-
NDST: Neural Driving Style Transfer for Human-Like Vision-Based Autonomous Driving
Authors:
Donghyun Kim,
Aws Khalil,
Haewoon Nam,
Jaerock Kwon
Abstract:
Autonomous Vehicles (AV) and Advanced Driver Assistant Systems (ADAS) prioritize safety over comfort. The intertwining factors of safety and comfort emerge as pivotal elements in ensuring the effectiveness of Autonomous Driving (AD). Users often experience discomfort when AV or ADAS drive the vehicle on their behalf. Providing a personalized human-like AD experience, tailored to match users' uniqu…
▽ More
Autonomous Vehicles (AV) and Advanced Driver Assistant Systems (ADAS) prioritize safety over comfort. The intertwining factors of safety and comfort emerge as pivotal elements in ensuring the effectiveness of Autonomous Driving (AD). Users often experience discomfort when AV or ADAS drive the vehicle on their behalf. Providing a personalized human-like AD experience, tailored to match users' unique driving styles while adhering to safety prerequisites, presents a significant opportunity to boost the acceptance of AVs. This paper proposes a novel approach, Neural Driving Style Transfer (NDST), inspired by Neural Style Transfer (NST), to address this issue. NDST integrates a Personalized Block (PB) into the conventional Baseline Driving Model (BDM), allowing for the transfer of a user's unique driving style while adhering to safety parameters. The PB serves as a self-configuring system, learning and adapting to an individual's driving behavior without requiring modifications to the BDM. This approach enables the personalization of AV models, aligning the driving style more closely with user preferences while ensuring baseline safety critical actuation. Two contrasting driving styles (Style A and Style B) were used to validate the proposed NDST methodology, demonstrating its efficacy in transferring personal driving styles to the AV system. Our work highlights the potential of NDST to enhance user comfort in AVs by providing a personalized and familiar driving experience. The findings affirm the feasibility of integrating NDST into existing AV frameworks to bridge the gap between safety and individualized driving styles, promoting wider acceptance and improved user experiences.
△ Less
Submitted 10 July, 2024;
originally announced July 2024.
-
Leveraging Large Language Models for Integrated Satellite-Aerial-Terrestrial Networks: Recent Advances and Future Directions
Authors:
Shumaila Javaid,
Ruhul Amin Khalil,
Nasir Saeed,
Bin He,
Mohamed-Slim Alouini
Abstract:
Integrated satellite, aerial, and terrestrial networks (ISATNs) represent a sophisticated convergence of diverse communication technologies to ensure seamless connectivity across different altitudes and platforms. This paper explores the transformative potential of integrating Large Language Models (LLMs) into ISATNs, leveraging advanced Artificial Intelligence (AI) and Machine Learning (ML) capab…
▽ More
Integrated satellite, aerial, and terrestrial networks (ISATNs) represent a sophisticated convergence of diverse communication technologies to ensure seamless connectivity across different altitudes and platforms. This paper explores the transformative potential of integrating Large Language Models (LLMs) into ISATNs, leveraging advanced Artificial Intelligence (AI) and Machine Learning (ML) capabilities to enhance these networks. We outline the current architecture of ISATNs and highlight the significant role LLMs can play in optimizing data flow, signal processing, and network management to advance 5G/6G communication technologies through advanced predictive algorithms and real-time decision-making. A comprehensive analysis of ISATN components is conducted, assessing how LLMs can effectively address traditional data transmission and processing bottlenecks. The paper delves into the network management challenges within ISATNs, emphasizing the necessity for sophisticated resource allocation strategies, traffic routing, and security management to ensure seamless connectivity and optimal performance under varying conditions. Furthermore, we examine the technical challenges and limitations associated with integrating LLMs into ISATNs, such as data integration for LLM processing, scalability issues, latency in decision-making processes, and the design of robust, fault-tolerant systems. The study also identifies key future research directions for fully harnessing LLM capabilities in ISATNs, which is crucial for enhancing network reliability, optimizing performance, and achieving a truly interconnected and intelligent global network system.
△ Less
Submitted 5 July, 2024;
originally announced July 2024.
-
Strategies for Arabic Readability Modeling
Authors:
Juan Piñeros Liberato,
Bashar Alhafni,
Muhamed Al Khalil,
Nizar Habash
Abstract:
Automatic readability assessment is relevant to building NLP applications for education, content analysis, and accessibility. However, Arabic readability assessment is a challenging task due to Arabic's morphological richness and limited readability resources. In this paper, we present a set of experimental results on Arabic readability assessment using a diverse range of approaches, from rule-bas…
▽ More
Automatic readability assessment is relevant to building NLP applications for education, content analysis, and accessibility. However, Arabic readability assessment is a challenging task due to Arabic's morphological richness and limited readability resources. In this paper, we present a set of experimental results on Arabic readability assessment using a diverse range of approaches, from rule-based methods to Arabic pretrained language models. We report our results on a newly created corpus at different textual granularity levels (words and sentence fragments). Our results show that combining different techniques yields the best results, achieving an overall macro F1 score of 86.7 at the word level and 87.9 at the fragment level on a blind test set. We make our code, data, and pretrained models publicly available.
△ Less
Submitted 3 July, 2024;
originally announced July 2024.
-
Generative AI for Synthetic Data Across Multiple Medical Modalities: A Systematic Review of Recent Developments and Challenges
Authors:
Mahmoud Ibrahim,
Yasmina Al Khalil,
Sina Amirrajab,
Chang Sun,
Marcel Breeuwer,
Josien Pluim,
Bart Elen,
Gokhan Ertaylan,
Michel Dumontier
Abstract:
This paper presents a comprehensive systematic review of generative models (GANs, VAEs, DMs, and LLMs) used to synthesize various medical data types, including imaging (dermoscopic, mammographic, ultrasound, CT, MRI, and X-ray), text, time-series, and tabular data (EHR). Unlike previous narrowly focused reviews, our study encompasses a broad array of medical data modalities and explores various ge…
▽ More
This paper presents a comprehensive systematic review of generative models (GANs, VAEs, DMs, and LLMs) used to synthesize various medical data types, including imaging (dermoscopic, mammographic, ultrasound, CT, MRI, and X-ray), text, time-series, and tabular data (EHR). Unlike previous narrowly focused reviews, our study encompasses a broad array of medical data modalities and explores various generative models. Our search strategy queries databases such as Scopus, PubMed, and ArXiv, focusing on recent works from January 2021 to November 2023, excluding reviews and perspectives. This period emphasizes recent advancements beyond GANs, which have been extensively covered previously.
The survey reveals insights from three key aspects: (1) Synthesis applications and purpose of synthesis, (2) generation techniques, and (3) evaluation methods. It highlights clinically valid synthesis applications, demonstrating the potential of synthetic data to tackle diverse clinical requirements. While conditional models incorporating class labels, segmentation masks and image translations are prevalent, there is a gap in utilizing prior clinical knowledge and patient-specific context, suggesting a need for more personalized synthesis approaches and emphasizing the importance of tailoring generative approaches to the unique characteristics of medical data. Additionally, there is a significant gap in using synthetic data beyond augmentation, such as for validation and evaluation of downstream medical AI models. The survey uncovers that the lack of standardized evaluation methodologies tailored to medical images is a barrier to clinical application, underscoring the need for in-depth evaluation approaches, benchmarking, and comparative studies to promote openness and collaboration.
△ Less
Submitted 2 July, 2024; v1 submitted 27 June, 2024;
originally announced July 2024.
-
Almost conservation of the harmonic actions for fully discretized nonlinear Klein--Gordon equations at low regularity
Authors:
Charbella Abou Khalil,
Joackim Bernier
Abstract:
Close to the origin, the nonlinear Klein--Gordon equations on the circle are nearly integrable Hamiltonian systems which have infinitely many almost conserved quantities called harmonic actions or super-actions. We prove that, at low regularity and with a CFL number of size 1, this property is preserved if we discretize the nonlinear Klein--Gordon equations with the symplectic mollified impulse me…
▽ More
Close to the origin, the nonlinear Klein--Gordon equations on the circle are nearly integrable Hamiltonian systems which have infinitely many almost conserved quantities called harmonic actions or super-actions. We prove that, at low regularity and with a CFL number of size 1, this property is preserved if we discretize the nonlinear Klein--Gordon equations with the symplectic mollified impulse methods. This extends previous results of D. Cohen, E. Hairer and C. Lubich to non-smooth solutions.
△ Less
Submitted 18 June, 2024;
originally announced June 2024.
