-
On the Eight Levels theorem and applications towards Lucas-Lehmer primality test for Mersenne primes, I
Authors:
Moustafa Ibrahim
Abstract:
Lucas-Lehmer test is the current standard algorithm used for testing the primality of Mersenne numbers, but it may have limitations in terms of its efficiency and accuracy. Develo** new algorithms or improving upon existing ones could potentially improve the search for Mersenne primes and the understanding of the distribution of Mersenne primes and composites. The development of new versions of…
▽ More
Lucas-Lehmer test is the current standard algorithm used for testing the primality of Mersenne numbers, but it may have limitations in terms of its efficiency and accuracy. Develo** new algorithms or improving upon existing ones could potentially improve the search for Mersenne primes and the understanding of the distribution of Mersenne primes and composites. The development of new versions of the primality test for Mersenne numbers could help to speed up the search for new Mersenne primes by improving the efficiency of the algorithm. This could potentially lead to the discovery of new Mersenne primes that were previously beyond the reach of current computational resources. The current paper proves what the author called the Eight Levels Theorem and then highlights and proves three new different versions for Lucas-Lehmer primality test for Mersenne primes and also gives a new criterion for Mersenne compositeness.
△ Less
Submitted 11 May, 2023;
originally announced May 2023.
-
The Missing Link: Exploring the Relationship Between Transformational Leadership and Change in team members in Construction
Authors:
M. R. Ibrahim
Abstract:
This study aimed to investigate how transformational leadership affects team processes, mediated by change in team members. A self-administered questionnaire was distributed to construction project team members in Abuja and Kaduna, and statistical analysis revealed a significant positive relationship between transformational leadership and team processes, transformational leadership and change in…
▽ More
This study aimed to investigate how transformational leadership affects team processes, mediated by change in team members. A self-administered questionnaire was distributed to construction project team members in Abuja and Kaduna, and statistical analysis revealed a significant positive relationship between transformational leadership and team processes, transformational leadership and change in team members, changes in team members and team processes, and changes in team members mediating the relationship between transformational leadership and team processes. Future studies should consider cultural differences.
△ Less
Submitted 22 May, 2023;
originally announced May 2023.
-
The Key to Organizational and construction Excellence: A Study of Total Quality Management
Authors:
M. R. Ibrahim,
D. U. Muhammad,
B. Muhammad,
J. O. Alaezi,
J. Agidani
Abstract:
This study examines the impact of Total Quality Management (TQM) practices on organizational outcomes. Results show a significant relationship between TQM practices such as top executive commitment, education and teaching, process control, and continuous progress, and how they can be leveraged to enhance performance outcomes.
This study examines the impact of Total Quality Management (TQM) practices on organizational outcomes. Results show a significant relationship between TQM practices such as top executive commitment, education and teaching, process control, and continuous progress, and how they can be leveraged to enhance performance outcomes.
△ Less
Submitted 22 May, 2023;
originally announced May 2023.
-
PCOAST: A Pauli-based Quantum Circuit Optimization Framework
Authors:
Jennifer Paykin,
Albert T. Schmitz,
Mohannad Ibrahim,
Xin-Chuan Wu,
A. Y. Matsuura
Abstract:
This paper presents the Pauli-based Circuit Optimization, Analysis, and Synthesis Toolchain (PCOAST), a framework for quantum circuit optimizations based on the commutative properties of Pauli strings. Prior work has demonstrated that commuting Clifford gates past Pauli rotations can expose opportunities for optimization in unitary circuits. PCOAST extends that approach by adapting the technique t…
▽ More
This paper presents the Pauli-based Circuit Optimization, Analysis, and Synthesis Toolchain (PCOAST), a framework for quantum circuit optimizations based on the commutative properties of Pauli strings. Prior work has demonstrated that commuting Clifford gates past Pauli rotations can expose opportunities for optimization in unitary circuits. PCOAST extends that approach by adapting the technique to mixed unitary and non-unitary circuits via generalized preparation and measurement nodes parameterized by Pauli strings. The result is the PCOAST graph, which enables novel optimizations based on whether a user needs to preserve the quantum state after executing the circuit, or whether they only need to preserve the measurement outcomes. Finally, the framework adapts a highly tunable greedy synthesis algorithm to implement the PCOAST graph with a given gate set.
PCOAST is implemented as a set of compiler passes in the Intel Quantum SDK. In this paper, we evaluate its compilation performance against two leading quantum compilers, Qiskit and tket. We find that PCOAST reduces total gate count by 32.53% and 43.33% on average, compared to to the best performance achieved by Qiskit and tket respectively, two-qubit gates by 29.22% and 20.58%, and circuit depth by 42.02% and 51.27%.
△ Less
Submitted 23 May, 2023; v1 submitted 16 May, 2023;
originally announced May 2023.
-
Optimization at the Interface of Unitary and Non-unitary Quantum Operations in PCOAST
Authors:
Albert T. Schmitz,
Mohannad Ibrahim,
Nicolas P. D. Sawaya,
Gian Giacomo Guerreschi,
Jennifer Paykin,
Xin-Chuan Wu,
A. Y. Matsuura
Abstract:
The Pauli-based Circuit Optimization, Analysis and Synthesis Toolchain (PCOAST) was recently introduced as a framework for optimizing quantum circuits. It converts a quantum circuit to a Pauli-based graph representation and provides a set of optimization subroutines to manipulate that internal representation as well as methods for re-synthesizing back to a quantum circuit. In this paper, we focus…
▽ More
The Pauli-based Circuit Optimization, Analysis and Synthesis Toolchain (PCOAST) was recently introduced as a framework for optimizing quantum circuits. It converts a quantum circuit to a Pauli-based graph representation and provides a set of optimization subroutines to manipulate that internal representation as well as methods for re-synthesizing back to a quantum circuit. In this paper, we focus on the set of subroutines which look to optimize the PCOAST graph in cases involving unitary and non-unitary operations as represented by nodes in the graph. This includes reduction of node cost and node number in the presence of preparation nodes, reduction of cost for Clifford operations in the presence of preparations, and measurement cost reduction using Clifford operations and the classical remap** of measurement outcomes. These routines can also be combined to amplify their effectiveness.
We evaluate the PCOAST optimization subroutines using the Intel Quantum SDK on examples of the Variational Quantum Eigensolver (VQE) algorithm. This includes synthesizing a circuit for the simultaneous measurement of a mutually commuting set of Pauli operators. We find for such measurement circuits the overall average ratio of the maximum theoretical number of two-qubit gates to the actual number of two-qubit gates used by our method to be 7.91.
△ Less
Submitted 22 May, 2023; v1 submitted 16 May, 2023;
originally announced May 2023.
-
Crosstalk-Based Parameterized Quantum Circuit Approximation
Authors:
Mohannad Ibrahim,
Nicholas T. Bronn,
Gregory T. Byrd
Abstract:
In this paper, we propose an ansatz approximation approach for variational quantum algorithms (VQAs) that uses one of the hardware's main attributes, its crosstalk behavior, as its main approximation driver. By utilizing crosstalk-adaptive scheduling, we are able to apply a circuit-level approximation/optimization to our ansatz. Our design procedure involves first characterizing the hardware's cro…
▽ More
In this paper, we propose an ansatz approximation approach for variational quantum algorithms (VQAs) that uses one of the hardware's main attributes, its crosstalk behavior, as its main approximation driver. By utilizing crosstalk-adaptive scheduling, we are able to apply a circuit-level approximation/optimization to our ansatz. Our design procedure involves first characterizing the hardware's crosstalk and then approximating the circuit by a desired level of crosstalk mitigation, all while effectively reducing its duration and gate counts. We demonstrate the effect of crosstalk mitigation on expressibility, trainability, and entanglement: key components that drive the utility of parameterized circuits. We tested our approach on real quantum hardware against a base configuration, and our results showed superior performance for the circuit-level optimized ansatz over a base ansatz for two quantum chemistry benchmarks. We take into consideration that applications vary in their response to crosstalk, and we believe that this approximation strategy can be used to create ansatze that are expressive, trainable, and with crosstalk mitigation levels tailored for specific workloads.
△ Less
Submitted 15 May, 2023; v1 submitted 6 May, 2023;
originally announced May 2023.
-
Time-Frequency Warped Waveforms for Well-Contained Massive Machine Type Communications
Authors:
Mostafa Ibrahim,
Huseyin Arslan,
Hakan Ali Cirpan,
Sabit Ekin
Abstract:
This paper proposes a novel time-frequency warped waveform for short symbols, massive machine-type communication (mMTC), and internet of things (IoT) applications. The waveform is composed of asymmetric raised cosine (RC) pulses to increase the signal containment in time and frequency domains. The waveform has low power tails in the time domain, hence better performance in the presence of delay sp…
▽ More
This paper proposes a novel time-frequency warped waveform for short symbols, massive machine-type communication (mMTC), and internet of things (IoT) applications. The waveform is composed of asymmetric raised cosine (RC) pulses to increase the signal containment in time and frequency domains. The waveform has low power tails in the time domain, hence better performance in the presence of delay spread and time offsets. The time-axis war** unitary transform is applied to control the waveform occupancy in time-frequency space and to compensate for the usage of high roll-off factor pulses at the symbol edges. The paper explains a step-by-step analysis for determining the roll-off factors profile and the war** functions. Gains are presented over the conventional Zero-tail Discrete Fourier Transform-spread-Orthogonal Frequency Division Multiplexing (ZT-DFT-s-OFDM), and Cyclic prefix (CP) DFT-s-OFDM schemes in the simulations section.
△ Less
Submitted 1 May, 2023;
originally announced May 2023.
