-
Deep Fusion Model for Brain Tumor Classification Using Fine-Grained Gradient Preservation
Authors:
Niful Islam,
Mohaiminul Islam Bhuiyan,
Jarin Tasnim Raya,
Nur Shazwani Kamarudin,
Khan Md Hasib,
M. F. Mridha,
Dewan Md. Farid
Abstract:
Brain tumors are one of the most common diseases that lead to early death if not diagnosed at an early stage. Traditional diagnostic approaches are extremely time-consuming and prone to errors. In this context, computer vision-based approaches have emerged as an effective tool for accurate brain tumor classification. While some of the existing solutions demonstrate noteworthy accuracy, the models…
▽ More
Brain tumors are one of the most common diseases that lead to early death if not diagnosed at an early stage. Traditional diagnostic approaches are extremely time-consuming and prone to errors. In this context, computer vision-based approaches have emerged as an effective tool for accurate brain tumor classification. While some of the existing solutions demonstrate noteworthy accuracy, the models become infeasible to deploy in areas where computational resources are limited. This research addresses the need for accurate and fast classification of brain tumors with a priority of deploying the model in technologically underdeveloped regions. The research presents a novel architecture for precise brain tumor classification fusing pretrained ResNet152V2 and modified VGG16 models. The proposed architecture undergoes a diligent fine-tuning process that ensures fine gradients are preserved in deep neural networks, which are essential for effective brain tumor classification. The proposed solution incorporates various image processing techniques to improve image quality and achieves an astounding accuracy of 98.36% and 98.04% in Figshare and Kaggle datasets respectively. This architecture stands out for having a streamlined profile, with only 2.8 million trainable parameters. We have leveraged 8-bit quantization to produce a model of size 73.881 MB, significantly reducing it from the previous size of 289.45 MB, ensuring smooth deployment in edge devices even in resource-constrained areas. Additionally, the use of Grad-CAM improves the interpretability of the model, offering insightful information regarding its decision-making process. Owing to its high discriminative ability, this model can be a reliable option for accurate brain tumor classification.
△ Less
Submitted 28 June, 2024;
originally announced June 2024.
-
Leveraging Knowledge Distillation for Lightweight Skin Cancer Classification: Balancing Accuracy and Computational Efficiency
Authors:
Niful Islam,
Khan Md Hasib,
Fahmida Akter Joti,
Asif Karim,
Sami Azam
Abstract:
Skin cancer is a major concern to public health, accounting for one-third of the reported cancers. If not detected early, the cancer has the potential for severe consequences. Recognizing the critical need for effective skin cancer classification, we address the limitations of existing models, which are often too large to deploy in areas with limited computational resources. In response, we presen…
▽ More
Skin cancer is a major concern to public health, accounting for one-third of the reported cancers. If not detected early, the cancer has the potential for severe consequences. Recognizing the critical need for effective skin cancer classification, we address the limitations of existing models, which are often too large to deploy in areas with limited computational resources. In response, we present a knowledge distillation based approach for creating a lightweight yet high-performing classifier. The proposed solution involves fusing three models, namely ResNet152V2, ConvNeXtBase, and ViT Base, to create an effective teacher model. The teacher model is then employed to guide a lightweight student model of size 2.03 MB. This student model is further compressed to 469.77 KB using 16-bit quantization, enabling smooth incorporation into edge devices. With six-stage image preprocessing, data augmentation, and a rigorous ablation study, the model achieves an impressive accuracy of 98.75% on the HAM10000 dataset and 98.94% on the Kaggle dataset in classifying benign and malignant skin cancers. With its high accuracy and compact size, our model appears to be a potential choice for accurate skin cancer classification, particularly in resource-constrained settings.
△ Less
Submitted 28 June, 2024; v1 submitted 24 June, 2024;
originally announced June 2024.
-
On a Modified Directional Distortional Hardening Model for Metal Plasticity
Authors:
Md Mahmudur Rahman,
Md Mahmudul Hasan Pathik,
Nazrul Islam
Abstract:
This study proposes a modification of the yield condition that overcomes the mathematical constraints of the Directional Distortional Hardening models developed by Feigenbaum and Dafalias. This modified model surpasses the mathematical inconsistency of the complete model and the limitation of the r-model of Feigenbaum and Dafalias. In the complete model, the inconsistency of distortional term in t…
▽ More
This study proposes a modification of the yield condition that overcomes the mathematical constraints of the Directional Distortional Hardening models developed by Feigenbaum and Dafalias. This modified model surpasses the mathematical inconsistency of the complete model and the limitation of the r-model of Feigenbaum and Dafalias. In the complete model, the inconsistency of distortional term in the yield surface and the plastic part of free energy appears in the absence of kinematic hardening. In addition, the simplified r-model fails to capture the flattening of the yield surface in the opposite direction of loading due to the absence of a fourth-order internal variable in the distortional term. Hence, this study incorporates a decoupled distortional hardening term in the equation of yield surface that makes it possible to simultaneously capture the flattening of the yield surface and allows isotropic hardening with distortion, even in the absence of kinematic hardening. The mathematical formulation of the proposed modified model is also developed, which sets the stage for future experimental investigations and validation efforts.
△ Less
Submitted 4 June, 2024;
originally announced June 2024.
-
ExplainableDetector: Exploring Transformer-based Language Modeling Approach for SMS Spam Detection with Explainability Analysis
Authors:
Mohammad Amaz Uddin,
Muhammad Nazrul Islam,
Leandros Maglaras,
Helge Janicke,
Iqbal H. Sarker
Abstract:
SMS, or short messaging service, is a widely used and cost-effective communication medium that has sadly turned into a haven for unwanted messages, commonly known as SMS spam. With the rapid adoption of smartphones and Internet connectivity, SMS spam has emerged as a prevalent threat. Spammers have taken notice of the significance of SMS for mobile phone users. Consequently, with the emergence of…
▽ More
SMS, or short messaging service, is a widely used and cost-effective communication medium that has sadly turned into a haven for unwanted messages, commonly known as SMS spam. With the rapid adoption of smartphones and Internet connectivity, SMS spam has emerged as a prevalent threat. Spammers have taken notice of the significance of SMS for mobile phone users. Consequently, with the emergence of new cybersecurity threats, the number of SMS spam has expanded significantly in recent years. The unstructured format of SMS data creates significant challenges for SMS spam detection, making it more difficult to successfully fight spam attacks in the cybersecurity domain. In this work, we employ optimized and fine-tuned transformer-based Large Language Models (LLMs) to solve the problem of spam message detection. We use a benchmark SMS spam dataset for this spam detection and utilize several preprocessing techniques to get clean and noise-free data and solve the class imbalance problem using the text augmentation technique. The overall experiment showed that our optimized fine-tuned BERT (Bidirectional Encoder Representations from Transformers) variant model RoBERTa obtained high accuracy with 99.84\%. We also work with Explainable Artificial Intelligence (XAI) techniques to calculate the positive and negative coefficient scores which explore and explain the fine-tuned model transparency in this text-based spam SMS detection task. In addition, traditional Machine Learning (ML) models were also examined to compare their performance with the transformer-based models. This analysis describes how LLMs can make a good impact on complex textual-based spam data in the cybersecurity field.
△ Less
Submitted 12 May, 2024;
originally announced May 2024.
-
Quantum-Edge Cloud Computing: A Future Paradigm for IoT Applications
Authors:
Mohammad Ikbal Hossain,
Shaharier Arafat Sumon,
Habib Md. Hasan,
Fatema Akter,
Md Bahauddin Badhon,
Mohammad Nahid Ul Islam
Abstract:
The Internet of Things (IoT) is expanding rapidly, which has created a need for sophisticated computational frameworks that can handle the data and security requirements inherent in modern IoT applications. However, traditional cloud computing frameworks have struggled with latency, scalability, and security vulnerabilities. Quantum-Edge Cloud Computing (QECC) is a new paradigm that effectively ad…
▽ More
The Internet of Things (IoT) is expanding rapidly, which has created a need for sophisticated computational frameworks that can handle the data and security requirements inherent in modern IoT applications. However, traditional cloud computing frameworks have struggled with latency, scalability, and security vulnerabilities. Quantum-Edge Cloud Computing (QECC) is a new paradigm that effectively addresses these challenges by combining the computational power of quantum computing, the low-latency benefits of edge computing, and the scalable resources of cloud computing. This study has been conducted based on a published literature review, performance improvements, and metrics data from Bangladesh on smart city infrastructure, healthcare monitoring, and the industrial IoT sector. We have discussed the integration of quantum cryptography to enhance data integrity, the role of edge computing in reducing response times, and how cloud computing's resource abundance can support large IoT networks. We examine case studies, such as the use of quantum sensors in self-driving vehicles, to illustrate the real-world impact of QECC. Furthermore, the paper identifies future research directions, including develo** quantum-resistant encryption and optimizing quantum algorithms for edge computing. The convergence of these technologies in QECC promises to overcome the existing limitations of IoT frameworks and set a new standard for the future of IoT applications.
△ Less
Submitted 8 May, 2024;
originally announced May 2024.
-
DTization: A New Method for Supervised Feature Scaling
Authors:
Niful Islam
Abstract:
Artificial intelligence is currently a dominant force in sha** various aspects of the world. Machine learning is a sub-field in artificial intelligence. Feature scaling is one of the data pre-processing techniques that improves the performance of machine learning algorithms. The traditional feature scaling techniques are unsupervised where they do not have influence of the dependent variable in…
▽ More
Artificial intelligence is currently a dominant force in sha** various aspects of the world. Machine learning is a sub-field in artificial intelligence. Feature scaling is one of the data pre-processing techniques that improves the performance of machine learning algorithms. The traditional feature scaling techniques are unsupervised where they do not have influence of the dependent variable in the scaling process. In this paper, we have presented a novel feature scaling technique named DTization that employs decision tree and robust scaler for supervised feature scaling. The proposed method utilizes decision tree to measure the feature importance and based on the importance, different features get scaled differently with the robust scaler algorithm. The proposed method has been extensively evaluated on ten classification and regression datasets on various evaluation matrices and the results show a noteworthy performance improvement compared to the traditional feature scaling methods.
△ Less
Submitted 27 April, 2024;
originally announced April 2024.
