-
CrypTen: Secure Multi-Party Computation Meets Machine Learning
Authors:
Brian Knott,
Shobha Venkataraman,
Awni Hannun,
Shubho Sengupta,
Mark Ibrahim,
Laurens van der Maaten
Abstract:
Secure multi-party computation (MPC) allows parties to perform computations on data while kee** that data private. This capability has great potential for machine-learning applications: it facilitates training of machine-learning models on private data sets owned by different parties, evaluation of one party's private model using another party's private data, etc. Although a range of studies imp…
▽ More
Secure multi-party computation (MPC) allows parties to perform computations on data while kee** that data private. This capability has great potential for machine-learning applications: it facilitates training of machine-learning models on private data sets owned by different parties, evaluation of one party's private model using another party's private data, etc. Although a range of studies implement machine-learning models via secure MPC, such implementations are not yet mainstream. Adoption of secure MPC is hampered by the absence of flexible software frameworks that "speak the language" of machine-learning researchers and engineers. To foster adoption of secure MPC in machine learning, we present CrypTen: a software framework that exposes popular secure MPC primitives via abstractions that are common in modern machine-learning frameworks, such as tensor computations, automatic differentiation, and modular neural networks. This paper describes the design of CrypTen and measure its performance on state-of-the-art models for text classification, speech recognition, and image classification. Our benchmarks show that CrypTen's GPU support and high-performance communication between (an arbitrary number of) parties allows it to perform efficient private evaluation of modern machine-learning models under a semi-honest threat model. For example, two parties using CrypTen can securely predict phonemes in speech recordings using Wav2Letter faster than real-time. We hope that CrypTen will spur adoption of secure MPC in the machine-learning community.
△ Less
Submitted 15 September, 2022; v1 submitted 2 September, 2021;
originally announced September 2021.
-
A new explicit expansion approach to Mersenne primes
Authors:
Moustafa Ibrahim
Abstract:
This paper first proves what the author called the Eight Levels Theorem and then highlights a new explicit expansion approach to Lucas-Lehmer primality test for Mersenne primes and gives a new criterion for Mersenne compositeness. Also, we prove four new combinatorial identities.
This paper first proves what the author called the Eight Levels Theorem and then highlights a new explicit expansion approach to Lucas-Lehmer primality test for Mersenne primes and gives a new criterion for Mersenne compositeness. Also, we prove four new combinatorial identities.
△ Less
Submitted 18 May, 2022; v1 submitted 23 August, 2021;
originally announced August 2021.
-
Influence-Based Reinforcement Learning for Intrinsically-Motivated Agents
Authors:
Ammar Fayad,
Majd Ibrahim
Abstract:
Discovering successful coordinated behaviors is a central challenge in Multi-Agent Reinforcement Learning (MARL) since it requires exploring a joint action space that grows exponentially with the number of agents. In this paper, we propose a mechanism for achieving sufficient exploration and coordination in a team of agents. Specifically, agents are rewarded for contributing to a more diversified…
▽ More
Discovering successful coordinated behaviors is a central challenge in Multi-Agent Reinforcement Learning (MARL) since it requires exploring a joint action space that grows exponentially with the number of agents. In this paper, we propose a mechanism for achieving sufficient exploration and coordination in a team of agents. Specifically, agents are rewarded for contributing to a more diversified team behavior by employing proper intrinsic motivation functions. To learn meaningful coordination protocols, we structure agents' interactions by introducing a novel framework, where at each timestep, an agent simulates counterfactual rollouts of its policy and, through a sequence of computations, assesses the gap between other agents' current behaviors and their targets. Actions that minimize the gap are considered highly influential and are rewarded. We evaluate our approach on a set of challenging tasks with sparse rewards and partial observability that require learning complex cooperative strategies under a proper exploration scheme, such as the StarCraft Multi-Agent Challenge. Our methods show significantly improved performances over different baselines across all tasks.
△ Less
Submitted 12 October, 2021; v1 submitted 28 August, 2021;
originally announced August 2021.
-
An improved model for describing the net carrier recombination rate in semiconductor devices
Authors:
M. L. Inche Ibrahim,
Anvar A. Zakhidov
Abstract:
Carrier recombination is a process that significantly influences the performance of semiconductor devices such as solar cells, photodiodes, and light-emitting diodes (LEDs). Therefore, a model that can accurately describe and quantify the net carrier recombination rate in semiconductor devices is important in order to further improve the performance of relevant semiconductor devices. The conventio…
▽ More
Carrier recombination is a process that significantly influences the performance of semiconductor devices such as solar cells, photodiodes, and light-emitting diodes (LEDs). Therefore, a model that can accurately describe and quantify the net carrier recombination rate in semiconductor devices is important in order to further improve the performance of relevant semiconductor devices. The conventional model for describing the net carrier recombination rate is derived based on the condition that there is no electric current in the considered semiconductor, which is true only when the semiconductor is not part of a semiconductor device, and hence is not connected to an external circuit. The conventional model is adopted and used for describing the net carrier recombination rate in semiconductors that are part of devices (i.e. in semiconductor devices). In this paper, we derive and propose a new model for describing the net carrier recombination rate in semiconductor devices. The newly proposed model is an improvement to the currently used model by considering the fact that electric current can flow in the semiconducting materials of semiconductor devices. We validate the proposed recombination model and show that the use of the proposed model can be crucial for modeling and analyzing the performance of optoelectronic devices such as solar cells and LEDs.
△ Less
Submitted 30 August, 2021; v1 submitted 23 August, 2021;
originally announced August 2021.
-
Taxonomy and Benchmarking of Precision-Scalable MAC Arrays Under Enhanced DNN Dataflow Representation
Authors:
Ehab M. Ibrahim,
Linyan Mei,
Marian Verhelst
Abstract:
Reduced-precision and variable-precision multiply-accumulate (MAC) operations provide opportunities to significantly improve energy efficiency and throughput of DNN accelerators with no/limited algorithmic performance loss, paving a way towards deploying AI applications on resource-constraint edge devices. Accordingly, various precision-scalable MAC array (PSMA) architectures were proposed recentl…
▽ More
Reduced-precision and variable-precision multiply-accumulate (MAC) operations provide opportunities to significantly improve energy efficiency and throughput of DNN accelerators with no/limited algorithmic performance loss, paving a way towards deploying AI applications on resource-constraint edge devices. Accordingly, various precision-scalable MAC array (PSMA) architectures were proposed recently. However, it is difficult to make a fair comparison between those alternatives, as each proposed PSMA is demonstrated in different systems and technologies. This work aims to provide a clear view of the design space of PSMA and offer insights for selecting the optimal architectures based on designers' needs. First, we introduce a precision-enhanced for-loop representation for DNN dataflows. Next, we use this new representation towards a comprehensive PSMA taxonomy, capable of systematically covering most prominent state-of-the-art PSMAs, as well as uncovering new PSMA architectures. Following that, we build a highly parameterized PSMA template that can be design-time configured into a huge subset of the design space spanned by the taxonomy. This allows to fairly and thoroughly benchmark 72 different PSMA architectures. We perform such studies in 28nm technology targeting run-time precision scalability from 8 to 2 bits, operating at 200 MHz and 1 GHz. Analyzing resulting energy and area breakdowns reveals key design guidelines for PSMA architectures.
△ Less
Submitted 17 January, 2022; v1 submitted 10 August, 2021;
originally announced August 2021.
-
Grounding inductive biases in natural images:invariance stems from variations in data
Authors:
Diane Bouchacourt,
Mark Ibrahim,
Ari S. Morcos
Abstract:
To perform well on unseen and potentially out-of-distribution samples, it is desirable for machine learning models to have a predictable response with respect to transformations affecting the factors of variation of the input. Here, we study the relative importance of several types of inductive biases towards such predictable behavior: the choice of data, their augmentations, and model architectur…
▽ More
To perform well on unseen and potentially out-of-distribution samples, it is desirable for machine learning models to have a predictable response with respect to transformations affecting the factors of variation of the input. Here, we study the relative importance of several types of inductive biases towards such predictable behavior: the choice of data, their augmentations, and model architectures. Invariance is commonly achieved through hand-engineered data augmentation, but do standard data augmentations address transformations that explain variations in real data? While prior work has focused on synthetic data, we attempt here to characterize the factors of variation in a real dataset, ImageNet, and study the invariance of both standard residual networks and the recently proposed vision transformer with respect to changes in these factors. We show standard augmentation relies on a precise combination of translation and scale, with translation recapturing most of the performance improvement -- despite the (approximate) translation invariance built in to convolutional architectures, such as residual networks. In fact, we found that scale and translation invariance was similar across residual networks and vision transformer models despite their markedly different architectural inductive biases. We show the training data itself is the main source of invariance, and that data augmentation only further increases the learned invariances. Notably, the invariances learned during training align with the ImageNet factors of variation we found. Finally, we find that the main factors of variation in ImageNet mostly relate to appearance and are specific to each class.
△ Less
Submitted 16 November, 2021; v1 submitted 9 June, 2021;
originally announced June 2021.
