-
Five-Lee-weight linear codes over $\mathbb{F}_{q}+u\mathbb{F}_{q}$
Authors:
Dr. Pavan Kumar,
Dr. Noor Mohammad Khan
Abstract:
In this study, linear codes having their Lee-weight distributions over the semi-local ring $\mathbb{F}_{q}+u\mathbb{F}_{q}$ with $u^{2}=1$ are constructed using the defining set and Gauss sums for an odd prime $q $. Moreover, we derive complete Hamming-weight enumerators for the images of the constructed linear codes under the Gray map. We finally show an application to secret sharing schemes.
In this study, linear codes having their Lee-weight distributions over the semi-local ring $\mathbb{F}_{q}+u\mathbb{F}_{q}$ with $u^{2}=1$ are constructed using the defining set and Gauss sums for an odd prime $q $. Moreover, we derive complete Hamming-weight enumerators for the images of the constructed linear codes under the Gray map. We finally show an application to secret sharing schemes.
△ Less
Submitted 26 June, 2024;
originally announced June 2024.
-
MidSurfer: A Parameter-Free Approach for Mid-Surface Extraction from Segmented Volumetric Data
Authors:
Eva Boneš,
Dawar Khan,
Ciril Bohak,
Benjamin A. Barad,
Danielle A. Grotjahn,
Ivan Viola,
Thomas Theußl
Abstract:
In the field of volumetric data processing and analysis, extracting mid-surfaces from thinly bounded compartments is crucial for tasks such as surface area estimation and accurate modeling of biological structures, yet it has lacked a standardized approach. To bridge this gap, we introduce MidSurfer--a novel parameter-free method for extracting mid-surfaces from segmented volumetric data. Our meth…
▽ More
In the field of volumetric data processing and analysis, extracting mid-surfaces from thinly bounded compartments is crucial for tasks such as surface area estimation and accurate modeling of biological structures, yet it has lacked a standardized approach. To bridge this gap, we introduce MidSurfer--a novel parameter-free method for extracting mid-surfaces from segmented volumetric data. Our method produces smooth, uniformly triangulated meshes that accurately capture the structural features of interest. The process begins with the Ridge Field Transformation step that transforms the segmented input data, followed by the Mid-Polyline Extraction Algorithm that works on individual volume slices. Based on the connectivity of components, this step can result in either single or multiple polyline segments that represent the structural features. These segments form a coherent series across the volume, creating a backbone of regularly distributed points on each slice that represents the mid-surface. Subsequently, we employ a Polyline Zipper Algorithm for triangulation that connects these polyline segments across neighboring slices, yielding a detailed triangulated mid-surface mesh. Our findings demonstrate that this method surpasses previous techniques in versatility, simplicity of use, and accuracy. Our approach is now publicly available as a plugin for ParaView, a widely-used multi-platform tool for data analysis and visualization, and can be found at https://github.com/kaust-vislab/MidSurfer .
△ Less
Submitted 7 April, 2024;
originally announced May 2024.
-
PitVQA: Image-grounded Text Embedding LLM for Visual Question Answering in Pituitary Surgery
Authors:
Runlong He,
Mengya Xu,
Adrito Das,
Danyal Z. Khan,
Sophia Bano,
Hani J. Marcus,
Danail Stoyanov,
Matthew J. Clarkson,
Mobarakol Islam
Abstract:
Visual Question Answering (VQA) within the surgical domain, utilizing Large Language Models (LLMs), offers a distinct opportunity to improve intra-operative decision-making and facilitate intuitive surgeon-AI interaction. However, the development of LLMs for surgical VQA is hindered by the scarcity of diverse and extensive datasets with complex reasoning tasks. Moreover, contextual fusion of the i…
▽ More
Visual Question Answering (VQA) within the surgical domain, utilizing Large Language Models (LLMs), offers a distinct opportunity to improve intra-operative decision-making and facilitate intuitive surgeon-AI interaction. However, the development of LLMs for surgical VQA is hindered by the scarcity of diverse and extensive datasets with complex reasoning tasks. Moreover, contextual fusion of the image and text modalities remains an open research challenge due to the inherent differences between these two types of information and the complexity involved in aligning them. This paper introduces PitVQA, a novel dataset specifically designed for VQA in endonasal pituitary surgery and PitVQA-Net, an adaptation of the GPT2 with a novel image-grounded text embedding for surgical VQA. PitVQA comprises 25 procedural videos and a rich collection of question-answer pairs spanning crucial surgical aspects such as phase and step recognition, context understanding, tool detection and localization, and tool-tissue interactions. PitVQA-Net consists of a novel image-grounded text embedding that projects image and text features into a shared embedding space and GPT2 Backbone with an excitation block classification head to generate contextually relevant answers within the complex domain of endonasal pituitary surgery. Our image-grounded text embedding leverages joint embedding, cross-attention and contextual representation to understand the contextual relationship between questions and surgical images. We demonstrate the effectiveness of PitVQA-Net on both the PitVQA and the publicly available EndoVis18-VQA dataset, achieving improvements in balanced accuracy of 8% and 9% over the most recent baselines, respectively. Our code and dataset is available at https://github.com/mobarakol/PitVQA.