-
A Cookbook of Self-Supervised Learning
Authors:
Randall Balestriero,
Mark Ibrahim,
Vlad Sobal,
Ari Morcos,
Shashank Shekhar,
Tom Goldstein,
Florian Bordes,
Adrien Bardes,
Gregoire Mialon,
Yuandong Tian,
Avi Schwarzschild,
Andrew Gordon Wilson,
Jonas Gei**,
Quentin Garrido,
Pierre Fernandez,
Amir Bar,
Hamed Pirsiavash,
Yann LeCun,
Micah Goldblum
Abstract:
Self-supervised learning, dubbed the dark matter of intelligence, is a promising path to advance machine learning. Yet, much like cooking, training SSL methods is a delicate art with a high barrier to entry. While many components are familiar, successfully training a SSL method involves a dizzying set of choices from the pretext tasks to training hyper-parameters. Our goal is to lower the barrier…
▽ More
Self-supervised learning, dubbed the dark matter of intelligence, is a promising path to advance machine learning. Yet, much like cooking, training SSL methods is a delicate art with a high barrier to entry. While many components are familiar, successfully training a SSL method involves a dizzying set of choices from the pretext tasks to training hyper-parameters. Our goal is to lower the barrier to entry into SSL research by laying the foundations and latest SSL recipes in the style of a cookbook. We hope to empower the curious researcher to navigate the terrain of methods, understand the role of the various knobs, and gain the know-how required to explore how delicious SSL can be.
△ Less
Submitted 28 June, 2023; v1 submitted 24 April, 2023;
originally announced April 2023.
-
Pinpointing Why Object Recognition Performance Degrades Across Income Levels and Geographies
Authors:
Laura Gustafson,
Megan Richards,
Melissa Hall,
Caner Hazirbas,
Diane Bouchacourt,
Mark Ibrahim
Abstract:
Despite impressive advances in object-recognition, deep learning systems' performance degrades significantly across geographies and lower income levels raising pressing concerns of inequity. Addressing such performance gaps remains a challenge, as little is understood about why performance degrades across incomes or geographies. We take a step in this direction by annotating images from Dollar Str…
▽ More
Despite impressive advances in object-recognition, deep learning systems' performance degrades significantly across geographies and lower income levels raising pressing concerns of inequity. Addressing such performance gaps remains a challenge, as little is understood about why performance degrades across incomes or geographies. We take a step in this direction by annotating images from Dollar Street, a popular benchmark of geographically and economically diverse images, labeling each image with factors such as color, shape, and background. These annotations unlock a new granular view into how objects differ across incomes and regions. We then use these object differences to pinpoint model vulnerabilities across incomes and regions. We study a range of modern vision models, finding that performance disparities are most associated with differences in texture, occlusion, and images with darker lighting. We illustrate how insights from our factor labels can surface mitigations to improve models' performance disparities. As an example, we show that mitigating a model's vulnerability to texture can improve performance on the lower income level. We release all the factor annotations along with an interactive dashboard to facilitate research into more equitable vision systems.
△ Less
Submitted 11 April, 2023;
originally announced April 2023.
-
RIS-aided Mixed RF-FSO Wireless Networks: Secrecy Performance Analysis with Simultaneous Eavesdrop**
Authors:
Md. Mijanur Rahman,
A. S. M. Badrudduza,
Noor Ahmad Sarker,
Md. Ibrahim,
Imran Shafique Ansari
Abstract:
The appearance of sixth-generation networks has resulted in the proposal of several solutions to tackle signal loss. One of these solutions is the utilization of reconfigurable intelligent surfaces (RIS), which can reflect or refract signals as required. This integration offers significant potential to improve the coverage area from the sender to the receiver. In this paper, we present a comprehen…
▽ More
The appearance of sixth-generation networks has resulted in the proposal of several solutions to tackle signal loss. One of these solutions is the utilization of reconfigurable intelligent surfaces (RIS), which can reflect or refract signals as required. This integration offers significant potential to improve the coverage area from the sender to the receiver. In this paper, we present a comprehensive framework for analyzing the secrecy performance of a RIS-aided mixed radio frequency (RF)-free space optics (FSO) system, for the first time. Our study assumes that a secure message is transmitted from a RF transmitter to a FSO receiver through an intermediate relay. The RF link experiences Rician fading while the FSO link experiences Málaga distributed turbulence with pointing errors. We examine three scenarios: 1) RF-link eavesdrop**, 2) FSO-link eavesdrop**, and 3) a simultaneous eavesdrop** attack on both RF and FSO links. We evaluate the secrecy performance using analytical expressions to compute secrecy metrics such as the average secrecy capacity, secrecy outage probability, strictly positive secrecy capacity, effective secrecy throughput, and intercept probability. Our results are confirmed via Monte-Carlo simulations and demonstrate that fading parameters, atmospheric turbulence conditions, pointing errors, and detection techniques play a crucial role in enhancing secrecy performance.
△ Less
Submitted 9 April, 2023;
originally announced April 2023.
-
Global quantum discord and von Neumann entropy in multipartite two-level atomic systems
Authors:
M. Ibrahim,
M. Usman,
Khalid Khan
Abstract:
We have computed the global quantum discord and von Neumann entropy of multipartite two-level atomic systems interacting with a single-mode Fock field. We use Tavis-Cumming model. We have explored how quantum correlations and quantum entanglement evolve with time in such systems. The quantum system is prepared initially in a mixed state and different parameters are varied to see how they affect th…
▽ More
We have computed the global quantum discord and von Neumann entropy of multipartite two-level atomic systems interacting with a single-mode Fock field. We use Tavis-Cumming model. We have explored how quantum correlations and quantum entanglement evolve with time in such systems. The quantum system is prepared initially in a mixed state and different parameters are varied to see how they affect the information processing in the system. The dynamical character of the global quantum discord and von Neumann entropy show an interplay between classical and non-classical correlations. Photons in this model play an important role to assist the global quantum discord and von Neumann entropy and we observed that the effects of the field on the global quantum discord and von Neumann entropy reside in the time evolution of the system indicating that both atom and field states have become entangled. The global quantum discord is assisted in a non-linear fashion with the number of photons in the system. The global quantum discord and von Neumann entropy show linear behavior with each other in the dynamics of the system. The effects of intrinsic decoherence on the dynamics of the global quantum discord and von Neumann entropy are also studied. We have extrapolated the results for a large photon number on the system. We have studied the effect of the change in the size of the system on the maximum value of global quantum discord and von Neumann entropy and we have estimated the scaling coefficients for this behavior.
△ Less
Submitted 23 March, 2023;
originally announced March 2023.
-
Plant Disease Detection using Region-Based Convolutional Neural Network
Authors:
Hasin Rehana,
Muhammad Ibrahim,
Md. Haider Ali
Abstract:
Agriculture plays an important role in the food and economy of Bangladesh. The rapid growth of population over the years also has increased the demand for food production. One of the major reasons behind low crop production is numerous bacteria, virus and fungal plant diseases. Early detection of plant diseases and proper usage of pesticides and fertilizers are vital for preventing the diseases an…
▽ More
Agriculture plays an important role in the food and economy of Bangladesh. The rapid growth of population over the years also has increased the demand for food production. One of the major reasons behind low crop production is numerous bacteria, virus and fungal plant diseases. Early detection of plant diseases and proper usage of pesticides and fertilizers are vital for preventing the diseases and boost the yield. Most of the farmers use generalized pesticides and fertilizers in the entire fields without specifically knowing the condition of the plants. Thus the production cost oftentimes increases, and, not only that, sometimes this becomes detrimental to the yield. Deep Learning models are found to be very effective to automatically detect plant diseases from images of plants, thereby reducing the need for human specialists. This paper aims at building a lightweight deep learning model for predicting leaf disease in tomato plants. By modifying the region-based convolutional neural network, we design an efficient and effective model that demonstrates satisfactory empirical performance on a benchmark dataset. Our proposed model can easily be deployed in a larger system where drones take images of leaves and these images will be fed into our model to know the health condition.
△ Less
Submitted 12 September, 2023; v1 submitted 15 March, 2023;
originally announced March 2023.
-
Speeding Up EfficientNet: Selecting Update Blocks of Convolutional Neural Networks using Genetic Algorithm in Transfer Learning
Authors:
Md. Mehedi Hasana,
Muhammad Ibrahim,
Md. Sawkat Ali
Abstract:
The performance of convolutional neural networks (CNN) depends heavily on their architectures. Transfer learning performance of a CNN relies quite strongly on selection of its trainable layers. Selecting the most effective update layers for a certain target dataset often requires expert knowledge on CNN architecture which many practitioners do not posses. General users prefer to use an available a…
▽ More
The performance of convolutional neural networks (CNN) depends heavily on their architectures. Transfer learning performance of a CNN relies quite strongly on selection of its trainable layers. Selecting the most effective update layers for a certain target dataset often requires expert knowledge on CNN architecture which many practitioners do not posses. General users prefer to use an available architecture (e.g. GoogleNet, ResNet, EfficientNet etc.) that is developed by domain experts. With the ever-growing number of layers, it is increasingly becoming quite difficult and cumbersome to handpick the update layers. Therefore, in this paper we explore the application of genetic algorithm to mitigate this problem. The convolutional layers of popular pretrained networks are often grouped into modules that constitute their building blocks. We devise a genetic algorithm to select blocks of layers for updating the parameters. By experimenting with EfficientNetB0 pre-trained on ImageNet and using Food-101, CIFAR-100 and MangoLeafBD as target datasets, we show that our algorithm yields similar or better results than the baseline in terms of accuracy, and requires lower training and evaluation time due to learning less number of parameters. We also devise a metric called block importance to measure efficacy of each block as update block and analyze the importance of the blocks selected by our algorithm.
△ Less
Submitted 1 March, 2023;
originally announced March 2023.