-
Enhancing Security of TAS/MRC Based Mixed RF-UOWC System with Induced Underwater Turbulence Effect
Authors:
Md. Ibrahim,
A. S. M. Badrudduza,
Md. Shakhawat Hossen,
Milton Kumar Kundu,
Imran Shafique Ansari
Abstract:
Post commercial deployment of fifth-generation (5G) technologies, the consideration of sixth-generation (6G) networks is drawing remarkable attention from research communities. Researchers suggest that similar to 5G, 6G technology must be human-centric where high secrecy together with high data rate will be the key features. These challenges can be easily overcome utilizing PHY security techniques…
▽ More
Post commercial deployment of fifth-generation (5G) technologies, the consideration of sixth-generation (6G) networks is drawing remarkable attention from research communities. Researchers suggest that similar to 5G, 6G technology must be human-centric where high secrecy together with high data rate will be the key features. These challenges can be easily overcome utilizing PHY security techniques over high-frequency free-space or underwater optical wireless communication (UOWC) technologies. But in long-distance communication, turbulence components drastically affect the optical signals, leading to the invention of the combination of radio-frequency (RF) links with optical links. This work deals with the secrecy performance analysis of a mixed RF-UOWC system where an eavesdropper tries to intercept RF communications. RF and optical links undergo $η-μ$ and mixture exponential generalized Gamma distributions, respectively. To keep pace with the high data rate of optical technologies, we exploit the antenna selection scheme at the source and maximal ratio combining diversity at the relay and eavesdropper, while the eavesdropper is unaware of the antenna selection scheme. We derive closed-form expressions of average secrecy capacity, secrecy outage probability, and strictly positive secrecy capacity to demonstrate the impacts of the system parameters on the secrecy behavior. Finally, the expressions are corroborated via Monte-Carlo simulations.
△ Less
Submitted 21 November, 2021; v1 submitted 19 May, 2021;
originally announced May 2021.
-
An Automated Method to Enrich Consumer Health Vocabularies Using GloVe Word Embeddings and An Auxiliary Lexical Resource
Authors:
Mohammed Ibrahim,
Susan Gauch,
Omar Salman,
Mohammed Alqahatani
Abstract:
Background: Clear language makes communication easier between any two parties. A layman may have difficulty communicating with a professional due to not understanding the specialized terms common to the domain. In healthcare, it is rare to find a layman knowledgeable in medical terminology which can lead to poor understanding of their condition and/or treatment. To bridge this gap, several profess…
▽ More
Background: Clear language makes communication easier between any two parties. A layman may have difficulty communicating with a professional due to not understanding the specialized terms common to the domain. In healthcare, it is rare to find a layman knowledgeable in medical terminology which can lead to poor understanding of their condition and/or treatment. To bridge this gap, several professional vocabularies and ontologies have been created to map laymen medical terms to professional medical terms and vice versa.
Objective: Many of the presented vocabularies are built manually or semi-automatically requiring large investments of time and human effort and consequently the slow growth of these vocabularies. In this paper, we present an automatic method to enrich laymen's vocabularies that has the benefit of being able to be applied to vocabularies in any domain.
Methods: Our entirely automatic approach uses machine learning, specifically Global Vectors for Word Embeddings (GloVe), on a corpus collected from a social media healthcare platform to extend and enhance consumer health vocabularies (CHV). Our approach further improves the CHV by incorporating synonyms and hyponyms from the WordNet ontology. The basic GloVe and our novel algorithms incorporating WordNet were evaluated using two laymen datasets from the National Library of Medicine (NLM), Open-Access Consumer Health Vocabulary (OAC CHV) and MedlinePlus Healthcare Vocabulary.
Results: The results show that GloVe was able to find new laymen terms with an F-score of 48.44%. Furthermore, our enhanced GloVe approach outperformed basic GloVe with an average F-score of 61%, a relative improvement of 25%. Furthermore, the enhanced GloVe showed a statistical significance over the two ground truth datasets with P<.001.
△ Less
Submitted 18 May, 2021;
originally announced May 2021.
-
WOVe: Incorporating Word Order in GloVe Word Embeddings
Authors:
Mohammed Ibrahim,
Susan Gauch,
Tyler Gerth,
Brandon Cox
Abstract:
Word vector representations open up new opportunities to extract useful information from unstructured text. Defining a word as a vector made it easy for the machine learning algorithms to understand a text and extract information from. Word vector representations have been used in many applications such word synonyms, word analogy, syntactic parsing, and many others. GloVe, based on word contexts…
▽ More
Word vector representations open up new opportunities to extract useful information from unstructured text. Defining a word as a vector made it easy for the machine learning algorithms to understand a text and extract information from. Word vector representations have been used in many applications such word synonyms, word analogy, syntactic parsing, and many others. GloVe, based on word contexts and matrix vectorization, is an ef-fective vector-learning algorithm. It improves on previous vector-learning algorithms. However, the GloVe model fails to explicitly consider the order in which words appear within their contexts. In this paper, multiple methods of incorporating word order in GloVe word embeddings are proposed. Experimental results show that our Word Order Vector (WOVe) word embeddings approach outperforms unmodified GloVe on the natural lan-guage tasks of analogy completion and word similarity. WOVe with direct concatenation slightly outperformed GloVe on the word similarity task, increasing average rank by 2%. However, it greatly improved on the GloVe baseline on a word analogy task, achieving an average 36.34% improvement in accuracy.
△ Less
Submitted 18 May, 2021;
originally announced May 2021.
-
$\texttt{RidgeSketch}$: A Fast sketching based solver for large scale ridge regression
Authors:
Nidham Gazagnadou,
Mark Ibrahim,
Robert M. Gower
Abstract:
We propose new variants of the sketch-and-project method for solving large scale ridge regression problems. Firstly, we propose a new momentum alternative and provide a theorem showing it can speed up the convergence of sketch-and-project, through a fast $\textit{sublinear}$ convergence rate. We carefully delimit under what settings this new sublinear rate is faster than the previously known linea…
▽ More
We propose new variants of the sketch-and-project method for solving large scale ridge regression problems. Firstly, we propose a new momentum alternative and provide a theorem showing it can speed up the convergence of sketch-and-project, through a fast $\textit{sublinear}$ convergence rate. We carefully delimit under what settings this new sublinear rate is faster than the previously known linear rate of convergence of sketch-and-project without momentum. Secondly, we consider combining the sketch-and-project method with new modern sketching methods such as the count sketch, subcount sketch (a new method we propose), and subsampled Hadamard transforms. We show experimentally that when combined with the sketch-and-project method, the (sub)count sketch is very effective on sparse data and the standard subsample sketch is effective on dense data. Indeed, we show that these sketching methods, combined with our new momentum scheme, result in methods that are competitive even when compared to the Conjugate Gradient method on real large scale data. On the contrary, we show the subsampled Hadamard transform does not perform well in this setting, despite the use of fast Hadamard transforms, and nor do recently proposed acceleration schemes work well in practice. To support all of our experimental findings, and invite the community to validate and extend our results, with this paper we are also releasing an open source software package: $\texttt{RidgeSketch}$. We designed this object-oriented package in Python for testing sketch-and-project methods and benchmarking ridge regression solvers. $\texttt{RidgeSketch}$ is highly modular, and new sketching methods can easily be added as subclasses. We provide code snippets of our package in the appendix.
△ Less
Submitted 26 May, 2021; v1 submitted 12 May, 2021;
originally announced May 2021.
-
Behavior-Guided Actor-Critic: Improving Exploration via Learning Policy Behavior Representation for Deep Reinforcement Learning
Authors:
Ammar Fayad,
Majd Ibrahim
Abstract:
In this work, we propose Behavior-Guided Actor-Critic (BAC), an off-policy actor-critic deep RL algorithm. BAC mathematically formulates the behavior of the policy through autoencoders by providing an accurate estimation of how frequently each state-action pair was visited while taking into consideration state dynamics that play a crucial role in determining the trajectories produced by the policy…
▽ More
In this work, we propose Behavior-Guided Actor-Critic (BAC), an off-policy actor-critic deep RL algorithm. BAC mathematically formulates the behavior of the policy through autoencoders by providing an accurate estimation of how frequently each state-action pair was visited while taking into consideration state dynamics that play a crucial role in determining the trajectories produced by the policy. The agent is encouraged to change its behavior consistently towards less-visited state-action pairs while attaining good performance by maximizing the expected discounted sum of rewards, resulting in an efficient exploration of the environment and good exploitation of all high reward regions. One prominent aspect of our approach is that it is applicable to both stochastic and deterministic actors in contrast to maximum entropy deep reinforcement learning algorithms. Results show considerably better performances of BAC when compared to several cutting-edge learning algorithms.
△ Less
Submitted 9 April, 2021;
originally announced April 2021.
-
Re-designing cities with conditional adversarial networks
Authors:
Mohamed R. Ibrahim,
James Haworth,
Nicola Christie
Abstract:
This paper introduces a conditional generative adversarial network to redesign a street-level image of urban scenes by generating 1) an urban intervention policy, 2) an attention map that localises where intervention is needed, 3) a high-resolution street-level image (1024 X 1024 or 1536 X1536) after implementing the intervention. We also introduce a new dataset that comprises aligned street-level…
▽ More
This paper introduces a conditional generative adversarial network to redesign a street-level image of urban scenes by generating 1) an urban intervention policy, 2) an attention map that localises where intervention is needed, 3) a high-resolution street-level image (1024 X 1024 or 1536 X1536) after implementing the intervention. We also introduce a new dataset that comprises aligned street-level images of before and after urban interventions from real-life scenarios that make this research possible. The introduced method has been trained on different ranges of urban interventions applied to realistic images. The trained model shows strong performance in re-modelling cities, outperforming existing methods that apply image-to-image translation in other domains that is computed in a single GPU. This research opens the door for machine intelligence to play a role in re-thinking and re-designing the different attributes of cities based on adversarial learning, going beyond the mainstream of facial landmarks manipulation or image synthesis from semantic segmentation.
△ Less
Submitted 14 April, 2021; v1 submitted 8 April, 2021;
originally announced April 2021.