-
An in-depth analysis of the variable cyclotron lines in GX 301$-$2
Authors:
Nicolas Zalot,
Ekaterina Sokolova-Lapa,
Jakob Stierhof,
Ralf Ballhausen,
Aafia Zainab,
Katja Pottschmidt,
Felix Fürst,
Philipp Thalhammer,
Nazma Islam,
Camille M. Diez,
Peter Kretschmar,
Katrin Berger,
Richard Rothschild,
Christian Malacaria,
Pragati Pradhan,
Jörn Wilms
Abstract:
Context. The High-Mass X-ray Binary (HMXB) system GX 301$-$2 is a persistent source with a well-known variable cyclotron line centered at 35 keV. Recently, a second cyclotron line at 50 keV has been reported with a presumably different behavior than the 35 keV line.
Aims. We investigate the presence of the newly discovered cyclotron line in the phase-averaged and phase-resolved spectra at higher…
▽ More
Context. The High-Mass X-ray Binary (HMXB) system GX 301$-$2 is a persistent source with a well-known variable cyclotron line centered at 35 keV. Recently, a second cyclotron line at 50 keV has been reported with a presumably different behavior than the 35 keV line.
Aims. We investigate the presence of the newly discovered cyclotron line in the phase-averaged and phase-resolved spectra at higher luminosities than before. We further aim to determine the pulse-phase variability of both lines.
Methods. We analyze a NuSTAR observation of GX 301$-$2 covering the pre-periastron flare, where the source luminosity reached its peak of ${\sim} 4 \times 10^{37}\,\mathrm{erg}\,\mathrm{s}^{-1}$ in the 5-50 keV range. We analyze the phase-averaged spectra in the NuSTAR energy range from 3.5-79 keV for both the complete observation and three time segments of it. We further analyze the phase-resolved spectra and the pulse-phase variability of continuum and cyclotron line parameters.
Results. We confirm that the description of the phase-averaged spectrum requires a second absorption feature at $51.5^{+1.1}_{-1.0}$ keV besides the established line at 35 keV. The statistical significance of this feature in the phase-averaged spectrum is $>99.999\%$. We further find that the 50 keV cyclotron line is present in three of eight phase bins.
Conclusions. Based on the results of our analysis, we confirm that the detected absorption feature is very likely to be a cyclotron line. We discuss a variety of physical scenarios which could explain the proposed anharmonicity, but also outline circumstances under which the lines are harmonically related. We further present the cyclotron line history of GX 301$-$2 and evaluate concordance among each other. We also discuss an alternative spectral model including cyclotron line emission wings.
△ Less
Submitted 25 March, 2024; v1 submitted 18 March, 2024;
originally announced March 2024.
-
Code as Reward: Empowering Reinforcement Learning with VLMs
Authors:
David Venuto,
Sami Nur Islam,
Martin Klissarov,
Doina Precup,
Sherry Yang,
Ankit Anand
Abstract:
Pre-trained Vision-Language Models (VLMs) are able to understand visual concepts, describe and decompose complex tasks into sub-tasks, and provide feedback on task completion. In this paper, we aim to leverage these capabilities to support the training of reinforcement learning (RL) agents. In principle, VLMs are well suited for this purpose, as they can naturally analyze image-based observations…
▽ More
Pre-trained Vision-Language Models (VLMs) are able to understand visual concepts, describe and decompose complex tasks into sub-tasks, and provide feedback on task completion. In this paper, we aim to leverage these capabilities to support the training of reinforcement learning (RL) agents. In principle, VLMs are well suited for this purpose, as they can naturally analyze image-based observations and provide feedback (reward) on learning progress. However, inference in VLMs is computationally expensive, so querying them frequently to compute rewards would significantly slowdown the training of an RL agent. To address this challenge, we propose a framework named Code as Reward (VLM-CaR). VLM-CaR produces dense reward functions from VLMs through code generation, thereby significantly reducing the computational burden of querying the VLM directly. We show that the dense rewards generated through our approach are very accurate across a diverse set of discrete and continuous environments, and can be more effective in training RL policies than the original sparse environment rewards.
△ Less
Submitted 7 February, 2024;
originally announced February 2024.
-
Scavenging Hyena: Distilling Transformers into Long Convolution Models
Authors:
Tokiniaina Raharison Ralambomihanta,
Shahrad Mohammadzadeh,
Mohammad Sami Nur Islam,
Wassim Jabbour,
Laurence Liang
Abstract:
The rapid evolution of Large Language Models (LLMs), epitomized by architectures like GPT-4, has reshaped the landscape of natural language processing. This paper introduces a pioneering approach to address the efficiency concerns associated with LLM pre-training, proposing the use of knowledge distillation for cross-architecture transfer. Leveraging insights from the efficient Hyena mechanism, ou…
▽ More
The rapid evolution of Large Language Models (LLMs), epitomized by architectures like GPT-4, has reshaped the landscape of natural language processing. This paper introduces a pioneering approach to address the efficiency concerns associated with LLM pre-training, proposing the use of knowledge distillation for cross-architecture transfer. Leveraging insights from the efficient Hyena mechanism, our method replaces attention heads in transformer models by Hyena, offering a cost-effective alternative to traditional pre-training while confronting the challenge of processing long contextual information, inherent in quadratic attention mechanisms. Unlike conventional compression-focused methods, our technique not only enhances inference speed but also surpasses pre-training in terms of both accuracy and efficiency. In the era of evolving LLMs, our work contributes to the pursuit of sustainable AI solutions, striking a balance between computational power and environmental impact.
△ Less
Submitted 30 January, 2024;
originally announced January 2024.
-
Deep Learning in Physical Layer: Review on Data Driven End-to-End Communication Systems and their Enabling Semantic Applications
Authors:
Nazmul Islam,
Seokjoo Shin
Abstract:
Deep Learning (DL) has enabled a paradigm shift in wireless communication system with data driven end-to-end (E2E) learning and optimization of the Physical Layer (PHY). By leveraging the representation learning of DL, E2E systems exhibit enhanced adaptability and performance in complex wireless environments, fulfilling the demands of 5G and beyond network systems and applications. The evolution o…
▽ More
Deep Learning (DL) has enabled a paradigm shift in wireless communication system with data driven end-to-end (E2E) learning and optimization of the Physical Layer (PHY). By leveraging the representation learning of DL, E2E systems exhibit enhanced adaptability and performance in complex wireless environments, fulfilling the demands of 5G and beyond network systems and applications. The evolution of data-driven techniques in the PHY has enabled advanced semantic applications across various modalities including text, image, audio, video, and multi-modal transmissions. These applications transcend from traditional bit-level communication to semantic-level intelligent communication systems, which are capable of understanding and adapting to the context and intent of the data transmission. Although PHY as a DL architecture for data-driven E2E communication is a key factor in enabling semantic communication systems (SemCom), and various studies in recent years have surveyed them separately, their combination has not been thoroughly reviewed. Additionally, these are emerging fields that are still in their infancy, with several techniques having been developed and evolved in recent years. Therefore, this article provides a holistic review of data-driven PHY for E2E communication system, and their enabling semantic applications across different modalities. Furthermore, it identifies critical challenges and prospective research directions, providing a pivotal reference for future development of DL in PHY and SemCom.
△ Less
Submitted 8 January, 2024;
originally announced January 2024.
-
Causative Insights into Open Source Software Security using Large Language Code Embeddings and Semantic Vulnerability Graph
Authors:
Nafis Tanveer Islam,
Gonzalo De La Torre Parra,
Dylan Manual,
Murtuza Jadliwala,
Peyman Najafirad
Abstract:
Open Source Software (OSS) security and resilience are worldwide phenomena hampering economic and technological innovation. OSS vulnerabilities can cause unauthorized access, data breaches, network disruptions, and privacy violations, rendering any benefits worthless. While recent deep-learning techniques have shown great promise in identifying and localizing vulnerabilities in source code, it is…
▽ More
Open Source Software (OSS) security and resilience are worldwide phenomena hampering economic and technological innovation. OSS vulnerabilities can cause unauthorized access, data breaches, network disruptions, and privacy violations, rendering any benefits worthless. While recent deep-learning techniques have shown great promise in identifying and localizing vulnerabilities in source code, it is unclear how effective these research techniques are from a usability perspective due to a lack of proper methodological analysis. Usually, these methods offload a developer's task of classifying and localizing vulnerable code; still, a reasonable study to measure the actual effectiveness of these systems to the end user has yet to be conducted. To address the challenge of proper developer training from the prior methods, we propose a system to link vulnerabilities to their root cause, thereby intuitively educating the developers to code more securely. Furthermore, we provide a comprehensive usability study to test the effectiveness of our system in fixing vulnerabilities and its capability to assist developers in writing more secure code. We demonstrate the effectiveness of our system by showing its efficacy in hel** developers fix source code with vulnerabilities. Our study shows a 24% improvement in code repair capabilities compared to previous methods. We also show that, when trained by our system, on average, approximately 9% of the developers naturally tend to write more secure code with fewer vulnerabilities.
△ Less
Submitted 13 January, 2024;
originally announced January 2024.
-
Code Security Vulnerability Repair Using Reinforcement Learning with Large Language Models
Authors:
Nafis Tanveer Islam,
Mohammad Bahrami Karkevandi,
Peyman Najafirad
Abstract:
With the recent advancement of Large Language Models (LLMs), generating functionally correct code has become less complicated for a wide array of developers. While using LLMs has sped up the functional development process, it poses a heavy risk to code security. Code generation with proper security measures using LLM is a significantly more challenging task than functional code generation. Securit…
▽ More
With the recent advancement of Large Language Models (LLMs), generating functionally correct code has become less complicated for a wide array of developers. While using LLMs has sped up the functional development process, it poses a heavy risk to code security. Code generation with proper security measures using LLM is a significantly more challenging task than functional code generation. Security measures may include adding a pair of lines of code with the original code, consisting of null pointer checking or prepared statements for SQL injection prevention. Currently, available code repair LLMs generate code repair by supervised fine-tuning, where the model looks at cross-entropy loss. However, the original and repaired codes are mostly similar in functionality and syntactically, except for a few (1-2) lines, which act as security measures. This imbalance between the lines needed for security measures and the functional code enforces the supervised fine-tuned model to prioritize generating functional code without adding proper security measures, which also benefits the model by resulting in minimal loss. Therefore, in this work, for security hardening and strengthening of generated code from LLMs, we propose a reinforcement learning-based method for program-specific repair with the combination of semantic and syntactic reward mechanisms that focus heavily on adding security and functional measures in the code, respectively.
