-
Decoupling Exploration and Exploitation for Unsupervised Pre-training with Successor Features
Authors:
JaeYoon Kim,
Junyu Xuan,
Christy Liang,
Farookh Hussain
Abstract:
Unsupervised pre-training has been on the lookout for the virtue of a value function representation referred to as successor features (SFs), which decouples the dynamics of the environment from the rewards. It has a significant impact on the process of task-specific fine-tuning due to the decomposition. However, existing approaches struggle with local optima due to the unified intrinsic reward of…
▽ More
Unsupervised pre-training has been on the lookout for the virtue of a value function representation referred to as successor features (SFs), which decouples the dynamics of the environment from the rewards. It has a significant impact on the process of task-specific fine-tuning due to the decomposition. However, existing approaches struggle with local optima due to the unified intrinsic reward of exploration and exploitation without considering the linear regression problem and the discriminator supporting a small skill sapce. We propose a novel unsupervised pre-training model with SFs based on a non-monolithic exploration methodology. Our approach pursues the decomposition of exploitation and exploration of an agent built on SFs, which requires separate agents for the respective purpose. The idea will leverage not only the inherent characteristics of SFs such as a quick adaptation to new tasks but also the exploratory and task-agnostic capabilities. Our suggested model is termed Non-Monolithic unsupervised Pre-training with Successor features (NMPS), which improves the performance of the original monolithic exploration method of pre-training with SFs. NMPS outperforms Active Pre-training with Successor Features (APS) in a comparative experiment.
△ Less
Submitted 4 May, 2024;
originally announced May 2024.
-
Resource Allocation of Industry 4.0 Micro-Service Applications across Serverless Fog Federation
Authors:
Razin Farhan Hussain,
Mohsen Amini Salehi
Abstract:
The Industry 4.0 revolution has been made possible via AI-based applications (e.g., for automation and maintenance) deployed on the serverless edge (aka fog) computing platforms at the industrial sites -- where the data is generated. Nevertheless, fulfilling the fault-intolerant and real-time constraints of Industry 4.0 applications on resource-limited fog systems in remote industrial sites (e.g.,…
▽ More
The Industry 4.0 revolution has been made possible via AI-based applications (e.g., for automation and maintenance) deployed on the serverless edge (aka fog) computing platforms at the industrial sites -- where the data is generated. Nevertheless, fulfilling the fault-intolerant and real-time constraints of Industry 4.0 applications on resource-limited fog systems in remote industrial sites (e.g., offshore oil fields) that are uncertain, disaster-prone, and have no cloud access is challenging. It is this challenge that our research aims at addressing. We consider the inelastic nature of the fog systems, software architecture of the industrial applications (micro-service-based versus monolithic), and scarcity of human experts in remote sites. To enable cloud-like elasticity, our approach is to dynamically and seamlessly (i.e., without human intervention) federate nearby fog systems. Then, we develop serverless resource allocation solutions that are cognizant of the applications' software architecture, their latency requirements, and distributed nature of the underlying infrastructure. We propose methods to seamlessly and optimally partition micro-service-based application across the federated fog. Our experimental evaluation express that not only the elasticity is overcome in a serverless manner, but also our developed application partitioning method can serve around 20% more tasks on-time than the existing methods in the literature.
△ Less
Submitted 13 January, 2024;
originally announced January 2024.
-
Deep Learning-Based Approaches for Contactless Fingerprints Segmentation and Extraction
Authors:
M. G. Sarwar Murshed,
Syed Konain Abbas,
Sandip Purnapatra,
Daqing Hou,
Faraz Hussain
Abstract:
Fingerprints are widely recognized as one of the most unique and reliable characteristics of human identity. Most modern fingerprint authentication systems rely on contact-based fingerprints, which require the use of fingerprint scanners or fingerprint sensors for capturing fingerprints during the authentication process. Various types of fingerprint sensors, such as optical, capacitive, and ultras…
▽ More
Fingerprints are widely recognized as one of the most unique and reliable characteristics of human identity. Most modern fingerprint authentication systems rely on contact-based fingerprints, which require the use of fingerprint scanners or fingerprint sensors for capturing fingerprints during the authentication process. Various types of fingerprint sensors, such as optical, capacitive, and ultrasonic sensors, employ distinct techniques to gather and analyze fingerprint data. This dependency on specific hardware or sensors creates a barrier or challenge for the broader adoption of fingerprint based biometric systems. This limitation hinders the widespread adoption of fingerprint authentication in various applications and scenarios. Border control, healthcare systems, educational institutions, financial transactions, and airport security face challenges when fingerprint sensors are not universally available. To mitigate the dependence on additional hardware, the use of contactless fingerprints has emerged as an alternative. Develo** precise fingerprint segmentation methods, accurate fingerprint extraction tools, and reliable fingerprint matchers are crucial for the successful implementation of a robust contactless fingerprint authentication system. This paper focuses on the development of a deep learning-based segmentation tool for contactless fingerprint localization and segmentation. Our system leverages deep learning techniques to achieve high segmentation accuracy and reliable extraction of fingerprints from contactless fingerprint images. In our evaluation, our segmentation method demonstrated an average mean absolute error (MAE) of 30 pixels, an error in angle prediction (EAP) of 5.92 degrees, and a labeling accuracy of 97.46%. These results demonstrate the effectiveness of our novel contactless fingerprint segmentation and extraction tools.
△ Less
Submitted 25 November, 2023;
originally announced November 2023.
-
Spatial Graph Coarsening: Weather and Weekday Prediction with London's Bike-Sharing Service using GNN
Authors:
Yuta Sato,
Pak Hei Lam,
Shruti Gupta,
Fareesah Hussain
Abstract:
This study introduced the use of Graph Neural Network (GNN) for predicting the weather and weekday of a day in London, from the dataset of Santander Cycles bike-sharing system as a graph classification task. The proposed GNN models newly introduced (i) a concatenation operator of graph features with trained node embeddings and (ii) a graph coarsening operator based on geographical contiguity, name…
▽ More
This study introduced the use of Graph Neural Network (GNN) for predicting the weather and weekday of a day in London, from the dataset of Santander Cycles bike-sharing system as a graph classification task. The proposed GNN models newly introduced (i) a concatenation operator of graph features with trained node embeddings and (ii) a graph coarsening operator based on geographical contiguity, namely "Spatial Graph Coarsening". With the node features of land-use characteristics and number of households around the bike stations and graph features of temperatures in the city, our proposed models outperformed the baseline model in cross-entropy loss and accuracy of the validation dataset.
△ Less
Submitted 30 August, 2023;
originally announced August 2023.
-
Enhancing image captioning with depth information using a Transformer-based framework
Authors:
Aya Mahmoud Ahmed,
Mohamed Yousef,
Khaled F. Hussain,
Yousef Bassyouni Mahdy
Abstract:
Captioning images is a challenging scene-understanding task that connects computer vision and natural language processing. While image captioning models have been successful in producing excellent descriptions, the field has primarily focused on generating a single sentence for 2D images. This paper investigates whether integrating depth information with RGB images can enhance the captioning task…
▽ More
Captioning images is a challenging scene-understanding task that connects computer vision and natural language processing. While image captioning models have been successful in producing excellent descriptions, the field has primarily focused on generating a single sentence for 2D images. This paper investigates whether integrating depth information with RGB images can enhance the captioning task and generate better descriptions. For this purpose, we propose a Transformer-based encoder-decoder framework for generating a multi-sentence description of a 3D scene. The RGB image and its corresponding depth map are provided as inputs to our framework, which combines them to produce a better understanding of the input scene. Depth maps could be ground truth or estimated, which makes our framework widely applicable to any RGB captioning dataset. We explored different fusion approaches to fuse RGB and depth images. The experiments are performed on the NYU-v2 dataset and the Stanford image paragraph captioning dataset. During our work with the NYU-v2 dataset, we found inconsistent labeling that prevents the benefit of using depth information to enhance the captioning task. The results were even worse than using RGB images only. As a result, we propose a cleaned version of the NYU-v2 dataset that is more consistent and informative. Our results on both datasets demonstrate that the proposed framework effectively benefits from depth information, whether it is ground truth or estimated, and generates better captions. Code, pre-trained models, and the cleaned version of the NYU-v2 dataset will be made publically available.
△ Less
Submitted 24 July, 2023;
originally announced August 2023.
-
An Autonomous Non-monolithic Agent with Multi-mode Exploration based on Options Framework
Authors:
JaeYoon Kim,
Junyu Xuan,
Christy Liang,
Farookh Hussain
Abstract:
Most exploration research on reinforcement learning (RL) has paid attention to `the way of exploration', which is `how to explore'. The other exploration research, `when to explore', has not been the main focus of RL exploration research. The issue of `when' of a monolithic exploration in the usual RL exploration behaviour binds an exploratory action to an exploitational action of an agent. Recent…
▽ More
Most exploration research on reinforcement learning (RL) has paid attention to `the way of exploration', which is `how to explore'. The other exploration research, `when to explore', has not been the main focus of RL exploration research. The issue of `when' of a monolithic exploration in the usual RL exploration behaviour binds an exploratory action to an exploitational action of an agent. Recently, a non-monolithic exploration research has emerged to examine the mode-switching exploration behaviour of humans and animals. The ultimate purpose of our research is to enable an agent to decide when to explore or exploit autonomously. We describe the initial research of an autonomous multi-mode exploration of non-monolithic behaviour in an options framework. The higher performance of our method is shown against the existing non-monolithic exploration method through comparative experimental results.
△ Less
Submitted 3 May, 2024; v1 submitted 2 May, 2023;
originally announced May 2023.