-
Effects of Co-channel Interference on RIS Empowered Wireless Networks amid Multiple Eavesdrop** Attempts
Authors:
Md. Roisul Ajom Ruku,
Md. Ibrahim,
A. S. M. Badrudduza,
Imran Shafique Ansari
Abstract:
This letter is concerned with the secrecy performance of reconfigurable intelligent surfaces (RIS)-aided wireless networks in the existence of multiple interferers towards the destination. To be more precise, we analyze three critical issues in the design of secure RIS-assisted networks: 1) How do interferers affect the performance of secure wireless networks? 2) Which of the two groups of eavesdr…
▽ More
This letter is concerned with the secrecy performance of reconfigurable intelligent surfaces (RIS)-aided wireless networks in the existence of multiple interferers towards the destination. To be more precise, we analyze three critical issues in the design of secure RIS-assisted networks: 1) How do interferers affect the performance of secure wireless networks? 2) Which of the two groups of eavesdroppers (i.e., colluding and non-colluding) is more severe? 3) How can RIS improve network confidentiality? To do so, we develop the analytical expression of secrecy outage probability in closed-form, along with asymptotic analysis at high signal-to-noise ratio regime to better understand the impacts of different system parameters on secrecy performance. Finally, we validate our analytical results using a computer based Monte-Carlo simulation.
△ Less
Submitted 21 February, 2023;
originally announced February 2023.
-
Secrecy Outage Analysis of Energy Harvesting Relay-based Mixed UOWC-RF Network with Multiple Eavesdroppers
Authors:
Moloy Kumar Ghosh,
Milton Kumar Kundu,
Md Ibrahim,
A. S. M. Badrudduza,
Md. Shamim Anower,
Imran Shafique Ansari,
Ali A. Shaikhi,
Mohammed A. Mohandes
Abstract:
This work deals with the physical layer security performance of a dual-hop underwater optical communication (UOWC)-radio frequency (RF) network under the intruding attempts of multiple eavesdroppers via RF links. The intermediate decode and forward relay node between the underwater source and the destination transforms the optical signal into electrical form and re-transmits it to the destination…
▽ More
This work deals with the physical layer security performance of a dual-hop underwater optical communication (UOWC)-radio frequency (RF) network under the intruding attempts of multiple eavesdroppers via RF links. The intermediate decode and forward relay node between the underwater source and the destination transforms the optical signal into electrical form and re-transmits it to the destination node with the help of harvested energy by the relay from an integrated power beacon within the system. The source-to-relay link (UOWC) follows a mixture exponential generalized Gamma turbulence with pointing error impairments whereas all the remaining links (RF) undergo $κ-μ$ shadowed fading. With regards to the types of intruders, herein two scenarios are considered, i.e., colluding (\textit{Scenario-I}) and non-colluding (\textit{Scenario-II}) eavesdroppers and the analytical expressions of secure outage probability, probability of strictly positive secrecy capacity, and effective secrecy throughput are derived in closed form for each scenario. Furthermore, the impacts of UOWC and RF channel parameters as well as detection techniques on secrecy capacity are demonstrated, and following this a comparison between the two considered scenarios is demonstrated that reveals the collusion between the eavesdroppers imposes the most harmful threat on secrecy throughput but a better secrecy level can be attained adopting diversity at the destination and power beacon nodes along with heterodyne detection rather than intensity modulation and direct detection technique. Finally, all the derived expressions are corroborated via Monte Carlo simulations.
△ Less
Submitted 20 February, 2023;
originally announced February 2023.
-
Unsupervised Learning for Pilot-free Transmission in 3GPP MIMO Systems
Authors:
Omar M. Sleem,
Mohamed Salah Ibrahim,
Akshay Malhotra,
Mihaela Beluri,
Philip Pietraski
Abstract:
Reference signals overhead reduction has recently evolved as an effective solution for improving the system spectral efficiency. This paper introduces a new downlink data structure that is free from demodulation reference signals (DM-RS), and hence does not require any channel estimation at the receiver. The new proposed data transmission structure involves a simple repetition step of part of the…
▽ More
Reference signals overhead reduction has recently evolved as an effective solution for improving the system spectral efficiency. This paper introduces a new downlink data structure that is free from demodulation reference signals (DM-RS), and hence does not require any channel estimation at the receiver. The new proposed data transmission structure involves a simple repetition step of part of the user data across the different sub-bands. Exploiting the repetition structure at the user side, it is shown that reliable recovery is possible via canonical correlation analysis. This paper also proposes two effective mechanisms for boosting the CCA performance in OFDM systems; one for repetition pattern selection and another to deal with the severe frequency selectivity issues. The proposed approach exhibits favorable complexity-performance tradeoff, rendering it appealing for practical implementation. Numerical results, using a 3GPP link-level testbench, demonstrate the superiority of the proposed approach relative to the state-of-the-art methods.
△ Less
Submitted 4 February, 2023;
originally announced February 2023.
-
Slice Transformer and Self-supervised Learning for 6DoF Localization in 3D Point Cloud Maps
Authors:
Muhammad Ibrahim,
Naveed Akhtar,
Saeed Anwar,
Michael Wise,
Ajmal Mian
Abstract:
Precise localization is critical for autonomous vehicles. We present a self-supervised learning method that employs Transformers for the first time for the task of outdoor localization using LiDAR data. We propose a pre-text task that reorganizes the slices of a $360^\circ$ LiDAR scan to leverage its axial properties. Our model, called Slice Transformer, employs multi-head attention while systemat…
▽ More
Precise localization is critical for autonomous vehicles. We present a self-supervised learning method that employs Transformers for the first time for the task of outdoor localization using LiDAR data. We propose a pre-text task that reorganizes the slices of a $360^\circ$ LiDAR scan to leverage its axial properties. Our model, called Slice Transformer, employs multi-head attention while systematically processing the slices. To the best of our knowledge, this is the first instance of leveraging multi-head attention for outdoor point clouds. We additionally introduce the Perth-WA dataset, which provides a large-scale LiDAR map of Perth city in Western Australia, covering $\sim$4km$^2$ area. Localization annotations are provided for Perth-WA. The proposed localization method is thoroughly evaluated on Perth-WA and Appollo-SouthBay datasets. We also establish the efficacy of our self-supervised learning approach for the common downstream task of object classification using ModelNet40 and ScanNN datasets. The code and Perth-WA data will be publicly released.
△ Less
Submitted 13 August, 2023; v1 submitted 21 January, 2023;
originally announced January 2023.
-
Anticancer Peptides Classification using Kernel Sparse Representation Classifier
Authors:
Ehtisham Fazal,
Muhammad Sohail Ibrahim,
Seongyong Park,
Imran Naseem,
Abdul Wahab
Abstract:
Cancer is one of the most challenging diseases because of its complexity, variability, and diversity of causes. It has been one of the major research topics over the past decades, yet it is still poorly understood. To this end, multifaceted therapeutic frameworks are indispensable. \emph{Anticancer peptides} (ACPs) are the most promising treatment option, but their large-scale identification and s…
▽ More
Cancer is one of the most challenging diseases because of its complexity, variability, and diversity of causes. It has been one of the major research topics over the past decades, yet it is still poorly understood. To this end, multifaceted therapeutic frameworks are indispensable. \emph{Anticancer peptides} (ACPs) are the most promising treatment option, but their large-scale identification and synthesis require reliable prediction methods, which is still a problem. In this paper, we present an intuitive classification strategy that differs from the traditional \emph{black box} method and is based on the well-known statistical theory of \emph{sparse-representation classification} (SRC). Specifically, we create over-complete dictionary matrices by embedding the \emph{composition of the K-spaced amino acid pairs} (CKSAAP). Unlike the traditional SRC frameworks, we use an efficient \emph{matching pursuit} solver instead of the computationally expensive \emph{basis pursuit} solver in this strategy. Furthermore, the \emph{kernel principal component analysis} (KPCA) is employed to cope with non-linearity and dimension reduction of the feature space whereas the \emph{synthetic minority oversampling technique} (SMOTE) is used to balance the dictionary. The proposed method is evaluated on two benchmark datasets for well-known statistical parameters and is found to outperform the existing methods. The results show the highest sensitivity with the most balanced accuracy, which might be beneficial in understanding structural and chemical aspects and develo** new ACPs. The Google-Colab implementation of the proposed method is available at the author's GitHub page (\href{https://github.com/ehtisham-Fazal/ACP-Kernel-SRC}{https://github.com/ehtisham-fazal/ACP-Kernel-SRC}).
△ Less
Submitted 19 December, 2022;
originally announced December 2022.
-
Hierarchical Strategies for Cooperative Multi-Agent Reinforcement Learning
Authors:
Majd Ibrahim,
Ammar Fayad
Abstract:
Adequate strategizing of agents behaviors is essential to solving cooperative MARL problems. One intuitively beneficial yet uncommon method in this domain is predicting agents future behaviors and planning accordingly. Leveraging this point, we propose a two-level hierarchical architecture that combines a novel information-theoretic objective with a trajectory prediction model to learn a strategy.…
▽ More
Adequate strategizing of agents behaviors is essential to solving cooperative MARL problems. One intuitively beneficial yet uncommon method in this domain is predicting agents future behaviors and planning accordingly. Leveraging this point, we propose a two-level hierarchical architecture that combines a novel information-theoretic objective with a trajectory prediction model to learn a strategy. To this end, we introduce a latent policy that learns two types of latent strategies: individual $z_A$, and relational $z_R$ using a modified Graph Attention Network module to extract interaction features. We encourage each agent to behave according to the strategy by conditioning its local $Q$ functions on $z_A$, and we further equip agents with a shared $Q$ function that conditions on $z_R$. Additionally, we introduce two regularizers to allow predicted trajectories to be accurate and rewarding. Empirical results on Google Research Football (GRF) and StarCraft (SC) II micromanagement tasks show that our method establishes a new state of the art being, to the best of our knowledge, the first MARL algorithm to solve all super hard SC II scenarios as well as the GRF full game with a win rate higher than $95\%$, thus outperforming all existing methods. Videos and brief overview of the methods and results are available at: https://sites.google.com/view/hier-strats-marl/home.
△ Less
Submitted 14 December, 2022;
originally announced December 2022.