△ Less
Submitted 30 January, 2024; v1 submitted 13 January, 2024;
originally announced January 2024.
-
LLM-Powered Code Vulnerability Repair with Reinforcement Learning and Semantic Reward
Authors:
Nafis Tanveer Islam,
Joseph Khoury,
Andrew Seong,
Mohammad Bahrami Karkevandi,
Gonzalo De La Torre Parra,
Elias Bou-Harb,
Peyman Najafirad
Abstract:
In software development, the predominant emphasis on functionality often supersedes security concerns, a trend gaining momentum with AI-driven automation tools like GitHub Copilot. These tools significantly improve developers' efficiency in functional code development. Nevertheless, it remains a notable concern that such tools are also responsible for creating insecure code, predominantly because…
▽ More
In software development, the predominant emphasis on functionality often supersedes security concerns, a trend gaining momentum with AI-driven automation tools like GitHub Copilot. These tools significantly improve developers' efficiency in functional code development. Nevertheless, it remains a notable concern that such tools are also responsible for creating insecure code, predominantly because of pre-training on publicly available repositories with vulnerable code. Moreover, developers are called the "weakest link in the chain" since they have very minimal knowledge of code security. Although existing solutions provide a reasonable solution to vulnerable code, they must adequately describe and educate the developers on code security to ensure that the security issues are not repeated. Therefore we introduce a multipurpose code vulnerability analysis system \texttt{SecRepair}, powered by a large language model, CodeGen2 assisting the developer in identifying and generating fixed code along with a complete description of the vulnerability with a code comment. Our innovative methodology uses a reinforcement learning paradigm to generate code comments augmented by a semantic reward mechanism. Inspired by how humans fix code issues, we propose an instruction-based dataset suitable for vulnerability analysis with LLMs. We further identify zero-day and N-day vulnerabilities in 6 Open Source IoT Operating Systems on GitHub. Our findings underscore that incorporating reinforcement learning coupled with semantic reward augments our model's performance, thereby fortifying its capacity to address code vulnerabilities with improved efficacy.
△ Less
Submitted 21 February, 2024; v1 submitted 6 January, 2024;
originally announced January 2024.
-
Swift/XRT observations of superorbital modulations in wind-fed supergiant X-ray binaries
Authors:
P. Romano,
E. Bozzo,
N. Islam,
R. H. D. Corbet
Abstract:
We present the first Swift/XRT long-term monitoring of 2S 0114+650, a wind-fed supergiant X-ray binary for which both orbital and superorbital periods are known (P_orb~11.6d and P_sup~0.8d). Our campaign, summing up to ~ 79ks, is the most intense and complete sampling of the X-ray light curve of this source with a sensitive pointed X-ray instrument, and covers 17 orbital, and 6 superorbital cycles…
▽ More
We present the first Swift/XRT long-term monitoring of 2S 0114+650, a wind-fed supergiant X-ray binary for which both orbital and superorbital periods are known (P_orb~11.6d and P_sup~0.8d). Our campaign, summing up to ~ 79ks, is the most intense and complete sampling of the X-ray light curve of this source with a sensitive pointed X-ray instrument, and covers 17 orbital, and 6 superorbital cycles. The combination of flexibility, sensitivity, and soft X-ray coverage of XRT allowed us to confirm previously reported spectral changes along the orbital cycle of the source and unveil the variability in its spectral parameters as a function of the superorbital phase. For completeness, we also report on a similar analysis carried out by exploiting XRT archival data on three additional wind-fed supergiant X-ray binaries IGR J16418-4532, IGR J16479-4514, and IGR J16493-4348. For these sources, the archival data provided coverage along several superorbital cycles but our analysis could not reveal any significant spectral variability.
△ Less
Submitted 14 December, 2023;
originally announced December 2023.
-
X-rays from RS Ophiuchi's 2021 eruption: shocks in and out of ionization equilibrium
Authors:
Nazma Islam,
Koji Mukai,
Jennifer L. Sokoloski
Abstract:
The recurrent nova RS Ophiuchi (RS Oph) underwent its most recent eruption on 8 August 2021 and became the first nova to produce both detectable GeV and TeV emission. We used extensive X-ray monitoring with the Neutron Star Interior Composition Explorer Mission (NICER) to model the X-ray spectrum and probe the shock conditions throughout the 2021 eruption. The rapidly evolving NICER spectra consis…
▽ More
The recurrent nova RS Ophiuchi (RS Oph) underwent its most recent eruption on 8 August 2021 and became the first nova to produce both detectable GeV and TeV emission. We used extensive X-ray monitoring with the Neutron Star Interior Composition Explorer Mission (NICER) to model the X-ray spectrum and probe the shock conditions throughout the 2021 eruption. The rapidly evolving NICER spectra consisted of both line and continuum emission that could not be accounted for using a single-temperature collisional equilibrium plasma model with an absorber that fully covered the source. We successfully modelled the NICER spectrum as a non-equilibrium ionization collisional plasma with partial-covering absorption. The temperature of the the non-equilibrium plasma show a peak on Day 5 with a kT of approximately 24 keV. The increase in temperature during the first five days could have been due to increasing contribution to the X-ray emission from material behind fast polar shocks or a decrease is the amount of energy being drained from shocks into particle acceleration during that time period. The absorption showed a change from fully covering the source to having a covering fraction of roughly 0.4, suggesting a geometrical evolution of the shock region within the complex global distribution of the circumstellar material. These findings show the evidence of the ejecta interacting with some dense equatorial shell initially and with less dense material in the bipolar regions at later times during the eruption.
△ Less
Submitted 28 November, 2023;
originally announced November 2023.
-
EWasteNet: A Two-Stream Data Efficient Image Transformer Approach for E-Waste Classification
Authors:
Niful Islam,
Md. Mehedi Hasan Jony,
Emam Hasan,
Sunny Sutradhar,
Atikur Rahman,
Md. Motaharul Islam
Abstract:
Improper disposal of e-waste poses global environmental and health risks, raising serious concerns. The accurate classification of e-waste images is critical for efficient management and recycling. In this paper, we have presented a comprehensive dataset comprised of eight different classes of images of electronic devices named the E-Waste Vision Dataset. We have also presented EWasteNet, a novel…
▽ More
Improper disposal of e-waste poses global environmental and health risks, raising serious concerns. The accurate classification of e-waste images is critical for efficient management and recycling. In this paper, we have presented a comprehensive dataset comprised of eight different classes of images of electronic devices named the E-Waste Vision Dataset. We have also presented EWasteNet, a novel two-stream approach for precise e-waste image classification based on a data-efficient image transformer (DeiT). The first stream of EWasteNet passes through a sobel operator that detects the edges while the second stream is directed through an Atrous Spatial Pyramid Pooling and attention block where multi-scale contextual information is captured. We train both of the streams simultaneously and their features are merged at the decision level. The DeiT is used as the backbone of both streams. Extensive analysis of the e-waste dataset indicates the usefulness of our method, providing 96% accuracy in e-waste classification. The proposed approach demonstrates significant usefulness in addressing the global concern of e-waste management. It facilitates efficient waste management and recycling by accurately classifying e-waste images, reducing health and safety hazards associated with improper disposal.
△ Less
Submitted 28 September, 2023;
originally announced November 2023.
-
Spinon heat transport in the three-dimensional quantum magnet PbCuTe$_2$O$_6$
Authors:
Xiaochen Hong,
Matthias Gillig,
Abanoub R. N. Hanna,
Shravani Chillal,
A. T. M. Nazmul Islam,
Bella Lake,
Bernd Büchner,
Christian Hess
Abstract:
Quantum spin liquids (QSL) are novel phases of matter which remain quantum disordered even at the lowest temperature. They are characterized by emergent gauge fields and fractionalized quasiparticles. Here we show that the sub-Kelvin thermal transport of the three-dimensional $S=1/2$ hyper-hyperkagome quantum magnet PbCuTe$_2$O$_6$ is governed by a sizeable charge-neutral fermionic contribution wh…
▽ More
Quantum spin liquids (QSL) are novel phases of matter which remain quantum disordered even at the lowest temperature. They are characterized by emergent gauge fields and fractionalized quasiparticles. Here we show that the sub-Kelvin thermal transport of the three-dimensional $S=1/2$ hyper-hyperkagome quantum magnet PbCuTe$_2$O$_6$ is governed by a sizeable charge-neutral fermionic contribution which is compatible with the itinerant fractionalized excitations of a spinon Fermi surface. We demonstrate that this hallmark feature of the QSL state is remarkably robust against sample crystallinity, large magnetic field, and field-induced magnetic order, ruling out the imitation of QSL features by extrinsic effects. Our findings thus reveal the characteristic low-energy features of PbCuTe$_2$O$_6$ which qualify this compound as a true QSL material.
△ Less
Submitted 20 November, 2023;
originally announced November 2023.
-
Notion of Explainable Artificial Intelligence -- An Empirical Investigation from A Users Perspective
Authors:
AKM Bahalul Haque,
A. K. M. Najmul Islam,
Patrick Mikalef
Abstract:
The growing attention to artificial intelligence-based applications has led to research interest in explainability issues. This emerging research attention on explainable AI (XAI) advocates the need to investigate end user-centric explainable AI. Thus, this study aims to investigate usercentric explainable AI and considered recommendation systems as the study context. We conducted focus group inte…
▽ More
The growing attention to artificial intelligence-based applications has led to research interest in explainability issues. This emerging research attention on explainable AI (XAI) advocates the need to investigate end user-centric explainable AI. Thus, this study aims to investigate usercentric explainable AI and considered recommendation systems as the study context. We conducted focus group interviews to collect qualitative data on the recommendation system. We asked participants about the end users' comprehension of a recommended item, its probable explanation, and their opinion of making a recommendation explainable. Our findings reveal that end users want a non-technical and tailor-made explanation with on-demand supplementary information. Moreover, we also observed users requiring an explanation about personal data usage, detailed user feedback, and authentic and reliable explanations. Finally, we propose a synthesized framework that aims at involving the end user in the development process for requirements collection and validation.
△ Less
Submitted 1 November, 2023;
originally announced November 2023.