△ Less
Submitted 22 May, 2024;
originally announced May 2024.
-
Towards comprehensive coverage of chemical space: Quantum mechanical properties of 836k constitutional and conformational closed shell neutral isomers consisting of HCNOFSiPSClBr
Authors:
Danish Khan,
Anouar Benali,
Scott Y. H. Kim,
Guido Falk von Rudorff,
O. Anatole von Lilienfeld
Abstract:
The Vector-QM24 (VQM24) dataset attempts to more comprehensively cover all possible neutral closed shell small organic and inorganic molecules and their conformers at state of the art level of theory. We have used density functional theory ($ω$B97X-D3/cc-pVDZ) to optimize 577k conformational isomers corresponding to 258k constitutional isomers.Isomers included contain up to five heavy atoms (non-h…
▽ More
The Vector-QM24 (VQM24) dataset attempts to more comprehensively cover all possible neutral closed shell small organic and inorganic molecules and their conformers at state of the art level of theory. We have used density functional theory ($ω$B97X-D3/cc-pVDZ) to optimize 577k conformational isomers corresponding to 258k constitutional isomers.Isomers included contain up to five heavy atoms (non-hydrogen) consisting of $p$-block elements C, N, O, F, Si, P, S, Cl, Br. Single point diffusion quantum Monte Carlo (DMC@PBE0(ccECP/cc-pVQZ)) energies are reported for the sub-set of the lowest conformers of 10,793 molecules with up to 4 heavy atoms.This dataset has been systematically generated by considering all combinatorially possible stoichiometries, and graphs (according to Lewis rules as implemented in the {\tt SURGE} package), along with all stable conformers identified by GFN2-xTB. Apart from graphs, geometries, rotational constants, and vibrational normal modes, VQM24 includes internal, atomization, electron-electron repulsion, exchange correlation, dispersion, vibrational frequency, Gibbs free, enthalpy, ZPV, molecular orbital energies; as well as entropy, and heat capacities. Electronic properties include multipole moments (dipole, quadrupole, octupole, hexadecapole), electrostatic potentials at nuclei (alchemical potential), Mulliken charges, and molecular wavefunctions. VQM24 represents a highly accurate and unbiased dataset of molecules, ideal for testing and training transferable, scalable, and generative ML models of real quantum systems.
△ Less
Submitted 13 May, 2024; v1 submitted 9 May, 2024;
originally announced May 2024.
-
Adaptive atomic basis sets
Authors:
Danish Khan,
Maximilian L. Ach,
O. Anatole von Lilienfeld
Abstract:
Atomic basis sets are widely employed within quantum mechanics based simulations of matter. We introduce a machine learning model that adapts the basis set to the local chemical environment of each atom, prior to the start of self consistent field (SCF) calculations. In particular, as a proof of principle and because of their historic popularity, we have studied the Gaussian type orbitals from the…
▽ More
Atomic basis sets are widely employed within quantum mechanics based simulations of matter. We introduce a machine learning model that adapts the basis set to the local chemical environment of each atom, prior to the start of self consistent field (SCF) calculations. In particular, as a proof of principle and because of their historic popularity, we have studied the Gaussian type orbitals from the Pople basis set, i.e. the STO-3G, 3-21G, 6-31G and 6-31G*. We adapt the basis by scaling the variance of the radial Gaussian functions leading to contraction or expansion of the atomic orbitals.A data set of optimal scaling factors for C, H, O, N and F were obtained by variational minimization of the Hartree-Fock (HF) energy of the smallest 2500 organic molecules from the QM9 database. Kernel ridge regression based machine learning (ML) prediction errors of the change in scaling decay rapidly with training set size, typically reaching less than 1 % for training set size 2000. Overall, we find systematically lower variance, and consequently the larger training efficiencies, when going from hydrogen to carbon to nitrogen to oxygen. Using the scaled basis functions obtained from the ML model, we conducted HF calculations for the subsequent 30'000 molecules in QM9. In comparison to the corresponding default Pople basis set results we observed improved energetics in up to 99 % of all cases. With respect to the larger basis set 6-311G(2df,2pd), atomization energy errors are lowered on average by ~31, 107, 11, and 11 kcal/mol for STO-3G, 3-21G, 6-31G and 6-31G*, respectively -- with negligible computational overhead. We illustrate the high transferability of adaptive basis sets for larger out-of-domain molecules relevant to addiction, diabetes, pain, aging.