-
Euclid. II. The VIS Instrument
Authors:
Euclid Collaboration,
M. Cropper,
A. Al-Bahlawan,
J. Amiaux,
S. Awan,
R. Azzollini,
K. Benson,
M. Berthe,
J. Boucher,
E. Bozzo,
C. Brockley-Blatt,
G. P. Candini,
C. Cara,
R. A. Chaudery,
R. E. Cole,
P. Danto,
J. Denniston,
A. M. Di Giorgio,
B. Dryer,
J. Endicott,
J. -P. Dubois,
M. Farina,
E. Galli,
L. Genolet,
J. P. D. Gow
, et al. (403 additional authors not shown)
Abstract:
This paper presents the specification, design, and development of the Visible Camera (VIS) on the ESA Euclid mission. VIS is a large optical-band imager with a field of view of 0.54 deg^2 sampled at 0.1" with an array of 609 Megapixels and spatial resolution of 0.18". It will be used to survey approximately 14,000 deg^2 of extragalactic sky to measure the distortion of galaxies in the redshift ran…
▽ More
This paper presents the specification, design, and development of the Visible Camera (VIS) on the ESA Euclid mission. VIS is a large optical-band imager with a field of view of 0.54 deg^2 sampled at 0.1" with an array of 609 Megapixels and spatial resolution of 0.18". It will be used to survey approximately 14,000 deg^2 of extragalactic sky to measure the distortion of galaxies in the redshift range z=0.1-1.5 resulting from weak gravitational lensing, one of the two principal cosmology probes of Euclid. With photometric redshifts, the distribution of dark matter can be mapped in three dimensions, and, from how this has changed with look-back time, the nature of dark energy and theories of gravity can be constrained. The entire VIS focal plane will be transmitted to provide the largest images of the Universe from space to date, reaching m_AB>24.5 with S/N >10 in a single broad I_E~(r+i+z) band over a six year survey. The particularly challenging aspects of the instrument are the control and calibration of observational biases, which lead to stringent performance requirements and calibration regimes. With its combination of spatial resolution, calibration knowledge, depth, and area covering most of the extra-Galactic sky, VIS will also provide a legacy data set for many other fields. This paper discusses the rationale behind the VIS concept and describes the instrument design and development before reporting the pre-launch performance derived from ground calibrations and brief results from the in-orbit commissioning. VIS should reach fainter than m_AB=25 with S/N>10 for galaxies of full-width half-maximum of 0.3" in a 1.3" diameter aperture over the Wide Survey, and m_AB>26.4 for a Deep Survey that will cover more than 50 deg^2. The paper also describes how VIS works with the other Euclid components of survey, telescope, and science data processing to extract the cosmological information.
△ Less
Submitted 22 May, 2024;
originally announced May 2024.
-
Euclid. I. Overview of the Euclid mission
Authors:
Euclid Collaboration,
Y. Mellier,
Abdurro'uf,
J. A. Acevedo Barroso,
A. Achúcarro,
J. Adamek,
R. Adam,
G. E. Addison,
N. Aghanim,
M. Aguena,
V. Ajani,
Y. Akrami,
A. Al-Bahlawan,
A. Alavi,
I. S. Albuquerque,
G. Alestas,
G. Alguero,
A. Allaoui,
S. W. Allen,
V. Allevato,
A. V. Alonso-Tetilla,
B. Altieri,
A. Alvarez-Candal,
A. Amara,
L. Amendola
, et al. (1086 additional authors not shown)
Abstract:
The current standard model of cosmology successfully describes a variety of measurements, but the nature of its main ingredients, dark matter and dark energy, remains unknown. Euclid is a medium-class mission in the Cosmic Vision 2015-2025 programme of the European Space Agency (ESA) that will provide high-resolution optical imaging, as well as near-infrared imaging and spectroscopy, over about 14…
▽ More
The current standard model of cosmology successfully describes a variety of measurements, but the nature of its main ingredients, dark matter and dark energy, remains unknown. Euclid is a medium-class mission in the Cosmic Vision 2015-2025 programme of the European Space Agency (ESA) that will provide high-resolution optical imaging, as well as near-infrared imaging and spectroscopy, over about 14,000 deg^2 of extragalactic sky. In addition to accurate weak lensing and clustering measurements that probe structure formation over half of the age of the Universe, its primary probes for cosmology, these exquisite data will enable a wide range of science. This paper provides a high-level overview of the mission, summarising the survey characteristics, the various data-processing steps, and data products. We also highlight the main science objectives and expected performance.
△ Less
Submitted 22 May, 2024;
originally announced May 2024.
-
Federated Learning with Heterogeneous Data Handling for Robust Vehicular Object Detection
Authors:
Ahmad Khalil,
Tizian Dege,
Pegah Golchin,
Rostyslav Olshevskyi,
Antonio Fernandez Anta,
Tobias Meuser
Abstract:
In the pursuit of refining precise perception models for fully autonomous driving, continual online model training becomes essential. Federated Learning (FL) within vehicular networks offers an efficient mechanism for model training while preserving raw sensory data integrity. Yet, FL struggles with non-identically distributed data (e.g., quantity skew), leading to suboptimal convergence rates dur…
▽ More
In the pursuit of refining precise perception models for fully autonomous driving, continual online model training becomes essential. Federated Learning (FL) within vehicular networks offers an efficient mechanism for model training while preserving raw sensory data integrity. Yet, FL struggles with non-identically distributed data (e.g., quantity skew), leading to suboptimal convergence rates during model training. In previous work, we introduced FedLA, an innovative Label-Aware aggregation method addressing data heterogeneity in FL for generic scenarios.
In this paper, we introduce FedProx+LA, a novel FL method building upon the state-of-the-art FedProx and FedLA to tackle data heterogeneity, which is specifically tailored for vehicular networks. We evaluate the efficacy of FedProx+LA in continuous online object detection model training. Through a comparative analysis against conventional and state-of-the-art methods, our findings reveal the superior convergence rate of FedProx+LA. Notably, if the label distribution is very heterogeneous, our FedProx+LA approach shows substantial improvements in detection performance compared to baseline methods, also outperforming our previous FedLA approach. Moreover, both FedLA and FedProx+LA increase convergence speed by 30% compared to baseline methods.
△ Less
Submitted 2 May, 2024;
originally announced May 2024.
-
The SAMER Arabic Text Simplification Corpus
Authors:
Bashar Alhafni,
Reem Hazim,
Juan Piñeros Liberato,
Muhamed Al Khalil,
Nizar Habash
Abstract:
We present the SAMER Corpus, the first manually annotated Arabic parallel corpus for text simplification targeting school-aged learners. Our corpus comprises texts of 159K words selected from 15 publicly available Arabic fiction novels most of which were published between 1865 and 1955. Our corpus includes readability level annotations at both the document and word levels, as well as two simplifie…
▽ More
We present the SAMER Corpus, the first manually annotated Arabic parallel corpus for text simplification targeting school-aged learners. Our corpus comprises texts of 159K words selected from 15 publicly available Arabic fiction novels most of which were published between 1865 and 1955. Our corpus includes readability level annotations at both the document and word levels, as well as two simplified parallel versions for each text targeting learners at two different readability levels. We describe the corpus selection process, and outline the guidelines we followed to create the annotations and ensure their quality. Our corpus is publicly available to support and encourage research on Arabic text simplification, Arabic automatic readability assessment, and the development of Arabic pedagogical language technologies.
△ Less
Submitted 29 April, 2024;
originally announced April 2024.
-
Cybersecurity in Motion: A Survey of Challenges and Requirements for Future Test Facilities of CAVs
Authors:
Ioannis Mavromatis,
Theodoros Spyridopoulos,
Pietro Carnelli,
Woon Hau Chin,
Ahmed Khalil,
Jennifer Chakravarty,
Lucia Cipolina Kun,
Robert J. Piechocki,
Colin Robbins,
Daniel Cunnington,
Leigh Chase,
Lamogha Chiazor,
Chris Preston,
Rahul,
Aftab Khan
Abstract:
The way we travel is changing rapidly, and Cooperative Intelligent Transportation Systems (C-ITSs) are at the forefront of this evolution. However, the adoption of C-ITSs introduces new risks and challenges, making cybersecurity a top priority for ensuring safety and reliability. Building on this premise, this paper presents an envisaged Cybersecurity Centre of Excellence (CSCE) designed to bolste…
▽ More
The way we travel is changing rapidly, and Cooperative Intelligent Transportation Systems (C-ITSs) are at the forefront of this evolution. However, the adoption of C-ITSs introduces new risks and challenges, making cybersecurity a top priority for ensuring safety and reliability. Building on this premise, this paper presents an envisaged Cybersecurity Centre of Excellence (CSCE) designed to bolster research, testing, and evaluation of the cybersecurity of C-ITSs. We explore the design, functionality, and challenges of CSCE's testing facilities, outlining the technological, security, and societal requirements. Through a thorough survey and analysis, we assess the effectiveness of these systems in detecting and mitigating potential threats, highlighting their flexibility to adapt to future C-ITSs. Finally, we identify current unresolved challenges in various C-ITS domains, with the aim of motivating further research into the cybersecurity of C-ITSs.
△ Less
Submitted 22 December, 2023;
originally announced December 2023.
-
Beyond Line of Sight Defense Communication Systems: Recent Advances and Future Challenges
Authors:
Ruhul Amin Khalil,
Muhammad Haris,
Nasir Saeed
Abstract:
Beyond Line of Sight (BLOS) communication stands as an indispensable element within defense communication strategies, facilitating information exchange in scenarios where traditional Line of Sight (LOS) methodologies encounter obstruction. This article delves into the forefront of technologies driving BLOS communication, emphasizing advanced systems like phantom networks, nanonetworks, aerial rela…
▽ More
Beyond Line of Sight (BLOS) communication stands as an indispensable element within defense communication strategies, facilitating information exchange in scenarios where traditional Line of Sight (LOS) methodologies encounter obstruction. This article delves into the forefront of technologies driving BLOS communication, emphasizing advanced systems like phantom networks, nanonetworks, aerial relays, and satellite-based defense communication. Moreover, we present a practical use case of UAV path planning using optimization techniques amidst radar-threat war zones that add concrete relevance, underscoring the tangible applications of BLOS defense communication systems. Additionally, we present several future research directions for BLOS communication in defense systems, such as resilience enhancement, the integration of heterogeneous networks, management of contested spectrums, advancements in multimedia communication, adaptive methodologies, and the burgeoning domain of the Internet of Military Things (IoMT). This exploration of BLOS technologies and their applications lays the groundwork for synergistic collaboration between industry and academia, fostering innovation in defense communication paradigms.
△ Less
Submitted 11 December, 2023;
originally announced December 2023.