-
Breakthroughs in Cool Star Physics with the Line Emission Mapper X-ray Probe
Authors:
Jeremy J. Drake,
Julián Alvarado Gomez,
Costanza Argiroffi,
Ettore Flaccomio,
Cecilia Garraffo,
Nicolas Grosso,
Nazma Islam,
Margarita Karovska,
Vinay L. Kashyap,
Kristina Monsch,
Jan-Uwe Ness,
Salvatore Sciortino,
Bradford Wargelin
Abstract:
We outline some of the highlights of the scientific case for the advancement of stellar high energy physics using the Line Emission Mapper X-ray Probe ({\it LEM}). The key to advancements with LEM lie in its large effective area -- up to 100 times that of the {\it Chandra} MEG -- and 1~eV spectral resolution. The large effective area opens up for the first time the ability to study time-dependent…
▽ More
We outline some of the highlights of the scientific case for the advancement of stellar high energy physics using the Line Emission Mapper X-ray Probe ({\it LEM}). The key to advancements with LEM lie in its large effective area -- up to 100 times that of the {\it Chandra} MEG -- and 1~eV spectral resolution. The large effective area opens up for the first time the ability to study time-dependent phenomena on their natural timescales at high resolution, such as flares and coronal mass ejections, and also opens the sky to much fainter targets than available to {\it Chandra} or {\it XMM-Newton}.
△ Less
Submitted 26 October, 2023;
originally announced October 2023.
-
DeepTriNet: A Tri-Level Attention Based DeepLabv3+ Architecture for Semantic Segmentation of Satellite Images
Authors:
Tareque Bashar Ovi,
Shakil Mosharrof,
Nomaiya Bashree,
Md Shofiqul Islam,
Muhammad Nazrul Islam
Abstract:
The segmentation of satellite images is crucial in remote sensing applications. Existing methods face challenges in recognizing small-scale objects in satellite images for semantic segmentation primarily due to ignoring the low-level characteristics of the underlying network and due to containing distinct amounts of information by different feature maps. Thus, in this research, a tri-level attenti…
▽ More
The segmentation of satellite images is crucial in remote sensing applications. Existing methods face challenges in recognizing small-scale objects in satellite images for semantic segmentation primarily due to ignoring the low-level characteristics of the underlying network and due to containing distinct amounts of information by different feature maps. Thus, in this research, a tri-level attention-based DeepLabv3+ architecture (DeepTriNet) is proposed for the semantic segmentation of satellite images. The proposed hybrid method combines squeeze-and-excitation networks (SENets) and tri-level attention units (TAUs) with the vanilla DeepLabv3+ architecture, where the TAUs are used to bridge the semantic feature gap among encoders output and the SENets used to put more weight on relevant features. The proposed DeepTriNet finds which features are the more relevant and more generalized way by its self-supervision rather we annotate them. The study showed that the proposed DeepTriNet performs better than many conventional techniques with an accuracy of 98% and 77%, IoU 80% and 58%, precision 88% and 68%, and recall of 79% and 55% on the 4-class Land-Cover.ai dataset and the 15-class GID-2 dataset respectively. The proposed method will greatly contribute to natural resource management and change detection in rural and urban regions through efficient and semantic satellite image segmentation
△ Less
Submitted 5 September, 2023;
originally announced October 2023.
-
Magnetic structure and phase diagram of the Heisenberg-Ising spin chain antiferromagnetic PbCo$_{2}$V$_{2}$O$_{8}$
Authors:
K. Puzniak,
C. Aguilar-Maldonado,
R. Feyerherm,
K. Prokeš,
A. T. M. N. Islam,
Y. Skourski,
L. Keller,
B. Lake
Abstract:
The effective spin-1/2 antiferromagnetic Heisenberg-Ising chain materials, ACo$_2$V$_2$O$_8$, A = Sr, Ba, are a rich source of exotic fundamental phenomena and have been investigated for their model magnetic properties both in zero and non-zero magnetic fields. Here we investigate a new member of the family, namely PbCo$_2$V$_2$O$_8$. We synthesize powder and single crystal samples of PbCo$_2$V…
▽ More
The effective spin-1/2 antiferromagnetic Heisenberg-Ising chain materials, ACo$_2$V$_2$O$_8$, A = Sr, Ba, are a rich source of exotic fundamental phenomena and have been investigated for their model magnetic properties both in zero and non-zero magnetic fields. Here we investigate a new member of the family, namely PbCo$_2$V$_2$O$_8$. We synthesize powder and single crystal samples of PbCo$_2$V$_2$O$_8$ and determine its magnetic structure using neutron diffraction. Furthermore, the magnetic field/temperature phase diagrams for magnetic field applied along the c, a, and [110] crystallographic directions in the tetragonal unit cell are determined via magnetization and heat capacity measurements. A complex series of phases and quantum phase transitions are discovered that depend strongly on both the magnitude and direction of the field. Our results show that \pcvo is an effective spin-1/2 antiferromagnetic Heisenberg-Ising chain with properties that are in general comparable to those of SrCo$_2$V$_2$O$_8$ and BaCo$_2$V$_2$O$_8$. One interesting departure from the results of these related compounds, is however, the discovery of a new field-induced phase for the field direction $H\|$[110] which has not been previously observed.
△ Less
Submitted 28 September, 2023;
originally announced September 2023.
-
Many boson quantum Szilard engine for fractional power law potential
Authors:
Najirul Islam
Abstract:
In this article, we have realized the quantum Szilard engine (QZE) for non-interacting bosons. We have adopted the Bose-Einstein statistics for this purpose. We have considered fractional power law potential for this purpose and have used the artifact of the quantization of energy. We have calculated the work and the efficiency for non-interacting bosons in fractional power potential. We have show…
▽ More
In this article, we have realized the quantum Szilard engine (QZE) for non-interacting bosons. We have adopted the Bose-Einstein statistics for this purpose. We have considered fractional power law potential for this purpose and have used the artifact of the quantization of energy. We have calculated the work and the efficiency for non-interacting bosons in fractional power potential. We have shown the dependence of the number of particles for the work and the efficiency. We also have realized the QZE for a single-particle in a Morse potential revealing how the depth of the potential impacts both work and efficiency. Furthermore, we have examined the influence of temperature and the anharmonicity parameter on the work. Finally, we have conducted a comparative analysis, considering both non-interacting bosons in a fractional power law potential and a single-particle in a Morse potential under harmonic approximation conditions.
△ Less
Submitted 12 September, 2023;
originally announced September 2023.
-
Review of Deep Learning-based Malware Detection for Android and Windows System
Authors:
Nazmul Islam,
Seokjoo Shin
Abstract:
Differentiating malware is important to determine their behaviors and level of threat; as well as to devise defensive strategy against them. In response, various anti-malware systems have been developed to distinguish between different malwares. However, most of the recent malware families are Artificial Intelligence (AI) enable and can deceive traditional anti-malware systems using different obfu…
▽ More
Differentiating malware is important to determine their behaviors and level of threat; as well as to devise defensive strategy against them. In response, various anti-malware systems have been developed to distinguish between different malwares. However, most of the recent malware families are Artificial Intelligence (AI) enable and can deceive traditional anti-malware systems using different obfuscation techniques. Therefore, only AI-enabled anti-malware system is robust against these techniques and can detect different features in the malware files that aid in malicious activities. In this study we review two AI-enabled techniques for detecting malware in Windows and Android operating system, respectively. Both the techniques achieved perfect accuracy in detecting various malware families.
△ Less
Submitted 4 July, 2023;
originally announced July 2023.
-
Distinguishing Human Generated Text From ChatGPT Generated Text Using Machine Learning
Authors:
Niful Islam,
Debopom Sutradhar,
Humaira Noor,
Jarin Tasnim Raya,
Monowara Tabassum Maisha,
Dewan Md Farid
Abstract:
ChatGPT is a conversational artificial intelligence that is a member of the generative pre-trained transformer of the large language model family. This text generative model was fine-tuned by both supervised learning and reinforcement learning so that it can produce text documents that seem to be written by natural intelligence. Although there are numerous advantages of this generative model, it c…
▽ More
ChatGPT is a conversational artificial intelligence that is a member of the generative pre-trained transformer of the large language model family. This text generative model was fine-tuned by both supervised learning and reinforcement learning so that it can produce text documents that seem to be written by natural intelligence. Although there are numerous advantages of this generative model, it comes with some reasonable concerns as well. This paper presents a machine learning-based solution that can identify the ChatGPT delivered text from the human written text along with the comparative analysis of a total of 11 machine learning and deep learning algorithms in the classification process. We have tested the proposed model on a Kaggle dataset consisting of 10,000 texts out of which 5,204 texts were written by humans and collected from news and social media. On the corpus generated by GPT-3.5, the proposed algorithm presents an accuracy of 77%.
△ Less
Submitted 26 May, 2023;
originally announced June 2023.
-
Magnetic excitation spectrum and Hamiltonian of the quantum spin chain BaCuTe2O6
Authors:
A. Samartzis,
S. Chillal,
H. O. Jeschke,
D. J. Voneshen,
Z. Lu,
A. T. M. N. Islam,
B. Lake
Abstract:
The magnetic excitation spectrum and Hamiltonian of the quantum magnet BaCuTe2O6 is studied by inelastic neutron scattering (INS) and density functional theory (DFT). INS on powder and single crystal samples reveals overlap** spinon continuua - the spectrum of an antiferromagnetic spin-1/2 spin chain - due to equivalent chains running along the a, b, and c directions. Long-range magnetic order o…
▽ More
The magnetic excitation spectrum and Hamiltonian of the quantum magnet BaCuTe2O6 is studied by inelastic neutron scattering (INS) and density functional theory (DFT). INS on powder and single crystal samples reveals overlap** spinon continuua - the spectrum of an antiferromagnetic spin-1/2 spin chain - due to equivalent chains running along the a, b, and c directions. Long-range magnetic order onsets below TN = 6.3 K due to interchain interactions, and is accompanied by the emergence of sharp spin-wave excitations which replace the continuua at low energies. The spin-wave spectrum is highly complex and was successfully modelled achieving excellent agreement with the data. The extracted interactions reveal an intrachain interaction, J3 = 2.9 meV, while the antiferromagnetic hyperkagome interaction J2, is the sub-leading interaction responsible for coupling the chains together in a frustrated way. DFT calculations reveal a similar picture for BaCuTe2O6 of dominant J3 and sub-leading J2 antiferromagnetic interactions and also indicate a high sensitivity of the interactions to small changes of structure which could explain the very different Hamiltonians observed in the sister compounds SrCuTe2O6 and PbCuTe2O6.
△ Less
Submitted 5 May, 2023;
originally announced May 2023.
