a…
▽ More
Although experience sharing (ES) accelerates multiagent reinforcement learning (MARL) in an advisor-advisee framework, attempts to apply ES to decentralized multiagent systems have so far relied on trusted environments and overlooked the possibility of adversarial manipulation and inference. Nevertheless, in a real-world setting, some Byzantine attackers, disguised as advisors, may provide false advice to the advisee and catastrophically degrade the overall learning performance. Also, an inference attacker, disguised as an advisee, may conduct several queries to infer the advisors' private information and make the entire ES process questionable in terms of privacy leakage. To address and tackle these issues, we propose a novel MARL framework (BRNES) that heuristically selects a dynamic neighbor zone for each advisee at each learning step and adopts a weighted experience aggregation technique to reduce Byzantine attack impact. Furthermore, to keep the agent's private information safe from adversarial inference attacks, we leverage the local differential privacy (LDP)-induced noise during the ES process. Our experiments show that our framework outperforms the state-of-the-art in terms of the steps to goal, obtained reward, and time to goal metrics. Particularly, our evaluation shows that the proposed framework is 8.32x faster than the current non-private frameworks and 1.41x faster than the private frameworks in an adversarial setting.
△ Less
Submitted 2 August, 2023;
originally announced August 2023.
-
Hiding in Plain Sight: Differential Privacy Noise Exploitation for Evasion-resilient Localized Poisoning Attacks in Multiagent Reinforcement Learning
Authors:
Md Tamjid Hossain,
Hung La
Abstract:
Lately, differential privacy (DP) has been introduced in cooperative multiagent reinforcement learning (CMARL) to safeguard the agents' privacy against adversarial inference during knowledge sharing. Nevertheless, we argue that the noise introduced by DP mechanisms may inadvertently give rise to a novel poisoning threat, specifically in the context of private knowledge sharing during CMARL, which…
▽ More
Lately, differential privacy (DP) has been introduced in cooperative multiagent reinforcement learning (CMARL) to safeguard the agents' privacy against adversarial inference during knowledge sharing. Nevertheless, we argue that the noise introduced by DP mechanisms may inadvertently give rise to a novel poisoning threat, specifically in the context of private knowledge sharing during CMARL, which remains unexplored in the literature. To address this shortcoming, we present an adaptive, privacy-exploiting, and evasion-resilient localized poisoning attack (PeLPA) that capitalizes on the inherent DP-noise to circumvent anomaly detection systems and hinder the optimal convergence of the CMARL model. We rigorously evaluate our proposed PeLPA attack in diverse environments, encompassing both non-adversarial and multiple-adversarial contexts. Our findings reveal that, in a medium-scale environment, the PeLPA attack with attacker ratios of 20% and 40% can lead to an increase in average steps to goal by 50.69% and 64.41%, respectively. Furthermore, under similar conditions, PeLPA can result in a 1.4x and 1.6x computational time increase in optimal reward attainment and a 1.18x and 1.38x slower convergence for attacker ratios of 20% and 40%, respectively.
△ Less
Submitted 12 July, 2023; v1 submitted 1 July, 2023;
originally announced July 2023.
-
A multi-level analysis of data quality for formal software citation
Authors:
David Schindler,
Tazin Hossain,
Sascha Spors,
Frank Krüger
Abstract:
Software is a central part of modern science, and knowledge of its use is crucial for the scientific community with respect to reproducibility and attribution of its developers. Several studies have investigated in-text mentions of software and its quality, while the quality of formal software citations has only been analyzed superficially. This study performs an in-depth evaluation of formal soft…
▽ More
Software is a central part of modern science, and knowledge of its use is crucial for the scientific community with respect to reproducibility and attribution of its developers. Several studies have investigated in-text mentions of software and its quality, while the quality of formal software citations has only been analyzed superficially. This study performs an in-depth evaluation of formal software citation based on a set of manually annotated software references. It examines which resources are cited for software usage, to what extend they allow proper identification of software and its specific version, how this information is made available by scientific publishers, and how well it is represented in large-scale bibliographic databases. The results show that software articles are the most cited resource for software, while direct software citations are better suited for identification of software versions. Moreover, we found current practices by both, publishers and bibliographic databases, to be unsuited to represent these direct software citations, hindering large-scale analyses such as assessing software impact. We argue that current practices for representing software citations -- the recommended way to cite software by current citation standards -- stand in the way of their adaption by the scientific community, and urge providers of bibliographic data to explicitly model scientific software.
△ Less
Submitted 17 April, 2024; v1 submitted 30 June, 2023;
originally announced June 2023.
-
MISGENDERED: Limits of Large Language Models in Understanding Pronouns
Authors:
Tamanna Hossain,
Sunipa Dev,
Sameer Singh
Abstract:
Content Warning: This paper contains examples of misgendering and erasure that could be offensive and potentially triggering.
Gender bias in language technologies has been widely studied, but research has mostly been restricted to a binary paradigm of gender. It is essential also to consider non-binary gender identities, as excluding them can cause further harm to an already marginalized group.…
▽ More
Content Warning: This paper contains examples of misgendering and erasure that could be offensive and potentially triggering.
Gender bias in language technologies has been widely studied, but research has mostly been restricted to a binary paradigm of gender. It is essential also to consider non-binary gender identities, as excluding them can cause further harm to an already marginalized group. In this paper, we comprehensively evaluate popular language models for their ability to correctly use English gender-neutral pronouns (e.g., singular they, them) and neo-pronouns (e.g., ze, xe, thon) that are used by individuals whose gender identity is not represented by binary pronouns. We introduce MISGENDERED, a framework for evaluating large language models' ability to correctly use preferred pronouns, consisting of (i) instances declaring an individual's pronoun, followed by a sentence with a missing pronoun, and (ii) an experimental setup for evaluating masked and auto-regressive language models using a unified method. When prompted out-of-the-box, language models perform poorly at correctly predicting neo-pronouns (averaging 7.7% accuracy) and gender-neutral pronouns (averaging 34.2% accuracy). This inability to generalize results from a lack of representation of non-binary pronouns in training data and memorized associations. Few-shot adaptation with explicit examples in the prompt improves performance for neo-pronouns, but only to 64.7% even with 20 shots. We release the full dataset, code, and demo at https://tamannahossainkay.github.io/misgendered/
△ Less
Submitted 7 July, 2023; v1 submitted 6 June, 2023;
originally announced June 2023.