-
A Comprehensive Study of Vision Transformers in Image Classification Tasks
Authors:
Mahmoud Khalil,
Ahmad Khalil,
Alioune Ngom
Abstract:
Image Classification is a fundamental task in the field of computer vision that frequently serves as a benchmark for gauging advancements in Computer Vision. Over the past few years, significant progress has been made in image classification due to the emergence of deep learning. However, challenges still exist, such as modeling fine-grained visual information, high computation costs, the parallel…
▽ More
Image Classification is a fundamental task in the field of computer vision that frequently serves as a benchmark for gauging advancements in Computer Vision. Over the past few years, significant progress has been made in image classification due to the emergence of deep learning. However, challenges still exist, such as modeling fine-grained visual information, high computation costs, the parallelism of the model, and inconsistent evaluation protocols across datasets. In this paper, we conduct a comprehensive survey of existing papers on Vision Transformers for image classification. We first introduce the popular image classification datasets that influenced the design of models. Then, we present Vision Transformers models in chronological order, starting with early attempts at adapting attention mechanism to vision tasks followed by the adoption of vision transformers, as they have demonstrated success in capturing intricate patterns and long-range dependencies within images. Finally, we discuss open problems and shed light on opportunities for image classification to facilitate new research ideas.
△ Less
Submitted 4 December, 2023; v1 submitted 2 December, 2023;
originally announced December 2023.
-
LL-VQ-VAE: Learnable Lattice Vector-Quantization For Efficient Representations
Authors:
Ahmed Khalil,
Robert Piechocki,
Raul Santos-Rodriguez
Abstract:
In this paper we introduce learnable lattice vector quantization and demonstrate its effectiveness for learning discrete representations. Our method, termed LL-VQ-VAE, replaces the vector quantization layer in VQ-VAE with lattice-based discretization. The learnable lattice imposes a structure over all discrete embeddings, acting as a deterrent against codebook collapse, leading to high codebook ut…
▽ More
In this paper we introduce learnable lattice vector quantization and demonstrate its effectiveness for learning discrete representations. Our method, termed LL-VQ-VAE, replaces the vector quantization layer in VQ-VAE with lattice-based discretization. The learnable lattice imposes a structure over all discrete embeddings, acting as a deterrent against codebook collapse, leading to high codebook utilization. Compared to VQ-VAE, our method obtains lower reconstruction errors under the same training conditions, trains in a fraction of the time, and with a constant number of parameters (equal to the embedding dimension $D$), making it a very scalable approach. We demonstrate these results on the FFHQ-1024 dataset and include FashionMNIST and Celeb-A.
△ Less
Submitted 13 October, 2023;
originally announced October 2023.
-
A Multi-Modal Latent-Features based Service Recommendation System for the Social Internet of Things
Authors:
Amar Khelloufi,
Huansheng Ning,
Abdenacer Naouri,
Abdelkarim Ben Sada,
Attia Qammar,
Abdelkader Khalil,
Sahraoui Dhelim,
Lingfeng Mao
Abstract:
The Social Internet of Things (SIoT), is revolutionizing how we interact with our everyday lives. By adding the social dimension to connecting devices, the SIoT has the potential to drastically change the way we interact with smart devices. This connected infrastructure allows for unprecedented levels of convenience, automation, and access to information, allowing us to do more with less effort. H…
▽ More
The Social Internet of Things (SIoT), is revolutionizing how we interact with our everyday lives. By adding the social dimension to connecting devices, the SIoT has the potential to drastically change the way we interact with smart devices. This connected infrastructure allows for unprecedented levels of convenience, automation, and access to information, allowing us to do more with less effort. However, this revolutionary new technology also brings an eager need for service recommendation systems. As the SIoT grows in scope and complexity, it becomes increasingly important for businesses and individuals, and SIoT objects alike to have reliable sources for products, services, and information that are tailored to their specific needs. Few works have been proposed to provide service recommendations for SIoT environments. However, these efforts have been confined to only focusing on modeling user-item interactions using contextual information, devices' SIoT relationships, and correlation social groups but these schemes do not account for latent semantic item-item structures underlying the sparse multi-modal contents in SIoT environment. In this paper, we propose a latent-based SIoT recommendation system that learns item-item structures and aggregates multiple modalities to obtain latent item graphs which are then used in graph convolutions to inject high-order affinities into item representations. Experiments showed that the proposed recommendation system outperformed state-of-the-art SIoT recommendation methods and validated its efficacy at mining latent relationships from multi-modal features.
△ Less
Submitted 13 April, 2024; v1 submitted 1 June, 2023;
originally announced June 2023.
-
Security and Privacy Issues for Urban Smart Traffic Infrastructure
Authors:
Anubhab Baksi,
Ahmed Ibrahim Samir Khalil,
Anupam Chattopadhyay
Abstract:
In recent times, the research works relating to smart traffic infrastructure have gained serious attention. As a result, research has been carried out in multiple directions to ensure that such infrastructure can improve upon our existing (mostly) human-controlled traffic infrastructure, without violating the safety margins. For this reason, cyber security issues of such infrastructure are of para…
▽ More
In recent times, the research works relating to smart traffic infrastructure have gained serious attention. As a result, research has been carried out in multiple directions to ensure that such infrastructure can improve upon our existing (mostly) human-controlled traffic infrastructure, without violating the safety margins. For this reason, cyber security issues of such infrastructure are of paramount interest. Kee** this in mind, we conduct a review of existing models, their vulnerabilities and how such vulnerabilities can be handled. Our work covers a vast area from the domain of security, starting from the theoretical notions of cryptography to the real-life adaptation of them. At the same time, we also consider the security issues that may arise due to the usage of artificial intelligence/machine learning in the infrastructure. We believe that our work will help future researchers to gain a comprehensive yet concise look at cyber security for smart traffic infrastructure.
△ Less
Submitted 27 September, 2023; v1 submitted 17 April, 2023;
originally announced April 2023.
-
Q-Map: Quantum Circuit Implementation of Boolean Functions
Authors:
Hassan Hajjdiab,
Ashraf Khalil,
Hichem Eleuch
Abstract:
Quantum computing has gained attention in recent years due to the significant progress in quantum computing technology. Today many companies like IBM, Google and Microsoft have developed quantum computers and simulators for research and commercial use. The development of quantum techniques and algorithms is essential to exploit the full power of quantum computers. In this paper we propose a simple…
▽ More
Quantum computing has gained attention in recent years due to the significant progress in quantum computing technology. Today many companies like IBM, Google and Microsoft have developed quantum computers and simulators for research and commercial use. The development of quantum techniques and algorithms is essential to exploit the full power of quantum computers. In this paper we propose a simple visual technique (we call Q-Map) for quantum realisation of classical Boolean logic circuits. The proposed method utilises concepts from Boolean algebra to produce a quantum circuit with minimal number of quantum gates.
△ Less
Submitted 3 August, 2023; v1 submitted 28 February, 2023;
originally announced March 2023.
-
Biomedical image analysis competitions: The state of current participation practice
Authors:
Matthias Eisenmann,
Annika Reinke,
Vivienn Weru,
Minu Dietlinde Tizabi,
Fabian Isensee,
Tim J. Adler,
Patrick Godau,
Veronika Cheplygina,
Michal Kozubek,
Sharib Ali,
Anubha Gupta,
Jan Kybic,
Alison Noble,
Carlos Ortiz de Solórzano,
Samiksha Pachade,
Caroline Petitjean,
Daniel Sage,
Donglai Wei,
Elizabeth Wilden,
Deepak Alapatt,
Vincent Andrearczyk,
Ujjwal Baid,
Spyridon Bakas,
Niranjan Balu,
Sophia Bano
, et al. (331 additional authors not shown)
Abstract:
The number of international benchmarking competitions is steadily increasing in various fields of machine learning (ML) research and practice. So far, however, little is known about the common practice as well as bottlenecks faced by the community in tackling the research questions posed. To shed light on the status quo of algorithm development in the specific field of biomedical imaging analysis,…
▽ More
The number of international benchmarking competitions is steadily increasing in various fields of machine learning (ML) research and practice. So far, however, little is known about the common practice as well as bottlenecks faced by the community in tackling the research questions posed. To shed light on the status quo of algorithm development in the specific field of biomedical imaging analysis, we designed an international survey that was issued to all participants of challenges conducted in conjunction with the IEEE ISBI 2021 and MICCAI 2021 conferences (80 competitions in total). The survey covered participants' expertise and working environments, their chosen strategies, as well as algorithm characteristics. A median of 72% challenge participants took part in the survey. According to our results, knowledge exchange was the primary incentive (70%) for participation, while the reception of prize money played only a minor role (16%). While a median of 80 working hours was spent on method development, a large portion of participants stated that they did not have enough time for method development (32%). 25% perceived the infrastructure to be a bottleneck. Overall, 94% of all solutions were deep learning-based. Of these, 84% were based on standard architectures. 43% of the respondents reported that the data samples (e.g., images) were too large to be processed at once. This was most commonly addressed by patch-based training (69%), downsampling (37%), and solving 3D analysis tasks as a series of 2D tasks. K-fold cross-validation on the training set was performed by only 37% of the participants and only 50% of the participants performed ensembling based on multiple identical models (61%) or heterogeneous models (39%). 48% of the respondents applied postprocessing steps.
△ Less
Submitted 12 September, 2023; v1 submitted 16 December, 2022;
originally announced December 2022.
-
Birkhoff normal form in low regularity for the nonlinear quantum harmonic oscillator
Authors:
Charbella Abou Khalil
Abstract:
Given small initial solutions of the nonlinear quantum harmonic oscillator on $\mathbb{R}$, we are interested in their long time behavior in the energy space which is an adapted Sobolev space. We perturbate the linear part by $V$ taken as multiplicative potentials, in a way that the linear frequencies satisfy a non-resonance condition. More precisely, we prove that for almost all potentials $V$, t…
▽ More
Given small initial solutions of the nonlinear quantum harmonic oscillator on $\mathbb{R}$, we are interested in their long time behavior in the energy space which is an adapted Sobolev space. We perturbate the linear part by $V$ taken as multiplicative potentials, in a way that the linear frequencies satisfy a non-resonance condition. More precisely, we prove that for almost all potentials $V$, the low modes of the solution are almost preserved for very long times.