-
Hardware in Loop Learning with Spin Stochastic Neurons
Authors:
A N M Nafiul Islam,
Kezhou Yang,
Amit K. Shukla,
Pravin Khanal,
Bowei Zhou,
Wei-Gang Wang,
Abhronil Sengupta
Abstract:
Despite the promise of superior efficiency and scalability, real-world deployment of emerging nanoelectronic platforms for brain-inspired computing have been limited thus far, primarily because of inter-device variations and intrinsic non-idealities. In this work, we demonstrate mitigating these issues by performing learning directly on practical devices through a hardware-in-loop approach, utiliz…
▽ More
Despite the promise of superior efficiency and scalability, real-world deployment of emerging nanoelectronic platforms for brain-inspired computing have been limited thus far, primarily because of inter-device variations and intrinsic non-idealities. In this work, we demonstrate mitigating these issues by performing learning directly on practical devices through a hardware-in-loop approach, utilizing stochastic neurons based on heavy metal/ferromagnetic spin-orbit torque heterostructures. We characterize the probabilistic switching and device-to-device variability of our fabricated devices of various sizes to showcase the effect of device dimension on the neuronal dynamics and its consequent impact on network-level performance. The efficacy of the hardware-in-loop scheme is illustrated in a deep learning scenario achieving equivalent software performance. This work paves the way for future large-scale implementations of neuromorphic hardware and realization of truly autonomous edge-intelligent devices.
△ Less
Submitted 21 March, 2024; v1 submitted 4 May, 2023;
originally announced May 2023.
-
An Unbiased Transformer Source Code Learning with Semantic Vulnerability Graph
Authors:
Nafis Tanveer Islam,
Gonzalo De La Torre Parra,
Dylan Manuel,
Elias Bou-Harb,
Peyman Najafirad
Abstract:
Over the years, open-source software systems have become prey to threat actors. Even as open-source communities act quickly to patch the breach, code vulnerability screening should be an integral part of agile software development from the beginning. Unfortunately, current vulnerability screening techniques are ineffective at identifying novel vulnerabilities or providing developers with code vuln…
▽ More
Over the years, open-source software systems have become prey to threat actors. Even as open-source communities act quickly to patch the breach, code vulnerability screening should be an integral part of agile software development from the beginning. Unfortunately, current vulnerability screening techniques are ineffective at identifying novel vulnerabilities or providing developers with code vulnerability and classification. Furthermore, the datasets used for vulnerability learning often exhibit distribution shifts from the real-world testing distribution due to novel attack strategies deployed by adversaries and as a result, the machine learning model's performance may be hindered or biased. To address these issues, we propose a joint interpolated multitasked unbiased vulnerability classifier comprising a transformer "RoBERTa" and graph convolution neural network (GCN). We present a training process utilizing a semantic vulnerability graph (SVG) representation from source code, created by integrating edges from a sequential flow, control flow, and data flow, as well as a novel flow dubbed Poacher Flow (PF). Poacher flow edges reduce the gap between dynamic and static program analysis and handle complex long-range dependencies. Moreover, our approach reduces biases of classifiers regarding unbalanced datasets by integrating Focal Loss objective function along with SVG. Remarkably, experimental results show that our classifier outperforms state-of-the-art results on vulnerability detection with fewer false negatives and false positives. After testing our model across multiple datasets, it shows an improvement of at least 2.41% and 18.75% in the best-case scenario. Evaluations using N-day program samples demonstrate that our proposed approach achieves a 93% accuracy and was able to detect 4, zero-day vulnerabilities from popular GitHub repositories.
△ Less
Submitted 17 April, 2023;
originally announced April 2023.
-
FedDiSC: A Computation-efficient Federated Learning Framework for Power Systems Disturbance and Cyber Attack Discrimination
Authors:
Muhammad Akbar Husnoo,
Adnan Anwar,
Haftu Tasew Reda,
Nasser Hosseinzadeh,
Shama Naz Islam,
Abdun Naser Mahmood,
Robin Doss
Abstract:
With the growing concern about the security and privacy of smart grid systems, cyberattacks on critical power grid components, such as state estimation, have proven to be one of the top-priority cyber-related issues and have received significant attention in recent years. However, cyberattack detection in smart grids now faces new challenges, including privacy preservation and decentralized power…
▽ More
With the growing concern about the security and privacy of smart grid systems, cyberattacks on critical power grid components, such as state estimation, have proven to be one of the top-priority cyber-related issues and have received significant attention in recent years. However, cyberattack detection in smart grids now faces new challenges, including privacy preservation and decentralized power zones with strategic data owners. To address these technical bottlenecks, this paper proposes a novel Federated Learning-based privacy-preserving and communication-efficient attack detection framework, known as FedDiSC, that enables Discrimination between power System disturbances and Cyberattacks. Specifically, we first propose a Federated Learning approach to enable Supervisory Control and Data Acquisition subsystems of decentralized power grid zones to collaboratively train an attack detection model without sharing sensitive power related data. Secondly, we put forward a representation learning-based Deep Auto-Encoder network to accurately detect power system and cybersecurity anomalies. Lastly, to adapt our proposed framework to the timeliness of real-world cyberattack detection in SGs, we leverage the use of a gradient privacy-preserving quantization scheme known as DP-SIGNSGD to improve its communication efficiency. Extensive simulations of the proposed framework on publicly available Industrial Control Systems datasets demonstrate that the proposed framework can achieve superior detection accuracy while preserving the privacy of sensitive power grid related information. Furthermore, we find that the gradient quantization scheme utilized improves communication efficiency by 40% when compared to a traditional federated learning approach without gradient quantization which suggests suitability in a real-world scenario.
△ Less
Submitted 7 April, 2023;
originally announced April 2023.
-
FeDiSa: A Semi-asynchronous Federated Learning Framework for Power System Fault and Cyberattack Discrimination
Authors:
Muhammad Akbar Husnoo,
Adnan Anwar,
Haftu Tasew Reda,
Nasser Hosseizadeh,
Shama Naz Islam,
Abdun Naser Mahmood,
Robin Doss
Abstract:
With growing security and privacy concerns in the Smart Grid domain, intrusion detection on critical energy infrastructure has become a high priority in recent years. To remedy the challenges of privacy preservation and decentralized power zones with strategic data owners, Federated Learning (FL) has contemporarily surfaced as a viable privacy-preserving alternative which enables collaborative tra…
▽ More
With growing security and privacy concerns in the Smart Grid domain, intrusion detection on critical energy infrastructure has become a high priority in recent years. To remedy the challenges of privacy preservation and decentralized power zones with strategic data owners, Federated Learning (FL) has contemporarily surfaced as a viable privacy-preserving alternative which enables collaborative training of attack detection models without requiring the sharing of raw data. To address some of the technical challenges associated with conventional synchronous FL, this paper proposes FeDiSa, a novel Semi-asynchronous Federated learning framework for power system faults and cyberattack Discrimination which takes into account communication latency and stragglers. Specifically, we propose a collaborative training of deep auto-encoder by Supervisory Control and Data Acquisition sub-systems which upload their local model updates to a control centre, which then perform a semi-asynchronous model aggregation for a new global model parameters based on a buffer system and a preset cut-off time. Experiments on the proposed framework using publicly available industrial control systems datasets reveal superior attack detection accuracy whilst preserving data confidentiality and minimizing the adverse effects of communication latency and stragglers. Furthermore, we see a 35% improvement in training time, thus validating the robustness of our proposed method.
△ Less
Submitted 28 March, 2023;
originally announced March 2023.
-
Field-induced effects in the spin liquid candidate PbCuTe$_{2}$O$_{6}$
Authors:
Paul Eibisch,
Christian Thurn,
Arif Ata,
Ulrich Tutsch,
Yohei Saito,
Steffi Hartmann,
Bernd Wolf,
Abanoub R. N. Hanna,
A. T. M. Nazmul Islam,
Shravani Chillal,
Bella Lake,
Michael Lang
Abstract:
PbCuTe$_2$O$_6$ is considered as one of the rare candidate materials for a three-dimensional quantum spin liquid (QSL). This assessment was based on the results of various magnetic experiments, performed mainly on polycrystalline material. More recent measurements on single crystals revealed an even more exotic behavior, yielding ferroelectric order below $T_{\text{FE}}\approx 1\,\text{K}$, accomp…
▽ More
PbCuTe$_2$O$_6$ is considered as one of the rare candidate materials for a three-dimensional quantum spin liquid (QSL). This assessment was based on the results of various magnetic experiments, performed mainly on polycrystalline material. More recent measurements on single crystals revealed an even more exotic behavior, yielding ferroelectric order below $T_{\text{FE}}\approx 1\,\text{K}$, accompanied by distinct lattice distortions, and a somewhat modified magnetic response which is still consistent with a QSL. Here we report on low-temperature measurements of various thermodynamic, magnetic and dielectric properties of single crystalline PbCuTe$_2$O$_6$ in magnetic fields $B\leq 14.5\,\text{T}$. The combination of these various probes allows us to construct a detailed $B$-$T$ phase diagram including a ferroelectric phase for $B \leq$ $8\,\text{T}$ and a $B$-induced magnetic phase at $B \geq$ $11\,\text{T}$. These phases are preceded by or coincide with a structural transition from a cubic high-temperature phase into a distorted non-cubic low-temperature state. The phase diagram discloses two quantum critical points (QCPs) in the accessible field range, a ferroelectric QCP at $B_{c1}$ = $7.9\,\text{T}$ and a magnetic QCP at $B_{c2}$ = $11\,\text{T}$. Field-induced lattice distortions, observed in the state at $T>$ $1\,\text{K}$ and which are assigned to the effect of spin-orbit interaction of the Cu$^{2+}$-ions, are considered as the key mechanism by which the magnetic field couples to the dielectric degrees of freedom in this material.
△ Less
Submitted 9 May, 2023; v1 submitted 27 February, 2023;
originally announced February 2023.
-
Algorithm for connectivity queries on real algebraic curves
Authors:
Md Nazrul Islam,
Adrien Poteaux,
Rémi Prébet
Abstract:
We consider the problem of answering connectivity queries on a real algebraic curve. The curve is given as the real trace of an algebraic curve, assumed to be in generic position, and being defined by some rational parametrizations. The query points are given by a zero-dimensional parametrization. We design an algorithm which counts the number of connected components of the real curve under study,…
▽ More
We consider the problem of answering connectivity queries on a real algebraic curve. The curve is given as the real trace of an algebraic curve, assumed to be in generic position, and being defined by some rational parametrizations. The query points are given by a zero-dimensional parametrization. We design an algorithm which counts the number of connected components of the real curve under study, and decides which query point lie in which connected component, in time log-linear in $N^6$, where $N$ is the maximum of the degrees and coefficient bit-sizes of the polynomials given as input. This matches the currently best-known bound for computing the topology of real plane curves. The main novelty of this algorithm is the avoidance of the computation of the complete topology of the curve.