-
Interpretable Bangla Sarcasm Detection using BERT and Explainable AI
Authors:
Ramisa Anan,
Tasnim Sakib Apon,
Zeba Tahsin Hossain,
Elizabeth Antora Modhu,
Sudipta Mondal,
MD. Golam Rabiul Alam
Abstract:
A positive phrase or a sentence with an underlying negative motive is usually defined as sarcasm that is widely used in today's social media platforms such as Facebook, Twitter, Reddit, etc. In recent times active users in social media platforms are increasing dramatically which raises the need for an automated NLP-based system that can be utilized in various tasks such as determining market deman…
▽ More
A positive phrase or a sentence with an underlying negative motive is usually defined as sarcasm that is widely used in today's social media platforms such as Facebook, Twitter, Reddit, etc. In recent times active users in social media platforms are increasing dramatically which raises the need for an automated NLP-based system that can be utilized in various tasks such as determining market demand, sentiment analysis, threat detection, etc. However, since sarcasm usually implies the opposite meaning and its detection is frequently a challenging issue, data meaning extraction through an NLP-based model becomes more complicated. As a result, there has been a lot of study on sarcasm detection in English over the past several years, and there's been a noticeable improvement and yet sarcasm detection in the Bangla language's state remains the same. In this article, we present a BERT-based system that can achieve 99.60\% while the utilized traditional machine learning algorithms are only capable of achieving 89.93\%. Additionally, we have employed Local Interpretable Model-Agnostic Explanations that introduce explainability to our system. Moreover, we have utilized a newly collected bangla sarcasm dataset, BanglaSarc that was constructed specifically for the evaluation of this study. This dataset consists of fresh records of sarcastic and non-sarcastic comments, the majority of which are acquired from Facebook and YouTube comment sections.
△ Less
Submitted 22 March, 2023;
originally announced March 2023.
-
Multimodal Deep Learning to Differentiate Tumor Recurrence from Treatment Effect in Human Glioblastoma
Authors:
Tonmoy Hossain,
Zoraiz Qureshi,
Nivetha Jayakumar,
Thomas Eluvathingal Muttikkal,
Sohil Patel,
David Schiff,
Miaomiao Zhang,
Bijoy Kundu
Abstract:
Differentiating tumor progression (TP) from treatment-related necrosis (TN) is critical for clinical management decisions in glioblastoma (GBM). Dynamic FDG PET (dPET), an advance from traditional static FDG PET, may prove advantageous in clinical staging. dPET includes novel methods of a model-corrected blood input function that accounts for partial volume averaging to compute parametric maps tha…
▽ More
Differentiating tumor progression (TP) from treatment-related necrosis (TN) is critical for clinical management decisions in glioblastoma (GBM). Dynamic FDG PET (dPET), an advance from traditional static FDG PET, may prove advantageous in clinical staging. dPET includes novel methods of a model-corrected blood input function that accounts for partial volume averaging to compute parametric maps that reveal kinetic information. In a preliminary study, a convolution neural network (CNN) was trained to predict classification accuracy between TP and TN for $35$ brain tumors from $26$ subjects in the PET-MR image space. 3D parametric PET Ki (from dPET), traditional static PET standardized uptake values (SUV), and also the brain tumor MR voxels formed the input for the CNN. The average test accuracy across all leave-one-out cross-validation iterations adjusting for class weights was $0.56$ using only the MR, $0.65$ using only the SUV, and $0.71$ using only the Ki voxels. Combining SUV and MR voxels increased the test accuracy to $0.62$. On the other hand, MR and Ki voxels increased the test accuracy to $0.74$. Thus, dPET features alone or with MR features in deep learning models would enhance prediction accuracy in differentiating TP vs TN in GBM.
△ Less
Submitted 27 February, 2023;
originally announced February 2023.
-
Magnon-magnon interactions induced by spin pum**-driven symmetry breaking in synthetic antiferromagnets
Authors:
Mitra Mani Subedi,
Kuangyin Deng,
Yuzan Xiong,
Jaret Mongeon,
Mohammad Tomal Hossain,
Peter Meisenheimer,
Edison Zhou,
John Heron,
Matthias Benjamin Jungfleisch,
Wei Zhang,
Benedetta Flebus,
Joseph Sklenar
Abstract:
The richness in both the dispersion and energy of antiferromagnetic magnons has spurred the magnetism community to consider antiferromagnets for future spintronic/magnonic applications. However, the excitation and control of antiferromagnetic magnons remains challenging, especially when compared to ferromagnetic counterparts. A middle ground is found with synthetic antiferromagnet metamaterials, w…
▽ More
The richness in both the dispersion and energy of antiferromagnetic magnons has spurred the magnetism community to consider antiferromagnets for future spintronic/magnonic applications. However, the excitation and control of antiferromagnetic magnons remains challenging, especially when compared to ferromagnetic counterparts. A middle ground is found with synthetic antiferromagnet metamaterials, where acoustic and optical magnons exist at GHz frequencies. In these materials, the magnon energy spectrum can be tuned by static symmetry-breaking external fields or dipolar interactions hybridizing optical and acoustic magnon branches. Here, we experimentally measure the magnon energy spectrum of synthetic antiferromagnetic tetralayers, and discover avoided energy level crossings in the energy spectrum that are unexplained by the antiferromagnetic interlayer coupling. We explain our experimental results using a phenomenological model incorporating both fieldlike and dam**like torques generated by spin pum** in noncollinear magnetic multilayers separated by normal-metal spacers. We show that an asymmetry in the fieldlike torques acting on different magnetic layers can lift the spectral degeneracies of acoustic and optical magnon branches and yield symmetry-breaking induced magnon-magnon interactions. Our work extends the phenomenology of spin pum** to noncollinear magnetization configurations and significantly expands ways of engineering magnon-magnon interactions within antiferromagnets and quantum hybrid magnonic materials.
△ Less
Submitted 18 January, 2023;
originally announced January 2023.
-
Planar Metasurface Antenna with Tunable via Boundaries for Computational Imaging
Authors:
Toufiq M. Hossain,
Andrey E. Miroshnichenko,
David A. Powell
Abstract:
The fusion of metasurface antennas and computational imaging facilitates the design of microwave imaging systems which require no lenses, phase shifters or moving parts. The technique involves the generation of appropriately designed diverse measurement modes to encode the scene information into a small number of measurements. We propose a novel boundary-tunable parallel plate waveguide-based meta…
▽ More
The fusion of metasurface antennas and computational imaging facilitates the design of microwave imaging systems which require no lenses, phase shifters or moving parts. The technique involves the generation of appropriately designed diverse measurement modes to encode the scene information into a small number of measurements. We propose a novel boundary-tunable parallel plate waveguide-based metasurface antenna for computational microwave imaging. The proposed antenna leverages a switchable boundary of two layers of vias, to efficiently change the waveguide modes supported by the antenna cavity, leading to diverse measurement modes in the scene plane. The superiority of the boundary tuning approach over the frequency diversity approach for the same antenna is confirmed using the singular value decomposition. Synthetic imaging is performed using a coupled dipole model, which quantitatively proves the efficacy of the proposed antenna along with the robustness against noise down to 15 dB SNR.
△ Less
Submitted 13 December, 2022;
originally announced December 2022.