-
Accelerator Real-time Edge AI for Distributed Systems (READS) Proposal
Authors:
K. Seiya,
K. J. Hazelwood,
M. A. Ibrahim,
V. P. Nagaslaev,
D. J. Nicklaus,
B. A. Schupbach,
R. M. Thurman-Keup,
N. V. Tran,
H. Liu,
S. Memik
Abstract:
Our objective will be to integrate ML into Fermilab accelerator operations and furthermore provide an accessible framework which can also be used by a broad range of other accelerator systems with dynamic tuning needs. We will develop of real-time accelerator control using embedded ML on-chip hardware and fast communication between distributed systems in this proposal. We will demonstrate this tec…
▽ More
Our objective will be to integrate ML into Fermilab accelerator operations and furthermore provide an accessible framework which can also be used by a broad range of other accelerator systems with dynamic tuning needs. We will develop of real-time accelerator control using embedded ML on-chip hardware and fast communication between distributed systems in this proposal. We will demonstrate this technology for the Mu2e experiment by increasing the overall duty factor and uptime of the experiment through two synergistic projects. First, we will use deep reinforcement learning techniques to improve the performance of the regulation loop through guided optimization to provide stable proton beams extracted from the Delivery Ring to the Mu2e experiment. This requires the development of a digital twin of the system to model the accelerator and develop real-time ML algorithms. Second, we will use de-blending techniques to disentangle and classify overlap** beam losses in the Main Injector and Recycler Ring to reduce overall beam downtime in each machine. This ML model will be deployed within a semi-autonomous operational mode. Both applications require processing at the millisecond scale and will share similar ML-in-hardware techniques and beam instrumentation readout technology. A collaboration between Fermilab and Northwestern University will pull together the talents and resources of accelerator physicists, beam instrumentation engineers, embedded system architects, FPGA board design experts, and ML experts to solve complex real-time accelerator controls challenges which will enhance the physics program. More broadly, the framework developed for Accelerator Real-time Edge AI Distributed Systems (READS) can be applied to future projects as the accelerator complex is upgraded for the PIP-II and DUNE era.
△ Less
Submitted 5 March, 2021;
originally announced March 2021.
-
On the unsteady dynamics of partially shrouded compressible jets
Authors:
Soumya R. Nanda,
S. K. Karthick,
T. V. Krishna,
A. De,
S. Mohammed Ibrahim
Abstract:
We experimentally investigate a partially shrouded sonic jet (a sonic free-jet shielded by a solid wall-extension on one side) exiting from a planar nozzle at two different nozzle pressure ratio ($ζ=4$ and $5$). We experimentally show that the inherent jet unsteadiness from the shock-induced flow separation on the wall and the emitted noise in the far-field is strongly coupled through a series of…
▽ More
We experimentally investigate a partially shrouded sonic jet (a sonic free-jet shielded by a solid wall-extension on one side) exiting from a planar nozzle at two different nozzle pressure ratio ($ζ=4$ and $5$). We experimentally show that the inherent jet unsteadiness from the shock-induced flow separation on the wall and the emitted noise in the far-field is strongly coupled through a series of experiments like high-speed schlieren, wall-static pressure, unsteady pressure spectra, and microphone measurements. The partially shrouded jet's lateral free expansion is also identified to be complicated, three-dimensional, and the produced noise is directional. The emitted acoustic pulses from the flap**-jet, the radiated noise from the shock-induced separation on the wall, and the shock-shear layer interaction on the other side of the wall are responsible for the generated acoustic disturbances. The non-uniform aeroacoustic forcing on the top and bottom portion of the partially wall-bounded jet shear layer leads to a self-sustained jet oscillation and a discrete sound emission. The vital features are identified through the proper orthogonal decomposition of high-speed schlieren images and supplemented by other measurements.
△ Less
Submitted 20 September, 2021; v1 submitted 14 February, 2021;
originally announced February 2021.
-
Addressing the Topological Defects of Disentanglement via Distributed Operators
Authors:
Diane Bouchacourt,
Mark Ibrahim,
Stéphane Deny
Abstract:
A core challenge in Machine Learning is to learn to disentangle natural factors of variation in data (e.g. object shape vs. pose). A popular approach to disentanglement consists in learning to map each of these factors to distinct subspaces of a model's latent representation. However, this approach has shown limited empirical success to date. Here, we show that, for a broad family of transformatio…
▽ More
A core challenge in Machine Learning is to learn to disentangle natural factors of variation in data (e.g. object shape vs. pose). A popular approach to disentanglement consists in learning to map each of these factors to distinct subspaces of a model's latent representation. However, this approach has shown limited empirical success to date. Here, we show that, for a broad family of transformations acting on images--encompassing simple affine transformations such as rotations and translations--this approach to disentanglement introduces topological defects (i.e. discontinuities in the encoder). Motivated by classical results from group representation theory, we study an alternative, more flexible approach to disentanglement which relies on distributed latent operators, potentially acting on the entire latent space. We theoretically and empirically demonstrate the effectiveness of this approach to disentangle affine transformations. Our work lays a theoretical foundation for the recent success of a new generation of models using distributed operators for disentanglement.
△ Less
Submitted 10 February, 2021;
originally announced February 2021.
-
CyclingNet: Detecting cycling near misses from video streams in complex urban scenes with deep learning
Authors:
Mohamed R. Ibrahim,
James Haworth,
Nicola Christie,
Tao Cheng
Abstract:
Cycling is a promising sustainable mode for commuting and leisure in cities, however, the fear of getting hit or fall reduces its wide expansion as a commuting mode. In this paper, we introduce a novel method called CyclingNet for detecting cycling near misses from video streams generated by a mounted frontal camera on a bike regardless of the camera position, the conditions of the built, the visu…
▽ More
Cycling is a promising sustainable mode for commuting and leisure in cities, however, the fear of getting hit or fall reduces its wide expansion as a commuting mode. In this paper, we introduce a novel method called CyclingNet for detecting cycling near misses from video streams generated by a mounted frontal camera on a bike regardless of the camera position, the conditions of the built, the visual conditions and without any restrictions on the riding behaviour. CyclingNet is a deep computer vision model based on convolutional structure embedded with self-attention bidirectional long-short term memory (LSTM) blocks that aim to understand near misses from both sequential images of scenes and their optical flows. The model is trained on scenes of both safe rides and near misses. After 42 hours of training on a single GPU, the model shows high accuracy on the training, testing and validation sets. The model is intended to be used for generating information that can draw significant conclusions regarding cycling behaviour in cities and elsewhere, which could help planners and policy-makers to better understand the requirement of safety measures when designing infrastructure or drawing policies. As for future work, the model can be pipelined with other state-of-the-art classifiers and object detectors simultaneously to understand the causality of near misses based on factors related to interactions of road-users, the built and the natural environments.
△ Less
Submitted 31 January, 2021;
originally announced February 2021.
-
Generalized Categorisation of Digital Pathology Whole Image Slides using Unsupervised Learning
Authors:
Mostafa Ibrahim,
Kevin Bryson
Abstract:
This project aims to break down large pathology images into small tiles and then cluster those tiles into distinct groups without the knowledge of true labels, our analysis shows how difficult certain aspects of clustering tumorous and non-tumorous cells can be and also shows that comparing the results of different unsupervised approaches is not a trivial task. The project also provides a software…
▽ More
This project aims to break down large pathology images into small tiles and then cluster those tiles into distinct groups without the knowledge of true labels, our analysis shows how difficult certain aspects of clustering tumorous and non-tumorous cells can be and also shows that comparing the results of different unsupervised approaches is not a trivial task. The project also provides a software package to be used by the digital pathology community, that uses some of the approaches developed to perform unsupervised unsupervised tile classification, which could then be easily manually labelled.
The project uses a mixture of techniques ranging from classical clustering algorithms such as K-Means and Gaussian Mixture Models to more complicated feature extraction techniques such as deep Autoencoders and Multi-loss learning. Throughout the project, we attempt to set a benchmark for evaluation using a few measures such as completeness scores and cluster plots.
Throughout our results we show that Convolutional Autoencoders manages to slightly outperform the rest of the approaches due to its powerful internal representation learning abilities. Moreover, we show that Gaussian Mixture models produce better results than K-Means on average due to its flexibility in capturing different clusters. We also show the huge difference in the difficulties of classifying different types of pathology textures.
△ Less
Submitted 27 December, 2020;
originally announced December 2020.
-
Reflective Parametric Frequency Selective Limiters with sub-dB Loss and $μ$Watts Power Thresholds
Authors:
Hussein M. E. Hussein,
Mahmoud A. A. Ibrahim,
Matteo Rinaldi,
Marvin Onabajo,
Cristian Cassella
Abstract:
This article describes the design methodology to achieve reflective diode-based parametric frequency selective limiters (pFSLs) with low power thresholds ($P_{th}$) and sub-dB insertion-loss values ($IL^{s.s}$) for driving power levels ($P_{in}$) lower than $P_{th}$. In addition, we present the measured performance of a reflective pFSL designed through the discussed methodology and assembled on a…
▽ More
This article describes the design methodology to achieve reflective diode-based parametric frequency selective limiters (pFSLs) with low power thresholds ($P_{th}$) and sub-dB insertion-loss values ($IL^{s.s}$) for driving power levels ($P_{in}$) lower than $P_{th}$. In addition, we present the measured performance of a reflective pFSL designed through the discussed methodology and assembled on a FR-4 printed circuit board (PCB). Thanks to its optimally engineered dynamics, the built pFSL can operate around $\sim$2.1 GHz while exhibiting record-low $P_{th}$ (-3.4 dBm) and $IL^{s.s}$ (0.94 dB) values. Furthermore, while the pFSL can selectively attenuate undesired signals with power ranging from -3.4 dBm to 13 dBm, it provides a strong suppression level (IS > 12.0 dB) even when driven by much higher $P_{in}$ values approaching 28 dBm. Such measured performance metrics demonstrate how the unique nonlinear dynamics of parametric-based FSLs can be leveraged through components and systems compatible with conventional chip-scale manufacturing processes in order to increase the resilience to electromagnetic interference (EMI), even of wireless radios designed for a low-power consumption and consequently characterized by a narrow dynamic range.
△ Less
Submitted 21 December, 2020;
originally announced December 2020.