△ Less
Submitted 11 July, 2023; v1 submitted 22 February, 2023;
originally announced February 2023.
-
Investigating the superorbital modulations in 4U 1909+07, IGR J16418-4532 and IGR J16479-4514 with Swift XRT, BAT and NuSTAR observations
Authors:
Nazma Islam,
Robin H. D. Corbet,
Joel B. Coley,
Katja Pottschmidt,
Felix Fuerst
Abstract:
A puzzling variety of superorbital modulations have been discovered in several supergiant High-Mass X-ray binaries (sgHMXBs). To investigate the mechanisms driving these superorbital modulations, we have analyzed long-term Neil Gehrels Swift Observatory (Swift) Burst Alert Telescope (BAT) observations of three sgHMXBs: 4U 1909+07, IGR J16418-4532 and IGR J16479-4514 and constructed their dynamic p…
▽ More
A puzzling variety of superorbital modulations have been discovered in several supergiant High-Mass X-ray binaries (sgHMXBs). To investigate the mechanisms driving these superorbital modulations, we have analyzed long-term Neil Gehrels Swift Observatory (Swift) Burst Alert Telescope (BAT) observations of three sgHMXBs: 4U 1909+07, IGR J16418-4532 and IGR J16479-4514 and constructed their dynamic power spectra and superorbital intensity profiles. These Swift BAT observations are complemented by pointed Swift X-ray Telescope (XRT) and Nuclear Spectroscopic Telescope Array (NuSTAR) observations performed near the predicted maximum and minimum phase of a single superorbital cycle for each of these sources. The BAT dynamic power spectra show changes in the strength of the superorbital modulation on timescales of years, with either the peak at the fundamental frequency and/or the second harmonic present at different times for all three sources. The pointed Swift XRT and NuSTAR observations show no significant differences between the pulse profiles and spectral parameters at the superorbital maximum and minimum phase. This is likely due to the fact the superorbital modulation had weakened significantly during the times when the NuSTAR observations were carried out for all three sources. The results from the Swift XRT, BAT and NuSTAR analysis indicate the possible presence of multiple co-rotating interaction regions (CIRs) in the stellar winds of the supergiant stars, although a structured stellar wind from the supergiant star due to tidal oscillations cannot be ruled out.
△ Less
Submitted 14 February, 2023;
originally announced February 2023.
-
Explainable Artificial Intelligence (XAI) from a user perspective- A synthesis of prior literature and problematizing avenues for future research
Authors:
AKM Bahalul Haque,
A. K. M. Najmul Islam,
Patrick Mikalef
Abstract:
The final search query for the Systematic Literature Review (SLR) was conducted on 15th July 2022. Initially, we extracted 1707 journal and conference articles from the Scopus and Web of Science databases. Inclusion and exclusion criteria were then applied, and 58 articles were selected for the SLR. The findings show four dimensions that shape the AI explanation, which are format (explanation repr…
▽ More
The final search query for the Systematic Literature Review (SLR) was conducted on 15th July 2022. Initially, we extracted 1707 journal and conference articles from the Scopus and Web of Science databases. Inclusion and exclusion criteria were then applied, and 58 articles were selected for the SLR. The findings show four dimensions that shape the AI explanation, which are format (explanation representation format), completeness (explanation should contain all required information, including the supplementary information), accuracy (information regarding the accuracy of the explanation), and currency (explanation should contain recent information). Moreover, along with the automatic representation of the explanation, the users can request additional information if needed. We have also found five dimensions of XAI effects: trust, transparency, understandability, usability, and fairness. In addition, we investigated current knowledge from selected articles to problematize future research agendas as research questions along with possible research paths. Consequently, a comprehensive framework of XAI and its possible effects on user behavior has been developed.
△ Less
Submitted 24 November, 2022;
originally announced November 2022.
-
Blockchain and Machine Learning for Fraud Detection: A Privacy-Preserving and Adaptive Incentive Based Approach
Authors:
Tahmid Hasan Pranto,
Kazi Tamzid Akhter Md Hasib,
Tahsinur Rahman,
AKM Bahalul Haque,
A. K. M. Najmul Islam,
Rashedur M. Rahman
Abstract:
Financial fraud cases are on the rise even with the current technological advancements. Due to the lack of inter-organization synergy and because of privacy concerns, authentic financial transaction data is rarely available. On the other hand, data-driven technologies like machine learning need authentic data to perform precisely in real-world systems. This study proposes a blockchain and smart co…
▽ More
Financial fraud cases are on the rise even with the current technological advancements. Due to the lack of inter-organization synergy and because of privacy concerns, authentic financial transaction data is rarely available. On the other hand, data-driven technologies like machine learning need authentic data to perform precisely in real-world systems. This study proposes a blockchain and smart contract-based approach to achieve robust Machine Learning (ML) algorithm for e-commerce fraud detection by facilitating inter-organizational collaboration. The proposed method uses blockchain to secure the privacy of the data. Smart contract deployed inside the network fully automates the system. An ML model is incrementally upgraded from collaborative data provided by the organizations connected to the blockchain. To incentivize the organizations, we have introduced an incentive mechanism that is adaptive to the difficulty level in updating a model. The organizations receive incentives based on the difficulty faced in updating the ML model. A mining criterion has been proposed to mine the block efficiently. And finally, the blockchain network istested under different difficulty levels and under different volumes of data to test its efficiency. The model achieved 98.93% testing accuracy and 98.22% Fbeta score (recall-biased f measure) over eight incremental updates. Our experiment shows that both data volume and difficulty level of blockchain impacts the mining time. For difficulty level less than five, mining time and difficulty level has a positive correlation. For difficulty level two and three, less than a second is required to mine a block in our system. Difficulty level five poses much more difficulties to mine the blocks.
△ Less
Submitted 23 October, 2022;
originally announced October 2022.
-
Multi-mode Jaynes-Cummings model results for the collapse and the revival of the quantum Rabi oscillations in a lossy resonant cavity
Authors:
Najirul Islam,
Shyamal Biswas
Abstract:
We have numerically obtained theoretical results for the collapse and the revival of the quantum Rabi oscillations for low average number of coherent photons injected on a two-level system in a lossy resonant cavity. We have adopted the multimode Jaynes-Cummings model for the same and especially treated the ``Ohmic" loss to the walls of the cavity, the leakage from the cavity, and the loss due to…
▽ More
We have numerically obtained theoretical results for the collapse and the revival of the quantum Rabi oscillations for low average number of coherent photons injected on a two-level system in a lossy resonant cavity. We have adopted the multimode Jaynes-Cummings model for the same and especially treated the ``Ohmic" loss to the walls of the cavity, the leakage from the cavity, and the loss due to the spontaneous emission through the open surface of the cavity. We have compared our results with the experimental data obtained by Brune et al [Phys. Rev. Lett. 76, 1800 (1996)] in this regard.
△ Less
Submitted 8 October, 2022;
originally announced October 2022.
-
Generalization of the Einstein coefficients and rate equations under the quantum Rabi oscillation
Authors:
Najirul Islam,
Shyamal Biswas
Abstract:
We have generalized Einstein coefficients and rate equations from quantum field theoretic point of view by bringing the fundamental processes and the quantum Rabi oscillation in a single footing for the light-matter interactions for nonzero Rabi frequency. We have analytically obtained multimode Jaynes-Cummings model results for the quantum Rabi oscillations of a two-level system in a lossy resona…
▽ More
We have generalized Einstein coefficients and rate equations from quantum field theoretic point of view by bringing the fundamental processes and the quantum Rabi oscillation in a single footing for the light-matter interactions for nonzero Rabi frequency. We have analytically obtained multimode Jaynes-Cummings model results for the quantum Rabi oscillations of a two-level system in a lossy resonant cavity containing (i) thermal photons and (ii) injected photons of a coherent field. We have renormalized the coupling constant for the light-matter interactions for these cases. Our results match well with the seminal experimental data obtained in this regard by Brune et al [Phys. Rev. Lett 76, 1800 (1996)]. We also have studied the population dynamics in this regard by applying the generalized Einstein rate equations.
△ Less
Submitted 8 October, 2022;
originally announced October 2022.
-
A Secure Federated Learning Framework for Residential Short Term Load Forecasting
Authors:
Muhammad Akbar Husnoo,
Adnan Anwar,
Nasser Hosseinzadeh,
Shama Naz Islam,
Abdun Naser Mahmood,
Robin Doss
Abstract:
Smart meter measurements, though critical for accurate demand forecasting, face several drawbacks including consumers' privacy, data breach issues, to name a few. Recent literature has explored Federated Learning (FL) as a promising privacy-preserving machine learning alternative which enables collaborative learning of a model without exposing private raw data for short term load forecasting. Desp…
▽ More
Smart meter measurements, though critical for accurate demand forecasting, face several drawbacks including consumers' privacy, data breach issues, to name a few. Recent literature has explored Federated Learning (FL) as a promising privacy-preserving machine learning alternative which enables collaborative learning of a model without exposing private raw data for short term load forecasting. Despite its virtue, standard FL is still vulnerable to an intractable cyber threat known as Byzantine attack carried out by faulty and/or malicious clients. Therefore, to improve the robustness of federated short-term load forecasting against Byzantine threats, we develop a state-of-the-art differentially private secured FL-based framework that ensures the privacy of the individual smart meter's data while protect the security of FL models and architecture. Our proposed framework leverages the idea of gradient quantization through the Sign Stochastic Gradient Descent (SignSGD) algorithm, where the clients only transmit the `sign' of the gradient to the control centre after local model training. As we highlight through our experiments involving benchmark neural networks with a set of Byzantine attack models, our proposed approach mitigates such threats quite effectively and thus outperforms conventional Fed-SGD models.
△ Less
Submitted 28 March, 2023; v1 submitted 29 September, 2022;
originally announced September 2022.