-
Energy and Time Based Topology Control Approach to Enhance the Lifetime of WSN in an economic zone
Authors:
Tanvir Hossain,
Md. Ershadul Haque,
Abdullah Al Mamun,
Samiul Ul Hoque,
Al Amin Fahim
Abstract:
An economic zone requires continuous monitoring and controlling by an autonomous surveillance system for heightening its production competency and security. Wireless sensor network (WSN) has swiftly grown popularity over the world for uninterruptedly monitoring and controlling a system. Sensor devices, the main elements of WSN, are given limited amount of energy, which leads the network to limited…
▽ More
An economic zone requires continuous monitoring and controlling by an autonomous surveillance system for heightening its production competency and security. Wireless sensor network (WSN) has swiftly grown popularity over the world for uninterruptedly monitoring and controlling a system. Sensor devices, the main elements of WSN, are given limited amount of energy, which leads the network to limited lifespan. Therefore, the most significant challenge is to increase the lifespan of a WSN system. Topology control mechanism (TCM) is a renowned method to enhance the lifespan of WSN. This paper proposes an approach to extend the lifetime of WSN for an economic area, targeting an economic zone in Bangladesh. Observations are made on the performance of the network lifetime considering the individual combinations of the TCM protocols and comparative investigation between the time and energy triggering strategy of TCM protocols. Results reveal the network makes a better performance in the case of A3 protocol while using the topology maintenance protocols with both time and energy triggering methods. Moreover, the performance of the A3 and DGETRec is superior to the other combinations of TCM protocols. Hence, the WSN system can be able to serve better connectivity coverage in the target economic zone.
△ Less
Submitted 4 October, 2022;
originally announced October 2022.
-
A Resource Allocation Scheme for Energy Demand Management in 6G-enabled Smart Grid
Authors:
Shafkat Islam,
Ioannis Zografopoulos,
Md Tamjid Hossain,
Shahriar Badsha,
Charalambos Konstantinou
Abstract:
Smart grid (SG) systems enhance grid resilience and efficient operation, leveraging the bidirectional flow of energy and information between generation facilities and prosumers. For energy demand management (EDM), the SG network requires computing a large amount of data generated by massive Internet-of-things sensors and advanced metering infrastructure (AMI) with minimal latency. This paper propo…
▽ More
Smart grid (SG) systems enhance grid resilience and efficient operation, leveraging the bidirectional flow of energy and information between generation facilities and prosumers. For energy demand management (EDM), the SG network requires computing a large amount of data generated by massive Internet-of-things sensors and advanced metering infrastructure (AMI) with minimal latency. This paper proposes a deep reinforcement learning (DRL)-based resource allocation scheme in a 6G-enabled SG edge network to offload resource-consuming EDM computation to edge servers. Automatic resource provisioning is achieved by harnessing the computational capabilities of smart meters in the dynamic edge network. To enforce DRL-assisted policies in dense 6G networks, the state information from multiple edge servers is required. However, adversaries can "poison" such information through false state injection (FSI) attacks, exhausting SG edge computing resources. Toward addressing this issue, we investigate the impact of such FSI attacks with respect to abusive utilization of edge resources, and develop a lightweight FSI detection mechanism based on supervised classifiers. Simulation results demonstrate the efficacy of DRL in dynamic resource allocation, the impact of the FSI attacks, and the effectiveness of the detection technique.
△ Less
Submitted 5 November, 2022; v1 submitted 6 June, 2022;
originally announced July 2022.
-
Adversarial Analysis of the Differentially-Private Federated Learning in Cyber-Physical Critical Infrastructures
Authors:
Md Tamjid Hossain,
Shahriar Badsha,
Hung La,
Haoting Shen,
Shafkat Islam,
Ibrahim Khalil,
Xun Yi
Abstract:
Federated Learning (FL) has become increasingly popular to perform data-driven analysis in cyber-physical critical infrastructures. Since the FL process may involve the client's confidential information, Differential Privacy (DP) has been proposed lately to secure it from adversarial inference. However, we find that while DP greatly alleviates the privacy concerns, the additional DP-noise opens a…
▽ More
Federated Learning (FL) has become increasingly popular to perform data-driven analysis in cyber-physical critical infrastructures. Since the FL process may involve the client's confidential information, Differential Privacy (DP) has been proposed lately to secure it from adversarial inference. However, we find that while DP greatly alleviates the privacy concerns, the additional DP-noise opens a new threat for model poisoning in FL. Nonetheless, very little effort has been made in the literature to investigate this adversarial exploitation of the DP-noise. To overcome this gap, in this paper, we present a novel adaptive model poisoning technique α-MPELM} through which an attacker can exploit the additional DP-noise to evade the state-of-the-art anomaly detection techniques and prevent optimal convergence of the FL model. We evaluate our proposed attack on the state-of-the-art anomaly detection approaches in terms of detection accuracy and validation loss. The main significance of our proposed α-MPELM attack is that it reduces the state-of-the-art anomaly detection accuracy by 6.8% for norm detection, 12.6% for accuracy detection, and 13.8% for mix detection. Furthermore, we propose a Reinforcement Learning-based DP level selection process to defend α-MPELM attack. The experimental results confirm that our defense mechanism converges to an optimal privacy policy without human maneuver.
△ Less
Submitted 1 December, 2022; v1 submitted 6 April, 2022;
originally announced April 2022.
-
On the Physical Layer Security Performance over RIS-aided Dual-hop RF-UOWC Mixed Network
Authors:
T. Hossain,
S. Shabab,
A. S. M. Badrudduza,
M. K. Kundu,
I. S. Ansari
Abstract:
Since security has been one of the crucial issues for high-yield communications such as 5G and 6G, the researchers continuously come up with newer techniques to enhance the security and performance of these progressive wireless communications. Reconfigurable intelligent surface (RIS) is one of those techniques that artificially rearrange and optimize the propagation environment of electromagnetic…
▽ More
Since security has been one of the crucial issues for high-yield communications such as 5G and 6G, the researchers continuously come up with newer techniques to enhance the security and performance of these progressive wireless communications. Reconfigurable intelligent surface (RIS) is one of those techniques that artificially rearrange and optimize the propagation environment of electromagnetic waves to improve both spectrum and energy efficiency of wireless networks. Besides, in underwater communication, underwater optical wireless communication (UOWC) is a better alternative/replacement for conventional acoustic and radio frequency (RF) technologies. Hence, mixed RIS-aided RF-UOWC can be treated as a promising technology for future wireless networks. This work focuses on the secrecy performance of mixed dual-hop RIS-aided RF-UOWC networks under the intercepting effort of a probable eavesdropper. The RF link operates under generalized Gamma fading distribution; likewise, the UOWC link experiences the mixture exponential generalized Gamma distribution. The secrecy analysis subsumes the derivations of closed-form expressions for average secrecy capacity, exact and lower bound of secrecy outage probability, and strictly positive secrecy capacity, all in terms of Meijer G functions. Capitalizing on these derivations, the effects of heterodyne and intensity modulation/direct detection systems, underwater turbulence resulting from air bubble levels, temperature gradients, and salinity gradients, are measured. Unlike conventional models that merely deal with thermally uniform scenarios, this proposed model is likely to be unique in terms of dealing with secrecy analysis of a temperature gradient RIS-aided RF-UOWC network. Lastly, the derivations are validated via Monte-Carlo simulations.