-
Keystroke Dynamics: Concepts, Techniques, and Applications
Authors:
Rashik Shadman,
Ahmed Anu Wahab,
Michael Manno,
Matthew Lukaszewski,
Daqing Hou,
Faraz Hussain
Abstract:
Reliably identifying and verifying subjects remains integral to computer system security. Various novel authentication techniques such as biometric authentication systems have been devised in recent years. This paper surveys keystroke-based authentication systems and their applications. Keystroke dynamics is a behavioral biometric that is emerging as an important tool for cybersecurity as it promi…
▽ More
Reliably identifying and verifying subjects remains integral to computer system security. Various novel authentication techniques such as biometric authentication systems have been devised in recent years. This paper surveys keystroke-based authentication systems and their applications. Keystroke dynamics is a behavioral biometric that is emerging as an important tool for cybersecurity as it promises to be non-intrusive and cost-effective. Also, no additional hardware is required, making it convenient to deploy. This survey covers novel keystroke datasets, state-of-the-art keystroke authentication algorithms, keystroke authentication on touch screen and mobile devices, and various prominent applications of such techniques beyond authentication. The paper covers all the significant aspects of keystroke dynamics and can be considered as a reference for future researchers in this domain. The paper includes a discussion of the latest keystroke datasets, providing researchers with up-to-date resources for analysis and experimentation. Additionally, we review the state-of-the-art algorithms adopted within this domain, offering insights into the cutting-edge techniques utilized for keystroke analysis. Moreover, our paper explains the diverse applications of keystroke dynamics, particularly focusing on security, verification and identification uses. Beyond these crucial areas, we mention other additional applications where keystroke dynamics can be applied, broadening the scope of understanding regarding its potential impact across various domains.
△ Less
Submitted 23 June, 2024; v1 submitted 8 March, 2023;
originally announced March 2023.
-
Deep Age-Invariant Fingerprint Segmentation System
Authors:
M. G. Sarwar Murshed,
Keivan Bahmani,
Stephanie Schuckers,
Faraz Hussain
Abstract:
Fingerprint-based identification systems achieve higher accuracy when a slap containing multiple fingerprints of a subject is used instead of a single fingerprint. However, segmenting or auto-localizing all fingerprints in a slap image is a challenging task due to the different orientations of fingerprints, noisy backgrounds, and the smaller size of fingertip components. The presence of slap image…
▽ More
Fingerprint-based identification systems achieve higher accuracy when a slap containing multiple fingerprints of a subject is used instead of a single fingerprint. However, segmenting or auto-localizing all fingerprints in a slap image is a challenging task due to the different orientations of fingerprints, noisy backgrounds, and the smaller size of fingertip components. The presence of slap images in a real-world dataset where one or more fingerprints are rotated makes it challenging for a biometric recognition system to localize and label the fingerprints automatically. Improper fingerprint localization and finger labeling errors lead to poor matching performance. In this paper, we introduce a method to generate arbitrary angled bounding boxes using a deep learning-based algorithm that precisely localizes and labels fingerprints from both axis-aligned and over-rotated slap images. We built a fingerprint segmentation model named CRFSEG (Clarkson Rotated Fingerprint segmentation Model) by updating the previously proposed CFSEG model which was based on traditional Faster R-CNN architecture [21]. CRFSEG improves upon the Faster R-CNN algorithm with arbitrarily angled bounding boxes that allow the CRFSEG to perform better in challenging slap images. After training the CRFSEG algorithm on a new dataset containing slap images collected from both adult and children subjects, our results suggest that the CRFSEG model was invariant across different age groups and can handle over-rotated slap images successfully. In the Combined dataset containing both normal and rotated images of adult and children subjects, we achieved a matching accuracy of 97.17%, which outperformed state-of-the-art VeriFinger (94.25%) and NFSEG segmentation systems (80.58%).
△ Less
Submitted 6 March, 2023;
originally announced March 2023.
-
Vorticity dynamics in transcritical liquid jet breakup
Authors:
Jordi Poblador-Ibanez,
William Sirignano,
Fazle Hussain
Abstract:
Contrary to common assumptions, a transcritical domain exists during the early times of liquid hydrocarbon fuel injection at supercritical pressure. A sharp two-phase interface is sustained before substantial heating of the liquid. Thus, two-phase dynamics has been shown to drive the early three-dimensional deformation and atomisation. A recent study of a transcritical liquid jet shows distinct de…
▽ More
Contrary to common assumptions, a transcritical domain exists during the early times of liquid hydrocarbon fuel injection at supercritical pressure. A sharp two-phase interface is sustained before substantial heating of the liquid. Thus, two-phase dynamics has been shown to drive the early three-dimensional deformation and atomisation. A recent study of a transcritical liquid jet shows distinct deformation features caused by interface thermodynamics, low surface tension, and intraphase diffusive mixing. In the present work, the vortex identification method $λ_ρ$, which considers the fluid compressibility, is used to study the vortex dynamics in a cool liquid n-decane transcritical jet surrounded by a hotter oxygen gaseous stream at supercritical pressures. The relationship between vortical structures and the liquid surface evolution is detailed, along with the vorticity generation mechanisms, including variable-density effects. The roles of hairpin and roller vortices in the early deformation of lobes, the layering and tearing of liquid sheets, and the formation of fuel-rich gaseous blobs are analysed. At these high pressures, enhanced intraphase mixing and ambient gas dissolution affect the local liquid structures (i.e., lobes). Thus, liquid breakup differs from classical sub-critical atomisation. Near the interface, liquid density and viscosity drop by up to 10% and 70%, respectively, and the liquid is more easily affected by the vortical motion (e.g., liquid sheets wrap around vortices). Despite the variable density, compressible vorticity generation terms are smaller than the vortex stretching and tilting. Layering traps and aligns the vortices along the streamwise direction while mitigating the generation of new rollers.
△ Less
Submitted 29 January, 2023;
originally announced January 2023.
-
Federated Fog Computing for Remote Industry 4.0 Applications
Authors:
Razin Farhan Hussain,
Mohsen Amini Salehi
Abstract:
Industry 4.0 operates based on IoT devices, sensors, and actuators, transforming the use of computing resources and software solutions in diverse sectors. Various Industry 4.0 latency-sensitive applications function based on machine learning to process sensor data for automation and other industrial activities. Sending sensor data to cloud systems is time consuming and detrimental to the latency c…
▽ More
Industry 4.0 operates based on IoT devices, sensors, and actuators, transforming the use of computing resources and software solutions in diverse sectors. Various Industry 4.0 latency-sensitive applications function based on machine learning to process sensor data for automation and other industrial activities. Sending sensor data to cloud systems is time consuming and detrimental to the latency constraints of the applications, thus, fog computing is often deployed. Executing these applications across heterogeneous fog systems demonstrates stochastic execution time behavior that affects the task completion time. We investigate and model various Industry 4.0 ML-based applications' stochastic executions and analyze them. Industries like oil and gas are prone to disasters requiring coordination of various latency-sensitive activities. Hence, fog computing resources can get oversubscribed due to the surge in the computing demands during a disaster. We propose federating nearby fog computing systems and forming a fog federation to make remote Industry 4.0 sites resilient against the surge in computing demands. We propose a statistical resource allocation method across fog federation for latency-sensitive tasks. Many of the modern Industry 4.0 applications operate based on a workflow of micro-services that are used alone within an industrial site. As such, industry 4.0 solutions need to be aware of applications' architecture, particularly monolithic vs. micro-service. Therefore, we propose a probability-based resource allocation method that can partition micro-service workflows across fog federation to meet their latency constraints. Another concern in Industry 4.0 is the data privacy of the federated fog. As such, we propose a solution based on federated learning to train industrial ML applications across federated fog systems without compromising the data confidentiality.
△ Less
Submitted 1 January, 2023;
originally announced January 2023.
-
Direct numerical simulation of turbulent pipe flow up to $Re_τ=5200$
Authors:
Jie Yao,
Saleh Rezaeiravesh,
Philipp Schlatter,
Fazle Hussain
Abstract:
Well-resolved direct numerical simulations (DNSs) have been performed of the flow in a smooth circular pipe of radius $R$ and axial length $10πR$ at friction Reynolds numbers up to $Re_τ=5200$. Various turbulence statistics are documented and compared with other DNS and experimental data in pipes as well as channels.Small but distinct differences between various datasets are identified. The fricti…
▽ More
Well-resolved direct numerical simulations (DNSs) have been performed of the flow in a smooth circular pipe of radius $R$ and axial length $10πR$ at friction Reynolds numbers up to $Re_τ=5200$. Various turbulence statistics are documented and compared with other DNS and experimental data in pipes as well as channels.Small but distinct differences between various datasets are identified. The friction factor $λ$ overshoots by $2\%$ and undershoots by $0.6\%$ of the Prandtl friction law at low and high $Re$ ranges, respectively. In addition, $λ$ in our results is slightly higher than that in Pirozzoli et al. (J. Fluid. Mech., 926, A28, 2021), but matches well with the experiments in Furuichi et al. (Phys. Fluids, 27, 095108, 2015). The log-law indicator function, which is nearly indistinguishable between the pipe and channel flows up to $y^+=250$, has not yet developed a plateau further away from the wall in the pipes even for the $Re_τ=5200$ cases. The wall shear stress fluctuations and the inner peak of the axial velocity intensity -- which grow monotonically with $Re_τ$ -- are lower in the pipe than in the channel, but the difference decreases with increasing $Re_τ$. While the wall values are slightly lower in channel than pipe flows at the same $Re_τ$, the inner peaks of the pressure fluctuations show negligible differences between them. The Reynolds number scaling of all these quantities agrees with both the logarithmic and defect power laws if the coefficients are properly chosen. The one-dimensional spectrum of the axial velocity fluctuation exhibits a $k^{-1}$ dependence at an intermediate distance from the wall -- as also seen in the channel flow. In summary, this high-fidelity data enable us to provide better insights into the flow physics in the pipes and the similarity/difference among different types of wall turbulence.
△ Less
Submitted 13 July, 2022;
originally announced July 2022.