△ Less
Submitted 28 March, 2024; v1 submitted 23 November, 2022;
originally announced November 2022.
-
Arabic Word-level Readability Visualization for Assisted Text Simplification
Authors:
Reem Hazim,
Hind Saddiki,
Bashar Alhafni,
Muhamed Al Khalil,
Nizar Habash
Abstract:
This demo paper presents a Google Docs add-on for automatic Arabic word-level readability visualization. The add-on includes a lemmatization component that is connected to a five-level readability lexicon and Arabic WordNet-based substitution suggestions. The add-on can be used for assessing the reading difficulty of a text and identifying difficult words as part of the task of manual text simplif…
▽ More
This demo paper presents a Google Docs add-on for automatic Arabic word-level readability visualization. The add-on includes a lemmatization component that is connected to a five-level readability lexicon and Arabic WordNet-based substitution suggestions. The add-on can be used for assessing the reading difficulty of a text and identifying difficult words as part of the task of manual text simplification. We make our add-on and its code publicly available.
△ Less
Submitted 19 October, 2022;
originally announced October 2022.
-
Q-learning Decision Transformer: Leveraging Dynamic Programming for Conditional Sequence Modelling in Offline RL
Authors:
Taku Yamagata,
Ahmed Khalil,
Raul Santos-Rodriguez
Abstract:
Recent works have shown that tackling offline reinforcement learning (RL) with a conditional policy produces promising results. The Decision Transformer (DT) combines the conditional policy approach and a transformer architecture, showing competitive performance against several benchmarks. However, DT lacks stitching ability -- one of the critical abilities for offline RL to learn the optimal poli…
▽ More
Recent works have shown that tackling offline reinforcement learning (RL) with a conditional policy produces promising results. The Decision Transformer (DT) combines the conditional policy approach and a transformer architecture, showing competitive performance against several benchmarks. However, DT lacks stitching ability -- one of the critical abilities for offline RL to learn the optimal policy from sub-optimal trajectories. This issue becomes particularly significant when the offline dataset only contains sub-optimal trajectories. On the other hand, the conventional RL approaches based on Dynamic Programming (such as Q-learning) do not have the same limitation; however, they suffer from unstable learning behaviours, especially when they rely on function approximation in an off-policy learning setting. In this paper, we propose the Q-learning Decision Transformer (QDT) to address the shortcomings of DT by leveraging the benefits of Dynamic Programming (Q-learning). It utilises the Dynamic Programming results to relabel the return-to-go in the training data to then train the DT with the relabelled data. Our approach efficiently exploits the benefits of these two approaches and compensates for each other's shortcomings to achieve better performance. We empirically show these in both simple toy environments and the more complex D4RL benchmark, showing competitive performance gains.
△ Less
Submitted 25 May, 2023; v1 submitted 8 September, 2022;
originally announced September 2022.
-
sim2real: Cardiac MR Image Simulation-to-Real Translation via Unsupervised GANs
Authors:
Sina Amirrajab,
Yasmina Al Khalil,
Cristian Lorenz,
Jurgen Weese,
Josien Pluim,
Marcel Breeuwer
Abstract:
There has been considerable interest in the MR physics-based simulation of a database of virtual cardiac MR images for the development of deep-learning analysis networks. However, the employment of such a database is limited or shows suboptimal performance due to the realism gap, missing textures, and the simplified appearance of simulated images. In this work we 1) provide image simulation on vir…
▽ More
There has been considerable interest in the MR physics-based simulation of a database of virtual cardiac MR images for the development of deep-learning analysis networks. However, the employment of such a database is limited or shows suboptimal performance due to the realism gap, missing textures, and the simplified appearance of simulated images. In this work we 1) provide image simulation on virtual XCAT subjects with varying anatomies, and 2) propose sim2real translation network to improve image realism. Our usability experiments suggest that sim2real data exhibits a good potential to augment training data and boost the performance of a segmentation algorithm.
△ Less
Submitted 9 August, 2022;
originally announced August 2022.
-
Software Artifact Mining in Software Engineering Conferences: A Meta-Analysis
Authors:
Zeinab Abou Khalil,
Stefano Zacchiroli
Abstract:
Background: Software development results in the production of various types of artifacts: source code, version control system metadata, bug reports, mailing list conversations, test data, etc. Empirical software engineering (ESE) has thrived mining those artifacts to uncover the inner workings of software development and improve its practices. But which artifacts are studied in the field is a movi…
▽ More
Background: Software development results in the production of various types of artifacts: source code, version control system metadata, bug reports, mailing list conversations, test data, etc. Empirical software engineering (ESE) has thrived mining those artifacts to uncover the inner workings of software development and improve its practices. But which artifacts are studied in the field is a moving target, which we study empirically in this paper.Aims: We quantitatively characterize the most frequently mined and co-mined software artifacts in ESE research and the research purposes they support.Method: We conduct a meta-analysis of artifact mining studies published in 11 top conferences in ESE, for a total of 9621 papers. We use natural language processing (NLP) techniques to characterize the types of software artifacts that are most often mined and their evolution over a 16-year period (2004-2020). We analyze the combinations of artifact types that are most often mined together, as well as the relationship between study purposes and mined artifacts.Results: We find that: (1) mining happens in the vast majority of analyzed papers, (2) source code and test data are the most mined artifacts, (3) there is an increasing interest in mining novel artifacts, together with source code, (4) researchers are most interested in the evaluation of software systems and use all possible empirical signals to support that goal.
△ Less
Submitted 18 July, 2022;
originally announced July 2022.
-
The General Index of Software Engineering Papers
Authors:
Zeinab Abou Khalil,
Stefano Zacchiroli
Abstract:
We introduce the General Index of Software Engineering Papers, a dataset of fulltext-indexed papers from the most prominent scientific venues in the field of Software Engineering. The dataset includes both complete bibliographic information and indexed ngrams (sequence of contiguous words after removal of stopwords and non-words, for a total of 577 276 382 unique n-grams in this release) with leng…
▽ More
We introduce the General Index of Software Engineering Papers, a dataset of fulltext-indexed papers from the most prominent scientific venues in the field of Software Engineering. The dataset includes both complete bibliographic information and indexed ngrams (sequence of contiguous words after removal of stopwords and non-words, for a total of 577 276 382 unique n-grams in this release) with length 1 to 5 for 44 581 papers retrieved from 34 venues over the 1971-2020 period.The dataset serves use cases in the field of meta-research, allowing to introspect the output of software engineering research even when access to papers or scholarly search engines is not possible (e.g., due to contractual reasons). The dataset also contributes to making such analyses reproducible and independently verifiable, as opposed to what happens when they are conducted using 3rd-party and non-open scholarly indexing services.The dataset is available as a portable Postgres database dump and released as open data.
△ Less
Submitted 7 April, 2022;
originally announced April 2022.
-
Extracting invariant of conjugacy from independence entropy
Authors:
Bashir Abu Khalil
Abstract:
The concept of independence entropy for symbolic dynamical systems was introduced in [LMP13]. This notion of entropy measures the extent to which one can freely insert symbols in positions without violating the constraints defined by the shift space. Independence entropy is not invariant under topological conjugacy. We define an invariant version of the independence entropy by setting sup h_{ind}(…
▽ More
The concept of independence entropy for symbolic dynamical systems was introduced in [LMP13]. This notion of entropy measures the extent to which one can freely insert symbols in positions without violating the constraints defined by the shift space. Independence entropy is not invariant under topological conjugacy. We define an invariant version of the independence entropy by setting sup h_{ind}(X) = sup{h_{ind}(Y )|Y ' X}. This invariant is bounded above by the topological entropy. We prove that equality sup h_{ind}(X) = h(X) holds for all sofic shift spaces over Z, then we give an example showing that equality does not hold for general shift spaces.
△ Less
Submitted 26 February, 2022; v1 submitted 23 February, 2022;
originally announced February 2022.
-
RLOps: Development Life-cycle of Reinforcement Learning Aided Open RAN
Authors:
Peizheng Li,
Jonathan Thomas,
Xiaoyang Wang,
Ahmed Khalil,
Abdelrahim Ahmad,
Rui Inacio,
Shipra Kapoor,
Arjun Parekh,
Angela Doufexi,
Arman Shojaeifard,
Robert Piechocki
Abstract:
Radio access network (RAN) technologies continue to evolve, with Open RAN gaining the most recent momentum. In the O-RAN specifications, the RAN intelligent controllers (RICs) are software-defined orchestration and automation functions for the intelligent management of RAN. This article introduces principles for machine learning (ML), in particular, reinforcement learning (RL) applications in the…
▽ More
Radio access network (RAN) technologies continue to evolve, with Open RAN gaining the most recent momentum. In the O-RAN specifications, the RAN intelligent controllers (RICs) are software-defined orchestration and automation functions for the intelligent management of RAN. This article introduces principles for machine learning (ML), in particular, reinforcement learning (RL) applications in the O-RAN stack. Furthermore, we review the state-of-the-art research in wireless networks and cast it onto the RAN framework and the hierarchy of the O-RAN architecture. We provide a taxonomy for the challenges faced by ML/RL models throughout the development life-cycle: from the system specification to production deployment (data acquisition, model design, testing and management, etc.). To address the challenges, we integrate a set of existing MLOps principles with unique characteristics when RL agents are considered. This paper discusses a systematic model development, testing and validation life-cycle, termed: RLOps. We discuss fundamental parts of RLOps, which include: model specification, development, production environment serving, operations monitoring and safety/security. Based on these principles, we propose the best practices for RLOps to achieve an automated and reproducible model development process. At last, a holistic data analytics platform rooted in the O-RAN deployment is designed and implemented, aiming to embrace and fulfil the aforementioned principles and best practices of RLOps.