△ Less
Submitted 13 December, 2021;
originally announced December 2021.
-
Vulnerability Characterization and Privacy Quantification for Cyber-Physical Systems
Authors:
Arpan Bhattacharjee,
Shahriar Badsha,
Md Tamjid Hossain,
Charalambos Konstantinou,
Xue** Liang
Abstract:
Cyber-physical systems (CPS) data privacy protection during sharing, aggregating, and publishing is a challenging problem. Several privacy protection mechanisms have been developed in the literature to protect sensitive data from adversarial analysis and eliminate the risk of re-identifying the original properties of shared data. However, most of the existing solutions have drawbacks, such as (i)…
▽ More
Cyber-physical systems (CPS) data privacy protection during sharing, aggregating, and publishing is a challenging problem. Several privacy protection mechanisms have been developed in the literature to protect sensitive data from adversarial analysis and eliminate the risk of re-identifying the original properties of shared data. However, most of the existing solutions have drawbacks, such as (i) lack of a proper vulnerability characterization model to accurately identify where privacy is needed, (ii) ignoring data providers privacy preference, (iii) using uniform privacy protection which may create inadequate privacy for some provider while overprotecting others, and (iv) lack of a comprehensive privacy quantification model assuring data privacy-preservation. To address these issues, we propose a personalized privacy preference framework by characterizing and quantifying the CPS vulnerabilities as well as ensuring privacy. First, we introduce a Standard Vulnerability Profiling Library (SVPL) by arranging the nodes of an energy-CPS from maximum to minimum vulnerable based on their privacy loss. Based on this model, we present our personalized privacy framework (PDP) in which Laplace noise is added based on the individual node's selected privacy preferences. Finally, combining these two proposed methods, we demonstrate that our privacy characterization and quantification model can attain better privacy preservation by eliminating the trade-off between privacy, utility, and risk of losing information.
△ Less
Submitted 4 November, 2021; v1 submitted 28 October, 2021;
originally announced October 2021.
-
Anti-aliasing Deep Image Classifiers using Novel Depth Adaptive Blurring and Activation Function
Authors:
Md Tahmid Hossain,
Shyh Wei Teng,
Ferdous Sohel,
Guojun Lu
Abstract:
Deep convolutional networks are vulnerable to image translation or shift, partly due to common down-sampling layers, e.g., max-pooling and strided convolution. These operations violate the Nyquist sampling rate and cause aliasing. The textbook solution is low-pass filtering (blurring) before down-sampling, which can benefit deep networks as well. Even so, non-linearity units, such as ReLU, often r…
▽ More
Deep convolutional networks are vulnerable to image translation or shift, partly due to common down-sampling layers, e.g., max-pooling and strided convolution. These operations violate the Nyquist sampling rate and cause aliasing. The textbook solution is low-pass filtering (blurring) before down-sampling, which can benefit deep networks as well. Even so, non-linearity units, such as ReLU, often re-introduce the problem, suggesting that blurring alone may not suffice. In this work, first, we analyse deep features with Fourier transform and show that Depth Adaptive Blurring is more effective, as opposed to monotonic blurring. To this end, we outline how this can replace existing down-sampling methods. Second, we introduce a novel activation function -- with a built-in low pass filter, to keep the problem from reappearing. From experiments, we observe generalisation on other forms of transformations and corruptions as well, e.g., rotation, scale, and noise. We evaluate our method under three challenging settings: (1) a variety of image translations; (2) adversarial attacks -- both $\ell_{p}$ bounded and unbounded; and (3) data corruptions and perturbations. In each setting, our method achieves state-of-the-art results and improves clean accuracy on various benchmark datasets.
△ Less
Submitted 2 October, 2021;
originally announced October 2021.
-
A novel network training approach for open set image recognition
Authors:
Md Tahmid Hossain,
Shyh Wei Teng,
Guojun Lu,
Ferdous Sohel
Abstract:
Convolutional Neural Networks (CNNs) are commonly designed for closed set arrangements, where test instances only belong to some "Known Known" (KK) classes used in training. As such, they predict a class label for a test sample based on the distribution of the KK classes. However, when used under the Open Set Recognition (OSR) setup (where an input may belong to an "Unknown Unknown" or UU class),…
▽ More
Convolutional Neural Networks (CNNs) are commonly designed for closed set arrangements, where test instances only belong to some "Known Known" (KK) classes used in training. As such, they predict a class label for a test sample based on the distribution of the KK classes. However, when used under the Open Set Recognition (OSR) setup (where an input may belong to an "Unknown Unknown" or UU class), such a network will always classify a test instance as one of the KK classes even if it is from a UU class. As a solution, recently, data augmentation based on Generative Adversarial Networks(GAN) has been used. In this work, we propose a novel approach for mining a "Known UnknownTrainer" or KUT set and design a deep OSR Network (OSRNet) to harness this dataset. The goal isto teach OSRNet the essence of the UUs through KUT set, which is effectively a collection of mined "hard Known Unknown negatives". Once trained, OSRNet can detect the UUs while maintaining high classification accuracy on KKs. We evaluate OSRNet on six benchmark datasets and demonstrate it outperforms contemporary OSR methods.
△ Less
Submitted 26 September, 2021;
originally announced September 2021.
-
PoRCH: A Novel Consensus Mechanism for Blockchain-Enabled Future SCADA Systems in Smart Grids and Industry 4.0
Authors:
Md Tamjid Hossain,
Shahriar Badsha,
Haoting Shen
Abstract:
Smart Grids and Industry 4.0 (I4.0) are neither a dream nor a near-future thing anymore, rather it is happening now. The integration of more and more embedded systems and IoT devices is pushing smart grids and I4.0 forward at a breakneck speed. To cope up with this, the modification of age-old SCADA (Supervisory Control and Data Acquisition) systems in terms of decentralization, near-real-time ope…
▽ More
Smart Grids and Industry 4.0 (I4.0) are neither a dream nor a near-future thing anymore, rather it is happening now. The integration of more and more embedded systems and IoT devices is pushing smart grids and I4.0 forward at a breakneck speed. To cope up with this, the modification of age-old SCADA (Supervisory Control and Data Acquisition) systems in terms of decentralization, near-real-time operation, security, and privacy is necessary. In this context, blockchain technology has the potential of providing not only these essential features of the data acquisition process of future SCADA systems but also many other useful add-ons. On the other side, it is evident that various type of security breach tends to take place more during any economic turmoil. These can cause even more serious devastation to the global economy and human life. Thus, it is necessary to make our industries robust, automated, and resilient with secured and immutable data acquiring systems. This paper deals with the implementation scopes of blockchain in the data acquisition part of SCADA systems in the area of the smart grid and I4.0. There are several consensus mechanisms to support blockchain integration in the field of cryptocurrencies, vehicular networks, healthcare systems, e-commerce, etc. But little attention has been paid to develo** efficient and easy-to-implement consensus mechanisms in the field of blockchain-enabled SCADA systems. From this perspective, a novel consensus mechanism, which we call PoRCH (Proof of Random Count in Hashes), with a customized mining node selection scheme has been proposed in this paper. Also, a small-scale prototype of a blockchain-enabled data acquisition system has been developed. The performance evaluation of the implemented prototype shows the benefits of blockchain technology.