-
Study of Generalized Lemaître-Tolman-Bondi Spacetime in Palatini $f(R)$ Gravity
Authors:
M. Z. Bhatti,
Z. Yousaf,
F. Hussain
Abstract:
This paper aims to analyze the generalization of Lemaître-Tolman-Bondi (LTB) spacetime for dissipative dust under the influence of Palatini $f(R)$ gravity. We explore the modified field equations, kinematical variables, and mass function in this scenario. We construct Bianchi identities using conservation and differential equations for shear, expansion, and curvature scalar in the background of Pa…
▽ More
This paper aims to analyze the generalization of Lemaître-Tolman-Bondi (LTB) spacetime for dissipative dust under the influence of Palatini $f(R)$ gravity. We explore the modified field equations, kinematical variables, and mass function in this scenario. We construct Bianchi identities using conservation and differential equations for shear, expansion, and curvature scalar in the background of Palatini $f(R)$ gravity. We calculated the scalar functions coming from the orthogonal decomposition of the Riemann tensor in this framework. These scalar functions known as structure scalars have been explored for LTB spacetime using modified field equations. The symmetric properties of LTB spacetime have been discussed using two subcases. We found that generalized LTB spacetime has properties comparable with LTB and obtained structure scalars in both cases which have a similar dependence on a material profile even in Palatini gravity.
△ Less
Submitted 20 December, 2021;
originally announced December 2021.
-
CDRec: Cayley-Dickson Recommender
Authors:
Anchen Li,
Bo Yang,
Huan Huo,
Farookh Hussain
Abstract:
In this paper, we propose a recommendation framework named Cayley-Dickson Recommender. We introduce Cayley-Dickson construction which uses a recursive process to define hypercomplex algebras and their mathematical operations. We also design a graph convolution operator to learn representations in the hypercomplex space. To the best of our knowledge, it is the first time that Cayley-Dickson constru…
▽ More
In this paper, we propose a recommendation framework named Cayley-Dickson Recommender. We introduce Cayley-Dickson construction which uses a recursive process to define hypercomplex algebras and their mathematical operations. We also design a graph convolution operator to learn representations in the hypercomplex space. To the best of our knowledge, it is the first time that Cayley-Dickson construction and graph convolution techniques have been used in hypercomplex recommendation. Compared with the state-of-the-art recommendation methods, our method achieves superior performance on real-world datasets.
△ Less
Submitted 14 January, 2022; v1 submitted 16 December, 2021;
originally announced December 2021.
-
Deep Slap Fingerprint Segmentation for Juveniles and Adults
Authors:
M. G. Sarwar Murshed,
Robert Kline,
Keivan Bahmani,
Faraz Hussain,
Stephanie Schuckers
Abstract:
Many fingerprint recognition systems capture four fingerprints in one image. In such systems, the fingerprint processing pipeline must first segment each four-fingerprint slap into individual fingerprints. Note that most of the current fingerprint segmentation algorithms have been designed and evaluated using only adult fingerprint datasets. In this work, we have developed a human-annotated in-hou…
▽ More
Many fingerprint recognition systems capture four fingerprints in one image. In such systems, the fingerprint processing pipeline must first segment each four-fingerprint slap into individual fingerprints. Note that most of the current fingerprint segmentation algorithms have been designed and evaluated using only adult fingerprint datasets. In this work, we have developed a human-annotated in-house dataset of 15790 slaps of which 9084 are adult samples and 6706 are samples drawn from children from ages 4 to 12. Subsequently, the dataset is used to evaluate the matching performance of the NFSEG, a slap fingerprint segmentation system developed by NIST, on slaps from adults and juvenile subjects. Our results reveal the lower performance of NFSEG on slaps from juvenile subjects. Finally, we utilized our novel dataset to develop the Mask-RCNN based Clarkson Fingerprint Segmentation (CFSEG). Our matching results using the Verifinger fingerprint matcher indicate that CFSEG outperforms NFSEG for both adults and juvenile slaps. The CFSEG model is publicly available at \url{https://github.com/keivanB/Clarkson_Finger_Segment}
△ Less
Submitted 3 May, 2022; v1 submitted 6 October, 2021;
originally announced October 2021.
-
Strong Scaling of OpenACC enabled Nek5000 on several GPU based HPC systems
Authors:
Jonathan Vincent,
**g Gong,
Martin Karp,
Adam Peplinski,
Niclas Jansson,
Artur Podobas,
Andreas Jocksch,
Jie Yao,
Fazle Hussain,
Stefano Markidis,
Matts Karlsson,
Dirk Pleiter,
Erwin Laure,
Philipp Schlatter
Abstract:
We present new results on the strong parallel scaling for the OpenACC-accelerated implementation of the high-order spectral element fluid dynamics solver Nek5000. The test case considered consists of a direct numerical simulation of fully-developed turbulent flow in a straight pipe, at two different Reynolds numbers $Re_τ=360$ and $Re_τ=550$, based on friction velocity and pipe radius. The strong…
▽ More
We present new results on the strong parallel scaling for the OpenACC-accelerated implementation of the high-order spectral element fluid dynamics solver Nek5000. The test case considered consists of a direct numerical simulation of fully-developed turbulent flow in a straight pipe, at two different Reynolds numbers $Re_τ=360$ and $Re_τ=550$, based on friction velocity and pipe radius. The strong scaling is tested on several GPU-enabled HPC systems, including the Swiss Piz Daint system, TACC's Longhorn, Jülich's JUWELS Booster, and Berzelius in Sweden. The performance results show that speed-up between 3-5 can be achieved using the GPU accelerated version compared with the CPU version on these different systems. The run-time for 20 timesteps reduces from 43.5 to 13.2 seconds with increasing the number of GPUs from 64 to 512 for $Re_τ=550$ case on JUWELS Booster system. This illustrates the GPU accelerated version the potential for high throughput. At the same time, the strong scaling limit is significantly larger for GPUs, at about $2000-5000$ elements per rank; compared to about $50-100$ for a CPU-rank.
△ Less
Submitted 4 November, 2021; v1 submitted 8 September, 2021;
originally announced September 2021.
-
Pulmonary Disease Classification Using Globally Correlated Maximum Likelihood: an Auxiliary Attention mechanism for Convolutional Neural Networks
Authors:
Edward Verenich,
Tobias Martin,
Alvaro Velasquez,
Nazar Khan,
Faraz Hussain
Abstract:
Convolutional neural networks (CNN) are now being widely used for classifying and detecting pulmonary abnormalities in chest radiographs. Two complementary generalization properties of CNNs, translation invariance and equivariance, are particularly useful in detecting manifested abnormalities associated with pulmonary disease, regardless of their spatial locations within the image. However, these…
▽ More
Convolutional neural networks (CNN) are now being widely used for classifying and detecting pulmonary abnormalities in chest radiographs. Two complementary generalization properties of CNNs, translation invariance and equivariance, are particularly useful in detecting manifested abnormalities associated with pulmonary disease, regardless of their spatial locations within the image. However, these properties also come with the loss of exact spatial information and global relative positions of abnormalities detected in local regions. Global relative positions of such abnormalities may help distinguish similar conditions, such as COVID-19 and viral pneumonia. In such instances, a global attention mechanism is needed, which CNNs do not support in their traditional architectures that aim for generalization afforded by translation invariance and equivariance. Vision Transformers provide a global attention mechanism, but lack translation invariance and equivariance, requiring significantly more training data samples to match generalization of CNNs. To address the loss of spatial information and global relations between features, while preserving the inductive biases of CNNs, we present a novel technique that serves as an auxiliary attention mechanism to existing CNN architectures, in order to extract global correlations between salient features.
△ Less
Submitted 1 September, 2021;
originally announced September 2021.
-
Key Lessons Learned from Working During Covid-19 on a Project in the World's Biggest Refugee Camp
Authors:
Faheem Hussain,
Suzana Brown
Abstract:
Using a case study structure, this research-in-progress paper elaborates the struggles of working on a humanitarian project during the Covid-19 period. The authors identify six specific challenges and propose innovations to address each of these challenges. The challenges are the following: supply chain, design of solutions, human resource development, connectivity, and user data collection. This…
▽ More
Using a case study structure, this research-in-progress paper elaborates the struggles of working on a humanitarian project during the Covid-19 period. The authors identify six specific challenges and propose innovations to address each of these challenges. The challenges are the following: supply chain, design of solutions, human resource development, connectivity, and user data collection. This unprecedented situation has been a testing ground for new innovative solutions for work in conflict zones.
△ Less
Submitted 22 August, 2021;
originally announced August 2021.
-
Transcending Old Boundaries: Digital Afterlife in the Age of COVID-19
Authors:
Mashiat Mostafa,
Faheem Hussain
Abstract:
The primary objective of our exploratory research is to contribute to the ongoing conversation on Digital Afterlife from the lenses of Global South during the COVID-19 period. Digital Afterlife is fast becoming a challenge for our increasingly connected society. Moreover, the situation got worse with the COVID-19 pandemic. The on-going research is to address the disparity in the Global South, spec…
▽ More
The primary objective of our exploratory research is to contribute to the ongoing conversation on Digital Afterlife from the lenses of Global South during the COVID-19 period. Digital Afterlife is fast becoming a challenge for our increasingly connected society. Moreover, the situation got worse with the COVID-19 pandemic. The on-going research is to address the disparity in the Global South, specifically in countries like Indonesia, India and The Philippines compared to the Global North for Digital Afterlife services such as policies and digital mourning services. By addressing the research question, 'What services and policy frameworks are available for Digital Afterlife in the Global South during COVID-19?', we aim to find the multitude of ways people in the Global South are managing their digital footprints. Our preliminary findings show that some considerable research and death related digital services and innovation have taken place during the pandemic. However, overwhelming majority of these works are western-centric and mainly dealing with post-mortem personal asset management. Cultural nuances, socio-economic perspectives, religion, political climate, regional infrastructures are mostly sidelined. We found significant disparity in Digital Afterlife product and service designs, which got worse during the global pandemic. Our goal is to collect further in-depth data within the three big ICT powerhouses of global south (Indonesia, India and The Philippines), identify the challenges as well as the innovations around Digital Afterlife.We envision proposing a set of recommendations, based on our findings, for develo** a more inclusive and equitable digital space in this pandemic-stricken world.
△ Less
Submitted 23 August, 2021;
originally announced August 2021.