△ Less
Submitted 25 November, 2022; v1 submitted 12 November, 2021;
originally announced November 2021.
-
Bayesian Multidimensional Scaling for Location Awareness in Hybrid-Internet of Underwater Things
Authors:
Ruhul Amin Khalil,
Nasir Saeed,
Mohammad Inayatullah Babar,
Tariqullah Jan,
Sadia Din
Abstract:
Localization of sensor nodes in the Internet of Underwater Things (IoUT) is of considerable significance due to its various applications, such as navigation, data tagging, and detection of underwater objects. Therefore, in this paper, we propose a hybrid Bayesian multidimensional scaling (BMDS) based localization technique that can work on a fully hybrid IoUT network where the nodes can communicat…
▽ More
Localization of sensor nodes in the Internet of Underwater Things (IoUT) is of considerable significance due to its various applications, such as navigation, data tagging, and detection of underwater objects. Therefore, in this paper, we propose a hybrid Bayesian multidimensional scaling (BMDS) based localization technique that can work on a fully hybrid IoUT network where the nodes can communicate using either optical, magnetic induction, and acoustic technologies. These technologies are already used for communication in the underwater environment; however, lacking localization solutions. Optical and magnetic induction communication achieves higher data rates for short communication. On the contrary, acoustic waves provide a low data rate for long-range underwater communication. The proposed method collectively uses optical, magnetic induction, and acoustic communication-based ranging to estimate the underwater sensor nodes' final locations. Moreover, we also analyze the proposed scheme by deriving the hybrid Cramer Rao lower bound (HCRLB). Simulation results provide a complete comparative analysis of the proposed method with the literature.
△ Less
Submitted 7 September, 2021;
originally announced September 2021.
-
CURE: Enabling RF Energy Harvesting using Cell-Free Massive MIMO UAVs Assisted by RIS
Authors:
Alvi Ataur Khalil,
Mohamed Y. Selim,
Mohammad Ashiqur Rahman
Abstract:
The ever-evolving internet of things (IoT) has led to the growth of numerous wireless sensors, communicating through the internet infrastructure. When designing a network using these sensors, one critical aspect is the longevity and self-sustainability of these devices. For extending the lifetime of these sensors, radio frequency energy harvesting (RFEH) technology has proved to be promising. In t…
▽ More
The ever-evolving internet of things (IoT) has led to the growth of numerous wireless sensors, communicating through the internet infrastructure. When designing a network using these sensors, one critical aspect is the longevity and self-sustainability of these devices. For extending the lifetime of these sensors, radio frequency energy harvesting (RFEH) technology has proved to be promising. In this paper, we propose CURE, a novel framework for RFEH that effectively combines the benefits of cell-free massive MIMO (CFmMIMO), unmanned aerial vehicles (UAVs), and reconfigurable intelligent surfaces (RISs) to provide seamless energy harvesting to IoT devices. We consider UAV as an access point (AP) in the CFmMIMO framework. To enhance the signal strength of the RFEH and information transfer, we leverage RISs owing to their passive reflection capability. Based on an extensive simulation, we validate our framework's performance by comparing the max-min fairness (MMF) algorithm for the amount of harvested energy.
△ Less
Submitted 21 July, 2021;
originally announced July 2021.
-
A Literature Review on Blockchain-enabled Security and Operation of Cyber-Physical Systems
Authors:
Alvi Ataur Khalil,
Javier Franco,
Imtiaz Parvez,
Selcuk Uluagac,
Mohammad Ashiqur Rahman
Abstract:
Blockchain has become a key technology in a plethora of application domains owing to its decentralized public nature. The cyber-physical systems (CPS) is one of the prominent application domains that leverage blockchain for myriad operations, where the Internet of Things (IoT) is utilized for data collection. Although some of the CPS problems can be solved by simply adopting blockchain for its sec…
▽ More
Blockchain has become a key technology in a plethora of application domains owing to its decentralized public nature. The cyber-physical systems (CPS) is one of the prominent application domains that leverage blockchain for myriad operations, where the Internet of Things (IoT) is utilized for data collection. Although some of the CPS problems can be solved by simply adopting blockchain for its secure and distributed nature, others require complex considerations for overcoming blockchain-imposed limitations while maintaining the core aspect of CPS. Even though a number of studies focus on either the utilization of blockchains for different CPS applications or the blockchain-enabled security of CPS, there is no comprehensive survey including both perspectives together. To fill this gap, we present a comprehensive overview of contemporary advancement in using blockchain for enhancing different CPS operations as well as improving CPS security. To the best of our knowledge, this is the first paper that presents an in-depth review of research on blockchain-enabled CPS operation and security.
△ Less
Submitted 16 July, 2021;
originally announced July 2021.
-
Does the duration of rapid release cycles affect the bug handling activity?
Authors:
Thorn Jansen,
Zeinab Abou Khalil,
Eleni Constantinou,
Tom Mens
Abstract:
Software projects are regularly updated with new functionality and bug fixes through so-called releases. In recent years, many software projects have been shifting to shorter release cycles and this can affect the bug handling activity. Past research has focused on the impact of switching from traditional to rapid release cycles with respect to bug handling activity, but the effect of the rapid re…
▽ More
Software projects are regularly updated with new functionality and bug fixes through so-called releases. In recent years, many software projects have been shifting to shorter release cycles and this can affect the bug handling activity. Past research has focused on the impact of switching from traditional to rapid release cycles with respect to bug handling activity, but the effect of the rapid release cycle duration has not yet been studied. We empirically investigate releases of 420 open source projects with rapid release cycles to understand the effect of variable and rapid release cycle durations on bug handling activity. We group the releases of these projects into five categories of release cycle durations. For each project, we investigate how the sequence of releases is related to bug handling activity metrics and we study the effect of the variability of cycle durations on bug fixing. Our results did not reveal any statistically significant difference for the studied bug handling activity metrics in the presence of variable rapid release cycle durations. This suggests that the duration of fast release cycles does not seem to impact bug handling activity.
△ Less
Submitted 15 March, 2021;
originally announced March 2021.
-
A Novel Framework for Threat Analysis of Machine Learning-based Smart Healthcare Systems
Authors:
Nur Imtiazul Haque,
Mohammad Ashiqur Rahman,
Md Hasan Shahriar,
Alvi Ataur Khalil,
Selcuk Uluagac
Abstract:
Smart healthcare systems (SHSs) are providing fast and efficient disease treatment leveraging wireless body sensor networks (WBSNs) and implantable medical devices (IMDs)-based internet of medical things (IoMT). In addition, IoMT-based SHSs are enabling automated medication, allowing communication among myriad healthcare sensor devices. However, adversaries can launch various attacks on the commun…
▽ More
Smart healthcare systems (SHSs) are providing fast and efficient disease treatment leveraging wireless body sensor networks (WBSNs) and implantable medical devices (IMDs)-based internet of medical things (IoMT). In addition, IoMT-based SHSs are enabling automated medication, allowing communication among myriad healthcare sensor devices. However, adversaries can launch various attacks on the communication network and the hardware/firmware to introduce false data or cause data unavailability to the automatic medication system endangering the patient's life. In this paper, we propose SHChecker, a novel threat analysis framework that integrates machine learning and formal analysis capabilities to identify potential attacks and corresponding effects on an IoMT-based SHS. Our framework can provide us with all potential attack vectors, each representing a set of sensor measurements to be altered, for an SHS given a specific set of attack attributes, allowing us to realize the system's resiliency, thus the insight to enhance the robustness of the model. We implement SHChecker on a synthetic and a real dataset, which affirms that our framework can reveal potential attack vectors in an IoMT system. This is a novel effort to formally analyze supervised and unsupervised machine learning models for black-box SHS threat analysis.
△ Less
Submitted 4 March, 2021;
originally announced March 2021.
-
Efficient UAV Trajectory-Planning using Economic Reinforcement Learning
Authors:
Alvi Ataur Khalil,
Alexander J Byrne,
Mohammad Ashiqur Rahman,
Mohammad Hossein Manshaei
Abstract:
Advances in unmanned aerial vehicle (UAV) design have opened up applications as varied as surveillance, firefighting, cellular networks, and delivery applications. Additionally, due to decreases in cost, systems employing fleets of UAVs have become popular. The uniqueness of UAVs in systems creates a novel set of trajectory or path planning and coordination problems. Environments include many more…
▽ More
Advances in unmanned aerial vehicle (UAV) design have opened up applications as varied as surveillance, firefighting, cellular networks, and delivery applications. Additionally, due to decreases in cost, systems employing fleets of UAVs have become popular. The uniqueness of UAVs in systems creates a novel set of trajectory or path planning and coordination problems. Environments include many more points of interest (POIs) than UAVs, with obstacles and no-fly zones. We introduce REPlanner, a novel multi-agent reinforcement learning algorithm inspired by economic transactions to distribute tasks between UAVs. This system revolves around an economic theory, in particular an auction mechanism where UAVs trade assigned POIs. We formulate the path planning problem as a multi-agent economic game, where agents can cooperate and compete for resources. We then translate the problem into a Partially Observable Markov decision process (POMDP), which is solved using a reinforcement learning (RL) model deployed on each agent. As the system computes task distributions via UAV cooperation, it is highly resilient to any change in the swarm size. Our proposed network and economic game architecture can effectively coordinate the swarm as an emergent phenomenon while maintaining the swarm's operation. Evaluation results prove that REPlanner efficiently outperforms conventional RL-based trajectory search.