△ Less
Submitted 21 September, 2021;
originally announced September 2021.
-
Privacy, Security, and Utility Analysis of Differentially Private CPES Data
Authors:
Md Tamjid Hossain,
Shahriar Badsha,
Haoting Shen
Abstract:
Differential privacy (DP) has been widely used to protect the privacy of confidential cyber physical energy systems (CPES) data. However, applying DP without analyzing the utility, privacy, and security requirements can affect the data utility as well as help the attacker to conduct integrity attacks (e.g., False Data Injection(FDI)) leveraging the differentially private data. Existing anomaly-det…
▽ More
Differential privacy (DP) has been widely used to protect the privacy of confidential cyber physical energy systems (CPES) data. However, applying DP without analyzing the utility, privacy, and security requirements can affect the data utility as well as help the attacker to conduct integrity attacks (e.g., False Data Injection(FDI)) leveraging the differentially private data. Existing anomaly-detection-based defense strategies against data integrity attacks in DP-based smart grids fail to minimize the attack impact while maximizing data privacy and utility. To address this challenge, it is nontrivial to apply a defensive approach during the design process. In this paper, we formulate and develop the defense strategy as a part of the design process to investigate data privacy, security, and utility in a DP-based smart grid network. We have proposed a provable relationship among the DP-parameters that enables the defender to design a fault-tolerant system against FDI attacks. To experimentally evaluate and prove the effectiveness of our proposed design approach, we have simulated the FDI attack in a DP-based grid. The evaluation indicates that the attack impact can be minimized if the designer calibrates the privacy level according to the proposed correlation of the DP-parameters to design the grid network. Moreover, we analyze the feasibility of the DP mechanism and QoS of the smart grid network in an adversarial setting. Our analysis suggests that the DP mechanism is feasible over existing privacy-preserving mechanisms in the smart grid domain. Also, the QoS of the differentially private grid applications is found satisfactory in adversarial presence.
△ Less
Submitted 21 September, 2021;
originally announced September 2021.
-
DeSMP: Differential Privacy-exploited Stealthy Model Poisoning Attacks in Federated Learning
Authors:
Md Tamjid Hossain,
Shafkat Islam,
Shahriar Badsha,
Haoting Shen
Abstract:
Federated learning (FL) has become an emerging machine learning technique lately due to its efficacy in safeguarding the client's confidential information. Nevertheless, despite the inherent and additional privacy-preserving mechanisms (e.g., differential privacy, secure multi-party computation, etc.), the FL models are still vulnerable to various privacy-violating and security-compromising attack…
▽ More
Federated learning (FL) has become an emerging machine learning technique lately due to its efficacy in safeguarding the client's confidential information. Nevertheless, despite the inherent and additional privacy-preserving mechanisms (e.g., differential privacy, secure multi-party computation, etc.), the FL models are still vulnerable to various privacy-violating and security-compromising attacks (e.g., data or model poisoning) due to their numerous attack vectors which in turn, make the models either ineffective or sub-optimal. Existing adversarial models focusing on untargeted model poisoning attacks are not enough stealthy and persistent at the same time because of their conflicting nature (large scale attacks are easier to detect and vice versa) and thus, remain an unsolved research problem in this adversarial learning paradigm. Considering this, in this paper, we analyze this adversarial learning process in an FL setting and show that a stealthy and persistent model poisoning attack can be conducted exploiting the differential noise. More specifically, we develop an unprecedented DP-exploited stealthy model poisoning (DeSMP) attack for FL models. Our empirical analysis on both the classification and regression tasks using two popular datasets reflects the effectiveness of the proposed DeSMP attack. Moreover, we develop a novel reinforcement learning (RL)-based defense strategy against such model poisoning attacks which can intelligently and dynamically select the privacy level of the FL models to minimize the DeSMP attack surface and facilitate the attack detection.
△ Less
Submitted 21 September, 2021;
originally announced September 2021.
-
Probing anisotropy in epitaxial Fe/Pt bilayers by spin-orbit torque ferromagnetic resonance
Authors:
Mohammad Tomal Hossain,
Sergi Lendinez,
Laura Scheuer,
Evangelos Papaioannou,
M. Benjamin Jungfleisch
Abstract:
We report the generation and detection of spin-orbit torque ferromagnetic resonance (STFMR) in micropatterned epitaxial Fe/Pt bilayers grown by molecular beam epitaxy. The magnetic field dependent measurements at an in-plane magnetic field angle of 45 degrees with respect to the microwave-current direction reveal the presence of two distinct voltage peaks indicative of a strong magnetic anisotropy…
▽ More
We report the generation and detection of spin-orbit torque ferromagnetic resonance (STFMR) in micropatterned epitaxial Fe/Pt bilayers grown by molecular beam epitaxy. The magnetic field dependent measurements at an in-plane magnetic field angle of 45 degrees with respect to the microwave-current direction reveal the presence of two distinct voltage peaks indicative of a strong magnetic anisotropy. We show that STFMR can be employed to probe the underlying magnetic properties including the anisotropies in the Fe layer. We compare our STFMR results with broadband ferromagnetic resonance spectroscopy of the unpatterned bilayer thin films. The experimental STFMR measurements are interpreted using an analytical formalism and further confirmed using micromagnetic modeling, which shed light on the field-dependent magnetization alignment in the microstructures responsible for the STFMR rectification. Our results demonstrate a simple and efficient method for determining magnetic anisotropies in microstructures by means of rf spectroscopy.
△ Less
Submitted 20 August, 2021;
originally announced August 2021.
-
Thermal Neutron Measurements with an Unpowered, Miniature, Solid-State Device
Authors:
Tim Hossain,
Clayton Fullwood,
Will Flanagan,
Peter Hedlesky,
John Rabaey,
Steven Block,
Aidan Medcalf,
Tracy Tip**
Abstract:
A prototype neutron detector has been created through modification to a commercial non-volatile flash memory device. Studies are being performed to modify this prototype into a purpose-built device with greater performance and functionality. This paper describes a demonstration of this technology using a thermal neutron beam produced by a TRIGA research reactor. With a 4x4 array of 16 prototype de…
▽ More
A prototype neutron detector has been created through modification to a commercial non-volatile flash memory device. Studies are being performed to modify this prototype into a purpose-built device with greater performance and functionality. This paper describes a demonstration of this technology using a thermal neutron beam produced by a TRIGA research reactor. With a 4x4 array of 16 prototype devices, the full widths of the beam dimensions at half maximum are measured to be 2.2x2.1 cm2.