-
Hierarchical Reinforcement Learning with Optimal Level Synchronization based on a Deep Generative Model
Authors:
JaeYoon Kim,
Junyu Xuan,
Christy Liang,
Farookh Hussain
Abstract:
The high-dimensional or sparse reward task of a reinforcement learning (RL) environment requires a superior potential controller such as hierarchical reinforcement learning (HRL) rather than an atomic RL because it absorbs the complexity of commands to achieve the purpose of the task in its hierarchical structure. One of the HRL issues is how to train each level policy with the optimal data collec…
▽ More
The high-dimensional or sparse reward task of a reinforcement learning (RL) environment requires a superior potential controller such as hierarchical reinforcement learning (HRL) rather than an atomic RL because it absorbs the complexity of commands to achieve the purpose of the task in its hierarchical structure. One of the HRL issues is how to train each level policy with the optimal data collection from its experience. That is to say, how to synchronize adjacent level policies optimally. Our research finds that a HRL model through the off-policy correction technique of HRL, which trains a higher-level policy with the goal of reflecting a lower-level policy which is newly trained using the off-policy method, takes the critical role of synchronizing both level policies at all times while they are being trained. We propose a novel HRL model supporting the optimal level synchronization using the off-policy correction technique with a deep generative model. This uses the advantage of the inverse operation of a flow-based deep generative model (FDGM) to achieve the goal corresponding to the current state of the lower-level policy. The proposed model also considers the freedom of the goal dimension between HRL policies which makes it the generalized inverse model of the model-free RL in HRL with the optimal synchronization method. The comparative experiment results show the performance of our proposed model.
△ Less
Submitted 17 July, 2021;
originally announced July 2021.
-
Composite active drag control in turbulent channel flows
Authors:
Jie Yao,
Xi Chen,
Fazle Hussain
Abstract:
A composite drag control (CDC) combining the opposition (OC) and spanwise opposed wall-jet forcing (SOJF) methods is studied in a turbulent channel flow via direct numerical simulation of the incompressible Navier-Stokes equations. A maximum drag reduction of about 33% is obtained for CDC -- much higher than that produced by either individual method (namely, 19% for SOJF and 23% for OC). Due to th…
▽ More
A composite drag control (CDC) combining the opposition (OC) and spanwise opposed wall-jet forcing (SOJF) methods is studied in a turbulent channel flow via direct numerical simulation of the incompressible Navier-Stokes equations. A maximum drag reduction of about 33% is obtained for CDC -- much higher than that produced by either individual method (namely, 19% for SOJF and 23% for OC). Due to the small power input required for both OC and SOJF methods, a significant net power saving (about 32%) is achieved via CDC. Flow analysis shows that CDC can take advantage of both OC and SOJF methods to better suppress drag producing, near-wall turbulent structures -- vortices and streaks. In particular, due to the presence of the large-scale coherent swirls generated by SOJF, it is more effective than OC in suppressing the random turbulence. Moreover, due to the OC's role in suppressing random small-scale turbulence, CDC requires weaker large-scale coherent swirls than those using SOJF only -- hence decreasing the drag contribution associated with large-scale swirls. In summary, our results suggest prospects of employing composite control strategy for effective skin friction drag reduction, particularly at very high Reynolds numbers.
△ Less
Submitted 3 May, 2021;
originally announced May 2021.
-
Explainable Artificial Intelligence (XAI): An Engineering Perspective
Authors:
F. Hussain,
R. Hussain,
E. Hossain
Abstract:
The remarkable advancements in Deep Learning (DL) algorithms have fueled enthusiasm for using Artificial Intelligence (AI) technologies in almost every domain; however, the opaqueness of these algorithms put a question mark on their applications in safety-critical systems. In this regard, the `explainability' dimension is not only essential to both explain the inner workings of black-box algorithm…
▽ More
The remarkable advancements in Deep Learning (DL) algorithms have fueled enthusiasm for using Artificial Intelligence (AI) technologies in almost every domain; however, the opaqueness of these algorithms put a question mark on their applications in safety-critical systems. In this regard, the `explainability' dimension is not only essential to both explain the inner workings of black-box algorithms, but it also adds accountability and transparency dimensions that are of prime importance for regulators, consumers, and service providers. eXplainable Artificial Intelligence (XAI) is the set of techniques and methods to convert the so-called black-box AI algorithms to white-box algorithms, where the results achieved by these algorithms and the variables, parameters, and steps taken by the algorithm to reach the obtained results, are transparent and explainable. To complement the existing literature on XAI, in this paper, we take an `engineering' approach to illustrate the concepts of XAI. We discuss the stakeholders in XAI and describe the mathematical contours of XAI from engineering perspective. Then we take the autonomous car as a use-case and discuss the applications of XAI for its different components such as object detection, perception, control, action decision, and so on. This work is an exploratory study to identify new avenues of research in the field of XAI.
△ Less
Submitted 10 January, 2021;
originally announced January 2021.
-
A Threat Modelling Approach to Analyze and Mitigate Botnet Attacks in Smart Home Use Case
Authors:
Syed Ghazanfar Abbas,
Shahzaib Zahid,
Faisal Hussain,
Ghalib A. Shah,
Muhammad Husnain
Abstract:
Despite the surging development and utilization of IoT devices, the security of IoT devices is still in infancy. The security pitfalls of IoT devices have made it easy for hackers to take over IoT devices and use them for malicious activities like botnet attacks. With the rampant emergence of IoT devices, botnet attacks are surging. The botnet attacks are not only catastrophic for IoT device users…
▽ More
Despite the surging development and utilization of IoT devices, the security of IoT devices is still in infancy. The security pitfalls of IoT devices have made it easy for hackers to take over IoT devices and use them for malicious activities like botnet attacks. With the rampant emergence of IoT devices, botnet attacks are surging. The botnet attacks are not only catastrophic for IoT device users but also for the rest of the world. Therefore, there is a crucial need to identify and mitigate the possible threats in IoT devices during the design phase. Threat modelling is a technique that is used to identify the threats in the earlier stages of the system design activity. In this paper, we propose a threat modelling approach to analyze and mitigate the botnet attacks in an IoT smart home use case. The proposed methodology identifies the development-level and application-level threats in smart home use case using STRIDE and VAST threat modelling methods. Moreover, we reticulate the identified threats with botnet attacks. Finally, we propose the mitigation techniques for all identified threats including the botnet threats.
△ Less
Submitted 6 January, 2021;
originally announced January 2021.
-
Analyzing the Performance of Smart Industry 4.0 Applications on Cloud Computing Systems
Authors:
Razin Farhan Hussain,
Alireza Pakravan,
Mohsen Amini Salehi
Abstract:
Cloud-based Deep Neural Network (DNN) applications that make latency-sensitive inference are becoming an indispensable part of Industry 4.0. Due to the multi-tenancy and resource heterogeneity, both inherent to the cloud computing environments, the inference time of DNN-based applications are stochastic. Such stochasticity, if not captured, can potentially lead to low Quality of Service (QoS) or e…
▽ More
Cloud-based Deep Neural Network (DNN) applications that make latency-sensitive inference are becoming an indispensable part of Industry 4.0. Due to the multi-tenancy and resource heterogeneity, both inherent to the cloud computing environments, the inference time of DNN-based applications are stochastic. Such stochasticity, if not captured, can potentially lead to low Quality of Service (QoS) or even a disaster in critical sectors, such as Oil and Gas industry. To make Industry 4.0 robust, solution architects and researchers need to understand the behavior of DNN-based applications and capture the stochasticity exists in their inference times. Accordingly, in this study, we provide a descriptive analysis of the inference time from two perspectives. First, we perform an application-centric analysis and statistically model the execution time of four categorically different DNN applications on both Amazon and Chameleon clouds. Second, we take a resource-centric approach and analyze a rate-based metric in form of Million Instruction Per Second (MIPS) for heterogeneous machines in the cloud. This non-parametric modeling, achieved via Jackknife and Bootstrap re-sampling methods, provides the confidence interval of MIPS for heterogeneous cloud machines. The findings of this research can be helpful for researchers and cloud solution architects to develop solutions that are robust against the stochastic nature of the inference time of DNN applications in the cloud and can offer a higher QoS to their users and avoid unintended outcomes.
△ Less
Submitted 10 December, 2020;
originally announced December 2020.
-
IoT DoS and DDoS Attack Detection using ResNet
Authors:
Faisal Hussain,
Syed Ghazanfar Abbas,
Muhammad Husnain,
Ubaid Ullah Fayyaz,
Farrukh Shahzad,
Ghalib A. Shah
Abstract:
The network attacks are increasing both in frequency and intensity with the rapid growth of internet of things (IoT) devices. Recently, denial of service (DoS) and distributed denial of service (DDoS) attacks are reported as the most frequent attacks in IoT networks. The traditional security solutions like firewalls, intrusion detection systems, etc., are unable to detect the complex DoS and DDoS…
▽ More
The network attacks are increasing both in frequency and intensity with the rapid growth of internet of things (IoT) devices. Recently, denial of service (DoS) and distributed denial of service (DDoS) attacks are reported as the most frequent attacks in IoT networks. The traditional security solutions like firewalls, intrusion detection systems, etc., are unable to detect the complex DoS and DDoS attacks since most of them filter the normal and attack traffic based upon the static predefined rules. However, these solutions can become reliable and effective when integrated with artificial intelligence (AI) based techniques. During the last few years, deep learning models especially convolutional neural networks achieved high significance due to their outstanding performance in the image processing field. The potential of these convolutional neural network (CNN) models can be used to efficiently detect the complex DoS and DDoS by converting the network traffic dataset into images. Therefore, in this work, we proposed a methodology to convert the network traffic data into image form and trained a state-of-the-art CNN model, i.e., ResNet over the converted data. The proposed methodology accomplished 99.99\% accuracy for detecting the DoS and DDoS in case of binary classification. Furthermore, the proposed methodology achieved 87\% average precision for recognizing eleven types of DoS and DDoS attack patterns which is 9\% higher as compared to the state-of-the-art.
△ Less
Submitted 2 December, 2020;
originally announced December 2020.