△ Less
Submitted 3 March, 2021;
originally announced March 2021.
-
Anonymization of labeled TOF-MRA images for brain vessel segmentation using generative adversarial networks
Authors:
Tabea Kossen,
Pooja Subramaniam,
Vince I. Madai,
Anja Hennemuth,
Kristian Hildebrand,
Adam Hilbert,
Jan Sobesky,
Michelle Livne,
Ivana Galinovic,
Ahmed A. Khalil,
Jochen B. Fiebach,
Dietmar Frey
Abstract:
Anonymization and data sharing are crucial for privacy protection and acquisition of large datasets for medical image analysis. This is a big challenge, especially for neuroimaging. Here, the brain's unique structure allows for re-identification and thus requires non-conventional anonymization. Generative adversarial networks (GANs) have the potential to provide anonymous images while preserving p…
▽ More
Anonymization and data sharing are crucial for privacy protection and acquisition of large datasets for medical image analysis. This is a big challenge, especially for neuroimaging. Here, the brain's unique structure allows for re-identification and thus requires non-conventional anonymization. Generative adversarial networks (GANs) have the potential to provide anonymous images while preserving predictive properties. Analyzing brain vessel segmentation, we trained 3 GANs on time-of-flight (TOF) magnetic resonance angiography (MRA) patches for image-label generation: 1) Deep convolutional GAN, 2) Wasserstein-GAN with gradient penalty (WGAN-GP) and 3) WGAN-GP with spectral normalization (WGAN-GP-SN). The generated image-labels from each GAN were used to train a U-net for segmentation and tested on real data. Moreover, we applied our synthetic patches using transfer learning on a second dataset. For an increasing number of up to 15 patients we evaluated the model performance on real data with and without pre-training. The performance for all models was assessed by the Dice Similarity Coefficient (DSC) and the 95th percentile of the Hausdorff Distance (95HD). Comparing the 3 GANs, the U-net trained on synthetic data generated by the WGAN-GP-SN showed the highest performance to predict vessels (DSC/95HD 0.82/28.97) benchmarked by the U-net trained on real data (0.89/26.61). The transfer learning approach showed superior performance for the same GAN compared to no pre-training, especially for one patient only (0.91/25.68 vs. 0.85/27.36). In this work, synthetic image-label pairs retained generalizable information and showed good performance for vessel segmentation. Besides, we showed that synthetic patches can be used in a transfer learning approach with independent data. This paves the way to overcome the challenges of scarce data and anonymization in medical imaging.
△ Less
Submitted 16 November, 2020; v1 submitted 9 September, 2020;
originally announced September 2020.
-
On The Usage Of Average Hausdorff Distance For Segmentation Performance Assessment: Hidden Bias When Used For Ranking
Authors:
Orhun Utku Aydin,
Abdel Aziz Taha,
Adam Hilbert,
Ahmed A. Khalil,
Ivana Galinovic,
Jochen B. Fiebach,
Dietmar Frey,
Vince Istvan Madai
Abstract:
Average Hausdorff Distance (AVD) is a widely used performance measure to calculate the distance between two point sets. In medical image segmentation, AVD is used to compare ground truth images with segmentation results allowing their ranking. We identified, however, a ranking bias of AVD making it less suitable for segmentation ranking. To mitigate this bias, we present a modified calculation of…
▽ More
Average Hausdorff Distance (AVD) is a widely used performance measure to calculate the distance between two point sets. In medical image segmentation, AVD is used to compare ground truth images with segmentation results allowing their ranking. We identified, however, a ranking bias of AVD making it less suitable for segmentation ranking. To mitigate this bias, we present a modified calculation of AVD that we have coined balanced AVD (bAVD). To simulate segmentations for ranking, we manually created non-overlap** segmentation errors common in cerebral vessel segmentation as our use-case. Adding the created errors consecutively and randomly to the ground truth, we created sets of simulated segmentations with increasing number of errors. Each set of simulated segmentations was ranked using AVD and bAVD. We calculated the Kendall-rank-correlation-coefficient between the segmentation ranking and the number of errors in each simulated segmentation. The rankings produced by bAVD had a significantly higher average correlation (0.969) than those of AVD (0.847). In 200 total rankings, bAVD misranked 52 and AVD misranked 179 segmentations. Our proposed evaluation measure, bAVD, alleviates AVDs ranking bias making it more suitable for rankings and quality assessment of segmentations.
△ Less
Submitted 13 September, 2020; v1 submitted 31 August, 2020;
originally announced September 2020.
-
Deep Learning in Industrial Internet of Things: Potentials, Challenges, and Emerging Applications
Authors:
Ruhul Amin Khalil,
Nasir Saeed,
Yasaman Moradi Fard,
Tareq Y. Al-Naffouri,
Mohamed-Slim Alouini
Abstract:
The recent advancements in the Internet of Things (IoT) are giving rise to the proliferation of interconnected devices, enabling various smart applications. These enormous number of IoT devices generates a large capacity of data that further require intelligent data analysis and processing methods, such as Deep Learning (DL). Notably, the DL algorithms, when applied in the Industrial Internet of T…
▽ More
The recent advancements in the Internet of Things (IoT) are giving rise to the proliferation of interconnected devices, enabling various smart applications. These enormous number of IoT devices generates a large capacity of data that further require intelligent data analysis and processing methods, such as Deep Learning (DL). Notably, the DL algorithms, when applied in the Industrial Internet of Things (IIoT), can enable various applications such as smart assembling, smart manufacturing, efficient networking, and accident detection-and-prevention. Therefore, motivated by these numerous applications; in this paper, we present the key potentials of DL in IIoT. First, we review various DL techniques, including convolutional neural networks, auto-encoders, and recurrent neural networks and there use in different industries. Then, we outline numerous use cases of DL for IIoT systems, including smart manufacturing, smart metering, smart agriculture, etc. Moreover, we categorize several research challenges regarding the effective design and appropriate implementation of DL-IIoT. Finally, we present several future research directions to inspire and motivate further research in this area.
△ Less
Submitted 15 August, 2020;
originally announced August 2020.
-
XCAT-GAN for Synthesizing 3D Consistent Labeled Cardiac MR Images on Anatomically Variable XCAT Phantoms
Authors:
Sina Amirrajab,
Samaneh Abbasi-Sureshjani,
Yasmina Al Khalil,
Cristian Lorenz,
Juergen Weese,
Josien Pluim,
Marcel Breeuwer
Abstract:
Generative adversarial networks (GANs) have provided promising data enrichment solutions by synthesizing high-fidelity images. However, generating large sets of labeled images with new anatomical variations remains unexplored. We propose a novel method for synthesizing cardiac magnetic resonance (CMR) images on a population of virtual subjects with a large anatomical variation, introduced using th…
▽ More
Generative adversarial networks (GANs) have provided promising data enrichment solutions by synthesizing high-fidelity images. However, generating large sets of labeled images with new anatomical variations remains unexplored. We propose a novel method for synthesizing cardiac magnetic resonance (CMR) images on a population of virtual subjects with a large anatomical variation, introduced using the 4D eXtended Cardiac and Torso (XCAT) computerized human phantom. We investigate two conditional image synthesis approaches grounded on a semantically-consistent mask-guided image generation technique: 4-class and 8-class XCAT-GANs. The 4-class technique relies on only the annotations of the heart; while the 8-class technique employs a predicted multi-tissue label map of the heart-surrounding organs and provides better guidance for our conditional image synthesis. For both techniques, we train our conditional XCAT-GAN with real images paired with corresponding labels and subsequently at the inference time, we substitute the labels with the XCAT derived ones. Therefore, the trained network accurately transfers the tissue-specific textures to the new label maps. By creating 33 virtual subjects of synthetic CMR images at the end-diastolic and end-systolic phases, we evaluate the usefulness of such data in the downstream cardiac cavity segmentation task under different augmentation strategies. Results demonstrate that even with only 20% of real images (40 volumes) seen during training, segmentation performance is retained with the addition of synthetic CMR images. Moreover, the improvement in utilizing synthetic images for augmenting the real data is evident through the reduction of Hausdorff distance up to 28% and an increase in the Dice score up to 5%, indicating a higher similarity to the ground truth in all dimensions.
△ Less
Submitted 31 July, 2020; v1 submitted 27 July, 2020;
originally announced July 2020.
-
Statistical model for filamentary structures of molecular clouds -- The modified multiplicative random cascade model and its multifractal nature
Authors:
Jean-François Robitaille,
Abdelhalim Abdeldayem,
Isabelle Joncour,
Estelle Moraux,
Frédérique Motte,
Pierre Lesaffre,
André Khalil
Abstract:
We propose a new statistical model that can reproduce the hierarchical nature of the ubiquitous filamentary structures of molecular clouds. This model is based on the multiplicative random cascade, which is designed to replicate the multifractal nature of intermittency in developed turbulence. We present a modified version of the multiplicative process where the spatial fluctuations as a function…
▽ More
We propose a new statistical model that can reproduce the hierarchical nature of the ubiquitous filamentary structures of molecular clouds. This model is based on the multiplicative random cascade, which is designed to replicate the multifractal nature of intermittency in developed turbulence. We present a modified version of the multiplicative process where the spatial fluctuations as a function of scales are produced with the wavelet transforms of a fractional Brownian motion realisation. This simple approach produces naturally a log-normal distribution function and hierarchical coherent structures. Despite the highly contrasted aspect of these coherent structures against a smoother background, their Fourier power spectrum can be fitted by a single power law. As reported in previous works using the multiscale non-Gaussian segmentation (MnGSeg) technique, it is proven that the fit of a single power law reflects the inability of the Fourier power spectrum to detect the progressive non-Gaussian contributions that are at the origin of these structures across the inertial range of the power spectrum. The mutifractal nature of these coherent structures is discussed, and an extension of the MnGSeg technique is proposed to calculate the multifractal spectrum that is associated with them. Using directional wavelets, we show that filamentary structures can easily be produced without changing the general shape of the power spectrum. The cumulative effect of random multiplicative sequences succeeds in producing the general aspect of filamentary structures similar to those associated with star-forming regions. The filamentary structures are formed through the product of a large number of random-phase linear waves at different spatial wavelengths. Dynamically, this effect might be associated with the collection of compressive processes that occur in the interstellar medium.