-
A Knowledge Distillation Ensemble Framework for Predicting Short and Long-term Hospitalisation Outcomes from Electronic Health Records Data
Authors:
Zina M Ibrahim,
Daniel Bean,
Thomas Searle,
Honghan Wu,
Anthony Shek,
Zeljko Kraljevic,
James Galloway,
Sam Norton,
James T Teo,
Richard JB Dobson
Abstract:
The ability to perform accurate prognosis of patients is crucial for proactive clinical decision making, informed resource management and personalised care. Existing outcome prediction models suffer from a low recall of infrequent positive outcomes. We present a highly-scalable and robust machine learning framework to automatically predict adversity represented by mortality and ICU admission from…
▽ More
The ability to perform accurate prognosis of patients is crucial for proactive clinical decision making, informed resource management and personalised care. Existing outcome prediction models suffer from a low recall of infrequent positive outcomes. We present a highly-scalable and robust machine learning framework to automatically predict adversity represented by mortality and ICU admission from time-series vital signs and laboratory results obtained within the first 24 hours of hospital admission. The stacked platform comprises two components: a) an unsupervised LSTM Autoencoder that learns an optimal representation of the time-series, using it to differentiate the less frequent patterns which conclude with an adverse event from the majority patterns that do not, and b) a gradient boosting model, which relies on the constructed representation to refine prediction, incorporating static features of demographics, admission details and clinical summaries. The model is used to assess a patient's risk of adversity over time and provides visual justifications of its prediction based on the patient's static features and dynamic signals. Results of three case studies for predicting mortality and ICU admission show that the model outperforms all existing outcome prediction models, achieving PR-AUC of 0.891 (95$%$ CI: 0.878 - 0.969) in predicting mortality in ICU and general ward settings and 0.908 (95$%$ CI: 0.870-0.935) in predicting ICU admission.
△ Less
Submitted 11 June, 2021; v1 submitted 18 November, 2020;
originally announced November 2020.
-
Diverse Group Formation Based on Multiple Demographic Features
Authors:
Mohammed Alqahtani,
Susan Gauch,
Omar Salman,
Mohammed Ibrahim,
Reem Al-Saffar
Abstract:
The goal of group formation is to build a team to accomplish a specific task. Algorithms are employed to improve the effectiveness of the team so formed and the efficiency of the group selection process. However, there is concern that team formation algorithms could be biased against minorities due to the algorithms themselves or the data on which they are trained. Hence, it is essential to build…
▽ More
The goal of group formation is to build a team to accomplish a specific task. Algorithms are employed to improve the effectiveness of the team so formed and the efficiency of the group selection process. However, there is concern that team formation algorithms could be biased against minorities due to the algorithms themselves or the data on which they are trained. Hence, it is essential to build fair team formation systems that incorporate demographic information into the process of building the group. Although there has been extensive work on modeling individuals expertise for expert recommendation and or team formation, there has been relatively little prior work on modeling demographics and incorporating demographics into the group formation process.
We propose a novel method to represent experts demographic profiles based on multidimensional demographic features. Moreover, we introduce two diversity ranking algorithms that form a group by considering demographic features along with the minimum required skills. Unlike many ranking algorithms that consider one Boolean demographic feature (e.g., gender or race), our diversity ranking algorithms consider multiple multivalued demographic attributes simultaneously. We evaluate our proposed algorithms using a real dataset based on members of a computer science program committee. The result shows that our algorithms form a program committee that is more diverse with an acceptable loss in utility.
△ Less
Submitted 3 December, 2020; v1 submitted 9 August, 2020;
originally announced August 2020.
-
Asset Prices and Capital Share Risks: Theory and Evidence
Authors:
Joseph P. Byrne,
Boulis M. Ibrahim,
Xiaoyu Zong
Abstract:
An asset pricing model using long-run capital share growth risk has recently been found to successfully explain U.S. stock returns. Our paper adopts a recursive preference utility framework to derive an heterogeneous asset pricing model with capital share risks.While modeling capital share risks, we account for the elevated consumption volatility of high income stockholders. Capital risks have str…
▽ More
An asset pricing model using long-run capital share growth risk has recently been found to successfully explain U.S. stock returns. Our paper adopts a recursive preference utility framework to derive an heterogeneous asset pricing model with capital share risks.While modeling capital share risks, we account for the elevated consumption volatility of high income stockholders. Capital risks have strong volatility effects in our recursive asset pricing model. Empirical evidence is presented in which capital share growth is also a source of risk for stock return volatility. We uncover contrasting unconditional and conditional asset pricing evidence for capital share risks.
△ Less
Submitted 24 June, 2020;
originally announced June 2020.
-
Eikonal amplitudes and non-global logarithms from the BMS equation
Authors:
Hana Benslama,
Yazid Delenda,
Kamel Khelifa-Kerfa,
Abdelaziz Mohamed Ibrahim
Abstract:
The Banfi-Marchesini-Smye (BMS) equation accounts for non-global logarithms to all orders in perturbation theory in the large-Nc approximation. We show that the squared amplitudes for the emission of soft energy-ordered gluons are correctly embedded in this equation, and explicitly verify that they coincide with those derived in our previous work in the large-Nc limit up to sixth order in the stro…
▽ More
The Banfi-Marchesini-Smye (BMS) equation accounts for non-global logarithms to all orders in perturbation theory in the large-Nc approximation. We show that the squared amplitudes for the emission of soft energy-ordered gluons are correctly embedded in this equation, and explicitly verify that they coincide with those derived in our previous work in the large-Nc limit up to sixth order in the strong coupling. We perform analytical calculations for the non-global logarithms up to fourth order for the specific hemisphere mass distribution in e+ e- collisions, thus confirming our previous semi-numerical results. We show that the solution to the BMS equation may be cast into a product of an infinite number of exponentials each of which resums a class of Feynman diagrams that manifest a symmetry pattern, and explicitly carry out the computation of the first of these exponentials.
△ Less
Submitted 11 September, 2020; v1 submitted 11 June, 2020;
originally announced June 2020.
-
On the fluidic behavior of an over-expanded planar plug nozzle under lateral confinement
Authors:
M. Chaudhary,
T. V. Krishna,
Sowmya R. Nanda,
S. K. Karthick,
A. Khan,
A. De,
S. Mohammed Ibrahim
Abstract:
The present work aims to study the fluidic behavior on lateral confinement by placing side-walls on the planar plug nozzle through experiments. The study involves two cases of nozzle pressure ratio (NPR=3, 6), which correspond to over-expanded nozzle operating conditions. Steady-state pressure measurements, together with schlieren and surface oil flow visualization, reveal the presence of over-exp…
▽ More
The present work aims to study the fluidic behavior on lateral confinement by placing side-walls on the planar plug nozzle through experiments. The study involves two cases of nozzle pressure ratio (NPR=3, 6), which correspond to over-expanded nozzle operating conditions. Steady-state pressure measurements, together with schlieren and surface oil flow visualization, reveal the presence of over-expansion shock and subsequent interaction and modification of the flow field on the plug surface. The flow remains attached to the plug surface for NPR=3; whereas, for NPR=6, a separated flow field with a recirculation bubble is observed. Spectral analysis of the unsteady pressure signals illustrates a clear difference between the attached and the separated flow. Besides, other flow features with a distinct temporal mode associated with and without lateral confinement are observed. The absence of lateral confinement reduces the intensity of low-frequency unsteadiness; however, on the contrary, the interaction region is relatively reduced under lateral confinement.
△ Less
Submitted 2 August, 2020; v1 submitted 31 May, 2020;
originally announced June 2020.
-
Noise Robust Named Entity Understanding for Voice Assistants
Authors:
Deepak Muralidharan,
Joel Ruben Antony Moniz,
Sida Gao,
Xiao Yang,
Justine Kao,
Stephen Pulman,
Atish Kothari,
Ray Shen,
Yinying Pan,
Vivek Kaul,
Mubarak Seyed Ibrahim,
Gang Xiang,
Nan Dun,
Yidan Zhou,
Andy O,
Yuan Zhang,
Pooja Chitkara,
Xuan Wang,
Alkesh Patel,
Kushal Tayal,
Roger Zheng,
Peter Grasch,
Jason D. Williams,
Lin Li
Abstract:
Named Entity Recognition (NER) and Entity Linking (EL) play an essential role in voice assistant interaction, but are challenging due to the special difficulties associated with spoken user queries. In this paper, we propose a novel architecture that jointly solves the NER and EL tasks by combining them in a joint reranking module. We show that our proposed framework improves NER accuracy by up to…
▽ More
Named Entity Recognition (NER) and Entity Linking (EL) play an essential role in voice assistant interaction, but are challenging due to the special difficulties associated with spoken user queries. In this paper, we propose a novel architecture that jointly solves the NER and EL tasks by combining them in a joint reranking module. We show that our proposed framework improves NER accuracy by up to 3.13% and EL accuracy by up to 3.6% in F1 score. The features used also lead to better accuracies in other natural language understanding tasks, such as domain classification and semantic parsing.
△ Less
Submitted 10 August, 2021; v1 submitted 29 May, 2020;
originally announced May 2020.