△ Less
Submitted 12 March, 2021;
originally announced March 2021.
-
Frequency Limited $\mathcal{H}_2$ Optimal Model Reduction of Large-Scale Sparse Dynamical Systems
Authors:
Xin Du,
M. Monir Uddin,
A. Mostakim Fony,
Md. Tanzim Hossain,
Mohammaed Sahadat-Hossain
Abstract:
We mainly consider the frequency limited $\mathcal{H}_2$ optimal model order reduction of large-scale sparse generalized systems. For this purpose we need to solve two Sylvester equations. This paper proposes efficient algorithm to solve them efficiently. The ideas are also generalized to index-1 descriptor systems. Numerical experiments are carried out using Python Programming Language and the re…
▽ More
We mainly consider the frequency limited $\mathcal{H}_2$ optimal model order reduction of large-scale sparse generalized systems. For this purpose we need to solve two Sylvester equations. This paper proposes efficient algorithm to solve them efficiently. The ideas are also generalized to index-1 descriptor systems. Numerical experiments are carried out using Python Programming Language and the results are presented to demonstrate the approximation accuracy and computational efficiency of the proposed techniques.
△ Less
Submitted 9 January, 2021;
originally announced January 2021.
-
Characterization of Broadband Focusing Microwave Metasurfaces at Oblique Incidence
Authors:
Ashif A. Fathnan,
Toufiq M. Hossain,
Dadin Mahmudin,
Yusuf N. Wijayanto,
David A. Powell
Abstract:
We report the characterization of an achromatic focusing metasurface at oblique incident angles. We show that in addition to the inherent off-axis aberrations that occurs due to the hyperbolic phase profile of the metasurface, the focusing performance is significantly degraded due to the meta-atoms' angular dispersion. To obtain insights into how the angular and spectral bandwidth of meta-atoms re…
▽ More
We report the characterization of an achromatic focusing metasurface at oblique incident angles. We show that in addition to the inherent off-axis aberrations that occurs due to the hyperbolic phase profile of the metasurface, the focusing performance is significantly degraded due to the meta-atoms' angular dispersion. To obtain insights into how the angular and spectral bandwidth of meta-atoms relate to the metasurface focusing performance, point-dipole models are used which incorporate different aspect's of the meta-atoms' angular response. It is emphasized that despite the meta-atoms being designed under the assumption that they support a single dipolar resonance, other resonances exist within the meta-atom geometry and become stronger at oblique incidence. These resonances disturb the designed phase and amplitude responses, resulting in lower focusing efficiency at higher incident angles. The modelling of higher order modes leads to good agreement with the experimental measurements, confirming that angular dispersion of the meta-atoms is the dominant mechanism in determining off-axis aberrations.
△ Less
Submitted 2 December, 2020;
originally announced December 2020.
-
Similarity and self-similarity in random walk with fixed, random and shrinking steps
Authors:
Tushar Mitra,
Tomal Hossain,
Santo Banerjee,
Md. Kamrul Hassan
Abstract:
In this article, we first give a comprehensive description of random walk (RW) problem focusing on self-similarity, dynamic scaling and its connection to diffusion phenomena. One of the main goals of our work is to check how robust the RW problem is under various different choices of the step size. We show that RW with random step size or uniformly shrinking step size is exactly the same as for RW…
▽ More
In this article, we first give a comprehensive description of random walk (RW) problem focusing on self-similarity, dynamic scaling and its connection to diffusion phenomena. One of the main goals of our work is to check how robust the RW problem is under various different choices of the step size. We show that RW with random step size or uniformly shrinking step size is exactly the same as for RW with fixed step size. Krapivsky and Redner in 2004 showed that RW with geometric shrinking step size, such that the size of the $n$th step is given by $S_n=λ^n$ with a fixed $λ<1$ value, exhibits some interesting features which are different from the RW with fixed step size. Motivated by this, we investigate what if $λ$ is not a fixed number rather it depends on the step number $n$? To this end, we first generate $N$ random numbers for RW of $t=N$ which are then arranged in a descending order so that the size of the $n$th step is $λ_n^n$. We have shown, both numerically and analytically, that $λ_n=(1-n/N)$, the root mean square displacement increases as $t^{1/4}$ which are different from all the known results on RW problems.
△ Less
Submitted 6 October, 2020;
originally announced October 2020.
-
Robust Image Classification Using A Low-Pass Activation Function and DCT Augmentation
Authors:
Md Tahmid Hossain,
Shyh Wei Teng,
Ferdous Sohel,
Guojun Lu
Abstract:
Convolutional Neural Network's (CNN's) performance disparity on clean and corrupted datasets has recently come under scrutiny. In this work, we analyse common corruptions in the frequency domain, i.e., High Frequency corruptions (HFc, e.g., noise) and Low Frequency corruptions (LFc, e.g., blur). Although a simple solution to HFc is low-pass filtering, ReLU -- a widely used Activation Function (AF)…
▽ More
Convolutional Neural Network's (CNN's) performance disparity on clean and corrupted datasets has recently come under scrutiny. In this work, we analyse common corruptions in the frequency domain, i.e., High Frequency corruptions (HFc, e.g., noise) and Low Frequency corruptions (LFc, e.g., blur). Although a simple solution to HFc is low-pass filtering, ReLU -- a widely used Activation Function (AF), does not have any filtering mechanism. In this work, we instill low-pass filtering into the AF (LP-ReLU) to improve robustness against HFc. To deal with LFc, we complement LP-ReLU with Discrete Cosine Transform based augmentation. LP-ReLU, coupled with DCT augmentation, enables a deep network to tackle the entire spectrum of corruption. We use CIFAR-10-C and Tiny ImageNet-C for evaluation and demonstrate improvements of 5% and 7.3% in accuracy respectively, compared to the State-Of-The-Art (SOTA). We further evaluate our method's stability on a variety of perturbations in CIFAR-10-P and Tiny ImageNet-P, achieving new SOTA in these experiments as well. To further strengthen our understanding regarding CNN's lack of robustness, a decision space visualisation process is proposed and presented in this work.
△ Less
Submitted 12 June, 2021; v1 submitted 18 July, 2020;
originally announced July 2020.