△ Less
Submitted 16 July, 2020;
originally announced July 2020.
-
AI-Driven CT-based quantification, staging and short-term outcome prediction of COVID-19 pneumonia
Authors:
Guillaume Chassagnon,
Maria Vakalopoulou,
Enzo Battistella,
Stergios Christodoulidis,
Trieu-Nghi Hoang-Thi,
Severine Dangeard,
Eric Deutsch,
Fabrice Andre,
Enora Guillo,
Nara Halm,
Stefany El Hajj,
Florian Bompard,
Sophie Neveu,
Chahinez Hani,
Ines Saab,
Alienor Campredon,
Hasmik Koulakian,
Souhail Bennani,
Gael Freche,
Aurelien Lombard,
Laure Fournier,
Hippolyte Monnier,
Teodor Grand,
Jules Gregory,
Antoine Khalil
, et al. (6 additional authors not shown)
Abstract:
Chest computed tomography (CT) is widely used for the management of Coronavirus disease 2019 (COVID-19) pneumonia because of its availability and rapidity. The standard of reference for confirming COVID-19 relies on microbiological tests but these tests might not be available in an emergency setting and their results are not immediately available, contrary to CT. In addition to its role for early…
▽ More
Chest computed tomography (CT) is widely used for the management of Coronavirus disease 2019 (COVID-19) pneumonia because of its availability and rapidity. The standard of reference for confirming COVID-19 relies on microbiological tests but these tests might not be available in an emergency setting and their results are not immediately available, contrary to CT. In addition to its role for early diagnosis, CT has a prognostic role by allowing visually evaluating the extent of COVID-19 lung abnormalities. The objective of this study is to address prediction of short-term outcomes, especially need for mechanical ventilation. In this multi-centric study, we propose an end-to-end artificial intelligence solution for automatic quantification and prognosis assessment by combining automatic CT delineation of lung disease meeting performance of experts and data-driven identification of biomarkers for its prognosis. AI-driven combination of variables with CT-based biomarkers offers perspectives for optimal patient management given the shortage of intensive care beds and ventilators.
△ Less
Submitted 20 April, 2020;
originally announced April 2020.
-
Phases of QCD$_3$ with three families of fundamental flavors
Authors:
Abdullah Khalil,
Radu Tatar
Abstract:
We explore the phase diagram for an $SU(N)$ gauge theory in $2 + 1$ dimensions with three families of fermions with different masses, all in the fundamental representation. The phase diagram is three dimensional and contains cuboid, planar and linear quantum regions, depending on the values of the fermionic masses. Among other checks, we consider the consistency with boson/fermion dualities and ve…
▽ More
We explore the phase diagram for an $SU(N)$ gauge theory in $2 + 1$ dimensions with three families of fermions with different masses, all in the fundamental representation. The phase diagram is three dimensional and contains cuboid, planar and linear quantum regions, depending on the values of the fermionic masses. Among other checks, we consider the consistency with boson/fermion dualities and verify the reduction of the phase diagram to the one and two-family diagrams.
△ Less
Submitted 27 August, 2020; v1 submitted 15 January, 2020;
originally announced January 2020.
-
From Global Choreographies to Provably Correct and Efficient Distributed Implementations
Authors:
Mohamad Jaber,
Yliès Falcone,
Paul Attie,
Al-Abbass Khalil,
Rayan Hallal
Abstract:
We define a method to automatically synthesize provably-correct efficient distributed implementations from high-level global choreographies. A global choreography describes the execution and communication logic between a set of provided processes which are described by their interfaces. The operations at the level of choreographies include multiparty communications, choice, loop, and branching. Ch…
▽ More
We define a method to automatically synthesize provably-correct efficient distributed implementations from high-level global choreographies. A global choreography describes the execution and communication logic between a set of provided processes which are described by their interfaces. The operations at the level of choreographies include multiparty communications, choice, loop, and branching. Choreographies are master-triggered, that is each choreography has one master to trigger its execution. This allows to automatically generate conflict free distributed implementations without controllers. The behavior of the synthesized implementations follows the behavior of choreographies. In addition, the absence of controllers ensures the efficiency of the implementation and reduces the communication needed at runtime. Moreover, we define a translation of the distributed implementations to equivalent Promela versions. The translation allows verifying the distributed system against behavioral properties. We implemented a Java prototype to validate the approach and applied it to automatically synthesize micro-services architectures. We illustrate our method on the automatic synthesis of a verified distributed buying system.
△ Less
Submitted 31 May, 2019;
originally announced May 2019.
-
Towards On-Chip MEMS-Based Optical Autocorrelator
Authors:
Ahmed M. Othman,
Hussein E. Kotb,
Yasser M. Sabry,
Osama Terra,
Diaa A. Khalil
Abstract:
We propose a compact MEMS-based optical autocorrelator based on a micromachined Michelson interferometer in silicon and the two-photon absorption non-linearity in a photodetector. The miniaturized autocorrelator has a scanning range of 1.2 ps and operates in the wavelength range of 1100-2000 nm. The device measures the interferometric autocorrelation due to its collinear nature, from which the int…
▽ More
We propose a compact MEMS-based optical autocorrelator based on a micromachined Michelson interferometer in silicon and the two-photon absorption non-linearity in a photodetector. The miniaturized autocorrelator has a scanning range of 1.2 ps and operates in the wavelength range of 1100-2000 nm. The device measures the interferometric autocorrelation due to its collinear nature, from which the intensity autocorrelation can be calculated. The field autocorrelation can also be measured, from which the optical pulse spectrum can be calculated. A theoretical model based on Gaussian beam propagation is developed to study the effect of optical beam divergence, pulse dispersion, tilt angle between the interferometer mirrors, and amplitude mismatch between the interfering pulses. This model explains many of the effects observed in experimental measurements due to the use of a MEMS interferometer. The experimental results of autocorrelation signals for several pulses in the order of 100 fs are compared to a commercial autocorrelator and a good match is found.
△ Less
Submitted 12 September, 2018;
originally announced September 2018.
-
Bivariate Discrete Exponentiated Weibull Distribution: Properties and Applications
Authors:
M. El- Morshedy,
A. A. Khalil
Abstract:
In this paper, a new bivariate discrete distribution is introduced which called bivariate discrete exponentiated Weibull (BDEW) distribution. Several of its mathematical statistical properties are derived such as the joint cumulative distribution function, the joint joint hazard rate function, probability mass function, joint moment generating function, mathematical expectation and reliability fun…
▽ More
In this paper, a new bivariate discrete distribution is introduced which called bivariate discrete exponentiated Weibull (BDEW) distribution. Several of its mathematical statistical properties are derived such as the joint cumulative distribution function, the joint joint hazard rate function, probability mass function, joint moment generating function, mathematical expectation and reliability function for stress-strength model. Further, the parameters of the BDEW distribution are estimated by the maximum likelihood method. Two real data sets are analyzed, and it was found that the BDEW distribution provides better fit than other discrete distributions.
△ Less
Submitted 11 May, 2018;
originally announced May 2018.
-
The Qatar Genome: A Population-Specific Tool for Precision Medicine in the Middle East
Authors:
Khalid A. Fakhro,
Michelle R. Staudt,
Monica Denise Ramstetter,
Amal Robay,
Joel A. Malek,
Ramin Badii,
Ajayeb Al-Nabet Al-Marri,
Charbel Abi Khalil,
Alya Al-Shakaki,
Omar Chidiac,
Dora Stadler,
Mahmoud Zirie,
Amin Jayyousi,
Jacqueline Salit,
Jason G. Mezey,
Ronald G. Crystal,
Juan L. Rodriguez-Flores
Abstract:
Reaching the full potential of precision medicine depends on the quality of personalized genome interpretation. In order to facilitate precision medicine in regions of the Middle East and North Africa (MENA), a population-specific reference genome for the indigenous Arab popula-tion of Qatar (QTRG) was constructed by incorporating allele frequency data from sequencing of 1,161 Qataris, representin…
▽ More
Reaching the full potential of precision medicine depends on the quality of personalized genome interpretation. In order to facilitate precision medicine in regions of the Middle East and North Africa (MENA), a population-specific reference genome for the indigenous Arab popula-tion of Qatar (QTRG) was constructed by incorporating allele frequency data from sequencing of 1,161 Qataris, representing 0.4% of the population. A total of 20.9 million SNP and 3.1 million indels were observed in Qatar, including an average of 1.79% novel variants per individual ge-nome. Replacement of the GRCh37 standard reference with QTRG in a best practices genome analysis workflow resulted in an average of 7* deeper coverage depth (an improvement of 23%), and 756,671 fewer variants on average, a reduction of 16% that is attributed to common Qatari alleles being present in the QTRG reference. The benefit for using QTRG varies across ances-tries, a factor that should be taken into consideration when selecting an appropriate reference for analysis.
△ Less
Submitted 13 May, 2018; v1 submitted 8 May, 2018;
originally announced May 2018.