-
High-Scalability CMOS Quantum Magnetometer with Spin-State Excitation and Detection of Diamond Color Centers
Authors:
Mohamed I. Ibrahim,
Christopher Foy,
Dirk R. Englund,
Ruonan Han
Abstract:
Magnetometers based on quantum mechanical processes enable high sensitivity and long-term stability without the need for re-calibration, but their integration into fieldable devices remains challenging. This paper presents a CMOS quantum vector-field magnetometer that miniaturizes the conventional quantum sensing platforms using nitrogen-vacancy (NV) centers in diamond. By integrating key componen…
▽ More
Magnetometers based on quantum mechanical processes enable high sensitivity and long-term stability without the need for re-calibration, but their integration into fieldable devices remains challenging. This paper presents a CMOS quantum vector-field magnetometer that miniaturizes the conventional quantum sensing platforms using nitrogen-vacancy (NV) centers in diamond. By integrating key components for spin control and readout, the chip performs magnetometry through optically detected magnetic resonance (ODMR) through a diamond slab attached to a custom CMOS chip. The ODMR control is highly uniform across the NV centers in the diamond, which is enabled by a CMOS-generated $\sim$2.87 GHz magnetic field with <5% inhomogeneity across a large-area current-driven wire array. The magnetometer chip is 1.5 mm$^2$ in size, prototyped in 65-nm bulk CMOS technology, and attached to a 300$\times$80 $μ$m2 diamond slab. NV fluorescence is measured by CMOS-integrated photodetectors. This on-chip measurement is enabled by efficient rejection of the green pump light from the red fluorescence through a CMOS-integrated spectral filter based on a combination of spectrally dependent plasmonic losses and diffractive filtering in the CMOS back-end-of-line (BEOL). This filter achieves $\sim$25 dB of green light rejection. We measure a sensitivity of 245 nT/Hz$^{1/2}$, marking a 130$\times$ improvement over a previous CMOS-NV sensor prototype, largely thanks to the better spectral filtering and homogeneous microwave generation over larger area.
△ Less
Submitted 22 July, 2020; v1 submitted 12 May, 2020;
originally announced May 2020.
-
Cell-Edge Detection via Selective Cooperation and Generalized Canonical Correlation
Authors:
Mohamed Salah Ibrahim,
Ahmed S. Zamzam,
Aritra Konar,
Nicholas D. Sidiropoulos
Abstract:
Improving the uplink quality of service for users located around the boundaries between cells is a key challenge in LTE systems. Relying on power control, existing approaches throttle the rates of cell-center users, while multi-user detection requires accurate channel estimates for the cell-edge users, which is another challenge due to their low received signal-to-noise ratio (SNR). Utilizing the…
▽ More
Improving the uplink quality of service for users located around the boundaries between cells is a key challenge in LTE systems. Relying on power control, existing approaches throttle the rates of cell-center users, while multi-user detection requires accurate channel estimates for the cell-edge users, which is another challenge due to their low received signal-to-noise ratio (SNR). Utilizing the fact that cell-edge user signals are weak but common (received at roughly equal power) at different base stations (BSs), this paper establishes a connection between cell-edge user detection and generalized canonical correlation analysis (GCCA). It puts forth a GCCA-based method that leverages selective BS cooperation to recover the cell-edge user signal subspace even at low SNR. The cell-edge user signals can then be extracted from the resulting mixture via algebraic signal processing techniques. The paper includes theoretical analysis showing why GCCA recovers the correct subspace containing the cell-edge user signals under mild conditions. The proposed method can also identify the number of cell-edge users in the system, i.e., the common subspace dimension. Simulations reveal significant performance improvement relative to various multiuser detection techniques. Cell-edge detection performance is further studied as a function of how many / which BSs are selected, and it is shown that using the closest three BS is always the best choice.
△ Less
Submitted 11 April, 2020;
originally announced April 2020.
-
Enriching Consumer Health Vocabulary Using Enhanced GloVe Word Embedding
Authors:
Mohammed Ibrahim,
Susan Gauch,
Omar Salman,
Mohammed Alqahatani
Abstract:
Open-Access and Collaborative Consumer Health Vocabulary (OAC CHV, or CHV for short), is a collection of medical terms written in plain English. It provides a list of simple, easy, and clear terms that laymen prefer to use rather than an equivalent professional medical term. The National Library of Medicine (NLM) has integrated and mapped the CHV terms to their Unified Medical Language System (UML…
▽ More
Open-Access and Collaborative Consumer Health Vocabulary (OAC CHV, or CHV for short), is a collection of medical terms written in plain English. It provides a list of simple, easy, and clear terms that laymen prefer to use rather than an equivalent professional medical term. The National Library of Medicine (NLM) has integrated and mapped the CHV terms to their Unified Medical Language System (UMLS). These CHV terms mapped to 56000 professional concepts on the UMLS. We found that about 48% of these laymen's terms are still jargon and matched with the professional terms on the UMLS. In this paper, we present an enhanced word embedding technique that generates new CHV terms from a consumer-generated text. We downloaded our corpus from a healthcare social media and evaluated our new method based on iterative feedback to word embedding using ground truth built from the existing CHV terms. Our feedback algorithm outperformed unmodified GLoVe and new CHV terms have been detected.
△ Less
Submitted 13 April, 2020; v1 submitted 31 March, 2020;
originally announced April 2020.
-
Design Multimedia Expert Diagnosing Diseases System Using Fuzzy Logic (MEDDSFL)
Authors:
Mohammed Salah Ibrahim,
Doaa Waleed Al-Dulaimee
Abstract:
In this paper we designed an efficient expert system to diagnose diseases for human beings. The system depended on several clinical features for different diseases which will be used as knowledge base for this system. We used fuzzy logic system which is one of the most expert systems techniques that used in building knowledge base of expert systems. Fuzzy logic will be used to inference the result…
▽ More
In this paper we designed an efficient expert system to diagnose diseases for human beings. The system depended on several clinical features for different diseases which will be used as knowledge base for this system. We used fuzzy logic system which is one of the most expert systems techniques that used in building knowledge base of expert systems. Fuzzy logic will be used to inference the results of disease diagnosing. We also provided the system with multimedia such as videos, pictures and information for most of disease that have been achieved in our system. The system implemented using Matlab ToolBox and fifteen diseases were studied. Five cases for normal, affected and unaffected people's different diseases have been tested on this system. The results show that system was able to predict the status whether a human has a disease or not accurately. All system results are reported in tables and discussed in detail.
△ Less
Submitted 22 March, 2020;
originally announced March 2020.
-
A Precisely Xtreme-Multi Channel Hybrid Approach For Roman Urdu Sentiment Analysis
Authors:
Faiza Memood,
Muhammad Usman Ghani,
Muhammad Ali Ibrahim,
Rehab Shehzadi,
Muhammad Nabeel Asim
Abstract:
In order to accelerate the performance of various Natural Language Processing tasks for Roman Urdu, this paper for the very first time provides 3 neural word embeddings prepared using most widely used approaches namely Word2vec, FastText, and Glove. The integrity of generated neural word embeddings is evaluated using intrinsic and extrinsic evaluation approaches. Considering the lack of publicly a…
▽ More
In order to accelerate the performance of various Natural Language Processing tasks for Roman Urdu, this paper for the very first time provides 3 neural word embeddings prepared using most widely used approaches namely Word2vec, FastText, and Glove. The integrity of generated neural word embeddings is evaluated using intrinsic and extrinsic evaluation approaches. Considering the lack of publicly available benchmark datasets, it provides a first-ever Roman Urdu dataset which consists of 3241 sentiments annotated against positive, negative and neutral classes. To provide benchmark baseline performance over the presented dataset, we adapt diverse machine learning (Support Vector Machine Logistic Regression, Naive Bayes), deep learning (convolutional neural network, recurrent neural network), and hybrid approaches. Effectiveness of generated neural word embeddings is evaluated by comparing the performance of machine and deep learning based methodologies using 7, and 5 distinct feature representation approaches respectively. Finally, it proposes a novel precisely extreme multi-channel hybrid methodology which outperforms state-of-the-art adapted machine and deep learning approaches by the figure of 9%, and 4% in terms of F1-score. Roman Urdu Sentiment Analysis, Pretrain word embeddings for Roman Urdu, Word2Vec, Glove, Fast-Text
△ Less
Submitted 11 March, 2020;
originally announced March 2020.
-
Reliable Detection of Unknown Cell-Edge Users Via Canonical Correlation Analysis
Authors:
Mohamed Salah Ibrahim,
Nicholas D. Sidiropoulos
Abstract:
Providing reliable service to users close to the edge between cells remains a challenge in cellular systems, even as 5G deployment is around the corner. These users are subject to significant signal attenuation, which also degrades their uplink channel estimates. Even joint detection using base station (BS) cooperation often fails to reliably detect such users, due to near-far power imbalance, and…
▽ More
Providing reliable service to users close to the edge between cells remains a challenge in cellular systems, even as 5G deployment is around the corner. These users are subject to significant signal attenuation, which also degrades their uplink channel estimates. Even joint detection using base station (BS) cooperation often fails to reliably detect such users, due to near-far power imbalance, and channel estimation errors. Is it possible to bypass the channel estimation stage and design a detector that can reliably detect cell-edge user signals under significant near-far imbalance? This paper shows, perhaps surprisingly, that the answer is affirmative -- albeit not via traditional multiuser detection. Exploiting that cell-edge user signals are weak but {\em common} to different base stations, while cell-center users are unique to their serving BS, this paper establishes an elegant connection between cell-edge user detection and canonical correlation analysis (CCA) of the associated space-time baseband-equivalent matrices. It proves that CCA identifies the common subspace of these matrices, even under significant intra- and inter-cell interference. The resulting mixture of cell-edge user signals can subsequently be unraveled using a well-known algebraic signal processing technique. Interestingly, the proposed approach does not even require that the signals from the different base stations are synchronized -- the right synchronization can be automatically determined as well. Experimental results demonstrate that the proposed approach achieves order of magnitude BER improvements compared to `oracle' multiuser detection that assumes perfect knowledge of the cell-center user channels.
△ Less
Submitted 4 March, 2020;
originally announced March 2020.