-
Towards a Universal Features Set for IoT Botnet Attacks Detection
Authors:
Faisal Hussain,
Syed Ghazanfar Abbas,
Ubaid U. Fayyaz,
Ghalib A. Shah,
Abdullah Toqeer,
Ahmad Ali
Abstract:
The security pitfalls of IoT devices make it easy for the attackers to exploit the IoT devices and make them a part of a botnet. Once hundreds of thousands of IoT devices are compromised and become the part of a botnet, the attackers use this botnet to launch the large and complex distributed denial of service (DDoS) attacks which take down the target websites or services and make them unable to r…
▽ More
The security pitfalls of IoT devices make it easy for the attackers to exploit the IoT devices and make them a part of a botnet. Once hundreds of thousands of IoT devices are compromised and become the part of a botnet, the attackers use this botnet to launch the large and complex distributed denial of service (DDoS) attacks which take down the target websites or services and make them unable to respond the legitimate users. So far, many botnet detection techniques have been proposed but their performance is limited to a specific dataset on which they are trained. This is because the features used to train a machine learning model on one botnet dataset, do not perform well on other datasets due to the diversity of attack patterns. Therefore, in this paper, we propose a universal features set to better detect the botnet attacks regardless of the underlying dataset. The proposed features set manifest preeminent results for detecting the botnet attacks when tested the trained machine learning models over three different botnet attack datasets.
△ Less
Submitted 1 December, 2020;
originally announced December 2020.
-
Measuring the Change in European and US COVID-19 Death Rates
Authors:
Zeina S. Khan,
Frank Van Bussel,
Fazle Hussain
Abstract:
By fitting a compartment ODE model for Covid-19 propagation to cumulative case and death data for US states and European countries, we find that the case mortality rate seems to have decreased by at least 80% in most of the US and at least 90% in most of Europe. These are much larger and faster changes than reported in empirical studies, such as the 18% decrease in mortality found for the New York…
▽ More
By fitting a compartment ODE model for Covid-19 propagation to cumulative case and death data for US states and European countries, we find that the case mortality rate seems to have decreased by at least 80% in most of the US and at least 90% in most of Europe. These are much larger and faster changes than reported in empirical studies, such as the 18% decrease in mortality found for the New York City hospital system from March to August 2020 (Horwitz et al, Trends in Covid-19 risk-adjusted mortality rates, J. Hosp. Med. 2020). Our reported decreases surprisingly do not have strong correlations to other model parameters (such as contact rate) or other standard state/national metrics such as population density, GDP, and median age. Almost all the decreases occurred between mid-April and mid-June, which unexpectedly corresponds to the time when many state and national lockdowns were released resulting in surges of new cases. Several plausible causes for this drop are examined, such as improvements in treatment, face mask wearing, a new virus strain, and potentially changing demographics of infected patients, but none are overwhelmingly convincing given the currently available evidence.
△ Less
Submitted 6 January, 2021; v1 submitted 10 November, 2020;
originally announced November 2020.
-
Objective quantification of Particle Pair Diffusion in Homogeneous Isotropic Turbulence
Authors:
Nadeem A. Malik,
Fazle Hussain
Abstract:
Turbulence consists of interacting flow structures covering a wide range of length and time scales. A long-standing question looms over pair diffusion of particles in close proximity i.e. particle pair diffusion at small separations: what range of turbulence length scales governs pair diffusion? Here, we attempt to answer this question by addressing pair diffusion by both fine scales and larger sc…
▽ More
Turbulence consists of interacting flow structures covering a wide range of length and time scales. A long-standing question looms over pair diffusion of particles in close proximity i.e. particle pair diffusion at small separations: what range of turbulence length scales governs pair diffusion? Here, we attempt to answer this question by addressing pair diffusion by both fine scales and larger scale coherent structures in which the fine scales are embedded - we unavoidably encounter a combination of both local and non-local interactions associated with the small and large length scales. The local structures possess length scales of the same order of magnitude as the pair separation $l$, and they induce strong relative motion between the particle pair. However, the non-local structures, possessing length scales much larger than $l$, also induce (via Biot-Savart) significant relative motion, an effect ignored in prior studies (based on Richardson-Obukhov R-O theory). This fundamentally changes the interpretation of the pair diffusion process, giving the pair diffusivity $K$ scaling as $K\sim l^{1.556}$ -- agreeing within $1\%$ of data. The `R-O constant' $g_l$ is shown to be not a constant, although widely assumed to be a constant. However, new constants (representing pair diffusivity $G_K$ and pair separation $G_l$) are identified, which we show to asymptote to $G_K\approx 0.73$ and $G_l\sim 0.01$ at high Reynolds numbers. As an application, we show that the radius of a cloud of droplets in a spray is smaller by an order of magnitude as compared to R-O theory.
△ Less
Submitted 6 August, 2020;
originally announced August 2020.
-
Improving Explainability of Image Classification in Scenarios with Class Overlap: Application to COVID-19 and Pneumonia
Authors:
Edward Verenich,
Alvaro Velasquez,
Nazar Khan,
Faraz Hussain
Abstract:
Trust in predictions made by machine learning models is increased if the model generalizes well on previously unseen samples and when inference is accompanied by cogent explanations of the reasoning behind predictions. In the image classification domain, generalization can be assessed through accuracy, sensitivity, and specificity. Explainability can be assessed by how well the model localizes the…
▽ More
Trust in predictions made by machine learning models is increased if the model generalizes well on previously unseen samples and when inference is accompanied by cogent explanations of the reasoning behind predictions. In the image classification domain, generalization can be assessed through accuracy, sensitivity, and specificity. Explainability can be assessed by how well the model localizes the object of interest within an image. However, both generalization and explainability through localization are degraded in scenarios with significant overlap between classes. We propose a method based on binary expert networks that enhances the explainability of image classifications through better localization by mitigating the model uncertainty induced by class overlap. Our technique performs discriminative localization on images that contain features with significant class overlap, without explicitly training for localization. Our method is particularly promising in real-world class overlap scenarios, such as COVID-19 and pneumonia, where expertly labeled data for localization is not readily available. This can be useful for early, rapid, and trustworthy screening for COVID-19.
△ Less
Submitted 15 August, 2020; v1 submitted 6 August, 2020;
originally announced August 2020.
-
US faces endemic Covid-19 infections and deaths; ways to stop the pandemic
Authors:
Fazle Hussain,
Zeina S. Khan,
Frank Van Bussel
Abstract:
A new epidemic model for Covid-19 has been constructed and simulated for eight US states. The coefficients for this model, based on seven coupled differential equations, are carefully evaluated against recorded data on cases and deaths. These projections reveal that Covid-19 will become endemic, spreading for more than two years. If stay-at-home orders are relaxed, most states may experience a sec…
▽ More
A new epidemic model for Covid-19 has been constructed and simulated for eight US states. The coefficients for this model, based on seven coupled differential equations, are carefully evaluated against recorded data on cases and deaths. These projections reveal that Covid-19 will become endemic, spreading for more than two years. If stay-at-home orders are relaxed, most states may experience a secondary peak in 2021. The number of Covid-19 deaths could have been significantly lower in most states that opened up, if lockdowns had been maintained. Additionally, our model predicts that decreasing contact rate by 10%, or increasing testing by approximately 15%, or doubling lockdown compliance (from the current $\sim$ 15%) will eradicate infections in Texas within a year. Applied to the entire US, the predictions based on the current situation indicate about 11 million total infections (including undetected), 8 million cumulative confirmed cases, and 630,000 cumulative deaths by November 1, 2020.
△ Less
Submitted 21 July, 2020; v1 submitted 15 July, 2020;
originally announced July 2020.
-
An Efficient Data Imputation Technique for Human Activity Recognition
Authors:
Ivan Miguel Pires,
Faisal Hussain,
Nuno M. Garcia,
Eftim Zdravevski
Abstract:
The tremendous applications of human activity recognition are surging its span from health monitoring systems to virtual reality applications. Thus, the automatic recognition of daily life activities has become significant for numerous applications. In recent years, many datasets have been proposed to train the machine learning models for efficient monitoring and recognition of human daily living…
▽ More
The tremendous applications of human activity recognition are surging its span from health monitoring systems to virtual reality applications. Thus, the automatic recognition of daily life activities has become significant for numerous applications. In recent years, many datasets have been proposed to train the machine learning models for efficient monitoring and recognition of human daily living activities. However, the performance of machine learning models in activity recognition is crucially affected when there are incomplete activities in a dataset, i.e., having missing samples in dataset captures. Therefore, in this work, we propose a methodology for extrapolating the missing samples of a dataset to better recognize the human daily living activities. The proposed method efficiently pre-processes the data captures and utilizes the k-Nearest Neighbors (KNN) imputation technique to extrapolate the missing samples in dataset captures. The proposed methodology elegantly extrapolated a similar pattern of activities as they were in the real dataset.
△ Less
Submitted 8 July, 2020;
originally announced July 2020.
-
A predictive model for Covid-19 spread applied to eight US states
Authors:
Zeina S. Khan,
Frank Van Bussel,
Fazle Hussain
Abstract:
A compartmental epidemic model is proposed to predict the Covid-19 virus spread. It considers: both detected and undetected infected populations, medical quarantine and social sequestration, release from sequestration, plus possible reinfection. The coefficients in the model are evaluated by fitting to empirical data for eight US states: Arizona, California, Florida, Illinois, Louisiana, New Jerse…
▽ More
A compartmental epidemic model is proposed to predict the Covid-19 virus spread. It considers: both detected and undetected infected populations, medical quarantine and social sequestration, release from sequestration, plus possible reinfection. The coefficients in the model are evaluated by fitting to empirical data for eight US states: Arizona, California, Florida, Illinois, Louisiana, New Jersey, New York State, and Texas. Together these states make up 43% of the US population; some of these states appear to have handled their initial outbreaks well, while others appear to be emerging hotspots. The evolution of Covid-19 is fairly similar among the states: variations in contact and recovery rates remain below 5%; however, not surprisingly, variations are larger in death rate, reinfection rate, stay-at-home effect, and release rate from sequestration. The results reveal that outbreaks may have been well underway in several states before first detected and that California might have seen more than one influx of the pandemic. Our projections based on the current situation indicate that Covid-19 will become endemic, spreading for more than two years. Should states fully relax stay-at-home orders, most states may experience a secondary peak in 2021. If lockdowns had been kept in place, the number of Covid-19 deaths so far could have been significantly lower in most states that opened up. Additionally, our model predicts that decreasing contact rate by 10%, or increasing testing by approximately 15%, or doubling lockdown compliance (from the current $\sim$ 15% to $\sim$ 30%) will eradicate infections in the state of Texas within a year. Extending our fits for all of the US states, we predict about 11 million total infections (including undetected), 8 million cumulative confirmed cases, and 630,000 cumulative deaths by November 1, 2020.