△ Less
Submitted 25 April, 2024;
originally announced April 2024.
-
DiffFit: Visually-Guided Differentiable Fitting of Molecule Structures to a Cryo-EM Map
Authors:
Deng Luo,
Zainab Alsuwaykit,
Dawar Khan,
Ondřej Strnad,
Tobias Isenberg,
Ivan Viola
Abstract:
We introduce DiffFit, a differentiable algorithm for fitting protein atomistic structures into experimental reconstructed Cryo-Electron Microscopy (cryo-EM) volume map. This process is essential in structural biology to semi-automatically reconstruct large meso-scale models of complex protein assemblies and complete cellular structures that are based on measured cryo-EM data. Current approaches re…
▽ More
We introduce DiffFit, a differentiable algorithm for fitting protein atomistic structures into experimental reconstructed Cryo-Electron Microscopy (cryo-EM) volume map. This process is essential in structural biology to semi-automatically reconstruct large meso-scale models of complex protein assemblies and complete cellular structures that are based on measured cryo-EM data. Current approaches require manual fitting in 3D that already results in approximately aligned structures followed by an automated fine-tuning of the alignment. With our DiffFit approach, we enable domain scientists to automatically fit new structures and visualize the fitting results for inspection and interactive revision. Our fitting begins with differentiable 3D rigid transformations of the protein atom coordinates, followed by sampling the density values at its atom coordinates from the target cryo-EM volume. To ensure a meaningful correlation between the sampled densities and the protein structure, we propose a novel loss function based on a multi-resolution volume-array approach and the exploitation of the negative space. Such loss function serves as a critical metric for assessing the fitting quality, ensuring both fitting accuracy and improved visualization of the results. We assessed the placement quality of DiffFit with several large, realistic datasets and found its quality to be superior to that of previous methods. We further evaluated our method in two use cases. First, we demonstrate its use in the process of automating the integration of known composite structures into larger protein complexes. Second, we show that it facilitates the fitting of predicted protein domains into volume densities to aid researchers in the identification of unknown proteins. We open-sourced (github.com/nanovis/DiffFitViewer) DiffFit as a plugin in ChimeraX. All supplemental materials are available at osf.io/5tx4q.
△ Less
Submitted 3 July, 2024; v1 submitted 3 April, 2024;
originally announced April 2024.
-
Adaptive hybrid density functionals
Authors:
Danish Khan,
Alastair James Arthur Price,
Maximilian L. Ach,
O. Anatole von Lilienfeld
Abstract:
Exact exchange contributions are known to crucially affect electronic states, which in turn govern covalent bond formation and breaking in chemical species. Empirically averaging the exact exchange admixture over compositional degrees of freedom, hybrid density functional approximations have been widely successful, yet have fallen short to reach high level quantum chemistry accuracy, primarily due…
▽ More
Exact exchange contributions are known to crucially affect electronic states, which in turn govern covalent bond formation and breaking in chemical species. Empirically averaging the exact exchange admixture over compositional degrees of freedom, hybrid density functional approximations have been widely successful, yet have fallen short to reach high level quantum chemistry accuracy, primarily due to delocalization errors. We propose to `adaptify` hybrid functionals by generating optimal admixture ratios of exact exchange on the fly, i.e. specifically for any chemical compound, using extremely data efficient quantum machine learning models that carry negligible overhead. The adaptive Perdew-Burke-Ernzerhof based hybrid density functional (aPBE0) is shown to yield atomization energies with sufficient accuracy to effectively cure the infamous spin gap problem in open shell systems, such as carbenes. aPBE0 further improves energetics, electron densities, and HOMO-LUMO gaps in organic molecules drawn from the QM9 and QM7b data set. Obtained with aPBE0 in a large basis, we present a revision of the entire QM9 data set (revQM9) with an estimated quality vastly superior to the original containing on average, stronger covalent binding, larger band-gaps, more localized electron densities, and larger dipole-moments. While aPBE0 is applicable in the equilibrium regime, outstanding limitations include covalent bond dissociation when going beyond the Coulson-Fisher point.
△ Less
Submitted 10 April, 2024; v1 submitted 22 February, 2024;
originally announced February 2024.