-
Fast Algorithms for Joint Multicast Beamforming and Antenna Selection in Massive MIMO
Authors:
Mohamed Salah Ibrahim,
Aritra Konar,
Nicholas D. Sidiropoulos
Abstract:
Massive MIMO is currently a leading physical layer technology candidate that can dramatically enhance throughput in 5G systems, for both unicast and multicast transmission modalities. As antenna elements are becoming smaller and cheaper in the mmW range compared to radio frequency (RF) chains, it is crucial to perform antenna selection at the transmitter, such that the available RF chains are swit…
▽ More
Massive MIMO is currently a leading physical layer technology candidate that can dramatically enhance throughput in 5G systems, for both unicast and multicast transmission modalities. As antenna elements are becoming smaller and cheaper in the mmW range compared to radio frequency (RF) chains, it is crucial to perform antenna selection at the transmitter, such that the available RF chains are switched to an appropriate subset of antennas. This paper considers the joint problem of multicast beamforming and antenna selection for a single multicast group in massive MIMO systems. The prior state-of-art for this problem relies on semi-definite relaxation (SDR), which cannot scale up to the massive MIMO regime. A successive convex approximation (SCA) based approach is proposed to tackle max-min fair joint multicast beamforming and antenna selection. The key idea of SCA is to successively approximate the non-convex problem by a class of non-smooth, convex optimization problems. Two fast and memory efficient first-order methods are proposed to solve each SCA subproblem. Simulations demonstrate that the proposed algorithms outperform the existing state-of-art approach in terms of solution quality and run time, in both traditional and especially in massive MIMO settings.
△ Less
Submitted 4 March, 2020;
originally announced March 2020.
-
Benchmark Performance of Machine And Deep Learning Based Methodologies for Urdu Text Document Classification
Authors:
Muhammad Nabeel Asim,
Muhammad Usman Ghani,
Muhammad Ali Ibrahim,
Sheraz Ahmad,
Waqar Mahmood,
Andreas Dengel
Abstract:
In order to provide benchmark performance for Urdu text document classification, the contribution of this paper is manifold. First, it pro-vides a publicly available benchmark dataset manually tagged against 6 classes. Second, it investigates the performance impact of traditional machine learning based Urdu text document classification methodologies by embedding 10 filter-based feature selection a…
▽ More
In order to provide benchmark performance for Urdu text document classification, the contribution of this paper is manifold. First, it pro-vides a publicly available benchmark dataset manually tagged against 6 classes. Second, it investigates the performance impact of traditional machine learning based Urdu text document classification methodologies by embedding 10 filter-based feature selection algorithms which have been widely used for other languages. Third, for the very first time, it as-sesses the performance of various deep learning based methodologies for Urdu text document classification. In this regard, for experimentation, we adapt 10 deep learning classification methodologies which have pro-duced best performance figures for English text classification. Fourth, it also investigates the performance impact of transfer learning by utiliz-ing Bidirectional Encoder Representations from Transformers approach for Urdu language. Fifth, it evaluates the integrity of a hybrid approach which combines traditional machine learning based feature engineering and deep learning based automated feature engineering. Experimental results show that feature selection approach named as Normalised Dif-ference Measure along with Support Vector Machine outshines state-of-the-art performance on two closed source benchmark datasets CLE Urdu Digest 1000k, and CLE Urdu Digest 1Million with a significant margin of 32%, and 13% respectively. Across all three datasets, Normalised Differ-ence Measure outperforms other filter based feature selection algorithms as it significantly uplifts the performance of all adopted machine learning, deep learning, and hybrid approaches. The source code and presented dataset are available at Github repository.
△ Less
Submitted 3 March, 2020;
originally announced March 2020.
-
Systematic Synthesis and Design of Ultra-Low Threshold Parametric Frequency Dividers
Authors:
Hussein M. E. Hussein,
Mahmoud A. A. Ibrahim,
Giuseppe Michetti,
Matteo Rinaldi,
Marvin Onabajo,
Cristian Cassella
Abstract:
A new method is discussed for the systematic synthesis, design and performance optimization of varactor-based parametric frequency dividers (PFDs) exhibiting an ultra-low power threshold ($P_{th}$). For the first time, it is analytically shown that the $P_{th}$-value exhibited by any PFD can always be expressed as an explicit closed-form function of the different impedances forming its network. Su…
▽ More
A new method is discussed for the systematic synthesis, design and performance optimization of varactor-based parametric frequency dividers (PFDs) exhibiting an ultra-low power threshold ($P_{th}$). For the first time, it is analytically shown that the $P_{th}$-value exhibited by any PFD can always be expressed as an explicit closed-form function of the different impedances forming its network. Such a unique and unexplored property permits to rely on linear models, during the PFD design and performance optimization. The validity of our analytical model has been verified, in a commercial circuit simulator, through time-domain and frequency-domain algorithms. To demonstrate the effectiveness of our new synthesis approach, we also report on a lumped prototype of a 200:100MHz PFD, realized on a printed circuit board (PCB). Although inductors with quality factors lower than 50 were used, the PFD prototype exhibits a $P_{th}$-value lower than $-$15dBm. Such a low $P_{th}$-value is the lowest one ever reported for passive varactor-based PFDs, operating in the same frequency range.
△ Less
Submitted 21 February, 2020;
originally announced February 2020.
-
New expansions for $x^n \pm y^n$ in terms of quadratic forms
Authors:
Moustafa Ibrahim
Abstract:
We prove new theorems for the polynomial expansions of $x^n \pm y^n$ in terms of the binary quadratic forms $αx^2 + βxy + αy^2 $ and $a x^2 + bxy + a y^2 $. The paper gives new arithmetic differential approach to compute the coefficients. Also, the paper gives generalization to well-known polynomial identity in the history of number theory. The paper highlights the emergence of a new class of poly…
▽ More
We prove new theorems for the polynomial expansions of $x^n \pm y^n$ in terms of the binary quadratic forms $αx^2 + βxy + αy^2 $ and $a x^2 + bxy + a y^2 $. The paper gives new arithmetic differential approach to compute the coefficients. Also, the paper gives generalization to well-known polynomial identity in the history of number theory. The paper highlights the emergence of a new class of polynomials that unify many well-known sequences including the Chebyshev polynomials of the first and second kind, Dickson polynomials of the first and second kind, Lucas and Fibonacci numbers, Mersenne numbers, Pell polynomials, Pell-Lucas polynomials, and Fermat numbers. Also, this paper highlights the emergence of the notions of trajectories and orbits of certain integers that passes through many well-known polynomials and sequences. The Lucas-Fibonacci trajectory, the Lucas-Pell trajectory, the Fibonacci-Pell trajectory, the Fibonacci-Lucas trajectory, the Chebyshev-Dickson trajectory of the first kind, the Chebyshev-Dickson trajectory of the second kind, and others are new trajectories included in this paper. Also, the Lucas orbit, Fibonacci orbit, Mersenne orbit, Lucas-Fibonacci orbit, Fermat orbit, and others are new orbits included in this paper.
△ Less
Submitted 9 February, 2020; v1 submitted 21 January, 2020;
originally announced January 2020.
-
Heart Segmentation From MRI Scans Using Convolutional Neural Network
Authors:
Shakeel Muhammad Ibrahim,
Muhammad Sohail Ibrahim,
Muhammad Usman,
Imran Naseem,
Muhammad Moinuddin
Abstract:
Heart is one of the vital organs of human body. A minor dysfunction of heart even for a short time interval can be fatal, therefore, efficient monitoring of its physiological state is essential for the patients with cardiovascular diseases. In the recent past, various computer assisted medical imaging systems have been proposed for the segmentation of the organ of interest. However, for the segmen…
▽ More
Heart is one of the vital organs of human body. A minor dysfunction of heart even for a short time interval can be fatal, therefore, efficient monitoring of its physiological state is essential for the patients with cardiovascular diseases. In the recent past, various computer assisted medical imaging systems have been proposed for the segmentation of the organ of interest. However, for the segmentation of heart using MRI, only few methods have been proposed each with its own merits and demerits. For further advancement in this area of research, we analyze automated heart segmentation methods for magnetic resonance images. The analysis are based on deep learning methods that processes a full MR scan in a slice by slice fashion to predict desired mask for heart region. We design two encoder decoder type fully convolutional neural network models
△ Less
Submitted 21 November, 2019;
originally announced November 2019.
-
WeatherNet: Recognising weather and visual conditions from street-level images using deep residual learning
Authors:
Mohamed R. Ibrahim,
James Haworth,
Tao Cheng
Abstract:
Extracting information related to weather and visual conditions at a given time and space is indispensable for scene awareness, which strongly impacts our behaviours, from simply walking in a city to riding a bike, driving a car, or autonomous drive-assistance. Despite the significance of this subject, it is still not been fully addressed by the machine intelligence relying on deep learning and co…
▽ More
Extracting information related to weather and visual conditions at a given time and space is indispensable for scene awareness, which strongly impacts our behaviours, from simply walking in a city to riding a bike, driving a car, or autonomous drive-assistance. Despite the significance of this subject, it is still not been fully addressed by the machine intelligence relying on deep learning and computer vision to detect the multi-labels of weather and visual conditions with a unified method that can be easily used for practice. What has been achieved to-date is rather sectorial models that address limited number of labels that do not cover the wide spectrum of weather and visual conditions. Nonetheless, weather and visual conditions are often addressed individually. In this paper, we introduce a novel framework to automatically extract this information from street-level images relying on deep learning and computer vision using a unified method without any pre-defined constraints in the processed images. A pipeline of four deep Convolutional Neural Network (CNN) models, so-called the WeatherNet, is trained, relying on residual learning using ResNet50 architecture, to extract various weather and visual conditions such as Dawn/dusk, day and night for time detection, and glare for lighting conditions, and clear, rainy, snowy, and foggy for weather conditions. The WeatherNet shows strong performance in extracting this information from user-defined images or video streams that can be used not limited to: autonomous vehicles and drive-assistance systems, tracking behaviours, safety-related research, or even for better understanding cities through images for policy-makers.
△ Less
Submitted 22 October, 2019;
originally announced October 2019.