△ Less
Submitted 9 July, 2020; v1 submitted 10 June, 2020;
originally announced June 2020.
-
Separation scaling for viscous vortex reconnection
Authors:
Jie Yao,
Fazle Hussain
Abstract:
Reconnection plays a significant role in the dynamics of plasmas, polymers and macromolecules, as well as in numerous laminar and turbulent flow phenomena in both classical and quantum fluids. Extensive studies in quantum vortex reconnection show that the minimum separation distance δ between interacting vortices follows a 1/2 scaling. Due to the complex nature of the dynamics (e.g., the formation…
▽ More
Reconnection plays a significant role in the dynamics of plasmas, polymers and macromolecules, as well as in numerous laminar and turbulent flow phenomena in both classical and quantum fluids. Extensive studies in quantum vortex reconnection show that the minimum separation distance δ between interacting vortices follows a 1/2 scaling. Due to the complex nature of the dynamics (e.g., the formation of bridges and threads as well as successive reconnections and avalanche), such scaling has never been reported for (classical) viscous vortex reconnection. Using the direct numerical simulation of the Navier-Stokes equations, we study viscous reconnection of slender vortices, whose core size is much smaller than the radius of the vortex curvature. For separations that are large compared to the vortex core size, we discover that δ(t) between the two interacting viscous vortices surprisingly also follows the 1/2 power scaling for both pre- and post-reconnection events. The prefactors in this 1/2-power law are found to depend not only on the initial configuration but also on the vortex Reynolds number (or viscosity). Our finding in the viscous reconnection, complementing numerous works on quantum vortex reconnection, suggests that there is indeed a universal route for reconnection -- an essential result for understanding the various facets of the viscous vortex reconnection phenomena and their potential modeling, as well as possibly explaining turbulence cascade physics.
△ Less
Submitted 10 June, 2020;
originally announced June 2020.
-
IoT-Flock: An Open-source Framework for IoT Traffic Generation
Authors:
Syed Ghazanfar,
Faisal Hussain,
Atiq Ur Rehman,
Ubaid U. Fayyaz,
Farrukh Shahzad,
Ghalib A. Shah
Abstract:
Network traffic generation is one of the primary techniques that is used to design and analyze the performance of network security systems. However, due to the diversity of IoT networks in terms of devices, applications and protocols, the traditional network traffic generator tools are unable to generate the IoT specific protocols traffic. Hence, the traditional traffic generator tools cannot be u…
▽ More
Network traffic generation is one of the primary techniques that is used to design and analyze the performance of network security systems. However, due to the diversity of IoT networks in terms of devices, applications and protocols, the traditional network traffic generator tools are unable to generate the IoT specific protocols traffic. Hence, the traditional traffic generator tools cannot be used for designing and testing the performance of IoT-specific security solutions. In order to design an IoT-based traffic generation framework, two main challenges include IoT device modelling and generating the IoT normal and attack traffic simultaneously. Therefore, in this work, we propose an open-source framework for IoT traffic generation which supports the two widely used IoT application layer protocols, i.e., MQTT and CoAP. The proposed framework allows a user to create an IoT use case, add customized IoT devices into it and generate normal and malicious IoT traffic over a real-time network. Furthermore, we set up a real-time IoT smart home use case to manifest the applicability of the proposed framework for develo** the security solutions for IoT smart home by emulating the real world IoT devices. The experimental results demonstrate that the proposed framework can be effectively used to develop better security solutions for IoT networks without physically deploying the real-time use case.
△ Less
Submitted 2 April, 2020;
originally announced April 2020.
-
The Utility of Feature Reuse: Transfer Learning in Data-Starved Regimes
Authors:
Rashik Shadman,
M. G. Sarwar Murshed,
Edward Verenich,
Alvaro Velasquez,
Faraz Hussain
Abstract:
The use of transfer learning with deep neural networks has increasingly become widespread for deploying well-tested computer vision systems to newer domains, especially those with limited datasets. We describe a transfer learning use case for a domain with a data-starved regime, having fewer than 100 labeled target samples. We evaluate the effectiveness of convolutional feature extraction and fine…
▽ More
The use of transfer learning with deep neural networks has increasingly become widespread for deploying well-tested computer vision systems to newer domains, especially those with limited datasets. We describe a transfer learning use case for a domain with a data-starved regime, having fewer than 100 labeled target samples. We evaluate the effectiveness of convolutional feature extraction and fine-tuning of overparameterized models with respect to the size of target training data, as well as their generalization performance on data with covariate shift, or out-of-distribution (OOD) data. Our experiments demonstrate that both overparameterization and feature reuse contribute to the successful application of transfer learning in training image classifiers in data-starved regimes. We provide visual explanations to support our findings and conclude that transfer learning enhances the performance of CNN architectures in data-starved regimes.
△ Less
Submitted 28 December, 2023; v1 submitted 29 February, 2020;
originally announced March 2020.
-
Hazard Detection in Supermarkets using Deep Learning on the Edge
Authors:
M. G. Sarwar Murshed,
Edward Verenich,
James J. Carroll,
Nazar Khan,
Faraz Hussain
Abstract:
Supermarkets need to ensure clean and safe environments for both shoppers and employees. Slips, trips, and falls can result in injuries that have a physical as well as financial cost. Timely detection of hazardous conditions such as spilled liquids or fallen items on supermarket floors can reduce the chances of serious injuries. This paper presents EdgeLite, a novel, lightweight deep learning mode…
▽ More
Supermarkets need to ensure clean and safe environments for both shoppers and employees. Slips, trips, and falls can result in injuries that have a physical as well as financial cost. Timely detection of hazardous conditions such as spilled liquids or fallen items on supermarket floors can reduce the chances of serious injuries. This paper presents EdgeLite, a novel, lightweight deep learning model for easy deployment and inference on resource-constrained devices. We describe the use of EdgeLite on two edge devices for detecting supermarket floor hazards. On a hazard detection dataset that we developed, EdgeLite, when deployed on edge devices, outperformed six state-of-the-art object detection models in terms of accuracy while having comparable memory usage and inference time.
△ Less
Submitted 29 February, 2020;
originally announced March 2020.
-
FlexServe: Deployment of PyTorch Models as Flexible REST Endpoints
Authors:
Edward Verenich,
Alvaro Velasquez,
M. G. Sarwar Murshed,
Faraz Hussain
Abstract:
The integration of artificial intelligence capabilities into modern software systems is increasingly being simplified through the use of cloud-based machine learning services and representational state transfer architecture design. However, insufficient information regarding underlying model provenance and the lack of control over model evolution serve as an impediment to the more widespread adopt…
▽ More
The integration of artificial intelligence capabilities into modern software systems is increasingly being simplified through the use of cloud-based machine learning services and representational state transfer architecture design. However, insufficient information regarding underlying model provenance and the lack of control over model evolution serve as an impediment to the more widespread adoption of these services in many operational environments which have strict security requirements. Furthermore, tools such as TensorFlow Serving allow models to be deployed as RESTful endpoints, but require error-prone transformations for PyTorch models as these dynamic computational graphs. This is in contrast to the static computational graphs of TensorFlow. To enable rapid deployments of PyTorch models without intermediate transformations we have developed FlexServe, a simple library to deploy multi-model ensembles with flexible batching.
△ Less
Submitted 29 February, 2020;
originally announced March 2020.
-
An Efficient Machine Learning-based Elderly Fall Detection Algorithm
Authors:
Faisal Hussain,
Muhammad Basit Umair,
Muhammad Ehatisham-ul-Haq,
Ivan Miguel Pires,
Tânia Valente,
Nuno M. Garcia,
Nuno Pombo
Abstract:
Falling is a commonly occurring mishap with elderly people, which may cause serious injuries. Thus, rapid fall detection is very important in order to mitigate the severe effects of fall among the elderly people. Many fall monitoring systems based on the accelerometer have been proposed for the fall detection. However, many of them mistakenly identify the daily life activities as fall or fall as d…
▽ More
Falling is a commonly occurring mishap with elderly people, which may cause serious injuries. Thus, rapid fall detection is very important in order to mitigate the severe effects of fall among the elderly people. Many fall monitoring systems based on the accelerometer have been proposed for the fall detection. However, many of them mistakenly identify the daily life activities as fall or fall as daily life activity. To this aim, an efficient machine learning-based fall detection algorithm has been proposed in this paper. The proposed algorithm detects fall with efficient sensitivity, specificity, and accuracy as compared to the state-of-the-art techniques. A publicly available dataset with a very simple and computationally efficient set of features is used to accurately detect the fall incident. The proposed algorithm reports and accuracy of 99.98% with the Support Vector Machine(SVM) classifier.
△ Less
Submitted 27 November, 2019;
originally announced November 2019.
-
Enterprise API Security and GDPR Compliance: Design and Implementation Perspective
Authors:
Fatima Hussain,
Rasheed Hussain,
Brett Noye,
Salah Sharieh
Abstract:
With the advancements in the enterprise-level business development, the demand for new applications and services is overwhelming. For the development and delivery of such applications and services, enterprise businesses rely on Application Programming Interfaces (APIs). In essence, API is a double-edged sword. On one hand, API provides ease of expanding the business through sharing value and utili…
▽ More
With the advancements in the enterprise-level business development, the demand for new applications and services is overwhelming. For the development and delivery of such applications and services, enterprise businesses rely on Application Programming Interfaces (APIs). In essence, API is a double-edged sword. On one hand, API provides ease of expanding the business through sharing value and utility, but on another hand it raises security and privacy issues. Since the applications usually use APIs to retrieve important data, therefore it is extremely important to make sure that an effective access control and security mechanism are in place , and the data does not fall into wrong hands. In this article, we discuss the current state of the enterprise API security and the role of Machine Learning (ML) in API security. We also discuss the General Data Protection Regulation (GDPR) compliance and its effect on the API security.