-
A new PCA-based utility measure for synthetic data evaluation
Authors:
F. K. Dankar,
M. K. Ibrahim
Abstract:
Data synthesis is a privacy enhancing technology aiming to produce realistic and timely data when real data is hard to obtain. Utility of synthetic data generators (SDGs) has been investigated through different utility metrics. These metrics have been found to generate conflicting conclusions making direct comparison of SDGs surprisingly difficult. Moreover, prior research found no correlation bet…
▽ More
Data synthesis is a privacy enhancing technology aiming to produce realistic and timely data when real data is hard to obtain. Utility of synthetic data generators (SDGs) has been investigated through different utility metrics. These metrics have been found to generate conflicting conclusions making direct comparison of SDGs surprisingly difficult. Moreover, prior research found no correlation between popular metrics, concluding they tackle different utility-dimensions. This paper aggregates four popular utility metrics (representing different utility dimensions) into one using principal-component-analysis and checks whether the new measure can generate synthetic data that perform well in real-life. The new measure is used to compare four well-recognized SDGs.
△ Less
Submitted 26 November, 2022;
originally announced December 2022.
-
A Whac-A-Mole Dilemma: Shortcuts Come in Multiples Where Mitigating One Amplifies Others
Authors:
Zhiheng Li,
Ivan Evtimov,
Albert Gordo,
Caner Hazirbas,
Tal Hassner,
Cristian Canton Ferrer,
Chenliang Xu,
Mark Ibrahim
Abstract:
Machine learning models have been found to learn shortcuts -- unintended decision rules that are unable to generalize -- undermining models' reliability. Previous works address this problem under the tenuous assumption that only a single shortcut exists in the training data. Real-world images are rife with multiple visual cues from background to texture. Key to advancing the reliability of vision…
▽ More
Machine learning models have been found to learn shortcuts -- unintended decision rules that are unable to generalize -- undermining models' reliability. Previous works address this problem under the tenuous assumption that only a single shortcut exists in the training data. Real-world images are rife with multiple visual cues from background to texture. Key to advancing the reliability of vision systems is understanding whether existing methods can overcome multiple shortcuts or struggle in a Whac-A-Mole game, i.e., where mitigating one shortcut amplifies reliance on others. To address this shortcoming, we propose two benchmarks: 1) UrbanCars, a dataset with precisely controlled spurious cues, and 2) ImageNet-W, an evaluation set based on ImageNet for watermark, a shortcut we discovered affects nearly every modern vision model. Along with texture and background, ImageNet-W allows us to study multiple shortcuts emerging from training on natural images. We find computer vision models, including large foundation models -- regardless of training set, architecture, and supervision -- struggle when multiple shortcuts are present. Even methods explicitly designed to combat shortcuts struggle in a Whac-A-Mole dilemma. To tackle this challenge, we propose Last Layer Ensemble, a simple-yet-effective method to mitigate multiple shortcuts without Whac-A-Mole behavior. Our results surface multi-shortcut mitigation as an overlooked challenge critical to advancing the reliability of vision systems. The datasets and code are released: https://github.com/facebookresearch/Whac-A-Mole.
△ Less
Submitted 21 March, 2023; v1 submitted 9 December, 2022;
originally announced December 2022.
-
Vandermonde Constrained Tensor Decomposition for Hybrid Beamforming in Multi-Carrier MIMO Systems
Authors:
Mohamed Salah Ibrahim,
Akshay Malhotra,
Mihaela Beluri,
Arnab Roy,
Shahab Hamidi-Rad
Abstract:
Hybrid beamforming has evolved as a promising technology that offers the balance between system performance and design complexity in mmWave MIMO systems. Existing hybrid beamforming methods either impose unit-modulus constraints or a codebook constraint on the analog precoders/combiners, which in turn results in a performance-overhead tradeoff. This paper puts forth a tensor framework to handle th…
▽ More
Hybrid beamforming has evolved as a promising technology that offers the balance between system performance and design complexity in mmWave MIMO systems. Existing hybrid beamforming methods either impose unit-modulus constraints or a codebook constraint on the analog precoders/combiners, which in turn results in a performance-overhead tradeoff. This paper puts forth a tensor framework to handle the wideband hybrid beamforming problem, with Vandermonde constraints on the analog precoders/combiners. The proposed method strikes the balance between performance, overhead and complexity. Numerical results on a 3GPP link-level test bench reveal the efficacy of the proposed approach relative to the codebook-based method while attaining the same feedback overhead. Moreover, the proposed method is shown to achieve comparable performance to the unit-modulus approaches, with substantial reductions in overhead.
△ Less
Submitted 29 November, 2022;
originally announced November 2022.
-
Exploiting Device and Audio Data to Tag Music with User-Aware Listening Contexts
Authors:
Karim M. Ibrahim,
Elena V. Epure,
Geoffroy Peeters,
Gaël Richard
Abstract:
As music has become more available especially on music streaming platforms, people have started to have distinct preferences to fit to their varying listening situations, also known as context. Hence, there has been a growing interest in considering the user's situation when recommending music to users. Previous works have proposed user-aware autotaggers to infer situation-related tags from music…
▽ More
As music has become more available especially on music streaming platforms, people have started to have distinct preferences to fit to their varying listening situations, also known as context. Hence, there has been a growing interest in considering the user's situation when recommending music to users. Previous works have proposed user-aware autotaggers to infer situation-related tags from music content and user's global listening preferences. However, in a practical music retrieval system, the autotagger could be only used by assuming that the context class is explicitly provided by the user. In this work, for designing a fully automatised music retrieval system, we propose to disambiguate the user's listening information from their stream data. Namely, we propose a system which can generate a situational playlist for a user at a certain time 1) by leveraging user-aware music autotaggers, and 2) by automatically inferring the user's situation from stream data (e.g. device, network) and user's general profile information (e.g. age). Experiments show that such a context-aware personalized music retrieval system is feasible, but the performance decreases in the case of new users, new tracks or when the number of context classes increases.
△ Less
Submitted 14 November, 2022;
originally announced November 2022.
-
ImageNet-X: Understanding Model Mistakes with Factor of Variation Annotations
Authors:
Badr Youbi Idrissi,
Diane Bouchacourt,
Randall Balestriero,
Ivan Evtimov,
Caner Hazirbas,
Nicolas Ballas,
Pascal Vincent,
Michal Drozdzal,
David Lopez-Paz,
Mark Ibrahim
Abstract:
Deep learning vision systems are widely deployed across applications where reliability is critical. However, even today's best models can fail to recognize an object when its pose, lighting, or background varies. While existing benchmarks surface examples challenging for models, they do not explain why such mistakes arise. To address this need, we introduce ImageNet-X, a set of sixteen human annot…
▽ More
Deep learning vision systems are widely deployed across applications where reliability is critical. However, even today's best models can fail to recognize an object when its pose, lighting, or background varies. While existing benchmarks surface examples challenging for models, they do not explain why such mistakes arise. To address this need, we introduce ImageNet-X, a set of sixteen human annotations of factors such as pose, background, or lighting the entire ImageNet-1k validation set as well as a random subset of 12k training images. Equipped with ImageNet-X, we investigate 2,200 current recognition models and study the types of mistakes as a function of model's (1) architecture, e.g. transformer vs. convolutional, (2) learning paradigm, e.g. supervised vs. self-supervised, and (3) training procedures, e.g., data augmentation. Regardless of these choices, we find models have consistent failure modes across ImageNet-X categories. We also find that while data augmentation can improve robustness to certain factors, they induce spill-over effects to other factors. For example, strong random crop** hurts robustness on smaller objects. Together, these insights suggest to advance the robustness of modern vision models, future research should focus on collecting additional data and understanding data augmentation schemes. Along with these insights, we release a toolkit based on ImageNet-X to spur further study into the mistakes image recognition systems make.
△ Less
Submitted 3 November, 2022;
originally announced November 2022.
-
Crime Prediction using Machine Learning with a Novel Crime Dataset
Authors:
Faisal Tareque Shohan,
Abu Ubaida Akash,
Muhammad Ibrahim,
Mohammad Shafiul Alam
Abstract:
Crime is an unlawful act that carries legal repercussions. Bangladesh has a high crime rate due to poverty, population growth, and many other socio-economic issues. For law enforcement agencies, understanding crime patterns is essential for preventing future criminal activity. For this purpose, these agencies need structured crime database. This paper introduces a novel crime dataset that contains…
▽ More
Crime is an unlawful act that carries legal repercussions. Bangladesh has a high crime rate due to poverty, population growth, and many other socio-economic issues. For law enforcement agencies, understanding crime patterns is essential for preventing future criminal activity. For this purpose, these agencies need structured crime database. This paper introduces a novel crime dataset that contains temporal, geographic, weather, and demographic data about 6574 crime incidents of Bangladesh. We manually gather crime news articles of a seven year time span from a daily newspaper archive. We extract basic features from these raw text. Using these basic features, we then consult standard service-providers of geo-location and weather data in order to garner these information related to the collected crime incidents. Furthermore, we collect demographic information from Bangladesh National Census data. All these information are combined that results in a standard machine learning dataset. Together, 36 features are engineered for the crime prediction task. Five supervised machine learning classification algorithms are then evaluated on this newly built dataset and satisfactory results are achieved. We also conduct exploratory analysis on various aspects the dataset. This dataset is expected to serve as the foundation for crime incidence prediction systems for Bangladesh and other countries. The findings of this study will help law enforcement agencies to forecast and contain crime as well as to ensure optimal resource allocation for crime patrol and prevention.
△ Less
Submitted 2 November, 2022;
originally announced November 2022.