-
Leveraging User Engagement Signals For Entity Labeling in a Virtual Assistant
Authors:
Deepak Muralidharan,
Justine Kao,
Xiao Yang,
Lin Li,
Lavanya Viswanathan,
Mubarak Seyed Ibrahim,
Kevin Luikens,
Stephen Pulman,
Ashish Garg,
Atish Kothari,
Jason Williams
Abstract:
Personal assistant AI systems such as Siri, Cortana, and Alexa have become widely used as a means to accomplish tasks through natural language commands. However, components in these systems generally rely on supervised machine learning algorithms that require large amounts of hand-annotated training data, which is expensive and time consuming to collect. The ability to incorporate unsupervised, we…
▽ More
Personal assistant AI systems such as Siri, Cortana, and Alexa have become widely used as a means to accomplish tasks through natural language commands. However, components in these systems generally rely on supervised machine learning algorithms that require large amounts of hand-annotated training data, which is expensive and time consuming to collect. The ability to incorporate unsupervised, weakly supervised, or distantly supervised data holds significant promise in overcoming this bottleneck. In this paper, we describe a framework that leverages user engagement signals (user behaviors that demonstrate a positive or negative response to content) to automatically create granular entity labels for training data augmentation. Strategies such as multi-task learning and validation using an external knowledge base are employed to incorporate the engagement annotated data and to boost the model's accuracy on a sequence labeling task. Our results show that learning from data automatically labeled by user engagement signals achieves significant accuracy gains in a production deep learning system, when measured on both the sequence labeling task as well as on user facing results produced by the system end-to-end. We believe this is the first use of user engagement signals to help generate training data for a sequence labeling task on a large scale, and can be applied in practical settings to speed up new feature deployment when little human annotated data is available.
△ Less
Submitted 18 September, 2019;
originally announced September 2019.
-
Chaotic Time Series Prediction using Spatio-Temporal RBF Neural Networks
Authors:
Alishba Sadiq,
Muhammad Sohail Ibrahim,
Muhammad Usman,
Muhammad Zubair,
Shujaat Khan
Abstract:
Due to the dynamic nature, chaotic time series are difficult predict. In conventional signal processing approaches signals are treated either in time or in space domain only. Spatio-temporal analysis of signal provides more advantages over conventional uni-dimensional approaches by harnessing the information from both the temporal and spatial domains. Herein, we propose an spatio-temporal extensio…
▽ More
Due to the dynamic nature, chaotic time series are difficult predict. In conventional signal processing approaches signals are treated either in time or in space domain only. Spatio-temporal analysis of signal provides more advantages over conventional uni-dimensional approaches by harnessing the information from both the temporal and spatial domains. Herein, we propose an spatio-temporal extension of RBF neural networks for the prediction of chaotic time series. The proposed algorithm utilizes the concept of time-space orthogonality and separately deals with the temporal dynamics and spatial non-linearity(complexity) of the chaotic series. The proposed RBF architecture is explored for the prediction of Mackey-Glass time series and results are compared with the standard RBF. The spatio-temporal RBF is shown to out perform the standard RBFNN by achieving significantly reduced estimation error.
△ Less
Submitted 17 August, 2019;
originally announced August 2019.
-
Are Quantitative Features of Lung Nodules Reproducible at Different CT Acquisition and Reconstruction Parameters?
Authors:
Barbaros S. Erdal,
Mutlu Demirer,
Chiemezie C. Amadi,
Gehan F. M. Ibrahim,
Thomas P. O'Donnell,
Rainer Grimmer,
Andreas Wimmer,
Kevin J. Little,
Vikash Gupta,
Matthew T. Bigelow,
Luciano M. Prevedello,
Richard D. White
Abstract:
Consistency and duplicability in Computed Tomography (CT) output is essential to quantitative imaging for lung cancer detection and monitoring. This study of CT-detected lung nodules investigated the reproducibility of volume-, density-, and texture-based features (outcome variables) over routine ranges of radiation-dose, reconstruction kernel, and slice thickness. CT raw data of 23 nodules were r…
▽ More
Consistency and duplicability in Computed Tomography (CT) output is essential to quantitative imaging for lung cancer detection and monitoring. This study of CT-detected lung nodules investigated the reproducibility of volume-, density-, and texture-based features (outcome variables) over routine ranges of radiation-dose, reconstruction kernel, and slice thickness. CT raw data of 23 nodules were reconstructed using 320 acquisition/reconstruction conditions (combinations of 4 doses, 10 kernels, and 8 thicknesses). Scans at 12.5%, 25%, and 50% of protocol dose were simulated; reduced-dose and full-dose data were reconstructed using conventional filtered back-projection and iterative-reconstruction kernels at a range of thicknesses (0.6-5.0 mm). Full-dose/B50f kernel reconstructions underwent expert segmentation for reference Region-Of-Interest (ROI) and nodule volume per thickness; each ROI was applied to 40 corresponding images (combinations of 4 doses and 10 kernels). Typical texture analysis metrics (including 5 histogram features, 13 Gray Level Co-occurrence Matrix, 5 Run Length Matrix, 2 Neighboring Gray-Level Dependence Matrix, and 2 Neighborhood Gray-Tone Difference Matrix) were computed per ROI. Reconstruction conditions resulting in no significant change in volume, density, or texture metrics were identified as "compatible pairs" for a given outcome variable. Our results indicate that as thickness increases, volumetric reproducibility decreases, while reproducibility of histogram- and texture-based features across different acquisition and reconstruction parameters improves. In order to achieve concomitant reproducibility of volumetric and radiomic results across studies, balanced standardization of the imaging acquisition parameters is required.
△ Less
Submitted 14 August, 2019;
originally announced August 2019.
-
Quantum Calculus-based Volterra LMS for Nonlinear Channel Estimation
Authors:
Muhammad Usman,
Muhammad Sohail Ibrahim,
Jawwad Ahmad,
Syed Saiq Hussain,
Muhammad Moinuddin
Abstract:
A novel adaptive filtering method called $q$-Volterra least mean square ($q$-VLMS) is presented in this paper. The $q$-VLMS is a nonlinear extension of conventional LMS and it is based on Jackson's derivative also known as $q$-calculus. In Volterra LMS, due to large variance of input signal the convergence speed is very low. With proper manipulation we successfully improved the convergence perform…
▽ More
A novel adaptive filtering method called $q$-Volterra least mean square ($q$-VLMS) is presented in this paper. The $q$-VLMS is a nonlinear extension of conventional LMS and it is based on Jackson's derivative also known as $q$-calculus. In Volterra LMS, due to large variance of input signal the convergence speed is very low. With proper manipulation we successfully improved the convergence performance of the Volterra LMS. The proposed algorithm is analyzed for the step-size bounds and results of analysis are verified through computer simulations for nonlinear channel estimation problem.
△ Less
Submitted 7 August, 2019;
originally announced August 2019.
-
Device-to-Device Coded Caching with Distinct Cache Sizes
Authors:
Abdelrahman M. Ibrahim,
Ahmed A. Zewail,
Aylin Yener
Abstract:
This paper considers a cache-aided device-to-device (D2D) system where the users are equipped with cache memories of different size. During low traffic hours, a server places content in the users' cache memories, knowing that the files requested by the users during peak traffic hours will have to be delivered by D2D transmissions only. The worst-case D2D delivery load is minimized by jointly desig…
▽ More
This paper considers a cache-aided device-to-device (D2D) system where the users are equipped with cache memories of different size. During low traffic hours, a server places content in the users' cache memories, knowing that the files requested by the users during peak traffic hours will have to be delivered by D2D transmissions only. The worst-case D2D delivery load is minimized by jointly designing the uncoded cache placement and linear coded D2D delivery. Next, a novel lower bound on the D2D delivery load with uncoded placement is proposed and used in explicitly characterizing the minimum D2D delivery load (MD2DDL) with uncoded placement for several cases of interest. In particular, having characterized the MD2DDL for equal cache sizes, it is shown that the same delivery load can be achieved in the network with users of unequal cache sizes, provided that the smallest cache size is greater than a certain threshold. The MD2DDL is also characterized in the small cache size regime, the large cache size regime, and the three-user case. Comparisons of the server-based delivery load with the D2D delivery load are provided. Finally, connections and mathematical parallels between cache-aided D2D systems and coded distributed computing (CDC) systems are discussed.
△ Less
Submitted 19 March, 2019;
originally announced March 2019.
-
Efficiently Reusing Natural Language Processing Models for Phenotype-Mention Identification in Free-text Electronic Medical Records: Methodology Study
Authors:
Honghan Wu,
Karen Hodgson,
Sue Dyson,
Katherine I. Morley,
Zina M. Ibrahim,
Ehtesham Iqbal,
Robert Stewart,
Richard JB Dobson,
Cathie Sudlow
Abstract:
Background: Many efforts have been put into the use of automated approaches, such as natural language processing (NLP), to mine or extract data from free-text medical records to construct comprehensive patient profiles for delivering better health-care. Reusing NLP models in new settings, however, remains cumbersome - requiring validation and/or retraining on new data iteratively to achieve conver…
▽ More
Background: Many efforts have been put into the use of automated approaches, such as natural language processing (NLP), to mine or extract data from free-text medical records to construct comprehensive patient profiles for delivering better health-care. Reusing NLP models in new settings, however, remains cumbersome - requiring validation and/or retraining on new data iteratively to achieve convergent results.
Objective: The aim of this work is to minimize the effort involved in reusing NLP models on free-text medical records.
Methods: We formally define and analyse the model adaptation problem in phenotype-mention identification tasks. We identify "duplicate waste" and "imbalance waste", which collectively impede efficient model reuse. We propose a phenotype embedding based approach to minimize these sources of waste without the need for labelled data from new settings.
Results: We conduct experiments on data from a large mental health registry to reuse NLP models in four phenotype-mention identification tasks. The proposed approach can choose the best model for a new task, identifying up to 76% (duplicate waste), i.e. phenotype mentions without the need for validation and model retraining, and with very good performance (93-97% accuracy). It can also provide guidance for validating and retraining the selected model for novel language patterns in new tasks, saving around 80% (imbalance waste), i.e. the effort required in "blind" model-adaptation approaches.