△ Less
Submitted 17 September, 2019;
originally announced September 2019.
-
Machine Learning at the Network Edge: A Survey
Authors:
M. G. Sarwar Murshed,
Christopher Murphy,
Daqing Hou,
Nazar Khan,
Ganesh Ananthanarayanan,
Faraz Hussain
Abstract:
Resource-constrained IoT devices, such as sensors and actuators, have become ubiquitous in recent years. This has led to the generation of large quantities of data in real-time, which is an appealing target for AI systems. However, deploying machine learning models on such end-devices is nearly impossible. A typical solution involves offloading data to external computing systems (such as cloud ser…
▽ More
Resource-constrained IoT devices, such as sensors and actuators, have become ubiquitous in recent years. This has led to the generation of large quantities of data in real-time, which is an appealing target for AI systems. However, deploying machine learning models on such end-devices is nearly impossible. A typical solution involves offloading data to external computing systems (such as cloud servers) for further processing but this worsens latency, leads to increased communication costs, and adds to privacy concerns. To address this issue, efforts have been made to place additional computing devices at the edge of the network, i.e close to the IoT devices where the data is generated. Deploying machine learning systems on such edge computing devices alleviates the above issues by allowing computations to be performed close to the data sources. This survey describes major research efforts where machine learning systems have been deployed at the edge of computer networks, focusing on the operational aspects including compression techniques, tools, frameworks, and hardware used in successful applications of intelligent edge systems.
△ Less
Submitted 23 May, 2021; v1 submitted 31 July, 2019;
originally announced August 2019.
-
Machine Learning for Resource Management in Cellular and IoT Networks: Potentials, Current Solutions, and Open Challenges
Authors:
Fatima Hussain,
Syed Ali Hassan,
Rasheed Hussain,
Ekram Hossain
Abstract:
Internet-of-Things (IoT) refers to a massively heterogeneous network formed through smart devices connected to the Internet. In the wake of disruptive IoT with a huge amount and variety of data, Machine Learning (ML) and Deep Learning (DL) mechanisms will play a pivotal role to bring intelligence to the IoT networks. Among other aspects, ML and DL can play an essential role in addressing the chall…
▽ More
Internet-of-Things (IoT) refers to a massively heterogeneous network formed through smart devices connected to the Internet. In the wake of disruptive IoT with a huge amount and variety of data, Machine Learning (ML) and Deep Learning (DL) mechanisms will play a pivotal role to bring intelligence to the IoT networks. Among other aspects, ML and DL can play an essential role in addressing the challenges of resource management in large-scale IoT networks. In this article, we conduct a systematic and in-depth survey of the ML- and DL-based resource management mechanisms in cellular wireless and IoT networks. We start with the challenges of resource management in cellular IoT and low-power IoT networks, review the traditional resource management mechanisms for IoT networks, and motivate the use of ML and DL techniques for resource management in these networks. Then, we provide a comprehensive survey of the existing ML- and DL-based resource allocation techniques in wireless IoT networks and also techniques specifically designed for HetNets, MIMO and D2D communications, and NOMA networks. To this end, we also identify the future research directions in using ML and DL for resource allocation and management in IoT networks.
△ Less
Submitted 21 July, 2019;
originally announced July 2019.
-
Accurate and Energy-Efficient Classification with Spiking Random Neural Network: Corrected and Expanded Version
Authors:
Khaled F. Hussain,
Mohamed Yousef Bassyouni,
Erol Gelenbe
Abstract:
Artificial Neural Network (ANN) based techniques have dominated state-of-the-art results in most problems related to computer vision, audio recognition, and natural language processing in the past few years, resulting in strong industrial adoption from all leading technology companies worldwide. One of the major obstacles that have historically delayed large scale adoption of ANNs is the huge comp…
▽ More
Artificial Neural Network (ANN) based techniques have dominated state-of-the-art results in most problems related to computer vision, audio recognition, and natural language processing in the past few years, resulting in strong industrial adoption from all leading technology companies worldwide. One of the major obstacles that have historically delayed large scale adoption of ANNs is the huge computational and power costs associated with training and testing (deploying) them. In the mean-time, Neuromorphic Computing platforms have recently achieved remarkable performance running more bio-realistic Spiking Neural Networks at high throughput and very low power consumption making them a natural alternative to ANNs. Here, we propose using the Random Neural Network (RNN), a spiking neural network with both theoretical and practical appealing properties, as a general purpose classifier that can match the classification power of ANNs on a number of tasks while enjoying all the features of a spiking neural network. This is demonstrated on a number of real-world classification datasets.
△ Less
Submitted 1 June, 2019;
originally announced June 2019.
-
Serverless Edge Computing for Green Oil and Gas Industry
Authors:
Razin Farhan Hussain,
Mohsen Amini Salehi,
Omid Semiari
Abstract:
Development of autonomous and self-driving vehicles requires agile and reliable services to manage hazardous road situations. Vehicular Network is the medium that can provide high-quality services for self-driving vehicles. The majority of service requests in Vehicular Networks are delay intolerant (e.g., hazard alerts, lane change warning) and require immediate service. Therefore, Vehicular Netwo…
▽ More
Development of autonomous and self-driving vehicles requires agile and reliable services to manage hazardous road situations. Vehicular Network is the medium that can provide high-quality services for self-driving vehicles. The majority of service requests in Vehicular Networks are delay intolerant (e.g., hazard alerts, lane change warning) and require immediate service. Therefore, Vehicular Networks, and particularly, Vehicle-to-Infrastructure (V2I) systems must provide a consistent real-time response to autonomous vehicles. During peak hours or disasters, when a surge of requests arrives at a Base Station, it is challenging for the V2I system to maintain its performance, which can lead to hazardous consequences. Hence, the goal of this research is to develop a V2I system that is robust against uncertain request arrivals. To achieve this goal, we propose to dynamically allocate service requests among Base Stations. We develop an uncertainty-aware resource allocation method for the federated environment that assigns arriving requests to a Base Station so that the likelihood of completing it on-time is maximized. We evaluate the system under various workload conditions and oversubscription levels. Simulation results show that edge federation can improve robustness of the V2I system by reducing the overall service miss rate by up to 45%.
△ Less
Submitted 11 May, 2019;
originally announced May 2019.
-
Robust Resource Allocation Using Edge Computing for Vehicle to Infrastructure (V2I) Networks
Authors:
Anna Kovalenko,
Razin Farhan Hussain,
Omid Semiari,
Mohsen Amini Salehi
Abstract:
Development of autonomous and self-driving vehicles requires agile and reliable services to manage hazardous road situations. Vehicular Network is the medium that can provide high-quality services for self-driving vehicles. The majority of service requests in Vehicular Networks are delay intolerant (e.g., hazard alerts, lane change warning) and require immediate service. Therefore, Vehicular Netwo…
▽ More
Development of autonomous and self-driving vehicles requires agile and reliable services to manage hazardous road situations. Vehicular Network is the medium that can provide high-quality services for self-driving vehicles. The majority of service requests in Vehicular Networks are delay intolerant (e.g., hazard alerts, lane change warning) and require immediate service. Therefore, Vehicular Networks, and particularly, Vehicle-to-Infrastructure (V2I) systems must provide a consistent real-time response to autonomous vehicles. During peak hours or disasters, when a surge of requests arrives at a Base Station, it is challenging for the V2I system to maintain its performance, which can lead to hazardous consequences. Hence, the goal of this research is to develop a V2I system that is robust against uncertain request arrivals. To achieve this goal, we propose to dynamically allocate service requests among Base Stations. We develop an uncertainty-aware resource allocation method for the federated environment that assigns arriving requests to a Base Station so that the likelihood of completing it on-time is maximized. We evaluate the system under various workload conditions and oversubscription levels. Simulation results show that edge federation can improve robustness of the V2I system by reducing the overall service miss rate by up to 45%.
△ Less
Submitted 11 May, 2019;
originally announced May 2019.
-
Machine Learning in IoT Security: Current Solutions and Future Challenges
Authors:
Fatima Hussain,
Rasheed Hussain,
Syed Ali Hassan,
Ekram Hossain
Abstract:
The future Internet of Things (IoT) will have a deep economical, commercial and social impact on our lives. The participating nodes in IoT networks are usually resource-constrained, which makes them luring targets for cyber attacks. In this regard, extensive efforts have been made to address the security and privacy issues in IoT networks primarily through traditional cryptographic approaches. How…
▽ More
The future Internet of Things (IoT) will have a deep economical, commercial and social impact on our lives. The participating nodes in IoT networks are usually resource-constrained, which makes them luring targets for cyber attacks. In this regard, extensive efforts have been made to address the security and privacy issues in IoT networks primarily through traditional cryptographic approaches. However, the unique characteristics of IoT nodes render the existing solutions insufficient to encompass the entire security spectrum of the IoT networks. This is, at least in part, because of the resource constraints, heterogeneity, massive real-time data generated by the IoT devices, and the extensively dynamic behavior of the networks. Therefore, Machine Learning (ML) and Deep Learning (DL) techniques, which are able to provide embedded intelligence in the IoT devices and networks, are leveraged to cope with different security problems. In this paper, we systematically review the security requirements, attack vectors, and the current security solutions for the IoT networks. We then shed light on the gaps in these security solutions that call for ML and DL approaches. We also discuss in detail the existing ML and DL solutions for addressing different security problems in IoT networks. At last, based on the detailed investigation of the existing solutions in the literature, we discuss the future research directions for ML- and DL-based IoT security.
△ Less
Submitted 13 March, 2019;
originally announced April 2019.