-
A New Data-Driven Sparse-Learning Approach to Study Chemical Reaction Networks
Authors:
Farshad Harirchi,
Doohyun Kim,
Omar A. Khalil,
Sijia Liu,
Paolo Elvati,
Angela Violi,
Alfred O. Hero
Abstract:
Chemical kinetic mechanisms can be represented by sets of elementary reactions that are easily translated into mathematical terms using physicochemical relationships. The schematic representation of reactions captures the interactions between reacting species and products. Determining the minimal chemical interactions underlying the dynamic behavior of systems is a major task. In this paper, we in…
▽ More
Chemical kinetic mechanisms can be represented by sets of elementary reactions that are easily translated into mathematical terms using physicochemical relationships. The schematic representation of reactions captures the interactions between reacting species and products. Determining the minimal chemical interactions underlying the dynamic behavior of systems is a major task. In this paper, we introduce a novel approach for the identification of the influential reactions in chemical reaction networks for combustion applications, using a data-driven sparse-learning technique. The proposed approach identifies a set of influential reactions using species concentrations and reaction rates, with minimal computational cost without requiring additional data or simulations. The new approach is applied to analyze the combustion chemistry of H2 and C3H8 in a constant-volume homogeneous reactor. The influential reactions identified by the sparse-learning method are consistent with the current kinetics knowledge of chemical mechanisms. Additionally, we show that a reduced version of the parent mechanism can be generated as a combination of the influential reactions identified at different times and conditions and that for both H2 and C3H8 this reduced mechanism performs closely to the parent mechanism as a function of ignition delay over a wide range of conditions. Our results demonstrate the potential of the sparse-learning approach as an effective and efficient tool for mechanism analysis and mechanism reduction.
△ Less
Submitted 10 February, 2019; v1 submitted 18 December, 2017;
originally announced December 2017.
-
A Data-Driven Sparse-Learning Approach to Model Reduction in Chemical Reaction Networks
Authors:
Farshad Harirchi,
Omar A. Khalil,
Sijia Liu,
Paolo Elvati,
Angela Violi,
Alfred O. Hero
Abstract:
In this paper, we propose an optimization-based sparse learning approach to identify the set of most influential reactions in a chemical reaction network. This reduced set of reactions is then employed to construct a reduced chemical reaction mechanism, which is relevant to chemical interaction network modeling. The problem of identifying influential reactions is first formulated as a mixed-intege…
▽ More
In this paper, we propose an optimization-based sparse learning approach to identify the set of most influential reactions in a chemical reaction network. This reduced set of reactions is then employed to construct a reduced chemical reaction mechanism, which is relevant to chemical interaction network modeling. The problem of identifying influential reactions is first formulated as a mixed-integer quadratic program, and then a relaxation method is leveraged to reduce the computational complexity of our approach. Qualitative and quantitative validation of the sparse encoding approach demonstrates that the model captures important network structural properties with moderate computational load.
△ Less
Submitted 12 December, 2017;
originally announced December 2017.
-
NLO Rutherford Scattering and the Kinoshita-Lee-Nauenberg Theorem
Authors:
Abdullah Khalil
Abstract:
We calculate to next-to-leading order accuracy the high-energy elastic scattering cross section for an electron off of a classical point source. We use the $\overline{\mathrm{MS}}$ renormalization scheme to tame the ultraviolet divergences while the infrared singularities are dealt with using the well known Kinoshita-Lee-Nauenberg theorem. We show for the first time how to correctly apply the Kino…
▽ More
We calculate to next-to-leading order accuracy the high-energy elastic scattering cross section for an electron off of a classical point source. We use the $\overline{\mathrm{MS}}$ renormalization scheme to tame the ultraviolet divergences while the infrared singularities are dealt with using the well known Kinoshita-Lee-Nauenberg theorem. We show for the first time how to correctly apply the Kinoshita-Lee-Nauenberg theorem diagrammatically in a next-to-leading order scattering process. We improve on previous works by including all initial and final state soft radiative processes, including absorption and an infinite sum of partially disconnected amplitudes. Crucially, we exploit the Monotone Convergence Theorem to prove that our delicate rearrangement of this formally divergent series is uniquely correct. This rearrangement yields a factorization of the infinite contribution from the initial state soft photons that then cancels in the physically observable cross section. Since we use the $\overline{\mathrm{MS}}$ renormalization scheme, our result is valid up to arbitrarily large momentum transfers between the source and the scattered electron as long as $α\log(1/δ)\ll 1$ and $α\log(1/δ)\log(Δ/E)\ll 1$, where $Δ$ and $δ$ are the experimental energy and angular resolutions, respectively, and $E$ is the energy of the scattered electron. Our work aims at computing the NLO corrections to the energy loss of a high energetic parton propagating in a quark-gluon plasma.
△ Less
Submitted 29 June, 2017;
originally announced June 2017.
-
A Complete Diagrammatic Implementation of the Kinoshita-Lee-Nauenberg Theorem at Next-to-Leading Order
Authors:
Abdullah Khalil,
W. A. Horowitz
Abstract:
We show for the first time in over 50 years how to correctly apply the Kinoshita-Lee-Nauenberg theorem diagrammatically in a next-to-leading order scattering process. We improve on previous works by including all initial and final state soft radiative processes, including absorption and an infinite sum of partially disconnected amplitudes. Crucially, we exploit the Monotone Convergence Theorem to…
▽ More
We show for the first time in over 50 years how to correctly apply the Kinoshita-Lee-Nauenberg theorem diagrammatically in a next-to-leading order scattering process. We improve on previous works by including all initial and final state soft radiative processes, including absorption and an infinite sum of partially disconnected amplitudes. Crucially, we exploit the Monotone Convergence Theorem to prove that our delicate rearrangement of this formally divergent series is correct. This rearrangement yields a factorization of the infinite contribution from the initial state soft photons that then cancels in the physically observable cross section. We derive the first complete next-to-leading order, high-energy Rutherford elastic scattering cross section in the $\overline{\mathrm{MS}}$ renormalization scheme as an explicit example of our procedure.
△ Less
Submitted 3 January, 2017;
originally announced January 2017.
-
Super Event Driven System OOP GUI Design
Authors:
Mahmoud Samir Fayed,
Ehab Aziz Khalil
Abstract:
This article presents a new proposal design of GUI and new technology in programming Namely "Super Technology" which can be applied for supporting the proposal design of GUI
This article presents a new proposal design of GUI and new technology in programming Namely "Super Technology" which can be applied for supporting the proposal design of GUI
△ Less
Submitted 18 December, 2016;
originally announced December 2016.
-
IP Tracing and Active Network Response
Authors:
Tarek S. Sobh,
Awad H. Khalil
Abstract:
Active security is mainly concerned with performing one or more security functions when a host in a communication network is subject to an attack. Such security functions include appropriate actions against attackers. To properly afford active security actions a set of software subsystems should be integrated together so that they can automatically detect and appropriately address any vulnerabilit…
▽ More
Active security is mainly concerned with performing one or more security functions when a host in a communication network is subject to an attack. Such security functions include appropriate actions against attackers. To properly afford active security actions a set of software subsystems should be integrated together so that they can automatically detect and appropriately address any vulnerability in the underlying network. This work presents integrated model for active security response model. The proposed model introduces Active Response Mechanism (ARM) for tracing anonymous attacks in the network back to their source. This work is motivated by the increased frequency and sophistication of denial-of-service attacks and by the difficulty in tracing packets with incorrect, or "spoofed", source addresses. This paper presents within the proposed model two tracing approaches based on:
1.Sleepy Watermark Tracing (SWT) for unauthorized access attacks.
2.Probabilistic Packet Marking (PPM) in the network for Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. On the basis of the proposed model a cooperative network security tools such as firewall, intrusion detection system with IP tracing mechanism has been designed for taking a rapid active response against real IPs for attackers. The proposed model is able to detect network vulnerabilities, trace attack source IP and reconfigure the attacked subnetworks.
△ Less
Submitted 21 September, 2014;
originally announced September 2014.
-
Nearest neighbor vector analysis of sdss dr5 galaxy distribution
Authors:
Yongfeng Wu,
Weike Xiao,
Rongjun Mu,
David Batuski,
Andre Khalil
Abstract:
We present the Nearest Neighbor Distance (NND) analysis of SDSS DR5 galaxies. We give NND results for observed, mock and random sample, and discuss the differences. We find that the observed sample gives us a significantly stronger aggregation characteristic than the random samples. Moreover, we investigate the direction of NND and find that the direction has close relation with the size of the NN…
▽ More
We present the Nearest Neighbor Distance (NND) analysis of SDSS DR5 galaxies. We give NND results for observed, mock and random sample, and discuss the differences. We find that the observed sample gives us a significantly stronger aggregation characteristic than the random samples. Moreover, we investigate the direction of NND and find that the direction has close relation with the size of the NND for the observed sample.
△ Less
Submitted 7 December, 2012;
originally announced December 2012.
-
Three-Dimensional Filamentation Analysis of SDSS DR5 Survey
Authors:
Yongfeng Wu,
David J. Batuski,
Andre Khalil
Abstract:
We introduce a new method to calculate the multi-scale 3D filamentation of SDSS DR5 galaxy clusters and also applied it to N-body simulations. We compared the filamentation of the observed vs. mock samples in metric space on scales from 8 Mpc to 30 Mpc. Mock samples are closer to the observed sample than random samples, and one of the mock samples behaves better than another one. We also find that…
▽ More
We introduce a new method to calculate the multi-scale 3D filamentation of SDSS DR5 galaxy clusters and also applied it to N-body simulations. We compared the filamentation of the observed vs. mock samples in metric space on scales from 8 Mpc to 30 Mpc. Mock samples are closer to the observed sample than random samples, and one of the mock samples behaves better than another one. We also find that the observed sample has a large filamentation value at a scale of 10 Mpc, which is not found from either mock samples or random samples. Key words: filamentation, metric space, galaxy clusters, SDSS DR5.
△ Less
Submitted 20 September, 2012;
originally announced September 2012.