-
Hybrid Stochastic Synapses Enabled by Scaled Ferroelectric Field-effect Transistors
Authors:
A N M Nafiul Islam,
Arnob Saha,
Zhouhang Jiang,
Kai Ni,
Abhronil Sengupta
Abstract:
Achieving brain-like density and performance in neuromorphic computers necessitates scaling down the size of nanodevices emulating neuro-synaptic functionalities. However, scaling nanodevices results in reduction of programming resolution and emergence of stochastic non-idealities. While prior work has mainly focused on binary transitions, in this work we leverage the stochastic switching of a thr…
▽ More
Achieving brain-like density and performance in neuromorphic computers necessitates scaling down the size of nanodevices emulating neuro-synaptic functionalities. However, scaling nanodevices results in reduction of programming resolution and emergence of stochastic non-idealities. While prior work has mainly focused on binary transitions, in this work we leverage the stochastic switching of a three-state ferroelectric field effect transistor (FeFET) to implement a long-term and short-term 2-tier stochastic synaptic memory with a single device. Experimental measurements are performed on a scaled 28nm high-$k$ metal gate technology-based device to develop a probabilistic model of the hybrid stochastic synapse. In addition to the advantage of ultra-low programming energies afforded by scaling, our hardware-algorithm co-design analysis reveals the efficacy of the 2-tier memory in comparison to binary stochastic synapses in on-chip learning tasks -- paving the way for algorithms exploiting multi-state devices with probabilistic transitions beyond deterministic ones.
△ Less
Submitted 10 March, 2023; v1 submitted 27 September, 2022;
originally announced September 2022.
-
Astromorphic Self-Repair of Neuromorphic Hardware Systems
Authors:
Zhuangyu Han,
A N M Nafiul Islam,
Abhronil Sengupta
Abstract:
While neuromorphic computing architectures based on Spiking Neural Networks (SNNs) are increasingly gaining interest as a pathway toward bio-plausible machine learning, attention is still focused on computational units like the neuron and synapse. Shifting from this neuro-synaptic perspective, this paper attempts to explore the self-repair role of glial cells, in particular, astrocytes. The work i…
▽ More
While neuromorphic computing architectures based on Spiking Neural Networks (SNNs) are increasingly gaining interest as a pathway toward bio-plausible machine learning, attention is still focused on computational units like the neuron and synapse. Shifting from this neuro-synaptic perspective, this paper attempts to explore the self-repair role of glial cells, in particular, astrocytes. The work investigates stronger correlations with astrocyte computational neuroscience models to develop macro-models with a higher degree of bio-fidelity that accurately captures the dynamic behavior of the self-repair process. Hardware-software co-design analysis reveals that bio-morphic astrocytic regulation has the potential to self-repair hardware realistic faults in neuromorphic hardware systems with significantly better accuracy and repair convergence for unsupervised learning tasks on the MNIST and F-MNIST datasets. Our implementation source code and trained models are available at https://github.com/NeuroCompLab-psu/Astromorphic_Self_Repair.
△ Less
Submitted 8 March, 2023; v1 submitted 15 September, 2022;
originally announced September 2022.
-
Corporate Environmental Management Accounting Practicing and Reporting in Bangladesh
Authors:
Nazrul Islam,
Syed Khaled Rahman
Abstract:
In the management of environment the Environmental Management Accounting (EMA) is essential for corporate or companies because corporate sectors are the main parties of environmental humiliation as they are existed in the environment and for protecting environment a branch of accounting is emerged which is called environmental management accounting. The objective of the study is to develop a compl…
▽ More
In the management of environment the Environmental Management Accounting (EMA) is essential for corporate or companies because corporate sectors are the main parties of environmental humiliation as they are existed in the environment and for protecting environment a branch of accounting is emerged which is called environmental management accounting. The objective of the study is to develop a compliance framework for EMA and appraise the ER practices in selected industries in Bangladesh. In conducting the study, 50 environmental sensitive industries were selected from DSE. A compliance checklist was developed on 75 aspects of EMA and ER under 13 groups. In develo** the compliance index binary method is used i.e. 1= if ER practices; 0= if not practices. Further the level of EMR/ER practices have been evaluated in terms of selected independent variables of the company viz. total assets, total sales, return on equity and size of board. The study found that the environmental management accounting in the manufacturing companies is in poor level. The maximum compliance is 67% and the lowest is 20%. The TA, TS BS and SP have been considered to find out the explanatory variables. In most of the cases board size does not play significant role in the practice of EMA in the sampled firms.
△ Less
Submitted 6 June, 2022;
originally announced August 2022.
-
Pinch points and half-moons in dipolar-octupolar Nd$_2$Hf$_2$O$_7$
Authors:
A. Samartzis,
J. Xu,
V. K. Anand,
A. T. M. N. Islam,
J. Ollivier,
Y. Su,
B. Lake
Abstract:
While it is established that the pinch point scattering pattern in spin ice arises from an emergent coulomb phase associated with magnetic moment that is divergence-free, more complex Hamiltonians can introduce a divergence-full part. If these two parts remain decoupled, they give rise to the co-existence of distinct features. Here we show that the moment in ${\rm Nd_2Hf_2O_7}$ forms a static long…
▽ More
While it is established that the pinch point scattering pattern in spin ice arises from an emergent coulomb phase associated with magnetic moment that is divergence-free, more complex Hamiltonians can introduce a divergence-full part. If these two parts remain decoupled, they give rise to the co-existence of distinct features. Here we show that the moment in ${\rm Nd_2Hf_2O_7}$ forms a static long-range ordered ground state, a flat, gapped pinch point excitation and dispersive excitations. These results confirm recent theories which predict that the dispersive modes, which arise from the divergence-full moment, host a pinch point pattern of their own, observed experimentally as `half-moons'.
△ Less
Submitted 8 September, 2022; v1 submitted 25 August, 2022;
originally announced August 2022.
-
RESAM: Requirements Elicitation and Specification for Deep-Learning Anomaly Models with Applications to UAV Flight Controllers
Authors:
Md Nafee Al Islam,
Yihong Ma,
Pedro Alarcon Granadeno,
Nitesh Chawla,
Jane Cleland-Huang
Abstract:
CyberPhysical systems (CPS) must be closely monitored to identify and potentially mitigate emergent problems that arise during their routine operations. However, the multivariate time-series data which they typically produce can be complex to understand and analyze. While formal product documentation often provides example data plots with diagnostic suggestions, the sheer diversity of attributes,…
▽ More
CyberPhysical systems (CPS) must be closely monitored to identify and potentially mitigate emergent problems that arise during their routine operations. However, the multivariate time-series data which they typically produce can be complex to understand and analyze. While formal product documentation often provides example data plots with diagnostic suggestions, the sheer diversity of attributes, critical thresholds, and data interactions can be overwhelming to non-experts who subsequently seek help from discussion forums to interpret their data logs. Deep learning models, such as Long Short-term memory (LSTM) networks can be used to automate these tasks and to provide clear explanations of diverse anomalies detected in real-time multivariate data-streams. In this paper we present RESAM, a requirements process that integrates knowledge from domain experts, discussion forums, and formal product documentation, to discover and specify requirements and design definitions in the form of time-series attributes that contribute to the construction of effective deep learning anomaly detectors. We present a case-study based on a flight control system for small Uncrewed Aerial Systems and demonstrate that its use guides the construction of effective anomaly detection models whilst also providing underlying support for explainability. RESAM is relevant to domains in which open or closed online forums provide discussion support for log analysis.
△ Less
Submitted 18 July, 2022;
originally announced July 2022.
-
Effects of MAC Parameters on the Performance of IEEE 802.11 DCF in NS-3
Authors:
Md. Abubakar Siddik,
Jakia Akter Nitu,
Natasha Islam,
Most. Anju Ara Hasi,
Jannatun Ferdous,
Md. Mizanur Rahman,
Md. Nahid Sultan
Abstract:
This paper presents the design procedure of the NS-3 script for WLAN that is organized according to the hierarchical manner of TCP/IP model. We configure all layers by using NS-3 model objects and set and modify the values used by objects to investigate the effects of MAC parameters (access mechanism, CWmin, CWmax and retry limit) on the performance metrics viz. packet delivery ratio, packet lost…
▽ More
This paper presents the design procedure of the NS-3 script for WLAN that is organized according to the hierarchical manner of TCP/IP model. We configure all layers by using NS-3 model objects and set and modify the values used by objects to investigate the effects of MAC parameters (access mechanism, CWmin, CWmax and retry limit) on the performance metrics viz. packet delivery ratio, packet lost ratio, aggregated throughput, and average delay. The simulation results show that RTS/CTS access mechanism outperforms basic access mechanism in saturated state, whereas the MAC parameters have no significant impact on network performance in non-saturated state. A higher value of CWmin improves the aggregated throughput in expense of average delay. The tradeoff relationships among the performance metrics are also observed in results for the optimal values of MAC parameters. Our design procedure represents a good guideline for new NS-3 users to design and modify script and results greatly benefit the network design and management.
△ Less
Submitted 25 June, 2022;
originally announced June 2022.
-
Impact of micro-credit on the livelihoods of clients -- A study on Sunamganj District
Authors:
Nazrul Islam
Abstract:
The objective of this paper is to assess the impact of micro credit on the livelihoods of the clients in the haor area of Sunamganj district, Sylhet, Bangladesh. The major findings of the study are that 66.2 percent respondents of borrowers and 98.7 non-borrowers are head of the family and an average 76.6 percent and among the borrowers 32 percent is husband/wife while 1.3 percent of non-borrowers…
▽ More
The objective of this paper is to assess the impact of micro credit on the livelihoods of the clients in the haor area of Sunamganj district, Sylhet, Bangladesh. The major findings of the study are that 66.2 percent respondents of borrowers and 98.7 non-borrowers are head of the family and an average 76.6 percent and among the borrowers 32 percent is husband/wife while 1.3 percent of non-borrowers and on average 22.2. In terms of sex 64.7 percent of borrowers and 92.5 percent of non-borrowers are male while 35.3 percent of borrowers and 7.5 percent of non-borrowers are female. The impact of micro-credit in terms of formal and informal credit receiving households based on DID method showed that total income, total expenditure and investment have been increased 13.57 percent, 10.39 percent and 26.17 percent. All the elements of total income have been increased except debt which has been decreased by 2.39 percent. But the decrease in debt is the good sign of positive impact of debt. Consumption of food has been increased but non-food has been decreased. All the elements of investment have been increased except some factors. The savings has been decreased due excess increase in investment. The study suggested that for breaking vicious cycle of poverty by micro-credit the duration of loans should be at least five year and the volume of loans must be minimum 500,000 and repayment should at not be less than monthly. The rate of interest should not be more than 5 percent.