-
Mobility in immersed granular materials upon cyclic loading
Authors:
Tanvir Hossain,
Pierre Rognon
Abstract:
We study the mobility of objects embedded in an immersed granular packing and subjected to cyclic loadings. In this aim, we conducted experiments using glass beads immersed in water and a horizontal plate subjected to a cyclic uplift force. Tests performed at different cyclic force frequencies and amplitudes evidence the development of three mobility regimes whereby the plate stays virtually immob…
▽ More
We study the mobility of objects embedded in an immersed granular packing and subjected to cyclic loadings. In this aim, we conducted experiments using glass beads immersed in water and a horizontal plate subjected to a cyclic uplift force. Tests performed at different cyclic force frequencies and amplitudes evidence the development of three mobility regimes whereby the plate stays virtually immobile, moves up steadily or slowly creeps upwards. Results show that steady plate uplift can occur at lower force magnitudes when the frequency is increased. We propose an interpretation of this frequency-weakening behaviour based on force relaxation experiments and on the analysis of the mobility response of theoretical visco-elasto-plastic mechanical analogue. These results and analysis point out inherent differences in mobility response between steady and cyclic loadings in immersed granular materials.
△ Less
Submitted 6 May, 2020;
originally announced May 2020.
-
Drag force in immersed granular materials
Authors:
Tanvir Hossain,
Pierre Rognon
Abstract:
We investigate the drag forces acting on large objects moving through a granular packing immersed in water. In this aim, we conducted uplift experiments involving pulling out horizontal plates at a prescribed velocity vertically. During these tests, we observed that the drag force reaches to peak at a low displacement and then decays. Results show that the peak drag force strongly increases with t…
▽ More
We investigate the drag forces acting on large objects moving through a granular packing immersed in water. In this aim, we conducted uplift experiments involving pulling out horizontal plates at a prescribed velocity vertically. During these tests, we observed that the drag force reaches to peak at a low displacement and then decays. Results show that the peak drag force strongly increases with the velocity and depends on the plate size and grain diameter. We identify empirical scaling laws for these properties and introduce a Darcy-flow mechanism that can explain them. Furthermore, we conducted tests involving suddenly stop** the motion of the plate, which evidenced a progressive relaxation of the drag force in time. We discuss how a visco-elasto-plastic mechanical analogue can reproduce these dynamics. These results and analyses highlight fundamental differences in drag force between dry and immersed granular materials.
△ Less
Submitted 26 April, 2020; v1 submitted 24 January, 2020;
originally announced January 2020.
-
Rate-dependent drag instability in granular materials
Authors:
T. Hossain,
P. Rognon
Abstract:
We investigate the conditions leading to large drag force fluctuations in granular materials. The study is based on a set of experimental drag tests, which involve pulling a plate vertically through a cohesionless granular material. In agreement with previous observations, drag force exhibits significant and sudden drops -up to 60%- when the plate is pulled out at low velocities. We further find t…
▽ More
We investigate the conditions leading to large drag force fluctuations in granular materials. The study is based on a set of experimental drag tests, which involve pulling a plate vertically through a cohesionless granular material. In agreement with previous observations, drag force exhibits significant and sudden drops -up to 60%- when the plate is pulled out at low velocities. We further find that this instability vanishes at higher pullout velocities and near the surface. We empirically characterise the frequency and amplitude of these fluctuations and find that these properties are not consistent with a classical stick-slip dynamics. We therefore propose an alternative physical mechanism that can explain these force fluctuations.
△ Less
Submitted 11 April, 2020; v1 submitted 22 January, 2020;
originally announced January 2020.
-
Distortion Robust Image Classification using Deep Convolutional Neural Network with Discrete Cosine Transform
Authors:
Md Tahmid Hossain,
Shyh Wei Teng,
Dengsheng Zhang,
Suryani Lim,
Guojun Lu
Abstract:
Convolutional Neural Network is good at image classification. However, it is found to be vulnerable to image quality degradation. Even a small amount of distortion such as noise or blur can severely hamper the performance of these CNN architectures. Most of the work in the literature strives to mitigate this problem simply by fine-tuning a pre-trained CNN on mutually exclusive or a union set of di…
▽ More
Convolutional Neural Network is good at image classification. However, it is found to be vulnerable to image quality degradation. Even a small amount of distortion such as noise or blur can severely hamper the performance of these CNN architectures. Most of the work in the literature strives to mitigate this problem simply by fine-tuning a pre-trained CNN on mutually exclusive or a union set of distorted training data. This iterative fine-tuning process with all known types of distortion is exhaustive and the network struggles to handle unseen distortions. In this work, we propose distortion robust DCT-Net, a Discrete Cosine Transform based module integrated into a deep network which is built on top of VGG16. Unlike other works in the literature, DCT-Net is "blind" to the distortion type and level in an image both during training and testing. As a part of the training process, the proposed DCT module discards input information which mostly represents the contribution of high frequencies. The DCT-Net is trained "blindly" only once and applied in generic situation without further retraining. We also extend the idea of traditional dropout and present a training adaptive version of the same. We evaluate our proposed method against Gaussian blur, motion blur, salt and pepper noise, Gaussian noise and speckle noise added to CIFAR-10/100 and ImageNet test sets. Experimental results demonstrate that once trained, DCT-Net not only generalizes well to a variety of unseen image distortions but also outperforms other methods in the literature.
△ Less
Submitted 6 August, 2020; v1 submitted 14 November, 2018;
originally announced November 2018.
-
Discovering Signals from Web Sources to Predict Cyber Attacks
Authors:
Palash Goyal,
KSM Tozammel Hossain,
Ashok Deb,
Nazgol Tavabi,
Nathan Bartley,
Andr'es Abeliuk,
Emilio Ferrara,
Kristina Lerman
Abstract:
Cyber attacks are growing in frequency and severity. Over the past year alone we have witnessed massive data breaches that stole personal information of millions of people and wide-scale ransomware attacks that paralyzed critical infrastructure of several countries. Combating the rising cyber threat calls for a multi-pronged strategy, which includes predicting when these attacks will occur. The in…
▽ More
Cyber attacks are growing in frequency and severity. Over the past year alone we have witnessed massive data breaches that stole personal information of millions of people and wide-scale ransomware attacks that paralyzed critical infrastructure of several countries. Combating the rising cyber threat calls for a multi-pronged strategy, which includes predicting when these attacks will occur. The intuition driving our approach is this: during the planning and preparation stages, hackers leave digital traces of their activities on both the surface web and dark web in the form of discussions on platforms like hacker forums, social media, blogs and the like. These data provide predictive signals that allow anticipating cyber attacks. In this paper, we describe machine learning techniques based on deep neural networks and autoregressive time series models that leverage external signals from publicly available Web sources to forecast cyber attacks. Performance of our framework across ground truth data over real-world forecasting tasks shows that our methods yield a significant lift or increase of F1 for the top signals on predicted cyber attacks. Our results suggest that, when deployed, our system will be able to provide an effective line of defense against various types of targeted cyber attacks.
△ Less
Submitted 8 June, 2018;
originally announced June 2018.