-
Evaluation of Parameterized Quantum Circuits with Cross-Resonance Pulse-Driven Entanglers
Authors:
Mohannad Ibrahim,
Hamed Mohammadbagherpoor,
Cynthia Rios,
Nicholas T. Bronn,
Gregory T. Byrd
Abstract:
Variational Quantum Algorithms (VQAs) have emerged as a powerful class of algorithms that is highly suitable for noisy quantum devices. Therefore, investigating their design has become key in quantum computing research. Previous works have shown that choosing an effective parameterized quantum circuit (PQC) or ansatz for VQAs is crucial to their overall performance, especially on near-term devices…
▽ More
Variational Quantum Algorithms (VQAs) have emerged as a powerful class of algorithms that is highly suitable for noisy quantum devices. Therefore, investigating their design has become key in quantum computing research. Previous works have shown that choosing an effective parameterized quantum circuit (PQC) or ansatz for VQAs is crucial to their overall performance, especially on near-term devices. In this paper, we utilize pulse-level access to quantum machines and our understanding of their two-qubit interactions to optimize the design of two-qubit entanglers in a manner suitable for VQAs. Our analysis results show that pulse-optimized ansatze reduce state preparation times by more than half, maintain expressibility relative to standard PQCs, and are more trainable through local cost function analysis. Our algorithm performance results show that in three cases, our PQC configuration outperforms the base implementation. Our algorithm performance results, executed on IBM Quantum hardware, demonstrate that our pulse-optimized PQC configurations are more capable of solving MaxCut and Chemistry problems compared to a standard configuration.
△ Less
Submitted 22 December, 2022; v1 submitted 1 November, 2022;
originally announced November 2022.
-
The Robustness Limits of SoTA Vision Models to Natural Variation
Authors:
Mark Ibrahim,
Quentin Garrido,
Ari Morcos,
Diane Bouchacourt
Abstract:
Recent state-of-the-art vision models introduced new architectures, learning paradigms, and larger pretraining data, leading to impressive performance on tasks such as classification. While previous generations of vision models were shown to lack robustness to factors such as pose, it's unclear the extent to which this next generation of models are more robust. To study this question, we develop a…
▽ More
Recent state-of-the-art vision models introduced new architectures, learning paradigms, and larger pretraining data, leading to impressive performance on tasks such as classification. While previous generations of vision models were shown to lack robustness to factors such as pose, it's unclear the extent to which this next generation of models are more robust. To study this question, we develop a dataset of more than 7 million images with controlled changes in pose, position, background, lighting, and size. We study not only how robust recent state-of-the-art models are, but also the extent to which models can generalize variation in factors when they're present during training. We consider a catalog of recent vision models, including vision transformers (ViT), self-supervised models such as masked autoencoders (MAE), and models trained on larger datasets such as CLIP. We find out-of-the-box, even today's best models are not robust to common changes in pose, size, and background. When some samples varied during training, we found models required a significant portion of diversity to generalize -- though eventually robustness did improve. When diversity is only seen for some classes however, we found models did not generalize to other classes, unless the classes were very similar to those seen varying during training. We hope our work will shed further light on the blind spots of SoTA models and spur the development of more robust vision models.
△ Less
Submitted 24 October, 2022;
originally announced October 2022.
-
Robust Self-Supervised Learning with Lie Groups
Authors:
Mark Ibrahim,
Diane Bouchacourt,
Ari Morcos
Abstract:
Deep learning has led to remarkable advances in computer vision. Even so, today's best models are brittle when presented with variations that differ even slightly from those seen during training. Minor shifts in the pose, color, or illumination of an object can lead to catastrophic misclassifications. State-of-the art models struggle to understand how a set of variations can affect different objec…
▽ More
Deep learning has led to remarkable advances in computer vision. Even so, today's best models are brittle when presented with variations that differ even slightly from those seen during training. Minor shifts in the pose, color, or illumination of an object can lead to catastrophic misclassifications. State-of-the art models struggle to understand how a set of variations can affect different objects. We propose a framework for instilling a notion of how objects vary in more realistic settings. Our approach applies the formalism of Lie groups to capture continuous transformations to improve models' robustness to distributional shifts. We apply our framework on top of state-of-the-art self-supervised learning (SSL) models, finding that explicitly modeling transformations with Lie groups leads to substantial performance gains of greater than 10% for MAE on both known instances seen in typical poses now presented in new poses, and on unknown instances in any pose. We also apply our approach to ImageNet, finding that the Lie operator improves performance by almost 4%. These results demonstrate the promise of learning transformations to improve model robustness.
△ Less
Submitted 24 October, 2022;
originally announced October 2022.
-
Disentanglement of Correlated Factors via Hausdorff Factorized Support
Authors:
Karsten Roth,
Mark Ibrahim,
Zeynep Akata,
Pascal Vincent,
Diane Bouchacourt
Abstract:
A grand goal in deep learning research is to learn representations capable of generalizing across distribution shifts. Disentanglement is one promising direction aimed at aligning a model's representation with the underlying factors generating the data (e.g. color or background). Existing disentanglement methods, however, rely on an often unrealistic assumption: that factors are statistically inde…
▽ More
A grand goal in deep learning research is to learn representations capable of generalizing across distribution shifts. Disentanglement is one promising direction aimed at aligning a model's representation with the underlying factors generating the data (e.g. color or background). Existing disentanglement methods, however, rely on an often unrealistic assumption: that factors are statistically independent. In reality, factors (like object color and shape) are correlated. To address this limitation, we consider the use of a relaxed disentanglement criterion -- the Hausdorff Factorized Support (HFS) criterion -- that encourages only pairwise factorized \emph{support}, rather than a factorial distribution, by minimizing a Hausdorff distance. This allows for arbitrary distributions of the factors over their support, including correlations between them. We show that the use of HFS consistently facilitates disentanglement and recovery of ground-truth factors across a variety of correlation settings and benchmarks, even under severe training correlations and correlation shifts, with in parts over $+60\%$ in relative improvement over existing disentanglement methods. In addition, we find that leveraging HFS for representation learning can even facilitate transfer to downstream tasks such as classification under distribution shifts. We hope our original approach and positive empirical results inspire further progress on the open problem of robust generalization. Code available at https://github.com/facebookresearch/disentangling-correlated-factors.
△ Less
Submitted 25 February, 2023; v1 submitted 13 October, 2022;
originally announced October 2022.
-
Modified hybrid inflation, reheating and stabilization of the electroweak vacuum
Authors:
Merna Ibrahim,
Mustafa Ashry,
Esraa Elkhateeb,
Adel M. Awad,
Ahmad Moursy
Abstract:
We propose a modification to the standard hybrid inflation model \cite{Linde:1993cn}, that connects a successful hybrid inflation scenario to the standard model Higgs sector, via the electroweak vacuum stability. The proposed model results in an effective inflation potential of a hilltop-type, with both the trans-Planckian and sub-Planckian inflation regimes consistent with the recent Planck/BICEP…
▽ More
We propose a modification to the standard hybrid inflation model \cite{Linde:1993cn}, that connects a successful hybrid inflation scenario to the standard model Higgs sector, via the electroweak vacuum stability. The proposed model results in an effective inflation potential of a hilltop-type, with both the trans-Planckian and sub-Planckian inflation regimes consistent with the recent Planck/BICEP combined results. Reheating via the inflation sector decays to right-handed neutrinos is considered. An upper bound on the reheating temperature $T_{\rm R} \lsim 2\times 10^{11}~(1\times 10^{13})$ GeV, for large~(small) field inflation, will suppress contributions from one-loop quantum corrections to the inflation potential. This may push the neutrino Yukawa couplings to be ${\cal O}(1)$ and affect the vacuum stability. We show that the couplings of the SM Higgs to the inflation sector can guarantee the electroweak vacuum stability up to the Planck scale. The so-called hybrid Higgs-inflaton model leads to a positive correction for the Higgs quartic coupling at a threshold scale, which is shown to have a very significant effect in stabilizing the electroweak vacuum. We find that even with ${\cal O}(1)$ neutrino Yukawa couplings, threshold corrections leave the SM vacuum stability intact.
△ Less
Submitted 22 February, 2023; v1 submitted 6 October, 2022;
originally announced October 2022.
-
Magnetization dynamics and reversal of two-dimensional magnets
Authors:
Essa M. Ibrahim,
Shufeng Zhang
Abstract:
Micromagnetics simulation based on the classical Landau-Lifshitz-Gilbert (LLG) equation has long been a powerful method for modeling magnetization dynamics and reversal of three-dimensional (3D) magnets. For two-dimensional (2D) magnets, the magnetization reversal always accompanies the collapse of the magnetization even at low temperatures due to intrinsic strong spin fluctuation. We propose a mi…
▽ More
Micromagnetics simulation based on the classical Landau-Lifshitz-Gilbert (LLG) equation has long been a powerful method for modeling magnetization dynamics and reversal of three-dimensional (3D) magnets. For two-dimensional (2D) magnets, the magnetization reversal always accompanies the collapse of the magnetization even at low temperatures due to intrinsic strong spin fluctuation. We propose a micromagnetic theory that explicitly takes into account the rapid demagnetization and remagnetization dynamics of 2D magnets during magnetization reversal. We apply the theory to a single-domain magnet to illustrate fundamental differences in magnetization trajectories and reversal times for 2D and 3D magnets.
△ Less
Submitted 9 September, 2022;
originally announced September 2022.
-
Quantum Stoner-Wohlfarth model of two-dimensional single domain magnets
Authors:
Essa M. Ibrahim,
Shufeng Zhang
Abstract:
The Stoner-Wohlfarth (SW) model is a classical model for magnetic hysteresis of single-domain particles. For two-dimensional magnets at finite temperature, the SW model must be extended to include intrinsic strong spin fluctuations. We predict several fundamentally different hysteresis properties between 2D and 3D magnets. The magnetization switching diagram known as the Asteroid figure in the con…
▽ More
The Stoner-Wohlfarth (SW) model is a classical model for magnetic hysteresis of single-domain particles. For two-dimensional magnets at finite temperature, the SW model must be extended to include intrinsic strong spin fluctuations. We predict several fundamentally different hysteresis properties between 2D and 3D magnets. The magnetization switching diagram known as the Asteroid figure in the conventional SW model becomes highly temperature dependent and asymmetric with respect to the transverse and longitudinal magnetic fields. Our results provide new insights for 2D magnetic materials based spintronics applications.