△ Less
Submitted 6 June, 2022;
originally announced June 2022.
-
Vicious Cycle of Poverty in Haor Region of Bangladesh- Impact of Formal and Informal Credits
Authors:
Nazrul Islam
Abstract:
This research attempts to explore the key research questions about what are the different microcredit programs in Haor area in Bangladesh? And do microcredit programs have a positive impact on livelihoods of the clients in terms of selected social indicators viz. income, consumption, assets, net worth, education, access to finance, social capacity, food security and handling socks etc. in Haor are…
▽ More
This research attempts to explore the key research questions about what are the different microcredit programs in Haor area in Bangladesh? And do microcredit programs have a positive impact on livelihoods of the clients in terms of selected social indicators viz. income, consumption, assets, net worth, education, access to finance, social capacity, food security and handling socks etc. in Haor area in Bangladesh? Utilizing difference-in-difference and factor analysis, we explore the nature and terms of conditions of available formal and informal micro-creditss in Haor region of Bangladesh; and investigate the impact of micro-creditss on the poverty condition of Haor people in Bangladesh. The findings showed that total income of borrowers has been increased over non-borrowers (z=6.75) significantly. Among the components of income, non-agricultural income has been increased significantly on the other hand income from labor sale has been decreased significantly. Total consumption expenditure with its heads of food and non-food consumption of both formal borrowers and informal borrowers have been increased over the period 2016-2019 significantly. Most of the key informants agreed that the findings are very much consistent with prevailing condition of micro-credits in Haor region. However, some of them raised question about the impacts of micro-credits. They argued that there is no straightforward positive impact of micro-credits on poverty condition of the households.
△ Less
Submitted 6 June, 2022;
originally announced June 2022.
-
Assessment of Consumers Awareness of Nutrition, Food Safety and Hygiene in the Life Cycle for Sustainable Development of Bangladesh- A Study on Sylhet City Corporation
Authors:
Nazrul Islam
Abstract:
The objective of the study is to explore the knowledge of consumers on nutrition, food safety and hygiene of the sampled respondents in the Sylhet City Corporation in Bangladesh in terms of different demographic characteristics. This study includes the different types of consumers in the life cycle viz. baby, child, adolescent, young and old so that an overall awareness level can be measured in th…
▽ More
The objective of the study is to explore the knowledge of consumers on nutrition, food safety and hygiene of the sampled respondents in the Sylhet City Corporation in Bangladesh in terms of different demographic characteristics. This study includes the different types of consumers in the life cycle viz. baby, child, adolescent, young and old so that an overall awareness level can be measured in the urban area of Bangladesh. The study is confined to SCC area in which all types of respondents has been included and findings from this study will be used generally for Bangladesh in making policy In conducting the study the population has been divided into six group as, Baby, child, adolescent, parental, unmarried adult young and married adult matured. We find that the average score of awareness of food nutrition and hygiene of unmarried adult is higher than that of married adults. The study suggested it is needed to increase awareness in of the parents for feeding babies. The average awareness of parents to their childs eating behavior between 5 and 9 years is 3.36 out of 5. The awareness is around 67 percent so we should be more careful in this regard. The average awareness adolescent food habit is 1.89 on three points scales which about 63 percent only. Therefore, the consciousness of adolescent has been to increase in taking food. The average feeding styles of parents is 4.24 out of 5 to their children up to 9 years and in percentage it is 84 percent.
△ Less
Submitted 6 June, 2022;
originally announced June 2022.
-
CurFi: An automated tool to find the best regression analysis model using curve fitting
Authors:
Ayon Roy,
Tausif Al Zubayer,
Nafisa Tabassum,
Muhammad Nazrul Islam,
Md. Abdus Sattar
Abstract:
Regression analysis is a well known quantitative research method that primarily explores the relationship between one or more independent variables and a dependent variable. Conducting regression analysis manually on large datasets with multiple independent variables can be tedious. An automated system for regression analysis will be of great help for researchers as well as non-expert users. Thus,…
▽ More
Regression analysis is a well known quantitative research method that primarily explores the relationship between one or more independent variables and a dependent variable. Conducting regression analysis manually on large datasets with multiple independent variables can be tedious. An automated system for regression analysis will be of great help for researchers as well as non-expert users. Thus, the objective of this research is to design and develop an automated curve fitting system. As outcome, a curve fitting system named "CurFi" was developed that uses linear regression models to fit a curve to a dataset and to find out the best fit model. The system facilitates to upload a dataset, split the dataset into training set and test set, select relevant features and label from the dataset; and the system will return the best fit linear regression model after training is completed. The developed tool would be a great resource for the users having limited technical knowledge who will also be able to find the best fit regression model for a dataset using the developed "CurFi" system.
△ Less
Submitted 16 May, 2022;
originally announced May 2022.
-
A Comparative Study of Machine Learning Methods for X-ray Binary Classification
Authors:
Zoe L. de Beurs,
N. Islam,
G. Gopalan,
S. D. Vrtilek
Abstract:
X-ray Binaries (XRBs) consist of a compact object that accretes material from an orbiting secondary star. The most secure method we have for determining if the compact object is a black hole is to determine its mass: this is limited to bright objects, and requires substantial time-intensive spectroscopic monitoring. With new X-ray sources being discovered with different X-ray observatories, develo…
▽ More
X-ray Binaries (XRBs) consist of a compact object that accretes material from an orbiting secondary star. The most secure method we have for determining if the compact object is a black hole is to determine its mass: this is limited to bright objects, and requires substantial time-intensive spectroscopic monitoring. With new X-ray sources being discovered with different X-ray observatories, develo** efficient, robust means to classify compact objects becomes increasingly important. We compare three machine learning classification methods (Bayesian Gaussian Processes (BGP), K-Nearest Neighbors (KNN), Support Vector Machines (SVM)) for determining the compact objects as neutron stars or black holes (BHs) in XRB systems. Each machine learning method uses spatial patterns which exist between systems of the same type in 3D Color-Color-Intensity diagrams. We used lightcurves extracted using six years of data with MAXI/GSC for 44 representative sources. We find that all three methods are highly accurate in distinguishing pulsing from non-pulsing neutron stars (NPNS) with 95\% of NPNS and 100\% of pulsars accurately predicted. All three methods have high accuracy distinguishing BHs from pulsars (92\%) but continue to confuse BHs with a subclass of NPNS, called the Bursters, with KNN doing the best at only 50\% accuracy for predicting BHs. The precision of all three methods is high, providing equivalent results over 5-10 independent runs. In a future work, we suggest a fourth dimension be incorporated to mitigate the confusion of BHs with Bursters. This work paves the way towards more robust methods to efficiently distinguish BHs, NPNS, and pulsars.
△ Less
Submitted 7 April, 2022; v1 submitted 1 April, 2022;
originally announced April 2022.
-
A Bayesian Deep Learning Technique for Multi-Step Ahead Solar Generation Forecasting
Authors:
Devinder Kaur,
Shama Naz Islam,
Md. Apel Mahmud
Abstract:
In this paper, we propose an improved Bayesian bidirectional long-short term memory (BiLSTM) neural networks for multi-step ahead (MSA) solar generation forecasting. The proposed technique applies alpha-beta divergence for a more appropriate consideration of outliers in the solar generation data and resulting variability of the weight parameter distribution in the neural network. The proposed meth…
▽ More
In this paper, we propose an improved Bayesian bidirectional long-short term memory (BiLSTM) neural networks for multi-step ahead (MSA) solar generation forecasting. The proposed technique applies alpha-beta divergence for a more appropriate consideration of outliers in the solar generation data and resulting variability of the weight parameter distribution in the neural network. The proposed method is examined on highly granular solar generation data from Ausgrid using probabilistic evaluation metrics such as Pinball loss and Winkler score. Moreover, a comparative analysis between MSA and the single-step ahead (SSA) forecasting is provided to test the effectiveness of the proposed method on variable forecasting horizons. The numerical results clearly demonstrate that the proposed Bayesian BiLSTM with alpha-beta divergence outperforms standard Bayesian BiLSTM and other benchmark methods for MSA forecasting in terms of error performance.
△ Less
Submitted 21 March, 2022;
originally announced March 2022.
-
Gamma-ray Eclipses and Orbital Modulation Transitions in the Candidate Redback 4FGL J1702.7-5655
Authors:
R. H. D. Corbet,
L. Chomiuk,
J. B. Coley,
G. Dubus,
P. G. Edwards,
N. Islam,
V. A. McBride,
J. Stevens,
J. Strader,
S. J. Swihart,
L. J. Townsend
Abstract:
Observations with the Fermi Large Area Telescope (LAT) of the gamma-ray source 4FGL J1702.7-5655, previously classified as a candidate millisecond pulsar, show highly-significant modulation at a period of 0.2438033 days (~ 5.85 hours). Further examination of the folded light curve indicates the presence of narrow eclipses, suggesting this is a redback binary system. An examination of the long-term…
▽ More
Observations with the Fermi Large Area Telescope (LAT) of the gamma-ray source 4FGL J1702.7-5655, previously classified as a candidate millisecond pulsar, show highly-significant modulation at a period of 0.2438033 days (~ 5.85 hours). Further examination of the folded light curve indicates the presence of narrow eclipses, suggesting this is a redback binary system. An examination of the long-term properties of the modulation over 13 years of LAT observations indicates that the orbital modulation of the gamma-rays changed from a simple eclipse before early 2013, to a broader, more easily detected, quasi-sinusoidal modulation. In addition, the time of the eclipse shifts to ~0.05 later in phase. This change in the orbital modulation properties is, however, not accompanied by a significant overall change in gamma-ray flux or spectrum. The quasi-sinusoidal component peaks ~0.5 out of phase with the eclipse, which would indicate inferior conjunction of the compact object in the system. Swift X-ray Telescope observations reveal a possible X-ray counterpart within the LAT error ellipse. However, radio observations obtained with the Australia Telescope Compact Array do not detect a source in the region. 4FGL J1702.7-5655 appears to have changed its state in 2013, perhaps related to changes in the intrabinary shock in the system. We discuss how the properties of 4FGL J1702.7-5655 compare to other binary millisecond pulsars that have exhibited orbital modulation in gamma rays.
△ Less
Submitted 23 May, 2022; v1 submitted 10 March, 2022;
originally announced March 2022.