-
RAPTOR: Ransomware Attack PredicTOR
Authors:
Florian Quinkert,
Thorsten Holz,
KSM Tozammel Hossain,
Emilio Ferrara,
Kristina Lerman
Abstract:
Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifical…
▽ More
Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in known ransomware attacks, and then monitors newly registered domains to identify potentially malicious ones. In addition, RAPTOR uses time series forecasting techniques to learn models of historical ransomware activity and then leverages malicious domain registrations as an external signal to forecast future ransomware activity. We illustrate RAPTOR's effectiveness by forecasting all activity stages of Cerber, a popular ransomware family. By monitoring zone files of the top-level domain .top starting from August 30, 2016 through May 31, 2017, RAPTOR predicted 2,126 newly registered domains to be potential Cerber domains. Of these, 378 later actually appeared in blacklists. Our empirical evaluation results show that using predicted domain registrations helped improve forecasts of future Cerber activity. Most importantly, our approach demonstrates the value of fusing different signals in forecasting applications in the cyber domain.
△ Less
Submitted 5 March, 2018;
originally announced March 2018.
-
Gender Differences in Undergraduate Physics Courses: A Comparative Study of Persistence
Authors:
Ashiqul Islam Dip,
Mohammad Tomal Hossain,
Md Forman Ullah,
Md Salah Uddin
Abstract:
We have investigated the difference in persistence between male and female students while taking undergraduatephysics courses. To quantify the persistence of a certain group of students, we have defined 'persistence index' as the inverseof the decrease rate of the number of that group of students while taking a specific course. We have collected the data fromthree consecutive workshops on various…
▽ More
We have investigated the difference in persistence between male and female students while taking undergraduatephysics courses. To quantify the persistence of a certain group of students, we have defined 'persistence index' as the inverseof the decrease rate of the number of that group of students while taking a specific course. We have collected the data fromthree consecutive workshops on various topics of physics. After plotting the number of participations against the number ofdays attended, we have calculated the decrease rates and persistence indices for both male and female student groups on eachworkshop and compared the persistence indices on a bar diagram. The comparative statistics show that the persistence indicesof female student groups are significantly higher than that of male student groups. This leads us to the conclusion that thefemale students are more persistent than male students while taking an undergraduate physics course.
△ Less
Submitted 20 January, 2017; v1 submitted 7 November, 2016;
originally announced November 2016.
-
Forecasting the Flu: Designing Social Network Sensors for Epidemics
Authors:
Huijuan Shao,
K. S. M. Tozammel Hossain,
Hao Wu,
Maleq Khan,
Anil Vullikanti,
B. Aditya Prakash,
Madhav Marathe,
Naren Ramakrishnan
Abstract:
Early detection and modeling of a contagious epidemic can provide important guidance about quelling the contagion, controlling its spread, or the effective design of countermeasures. A topic of recent interest has been to design social network sensors, i.e., identifying a small set of people who can be monitored to provide insight into the emergence of an epidemic in a larger population. We formal…
▽ More
Early detection and modeling of a contagious epidemic can provide important guidance about quelling the contagion, controlling its spread, or the effective design of countermeasures. A topic of recent interest has been to design social network sensors, i.e., identifying a small set of people who can be monitored to provide insight into the emergence of an epidemic in a larger population. We formally pose the problem of designing social network sensors for flu epidemics and identify two different objectives that could be targeted in such sensor design problems. Using the graph theoretic notion of dominators we develop an efficient and effective heuristic for forecasting epidemics at lead time. Using six city-scale datasets generated by extensive microscopic epidemiological simulations involving millions of individuals, we illustrate the practical applicability of our methods and show significant benefits (up to twenty-two days more lead time) compared to other competitors. Most importantly, we demonstrate the use of surrogates or proxies for policy makers for designing social network sensors that require from nonintrusive knowledge of people to more information on the relationship among people. The results show that the more intrusive information we obtain, the longer lead time to predict the flu outbreak up to nine days.
△ Less
Submitted 8 March, 2016; v1 submitted 22 February, 2016;
originally announced February 2016.
-
Dirac Point and Edge States in a Microwave Realization of Tight-Binding Graphene-like Structures
Authors:
U. Kuhl,
S. Barkhofen,
T. Tudorovskiy,
H. -J. Stoeckmann,
T. Hossain,
L. de Forges de Parny,
F. Mortessagne
Abstract:
We present a microwave realization of finite tight-binding graphene-like structures. The structures are realized using discs with a high index of refraction. The discs are placed on a metallic surface while a second surface is adjusted atop the discs, such that the waves coupling the discs in the air are evanescent, leading to the tight-binding behavior. In reflection measurements the Dirac point…
▽ More
We present a microwave realization of finite tight-binding graphene-like structures. The structures are realized using discs with a high index of refraction. The discs are placed on a metallic surface while a second surface is adjusted atop the discs, such that the waves coupling the discs in the air are evanescent, leading to the tight-binding behavior. In reflection measurements the Dirac point and a linear increase close to the Dirac point is observed, if the measurement is performed inside the sample. Resonances due to edge states are found close to the Dirac point if the measurements are performed at the zigzag-edge or at the corner in case of a broken benzene ring.
△ Less
Submitted 22 September, 2010; v1 submitted 4 June, 2010;
originally announced June 2010.
-
Growth and Characterization of Bulk Aluminum Nitride by Physical Vapor Transport
Authors:
Tim K. Hossain,
James V. Lindesay,
Michael G. Spencer
Abstract:
A major issue in the development of the technology of nitride based materials is the choice of substrate. The structural and optical properties of the layers are intimately connected to the substrate material used in the epitaxial growth. Key issues include lattice matching of substrate and epitaxial layer and the difference in the thermal expansion between the substrate and epitaxial layer. Due…
▽ More
A major issue in the development of the technology of nitride based materials is the choice of substrate. The structural and optical properties of the layers are intimately connected to the substrate material used in the epitaxial growth. Key issues include lattice matching of substrate and epitaxial layer and the difference in the thermal expansion between the substrate and epitaxial layer. Due to the extremely high vapor pressure of nitrogen over Gallium Nitride (GaN), pure GaN substrate are very difficult to produce and currently almost all nitride-based device are fabricated by hetero-epitaxy on either Sapphire or Silicon Carbide (SiC). Alternatively, AlN has a significantly lower vapor pressure of nitrogen and can be grown in bulk form. In this paper we report on our results in the growth of AlN by physical vapor transport. A theoretical model was developed to investigate the growth process by to determine optimal growth parameters. Several different seed crystals were investigated, singular 6H-SiC, 3.50 off-axis 6H-SiC and 80 off-axis 4H-SiC, and AlN grown by hydride vapor deposition on silicon substrates (the silicon substrates were subsequently removed by etching). Auger electron microscopy, transmission electron microscopy, and various X-ray diffraction techniques were used to investigate the samples grown.
△ Less
Submitted 13 April, 2002;
originally announced April 2002.