△ Less
Submitted 9 September, 2022;
originally announced September 2022.
-
MangoLeafBD: A Comprehensive Image Dataset to Classify Diseased and Healthy Mango Leaves
Authors:
Sarder Iftekhar Ahmed,
Muhammad Ibrahim,
Md. Nadim,
Md. Mizanur Rahman,
Maria Mehjabin Shejunti,
Taskeed Jabid,
Md. Sawkat Ali
Abstract:
Agriculture is of one of the few remaining sectors that is yet to receive proper attention from the machine learning community. The importance of datasets in the machine learning discipline cannot be overemphasized. The lack of standard and publicly available datasets related to agriculture impedes practitioners of this discipline to harness the full benefit of these powerful computational predict…
▽ More
Agriculture is of one of the few remaining sectors that is yet to receive proper attention from the machine learning community. The importance of datasets in the machine learning discipline cannot be overemphasized. The lack of standard and publicly available datasets related to agriculture impedes practitioners of this discipline to harness the full benefit of these powerful computational predictive tools and techniques. To improve this scenario, we develop, to the best of our knowledge, the first-ever standard, ready-to-use, and publicly available dataset of mango leaves. The images are collected from four mango orchards of Bangladesh, one of the top mango-growing countries of the world. The dataset contains 4000 images of about 1800 distinct leaves covering seven diseases. Although the dataset is developed using mango leaves of Bangladesh only, since we deal with diseases that are common across many countries, this dataset is likely to be applicable to identify mango diseases in other countries as well, thereby boosting mango yield. This dataset is expected to draw wide attention from machine learning researchers and practitioners in the field of automated agriculture.
△ Less
Submitted 27 August, 2022;
originally announced September 2022.
-
Experience With Machine Protection Systems At PIP2IT
Authors:
PIP-II Collaboration,
:,
A. Warner,
M. Austin,
L. Carmichael,
J. -P. Carneiro,
B. Hanna,
E. Harms,
R. Neswold,
L. Prost,
R. Rivera,
A. Shemyakin,
M. Ibrahim,
J. Wu
Abstract:
The PIP-II Injector Test 1 PIP2IT facility accelerator was assembled in multiple stages in 2014 $-$ 2021 to test concepts and components of the future PIPII linac that is being constructed at Fermilab. In its final configuration, PIP2IT accelerated a 0.55 ms x 20 Hz x 2 mA H$-$ beam to 16 MeV. To protect elements of the beam line, a Machine Protection System MPS was implemented and commissioned. T…
▽ More
The PIP-II Injector Test 1 PIP2IT facility accelerator was assembled in multiple stages in 2014 $-$ 2021 to test concepts and components of the future PIPII linac that is being constructed at Fermilab. In its final configuration, PIP2IT accelerated a 0.55 ms x 20 Hz x 2 mA H$-$ beam to 16 MeV. To protect elements of the beam line, a Machine Protection System MPS was implemented and commissioned. The beam was interrupted faster than 10$μ$s when excessive beam loss was detected. The paper describes the MPS architecture, methods of the loss detection, procedure of the beam interruption, and operational experience at PIP2IT.
△ Less
Submitted 8 September, 2022; v1 submitted 2 September, 2022;
originally announced September 2022.
-
Synchronous High-frequency Distributed Readout For Edge Processing At The Fermilab Main Injector And Recycler
Authors:
J. R. Berlioz,
M. R. Austin,
J. M. Arnold,
K. J. Hazelwood,
P. Hanlet,
M. A. Ibrahim,
A. Narayanan,
D. J. Nicklaus,
G. Praudhan,
A. L. Saewert,
B. A. Schupbach,
K. Seiya,
R. M. Thurman-Keup,
N. V. Tran,
J. Jang,
H. Liu,
S. Memik,
R. Shi,
M. Thieme,
D. Ulusel
Abstract:
The Main Injector (MI) was commissioned using data acquisition systems developed for the Fermilab Main Ring in the 1980s. New VME-based instrumentation was commissioned in 2006 for beam loss monitors (BLM)[2], which provided a more systematic study of the machine and improved displays of routine operation. However, current projects are demanding more data and at a faster rate from this aging hardw…
▽ More
The Main Injector (MI) was commissioned using data acquisition systems developed for the Fermilab Main Ring in the 1980s. New VME-based instrumentation was commissioned in 2006 for beam loss monitors (BLM)[2], which provided a more systematic study of the machine and improved displays of routine operation. However, current projects are demanding more data and at a faster rate from this aging hardware. One such project, Real-time Edge AI for Distributed Systems (READS), requires the high-frequency, low-latency collection of synchronized BLM readings from around the approximately two-mile accelerator complex. Significant work has been done to develop new hardware to monitor the VME backplane and broadcast BLM measurements over Ethernet, while not disrupting the existing operations critical functions of the BLM system. This paper will detail the design, implementation, and testing of this parallel data pathway.
△ Less
Submitted 31 August, 2022;
originally announced August 2022.
-
Transformer-Based Deep Learning Model for Stock Price Prediction: A Case Study on Bangladesh Stock Market
Authors:
Tashreef Muhammad,
Anika Bintee Aftab,
Md. Mainul Ahsan,
Maishameem Meherin Muhu,
Muhammad Ibrahim,
Shahidul Islam Khan,
Mohammad Shafiul Alam
Abstract:
In modern capital market the price of a stock is often considered to be highly volatile and unpredictable because of various social, financial, political and other dynamic factors. With calculated and thoughtful investment, stock market can ensure a handsome profit with minimal capital investment, while incorrect prediction can easily bring catastrophic financial loss to the investors. This paper…
▽ More
In modern capital market the price of a stock is often considered to be highly volatile and unpredictable because of various social, financial, political and other dynamic factors. With calculated and thoughtful investment, stock market can ensure a handsome profit with minimal capital investment, while incorrect prediction can easily bring catastrophic financial loss to the investors. This paper introduces the application of a recently introduced machine learning model - the Transformer model, to predict the future price of stocks of Dhaka Stock Exchange (DSE), the leading stock exchange in Bangladesh. The transformer model has been widely leveraged for natural language processing and computer vision tasks, but, to the best of our knowledge, has never been used for stock price prediction task at DSE. Recently the introduction of time2vec encoding to represent the time series features has made it possible to employ the transformer model for the stock price prediction. This paper concentrates on the application of transformer-based model to predict the price movement of eight specific stocks listed in DSE based on their historical daily and weekly data. Our experiments demonstrate promising results and acceptable root mean squared error on most of the stocks.
△ Less
Submitted 17 August, 2022;
originally announced August 2022.
-
ImageSig: A signature transform for ultra-lightweight image recognition
Authors:
Mohamed R. Ibrahim,
Terry Lyons
Abstract:
This paper introduces a new lightweight method for image recognition. ImageSig is based on computing signatures and does not require a convolutional structure or an attention-based encoder. It is striking to the authors that it achieves: a) an accuracy for 64 X 64 RGB images that exceeds many of the state-of-the-art methods and simultaneously b) requires orders of magnitude less FLOPS, power and m…
▽ More
This paper introduces a new lightweight method for image recognition. ImageSig is based on computing signatures and does not require a convolutional structure or an attention-based encoder. It is striking to the authors that it achieves: a) an accuracy for 64 X 64 RGB images that exceeds many of the state-of-the-art methods and simultaneously b) requires orders of magnitude less FLOPS, power and memory footprint. The pretrained model can be as small as 44.2 KB in size. ImageSig shows unprecedented performance on hardware such as Raspberry Pi and Jetson-nano. ImageSig treats images as streams with multiple channels. These streams are parameterized by spatial directions. We contribute to the functionality of signature and rough path theory to stream-like data and vision tasks on static images beyond temporal streams. With very few parameters and small size models, the key advantage is that one could have many of these "detectors" assembled on the same chip; moreover, the feature acquisition can be performed once and shared between different models of different tasks - further accelerating the process. This contributes to energy efficiency and the advancements of embedded AI at the edge.
△ Less
Submitted 13 May, 2022;
originally announced May 2022.
-
Safe Hierarchical Model Predictive Control and Planning for Autonomous Systems
Authors:
Markus Koegel,
Mohamed Ibrahim,
Christian Kallies,
Rolf Findeisen
Abstract:
Planning and control for autonomous vehicles usually are hierarchical separated. However, increasing performance demands and operating in highly dynamic environments requires an frequent re-evaluation of the planning and tight integration of control and planning to guarantee safety. We propose an integrated hierarchical predictive control and planning approach to tackle this challenge. Planner and…
▽ More
Planning and control for autonomous vehicles usually are hierarchical separated. However, increasing performance demands and operating in highly dynamic environments requires an frequent re-evaluation of the planning and tight integration of control and planning to guarantee safety. We propose an integrated hierarchical predictive control and planning approach to tackle this challenge. Planner and controller are based on the repeated solution of moving horizon optimal control problems. The planner can choose different low-layer controller modes for increased flexibility and performance instead of using a single controller with a large safety margin for collision avoidance under uncertainty. Planning is based on simplified system dynamics and safety, yet flexible operation is ensured by constraint tightening based on a mixed-integer linear programming formulation. A cyclic horizon tube-based model predictive controller guarantees constraint satisfaction for different control modes and disturbances. Examples of such modes are a slow-speed movement with high precision and fast-speed movements with large uncertainty bounds. Allowing for different control modes reduces the conservatism, while the hierarchical decomposition of the problem reduces the computational cost and enables real-time implementation. We derive conditions for recursive feasibility to ensure constraint satisfaction and obstacle avoidance to guarantee safety and ensure compatibility between the layers and modes. Simulation results illustrate the efficiency and applicability of the proposed hierarchical strategy.
△ Less
Submitted 27 March, 2022;
originally announced March 2022.