Conclusions: Adapting pre-trained NLP models for new tasks can be more efficient and effective if the language pattern landscapes of old settings and new settings can be made explicit and comparable. Our experiments show that the phenotype-mention embedding approach is an effective way to model language patterns for phenotype-mention identification tasks and that its use can guide efficient NLP model reuse.
△ Less
Submitted 23 October, 2019; v1 submitted 10 March, 2019;
originally announced March 2019.
-
Time-Frequency Warped Waveforms
Authors:
Mostafa Ibrahim,
Ali Fatih Demir,
Huseyin Arslan
Abstract:
The forthcoming communication systems are advancing towards improved flexibility in various aspects. Improved flexibility is crucial to cater diverse service requirements. This letter proposes a novel waveform design scheme that exploits axis war** to enable peaceful coexistence of different pulse shapes. A war** transform manipulates the lattice samples non-uniformly and provides flexibility…
▽ More
The forthcoming communication systems are advancing towards improved flexibility in various aspects. Improved flexibility is crucial to cater diverse service requirements. This letter proposes a novel waveform design scheme that exploits axis war** to enable peaceful coexistence of different pulse shapes. A war** transform manipulates the lattice samples non-uniformly and provides flexibility to handle the time-frequency occupancy of a signal. The proposed approach enables the utilization of flexible pulse shapes in a quasi-orthogonal manner and increases the spectral efficiency. In addition, the rectangular resource block structure, which assists an efficient resource allocation, is preserved with the warped waveform design as well.
△ Less
Submitted 15 February, 2019;
originally announced February 2019.
-
Waveform Design for 5G and Beyond
Authors:
Ali Fatih Demir,
M. Elkourdi,
M. Ibrahim,
H. Arslan
Abstract:
5G is envisioned to improve major key performance indicators (KPIs), such as peak data rate, spectral efficiency, power consumption, complexity, connection density, latency, and mobility. This chapter aims to provide a complete picture of the ongoing 5G waveform discussions and overviews the major candidates. It provides a brief description of the waveform and reveals the 5G use cases and waveform…
▽ More
5G is envisioned to improve major key performance indicators (KPIs), such as peak data rate, spectral efficiency, power consumption, complexity, connection density, latency, and mobility. This chapter aims to provide a complete picture of the ongoing 5G waveform discussions and overviews the major candidates. It provides a brief description of the waveform and reveals the 5G use cases and waveform design requirements. The chapter presents the main features of cyclic prefix-orthogonal frequency-division multiplexing (CP-OFDM) that is deployed in 4G LTE systems. CP-OFDM is the baseline of the 5G waveform discussions since the performance of a new waveform is usually compared with it. The chapter examines the essential characteristics of the major waveform candidates along with the related advantages and disadvantages. It summarizes and compares the key features of different waveforms.
△ Less
Submitted 15 February, 2019;
originally announced February 2019.
-
Detecting Local Community Structures in Social Networks Using Concept Interestingness
Authors:
Mohamed-Hamza Ibrahim,
Rokia Missaoui,
Abir Messaoudi
Abstract:
One key challenge in Social Network Analysis is to design an efficient and accurate community detection procedure as a means to discover intrinsic structures and extract relevant information. In this paper, we introduce a novel strategy called (COIN), which exploits COncept INterestingness measures to detect communities based on the concept lattice construction of the network. Thus, unlike off-the…
▽ More
One key challenge in Social Network Analysis is to design an efficient and accurate community detection procedure as a means to discover intrinsic structures and extract relevant information. In this paper, we introduce a novel strategy called (COIN), which exploits COncept INterestingness measures to detect communities based on the concept lattice construction of the network. Thus, unlike off-the-shelf community detection algorithms, COIN leverages relevant conceptual characteristics inherited from Formal Concept Analysis to discover substantial local structures. On the first stage of COIN, we extract the formal concepts that capture all the cliques and bridges in the social network. On the second stage, we use the stability index to remove noisy bridges between communities and then percolate relevant adjacent cliques. Our experiments on several real-world social networks show that COIN can quickly detect communities more accurately than existing prominent algorithms such as Edge betweenness, Fast greedy modularity, and Infomap.
△ Less
Submitted 5 February, 2019;
originally announced February 2019.
-
Global Explanations of Neural Networks: Map** the Landscape of Predictions
Authors:
Mark Ibrahim,
Melissa Louie,
Ceena Modarres,
John Paisley
Abstract:
A barrier to the wider adoption of neural networks is their lack of interpretability. While local explanation methods exist for one prediction, most global attributions still reduce neural network decisions to a single set of features. In response, we present an approach for generating global attributions called GAM, which explains the landscape of neural network predictions across subpopulations.…
▽ More
A barrier to the wider adoption of neural networks is their lack of interpretability. While local explanation methods exist for one prediction, most global attributions still reduce neural network decisions to a single set of features. In response, we present an approach for generating global attributions called GAM, which explains the landscape of neural network predictions across subpopulations. GAM augments global explanations with the proportion of samples that each attribution best explains and specifies which samples are described by each attribution. Global explanations also have tunable granularity to detect more or fewer subpopulations. We demonstrate that GAM's global explanations 1) yield the known feature importances of simulated data, 2) match feature weights of interpretable statistical models on real data, and 3) are intuitive to practitioners through user studies. With more transparent predictions, GAM can help ensure neural network decisions are generated for the right reasons.
△ Less
Submitted 6 February, 2019;
originally announced February 2019.
-
Mixed Membership Recurrent Neural Networks
Authors:
Ghazal Fazelnia,
Mark Ibrahim,
Ceena Modarres,
Kevin Wu,
John Paisley
Abstract:
Models for sequential data such as the recurrent neural network (RNN) often implicitly model a sequence as having a fixed time interval between observations and do not account for group-level effects when multiple sequences are observed. We propose a model for grouped sequential data based on the RNN that accounts for varying time intervals between observations in a sequence by learning a group-le…
▽ More
Models for sequential data such as the recurrent neural network (RNN) often implicitly model a sequence as having a fixed time interval between observations and do not account for group-level effects when multiple sequences are observed. We propose a model for grouped sequential data based on the RNN that accounts for varying time intervals between observations in a sequence by learning a group-level base parameter to which each sequence can revert. Our approach is motivated by the mixed membership framework, and we show how it can be used for dynamic topic modeling in which the distribution on topics (not the topics themselves) are evolving in time. We demonstrate our approach on a dataset of 3.4 million online grocery shop** orders made by 206K customers.
△ Less
Submitted 22 December, 2018;
originally announced December 2018.
-
Semi-Supervised Semantic Image Segmentation with Self-correcting Networks
Authors:
Mostafa S. Ibrahim,
Arash Vahdat,
Mani Ranjbar,
William G. Macready
Abstract:
Building a large image dataset with high-quality object masks for semantic segmentation is costly and time consuming. In this paper, we introduce a principled semi-supervised framework that only uses a small set of fully supervised images (having semantic segmentation labels and box labels) and a set of images with only object bounding box labels (we call it the weak set). Our framework trains the…
▽ More
Building a large image dataset with high-quality object masks for semantic segmentation is costly and time consuming. In this paper, we introduce a principled semi-supervised framework that only uses a small set of fully supervised images (having semantic segmentation labels and box labels) and a set of images with only object bounding box labels (we call it the weak set). Our framework trains the primary segmentation model with the aid of an ancillary model that generates initial segmentation labels for the weak set and a self-correction module that improves the generated labels during training using the increasingly accurate primary model. We introduce two variants of the self-correction module using either linear or convolutional functions. Experiments on the PASCAL VOC 2012 and Cityscape datasets show that our models trained with a small fully supervised set perform similar to, or better than, models trained with a large fully supervised set while requiring ~7x less annotation effort.
△ Less
Submitted 25 February, 2020; v1 submitted 16 November, 2018;
originally announced November 2018.
-
Towards Explainable Deep Learning for Credit Lending: A Case Study
Authors:
Ceena Modarres,
Mark Ibrahim,
Melissa Louie,
John Paisley
Abstract:
Deep learning adoption in the financial services industry has been limited due to a lack of model interpretability. However, several techniques have been proposed to explain predictions made by a neural network. We provide an initial investigation into these techniques for the assessment of credit risk with neural networks.
Deep learning adoption in the financial services industry has been limited due to a lack of model interpretability. However, several techniques have been proposed to explain predictions made by a neural network. We provide an initial investigation into these techniques for the assessment of credit risk with neural networks.
△ Less
Submitted 30 November, 2018; v1 submitted 15 November, 2018;
originally announced November 2018.
-
Benefits of Coded Placement for Networks with Heterogeneous Cache Sizes
Authors:
Abdelrahman M. Ibrahim,
Ahmed A. Zewail,
Aylin Yener
Abstract:
In this work, we study coded placement in caching systems where the users have unequal cache sizes and demonstrate its performance advantage. In particular, we propose a caching scheme with coded placement for three-user systems that outperforms the best caching scheme with uncoded placement. In our proposed scheme, users cache both uncoded and coded pieces of the files, and the coded pieces at th…
▽ More
In this work, we study coded placement in caching systems where the users have unequal cache sizes and demonstrate its performance advantage. In particular, we propose a caching scheme with coded placement for three-user systems that outperforms the best caching scheme with uncoded placement. In our proposed scheme, users cache both uncoded and coded pieces of the files, and the coded pieces at the users with large memories are decoded using the unicast/multicast signals intended to serve users with smaller memories. Furthermore, we extend the proposed scheme to larger systems and show the reduction in delivery load with coded placement compared to uncoded placement.
△ Less
Submitted 9 November, 2018;
originally announced November 2018.