-
A note on some perfect fluid Kantowski-Sachs and Bianchi type III space-times and their conformal vector fields in f(R) theory of gravity
Authors:
Ghulam Shabbir,
Fiaz Hussain,
A. H. Kara,
Muhammad Ramzan
Abstract:
The purpose of this paper is to find conformal vector fields of some perfect fluid Kantowski-Sachs and Bianchi type III space-times in the f(R) theory of gravity using direct integration technique. In this study there exists only eight cases. Studying each case in detail, we found that in two cases proper conformal vector fields exist while in the rest of six cases conformal vector fields become K…
▽ More
The purpose of this paper is to find conformal vector fields of some perfect fluid Kantowski-Sachs and Bianchi type III space-times in the f(R) theory of gravity using direct integration technique. In this study there exists only eight cases. Studying each case in detail, we found that in two cases proper conformal vector fields exist while in the rest of six cases conformal vector fields become Killing vector fields. The dimension of conformal vector fields is either 4 or 6.
△ Less
Submitted 3 March, 2019;
originally announced March 2019.
-
Dynamics of fracturing saturated porous media and self-organization of rupture
Authors:
C. Peruzzo,
D. T. Cao,
E. Milanese,
P. Favia,
F. Pesavento,
F. Hussain,
B. A. Schrefler
Abstract:
Analytical solutions and a vast majority of numerical ones for fracture propagation in saturated porous media yield smooth behavior while experiments, field observations and a few numerical solutions reveal stepwise crack advancement and pressure oscillations. To explain this fact, we invoke self-organization of rupture observed in fracturing solids, both dry and fully saturated, when two requirem…
▽ More
Analytical solutions and a vast majority of numerical ones for fracture propagation in saturated porous media yield smooth behavior while experiments, field observations and a few numerical solutions reveal stepwise crack advancement and pressure oscillations. To explain this fact, we invoke self-organization of rupture observed in fracturing solids, both dry and fully saturated, when two requirements are satisfied: i) the external drive has a much slower timescale than fracture propagation; and ii) the increment of the external load (drive) is applied only when the internal rearrangement of fracture is over. These requirements are needed to obtain clean Self Organised Criticality (SOC) in quasi-static situations. They imply that there should be no restriction on the fracture velocity i.e. algorithmically the fracture advancement rule should always be independent of the crack velocity. Generally, this is not the case when smooth answers are obtained which are often unphysical. Under the above conditions hints of Self Organized Criticality are evident in heterogeneous porous media in quasi-static conditions using a lattice model, showing stepwise advancement of the fracture and pressure oscillations. We extend this model to incorporate inertia forces and show that this behavior still holds. By incorporating the above requirements in numerical fracture advancement algorithms for cohesive fracture in saturated porous continua we also reproduce stepwise advancements and pressure oscillations both in quasi-static and dynamic situations. Since dynamic tests of dry specimens show that the fracture advancement velocity is not constant we replicate such an effect with a model of a debonding beam on elastic foundation. This is the first step before introducing the interaction with a fluid.
△ Less
Submitted 26 February, 2019;
originally announced February 2019.
-
Accurate, Data-Efficient, Unconstrained Text Recognition with Convolutional Neural Networks
Authors:
Mohamed Yousef,
Khaled F. Hussain,
Usama S. Mohammed
Abstract:
Unconstrained text recognition is an important computer vision task, featuring a wide variety of different sub-tasks, each with its own set of challenges. One of the biggest promises of deep neural networks has been the convergence and automation of feature extractors from input raw signals, allowing for the highest possible performance with minimum required domain knowledge. To this end, we propo…
▽ More
Unconstrained text recognition is an important computer vision task, featuring a wide variety of different sub-tasks, each with its own set of challenges. One of the biggest promises of deep neural networks has been the convergence and automation of feature extractors from input raw signals, allowing for the highest possible performance with minimum required domain knowledge. To this end, we propose a data-efficient, end-to-end neural network model for generic, unconstrained text recognition. In our proposed architecture we strive for simplicity and efficiency without sacrificing recognition accuracy. Our proposed architecture is a fully convolutional network without any recurrent connections trained with the CTC loss function. Thus it operates on arbitrary input sizes and produces strings of arbitrary length in a very efficient and parallelizable manner. We show the generality and superiority of our proposed text recognition architecture by achieving state of the art results on seven public benchmark datasets, covering a wide spectrum of text recognition tasks, namely: Handwriting Recognition, CAPTCHA recognition, OCR, License Plate Recognition, and Scene Text Recognition. Our proposed architecture has won the ICFHR2018 Competition on Automated Text Recognition on a READ Dataset.
△ Less
Submitted 31 December, 2018;
originally announced December 2018.
-
Toward a self-learned Smart Contracts
Authors:
Ahmed S. Almasoud,
Maged M. Eljazzar,
Farookh Hussain
Abstract:
In recent years, Blockchain technology has been highly valued and disruptive. Several researches have presented a merge between blockchain and current application i.e. medical, supply chain, and e-commerce. Although Blockchain architecture does not have a standard yet, IBM, MS, AWS offer BaaS (Blockchain as a Service). In addition to the current public chains i.e. Ethereum, NEO, and Cardeno; there…
▽ More
In recent years, Blockchain technology has been highly valued and disruptive. Several researches have presented a merge between blockchain and current application i.e. medical, supply chain, and e-commerce. Although Blockchain architecture does not have a standard yet, IBM, MS, AWS offer BaaS (Blockchain as a Service). In addition to the current public chains i.e. Ethereum, NEO, and Cardeno; there are some differences between several public ledgers in terms of development and architecture. This paper introduces the main factors that affect integration of Artificial Intelligence with Blockchain. As well as, how it could be integrated for forecasting and automating; building self-regulated chain.
△ Less
Submitted 26 December, 2018;
originally announced December 2018.
-
First-principles prediction of half-Heusler half-metals above room temperature
Authors:
Muhammad Atif Sattar,
S. Aftab Ahmad,
Fayyaz Hussain,
Claudio Cazorla
Abstract:
Half-metallicity (HM) offers great potential for engineering spintronic applications, yet only few magnetic materials present metallicity in just one spin channel. In addition, most HM systems become magnetically disordered at temperatures well below ambient conditions, which further hinders the development of spin-based electronic devices. Here, we use first-principles methods based on density fu…
▽ More
Half-metallicity (HM) offers great potential for engineering spintronic applications, yet only few magnetic materials present metallicity in just one spin channel. In addition, most HM systems become magnetically disordered at temperatures well below ambient conditions, which further hinders the development of spin-based electronic devices. Here, we use first-principles methods based on density functional theory (DFT) to investigate the electronic, magnetic, structural, mixing, and vibrational properties of $90$ $XYZ$ half-Heusler (HH) alloys ($X =$ Li, Na, K, Rb, Cs; $Y =$ V,Nb, Ta; $Z =$ Si, Ge, Sn, S, Se, Te). We disclose a total of $28$ new HH compounds that are ferromagnetic, vibrationally stable, and HM, with semiconductor band gaps in the range of $1$-$4$ eV and HM band gaps of $0.2$-$0.8$ eV. By performing Monte Carlo simulations of a spin Heisenberg model fitted to DFT energies, we estimate the Curie temperature, $T_{\rm C}$, of each HM compound. We find that $17$ HH HM remain magnetically ordered at and above room temperature, namely, $300 \le T_{\rm C} \le 450$ K, with total magnetic moments of $2$ and $4$ $μ_{\rm B}$. A further materials sieve based on zero-temperature mixing energies let us to conclude $5$ overall promising ferromagnetic HH HM at and above room temperature: NaVSi, RbVTe, CsVS, CsVSe, and RbNbTe. We also predict $2$ ferromagnetic materials that are semiconductor and magnetically ordered at ambient conditions: LiVSi and LiVGe.
△ Less
Submitted 12 December, 2018;
originally announced December 2018.
-
Effects of Repetitive SSVEPs on EEG Complexity using Multiscale Inherent Fuzzy Entropy
Authors:
Zehong Cao,
Wei** Ding,
Yu-Kai Wang,
Farookh Khadeer Hussain,
Adel Al-Jumaily,
Chin-Teng Lin
Abstract:
Multiscale inherent fuzzy entropy is an objective measurement of electroencephalography (EEG) complexity, reflecting the habituation of brain systems. Entropy dynamics are generally believed to reflect the ability of the brain to adapt to a visual stimulus environment. In this study, we explored repetitive steady-state visual evoked potential (SSVEP)-based EEG complexity by assessing multiscale in…
▽ More
Multiscale inherent fuzzy entropy is an objective measurement of electroencephalography (EEG) complexity, reflecting the habituation of brain systems. Entropy dynamics are generally believed to reflect the ability of the brain to adapt to a visual stimulus environment. In this study, we explored repetitive steady-state visual evoked potential (SSVEP)-based EEG complexity by assessing multiscale inherent fuzzy entropy with relative measurements. We used a wearable EEG device with Oz and Fpz electrodes to collect EEG signals from 40 participants under the following three conditions: a resting state (closed-eyes (CE) and open- eyes (OE) stimulation with five 15-Hz CE SSVEPs and stimulation with five 20-Hz OE SSVEPs. We noted monotonic enhancement of occipital EEG relative complexity with increasing stimulus times in CE and OE conditions. The occipital EEG relative complexity was significantly higher for the fifth SSVEP than for the first SSEVP (FDR-adjusted p < 0.05). Similarly, the prefrontal EEG relative complexity tended to be significantly higher in the OE condition compared to that in the CE condition (FDR-adjusted p < 0.05). The results also indicate that multiscale inherent fuzzy entropy is superior to other competing multiscale-based entropy methods. In conclusion, EEG relative complexity increases with stimulus times, a finding that reflects the strong habituation of brain systems. These results suggest that multiscale inherent fuzzy entropy is an EEG pattern with which brain complexity can be assessed using repetitive SSVEP stimuli.
△ Less
Submitted 29 September, 2018; v1 submitted 18 September, 2018;
originally announced September 2018.