-
Exploring the Research Landscape of Pakistan: A Data-driven Analysis of Scopus Indexed Scientific Literature
Authors:
Muhammad Bilal Ibrahim,
Saeed-Ul Hassan
Abstract:
Scientific contribution and research performance of a university, research group, or institute needs to be evaluated all the more with the increasing volume and fast-develo** disciplines of research. The need of the time is to develop tools for strategic planning and management that will help research bodies to rank and benchmark themselves against international standards. This will enable them…
▽ More
Scientific contribution and research performance of a university, research group, or institute needs to be evaluated all the more with the increasing volume and fast-develo** disciplines of research. The need of the time is to develop tools for strategic planning and management that will help research bodies to rank and benchmark themselves against international standards. This will enable them to invest appropriately in research areas of promising strength and gain maximally from them, thus fulfilling the ultimate purpose of positive impact of research on society. Our tool is capable of rating and benchmarking universities as well as research institutes in not only the major disciplines and sub-disciplines, but at the finest level of niche areas of science and technology too with the help of its innovative bibliometric indicators based on publications and citation analysis. The tool accepts inputs like discipline/subject area, university, and country and time window while using data retrieved from bibliography database, Scopus, to benchmark and rate the research body under consideration. We have evaluated that there are many niche subject areas in which small or medium size universities are performing good in comparison to the large universities. Most of these subject areas are of more significance in the present day and the future. Government and funds allocating bodies should take this factor in account that investing the right money at right place will give far better results than we they are having right now
△ Less
Submitted 13 February, 2022;
originally announced February 2022.
-
Inference of bipolar neutrino flavor oscillations near a core-collapse supernova, based on multiple measurements at Earth
Authors:
Eve Armstrong,
Amol V. Patwardhan,
A. A. Ahmetaj,
M. Margarette Sanchez,
Sophia Miskiewicz,
Marcus Ibrahim,
Ishaan Singh
Abstract:
Neutrinos in compact-object environments, such as core-collapse supernovae, can experience various kinds of collective effects in flavor space, engendered by neutrino-neutrino interactions. These include "bipolar" collective oscillations, which are exhibited by neutrino ensembles where different flavors dominate at different energies. Considering the importance of neutrinos in the dynamics and nuc…
▽ More
Neutrinos in compact-object environments, such as core-collapse supernovae, can experience various kinds of collective effects in flavor space, engendered by neutrino-neutrino interactions. These include "bipolar" collective oscillations, which are exhibited by neutrino ensembles where different flavors dominate at different energies. Considering the importance of neutrinos in the dynamics and nucleosynthesis in these environments, it is desirable to ascertain whether an Earth-based detection could contain signatures of bipolar oscillations that occurred within a supernova envelope. To that end, we continue examining a cost-function formulation of statistical data assimilation (SDA) to infer solutions to a small-scale model of neutrino flavor transformation. SDA is an inference paradigm designed to optimize a model with sparse data. Our model consists of two mono-energetic neutrino beams with different energies emanating from a source and coherently interacting with each other and with a matter background, with time-varying interaction strengths. We attempt to infer flavor transformation histories of these beams using simulated measurements of the flavor content at locations in vacuum (that is, far from the source), which could in principle correspond to earth-based detectors. Within the scope of this small-scale model, we found that: (i) based on such measurements, the SDA procedure is able to infer \textit{whether} bipolar oscillations had occurred within the protoneutron star envelope, and (ii) if the measurements are able to sample the full amplitude of the neutrino oscillations in vacuum, then the amplitude of the prior bipolar oscillations is also well predicted. This result intimates that the inference paradigm can well complement numerical integration codes, via its ability to infer flavor evolution at physically inaccessible locations.
△ Less
Submitted 20 January, 2022;
originally announced January 2022.
-
Insights from a computational analysis of the SARS-CoV-2 Omicron variant: Host-pathogen interaction, pathogenicity and possible therapeutics
Authors:
Md Sorwer Alam Parvez,
Manash Kumar Saha,
Md. Ibrahim,
Yusha Araf,
Md. Taufiqul Islam,
Gen Ohtsuki,
Mohammad Jakir Hosen
Abstract:
Prominently accountable for the upsurge of COVID-19 cases as the world attempts to recover from the previous two waves, Omicron has further threatened the conventional therapeutic approaches. Omicron is the fifth variant of concern (VOC), which comprises more than 10 mutations in the receptor-binding domain (RBD) of the spike protein. However, the lack of extensive research regarding Omicron has r…
▽ More
Prominently accountable for the upsurge of COVID-19 cases as the world attempts to recover from the previous two waves, Omicron has further threatened the conventional therapeutic approaches. Omicron is the fifth variant of concern (VOC), which comprises more than 10 mutations in the receptor-binding domain (RBD) of the spike protein. However, the lack of extensive research regarding Omicron has raised the need to establish correlations to understand this variant by structural comparisons. Here, we evaluate, correlate, and compare its genomic sequences through an immunoinformatic approach with wild and mutant RBD forms of the spike protein to understand its epidemiological characteristics and responses towards existing drugs for better patient management. Our computational analyses provided insights into infectious and pathogenic trails of the Omicron variant. In addition, while the analysis represented South Africa's Omicron variant being similar to the highly-infectious B.1.620 variant, mutations within the prominent proteins are hypothesized to alter its pathogenicity. Moreover, docking evaluations revealed significant differences in binding affinity with human receptors, ACE2 and NRP1. Owing to its characteristics of rendering existing treatments ineffective, we evaluated the drug efficacy against their target protein encoded in the Omicron through molecular docking approach. Most of the tested drugs were proven to be effective. Nirmatrelvir (Paxlovid), MPro 13b, and Lopinavir displayed increased effectiveness and efficacy, while Ivermectin showed the best result against Omicron.
△ Less
Submitted 20 January, 2022;
originally announced January 2022.
-
DEIMoS: an open-source tool for processing high-dimensional mass spectrometry data
Authors:
Sean M. Colby,
Christine H. Chang,
Jessica L. Bade,
Jamie R. Nunez,
Madison R. Blumer,
Daniel J. Orton,
Kent J. Bloodsworth,
Ernesto S. Nakayasu,
Richard D. Smith,
Yehia M. Ibrahim,
Ryan S. Renslow,
Thomas O. Metz
Abstract:
We present DEIMoS: Data Extraction for Integrated Multidimensional Spectrometry, a Python application programming interface (API) and command-line tool for high-dimensional mass spectrometry data analysis workflows that offers ease of development and access to efficient algorithmic implementations. Functionality includes feature detection, feature alignment, collision cross section (CCS) calibrati…
▽ More
We present DEIMoS: Data Extraction for Integrated Multidimensional Spectrometry, a Python application programming interface (API) and command-line tool for high-dimensional mass spectrometry data analysis workflows that offers ease of development and access to efficient algorithmic implementations. Functionality includes feature detection, feature alignment, collision cross section (CCS) calibration, isotope detection, and MS/MS spectral deconvolution, with the output comprising detected features aligned across study samples and characterized by mass, CCS, tandem mass spectra, and isotopic signature. Notably, DEIMoS operates on N-dimensional data, largely agnostic to acquisition instrumentation; algorithm implementations simultaneously utilize all dimensions to (i) offer greater separation between features, thus improving detection sensitivity, (ii) increase alignment/feature matching confidence among datasets, and (iii) mitigate convolution artifacts in tandem mass spectra. We demonstrate DEIMoS with LC-IMS-MS/MS data to illustrate the advantages of a multidimensional approach in each data processing step.
△ Less
Submitted 6 December, 2021;
originally announced December 2021.
-
Magnetism of two-dimensional magnets in the presence of random fields
Authors:
Essa M. Ibrahim,
** Tang,
Shufeng Zhang
Abstract:
In low-dimensional magnets, thermal agitation and spatial disorders generate strong spin fluctuations that suppress the long-range magnetic ordering. We develop an analytical equation for the equilibrium magnetization of two-dimensional magnets at finite temperatures in the presence of the random magnetic field. We find that the random field induces a first-order phase transition in addition to th…
▽ More
In low-dimensional magnets, thermal agitation and spatial disorders generate strong spin fluctuations that suppress the long-range magnetic ordering. We develop an analytical equation for the equilibrium magnetization of two-dimensional magnets at finite temperatures in the presence of the random magnetic field. We find that the random field induces a first-order phase transition in addition to the reduced Curie temperature. The first-order phase transition persists even in the presence of the moderate external magnetic field.
△ Less
Submitted 6 December, 2021;
originally announced December 2021.
-
Exploring Airline Gate-Scheduling Optimization Using Quantum Computers
Authors:
Hamed Mohammadbagherpoor,
Patrick Dreher,
Mohannad Ibrahim,
Young-Hyun Oh,
James Hall,
Richard E Stone,
Mirela Stojkovic
Abstract:
This paper investigates the application of quantum computing technology to airline gate-scheduling quadratic assignment problems (QAP). We explore the quantum computing hardware architecture and software environment required for porting classical versions of these type of problems to quantum computers. We discuss the variational quantum eigensolver and the inclusion of space-efficient graph colori…
▽ More
This paper investigates the application of quantum computing technology to airline gate-scheduling quadratic assignment problems (QAP). We explore the quantum computing hardware architecture and software environment required for porting classical versions of these type of problems to quantum computers. We discuss the variational quantum eigensolver and the inclusion of space-efficient graph coloring to the Quadratic Unconstrained Binary Optimization (QUBO). These enhanced quantum computing algorithms are tested with an 8 gate and 24 flight test case using both the IBM quantum computing simulator and a 27 qubit superconducting transmon IBM quantum computing hardware platform.
△ Less
Submitted 17 November, 2021;
originally announced November 2021.
-
On Effective Secrecy Throughput of Underlay Spectrum Sharing $α$-$μ$/ Málaga Hybrid Model under Interference-and-Transmit Power Constraints
Authors:
Md. Ibrahim,
A. S. M. Badrudduza,
Md. Shakhawat Hossen,
M. K. Kundu,
Imran Shafique Ansari
Abstract:
The underlay cognitive radio-based hybrid radio frequency / free-space optical (RF / FSO) systems have been emerged as a promising technology due to its ability to eliminate spectrum scarcity and spectrum under-utilization problems. Consequently, this work analyzes the physical layer security aspects of a cognitive RF / FSO hybrid network that includes a primary user, a secondary source, a seconda…
▽ More
The underlay cognitive radio-based hybrid radio frequency / free-space optical (RF / FSO) systems have been emerged as a promising technology due to its ability to eliminate spectrum scarcity and spectrum under-utilization problems. Consequently, this work analyzes the physical layer security aspects of a cognitive RF / FSO hybrid network that includes a primary user, a secondary source, a secondary receiver, and an eavesdropper where the secret communication takes place between two legitimate secondary peers over the RF and FSO links simultaneously, and the eavesdropper can overhear the RF link only. In particular, the maximum transmit power limitation at the secondary user as well as the permissible interference power restriction at the primary user are also taken into consideration. All the RF links are modeled with $α$-$μ$ fading whereas the FSO link undergoes Málaga (M) turbulence with link blockage and pointing error impairments. At the receiver, the selection combining diversity technique is utilized to select the signal with the best electrical signal-to-ratio (SNR). Moreover, the closed-form expressions for the secrecy outage probability, probability of strictly positive secrecy capacity, and effective secrecy throughput are derived to analyze the secrecy performance. Besides, the impacts of fading, primary-secondary interference, detection techniques, link blockage probability, atmospheric turbulence, and pointing error are examined. Finally, Monte-Carlo simulations are performed to corroborate the derived expressions.
△ Less
Submitted 12 November, 2021;
originally announced November 2021.
-
Unsteady pulsating flowfield over spiked axisymmetric forebody at hypersonic flows
Authors:
S. Mohammed Ibrahim,
R. Sriram,
S. K. Karthick,
G. Jagadeesh
Abstract:
The paper gives experimental observations on the hypersonic flow past an axisymmetric flat-face cylinder with a protruding sharp-tip spike at a freestream Mach number of $M_\infty = 8.16$ at two different freestream Reynolds numbers based on the base body diameter ($Re_D = 0.76 \times 10^6$, and $3.05 \times 10^6$). Furthermore, modal analysis is done on schlieren images to understand the flow dyn…
▽ More
The paper gives experimental observations on the hypersonic flow past an axisymmetric flat-face cylinder with a protruding sharp-tip spike at a freestream Mach number of $M_\infty = 8.16$ at two different freestream Reynolds numbers based on the base body diameter ($Re_D = 0.76 \times 10^6$, and $3.05 \times 10^6$). Furthermore, modal analysis is done on schlieren images to understand the flow dynamics parallel with the unsteady pressure measurements. The protruding spike of length to base body diameter ratio of $[l/D]=1$ creates a familiar unsteady flowfield called 'pulsation.' Pressure loading and fluctuation intensity at two different $Re_D$ cases are calculated. A maximum drop of 98.24\% is observed in both parameters between the high and low ReD cases. Based on the analysis, a difference in the pulsation characteristics are noticed, which arise from two vortical zones, each from a system of two `$λ$' shocks formed during the `collapse' phase ahead of the base body. The interaction of shedding vortices from the $λ$-shocks' triple-points, along with the rotating stationary waves, contributes to the asymmetric high-pressure loading and the observation of shock pulsation on the flat-face cylinder. The vortical interactions form the second dominant spatial mode with a temporal mode carrying a dimensionless frequency ($f_2D/u_\infty \approx 0.34$) almost twice that of the fundamental frequency ($f_1D/u_\infty \approx 0.17$). The observed frequencies are invariant irrespective of the ReD cases. However, for the high-frequency range, the spectral pressure decay is observed to follow an inverse and -7/3 law for the low and high $Re_D$ cases, respectively.
△ Less
Submitted 19 December, 2021; v1 submitted 5 November, 2021;
originally announced November 2021.
-
Detecting Important Patterns Using Conceptual Relevance Interestingness Measure
Authors:
Mohamed-Hamza Ibrahim,
Rokia Missaoui,
Jean Vaillancourt
Abstract:
Discovering meaningful conceptual structures is a substantial task in data mining and knowledge discovery applications. While off-the-shelf interestingness indices defined in Formal Concept Analysis may provide an effective relevance evaluation in several situations, they frequently give inadequate results when faced with massive formal contexts (and concept lattices), and in the presence of irrel…
▽ More
Discovering meaningful conceptual structures is a substantial task in data mining and knowledge discovery applications. While off-the-shelf interestingness indices defined in Formal Concept Analysis may provide an effective relevance evaluation in several situations, they frequently give inadequate results when faced with massive formal contexts (and concept lattices), and in the presence of irrelevant concepts. In this paper, we introduce the Conceptual Relevance (CR) score, a new scalable interestingness measurement for the identification of actionable concepts. From a conceptual perspective, the minimal generators provide key information about their associated concept intent. Furthermore, the relevant attributes of a concept are those that maintain the satisfaction of its closure condition. Thus, the guiding idea of CR exploits the fact that minimal generators and relevant attributes can be efficiently used to assess concept relevance. As such, the CR index quantifies both the amount of conceptually relevant attributes and the number of the minimal generators per concept intent. Our experiments on synthetic and real-world datasets show the efficiency of this measure over the well-known stability index.
△ Less
Submitted 21 October, 2021;
originally announced October 2021.
-
On The Emergence of a New Prime Number And Omega Sequences
Authors:
Moustafa Ibrahim
Abstract:
This paper highlights the emergence of the Omega sequence in number theory and its connection with the emergence of a new prime number, and also highlights its theoretical applications for Lucas-Lehmer primality test, and Euclid-Euler theory for even perfect numbers. We also show that Omega sequences unify and give new representations for Mersenne numbers, Fermat numbers, Lucas numbers, Fibonacci…
▽ More
This paper highlights the emergence of the Omega sequence in number theory and its connection with the emergence of a new prime number, and also highlights its theoretical applications for Lucas-Lehmer primality test, and Euclid-Euler theory for even perfect numbers. We also show that Omega sequences unify and give new representations for Mersenne numbers, Fermat numbers, Lucas numbers, Fibonacci numbers, Chebyshev sequence, Dickson sequence, and others.
△ Less
Submitted 4 November, 2021; v1 submitted 5 October, 2021;
originally announced October 2021.
-
Accelerating Encrypted Computing on Intel GPUs
Authors:
Yujia Zhai,
Mohannad Ibrahim,
Yiqin Qiu,
Fabian Boemer,
Zizhong Chen,
Alexey Titov,
Alexander Lyashevsky
Abstract:
Homomorphic Encryption (HE) is an emerging encryption scheme that allows computations to be performed directly on encrypted messages. This property provides promising applications such as privacy-preserving deep learning and cloud computing. Prior works have been proposed to enable practical privacy-preserving applications with architectural-aware optimizations on CPUs, GPUs and FPGAs. However, th…
▽ More
Homomorphic Encryption (HE) is an emerging encryption scheme that allows computations to be performed directly on encrypted messages. This property provides promising applications such as privacy-preserving deep learning and cloud computing. Prior works have been proposed to enable practical privacy-preserving applications with architectural-aware optimizations on CPUs, GPUs and FPGAs. However, there is no systematic optimization for the whole HE pipeline on Intel GPUs. In this paper, we present the first-ever SYCL-based GPU backend for Microsoft SEAL APIs. We perform optimizations from instruction level, algorithmic level and application level to accelerate our HE library based on the Cheon, Kim, Kimand Song (CKKS) scheme on Intel GPUs. The performance is validated on two latest Intel GPUs. Experimental results show that our staged optimizations together with optimizations including low-level optimizations and kernel fusion accelerate the Number Theoretic Transform (NTT), a key algorithm for HE, by up to 9.93X compared with the naïve GPU baseline. The roofline analysis confirms that our optimized NTT reaches 79.8% and85.7% of the peak performance on two GPU devices. Through the highly optimized NTT and the assembly-level optimization, we obtain 2.32X - 3.05X acceleration for HE evaluation routines. In addition, our all-together systematic optimizations improve the performance of encrypted element-wise polynomial matrix multiplication application by up to 3.10X.
△ Less
Submitted 29 September, 2021;
originally announced September 2021.
-
Identifying Influential Nodes in Two-mode Data Networks using Formal Concept Analysis
Authors:
Mohamed-Hamza Ibrahim,
Rokia Missaoui,
Jean Vaillancourt
Abstract:
Identifying important actors (or nodes) in a two-mode network often remains a crucial challenge in mining, analyzing, and interpreting real-world networks. While traditional bipartite centrality indices are often used to recognize key nodes that influence the network information flow, they frequently produce poor results in intricate situations such as massive networks with complex local structure…
▽ More
Identifying important actors (or nodes) in a two-mode network often remains a crucial challenge in mining, analyzing, and interpreting real-world networks. While traditional bipartite centrality indices are often used to recognize key nodes that influence the network information flow, they frequently produce poor results in intricate situations such as massive networks with complex local structures or a lack of complete knowledge about the network topology and certain properties. In this paper, we introduce Bi-face (BF), a new bipartite centrality measurement for identifying important nodes in two-mode networks. Using the powerful mathematical formalism of Formal Concept Analysis, the BF measure exploits the faces of concept intents to identify nodes that have influential bicliques connectivity and are not located in irrelevant bridges. Unlike off-the shelf centrality indices, it quantifies how a node has a cohesive-substructure influence on its neighbour nodes via bicliques while not being in network core-peripheral ones through its absence from non-influential bridges. Our experiments on several real-world and synthetic networks show the efficiency of BF over existing prominent bipartite centrality measures such as betweenness, closeness, eigenvector, and vote-rank among others.
△ Less
Submitted 7 September, 2021;
originally announced September 2021.