-
The Uli Dataset: An Exercise in Experience Led Annotation of oGBV
Authors:
Arnav Arora,
Maha **adoss,
Cheshta Arora,
Denny George,
Brindaalakshmi,
Haseena Dawood Khan,
Kirti Rawat,
Div,
Ritash,
Seema Mathur,
Shivani Yadav,
Shehla Rashid Shora,
Rie Raut,
Sumit Pawar,
Apurva Paithane,
Sonia,
Vivek,
Dharini Priscilla,
Khairunnisha,
Grace Banu,
Ambika Tandon,
Rishav Thakker,
Rahul Dev Korra,
Aatman Vaidya,
Tarunima Prabhakar
Abstract:
Online gender based violence has grown concomitantly with adoption of the internet and social media. Its effects are worse in the Global majority where many users use social media in languages other than English. The scale and volume of conversations on the internet has necessitated the need for automated detection of hate speech, and more specifically gendered abuse. There is, however, a lack of…
▽ More
Online gender based violence has grown concomitantly with adoption of the internet and social media. Its effects are worse in the Global majority where many users use social media in languages other than English. The scale and volume of conversations on the internet has necessitated the need for automated detection of hate speech, and more specifically gendered abuse. There is, however, a lack of language specific and contextual data to build such automated tools. In this paper we present a dataset on gendered abuse in three languages- Hindi, Tamil and Indian English. The dataset comprises of tweets annotated along three questions pertaining to the experience of gender abuse, by experts who identify as women or a member of the LGBTQIA community in South Asia. Through this dataset we demonstrate a participatory approach to creating datasets that drive AI systems.
△ Less
Submitted 24 June, 2024; v1 submitted 15 November, 2023;
originally announced November 2023.
-
Reducing Training Data Needs with Minimal Multilevel Machine Learning (M3L)
Authors:
Stefan Heinen,
Danish Khan,
Guido Falk von Rudorff,
Konstantin Karandashev,
Daniel Jose Arismendi Arrieta,
Alastair J. A. Price,
Surajit Nandi,
Arghya Bhowmik,
Kersti Hermansson,
O. Anatole von Lilienfeld
Abstract:
For many machine learning applications in science, data acquisition, not training, is the bottleneck even when avoiding experiments and relying on computation and simulation. Correspondingly, and in order to reduce cost and carbon footprint, training data efficiency is key. We introduce minimal multilevel machine learning (M3L) which optimizes training data set sizes using a loss function at multi…
▽ More
For many machine learning applications in science, data acquisition, not training, is the bottleneck even when avoiding experiments and relying on computation and simulation. Correspondingly, and in order to reduce cost and carbon footprint, training data efficiency is key. We introduce minimal multilevel machine learning (M3L) which optimizes training data set sizes using a loss function at multiple levels of reference data in order to minimize a combination of prediction error with overall training data acquisition costs (as measured by computational wall-times). Numerical evidence has been obtained for calculated atomization energies and electron affinities of thousands of organic molecules at various levels of theory including HF, MP2, DLPNO-CCSD(T), DFHFCABS, PNOMP2F12, and PNOCCSD(T)F12, and treating tens with basis sets TZ, cc-pVTZ, and AVTZ-F12. Our M3L benchmarks for reaching chemical accuracy in distinct chemical compound sub-spaces indicate substantial computational cost reductions by factors of $\sim$ 1.01, 1.1, 3.8, 13.8 and 25.8 when compared to heuristic sub-optimal multilevel machine learning (M2L) for the data sets QM7b, QM9$^\mathrm{LCCSD(T)}$, EGP, QM9$^\mathrm{CCSD(T)}_\mathrm{AE}$, and QM9$^\mathrm{CCSD(T)}_\mathrm{EA}$, respectively. Furthermore, we use M2L to investigate the performance for 76 density functionals when used within multilevel learning and building on the following levels drawn from the hierarchy of Jacobs Ladder:~LDA, GGA, mGGA, and hybrid functionals. Within M2L and the molecules considered, mGGAs do not provide any noticeable advantage over GGAs. Among the functionals considered and in combination with LDA, the three on average top performing GGA and Hybrid levels for atomization energies on QM9 using M3L correspond respectively to PW91, KT2, B97D, and $τ$-HCTH, B3LYP$\ast$(VWN5), TPSSH.
△ Less
Submitted 22 August, 2023;
originally announced August 2023.
-
Autonomous data extraction from peer reviewed literature for training machine learning models of oxidation potentials
Authors:
Siwoo Lee,
Stefan Heinen,
Danish Khan,
O. Anatole von Lilienfeld
Abstract:
We present an automated data-collection pipeline involving a convolutional neural network and a large language model to extract user-specified tabular data from peer-reviewed literature. The pipeline is applied to 74 reports published between 1957 and 2014 with experimentally-measured oxidation potentials for 592 organic molecules (-0.75 to 3.58 V). After data curation (solvents, reference electro…
▽ More
We present an automated data-collection pipeline involving a convolutional neural network and a large language model to extract user-specified tabular data from peer-reviewed literature. The pipeline is applied to 74 reports published between 1957 and 2014 with experimentally-measured oxidation potentials for 592 organic molecules (-0.75 to 3.58 V). After data curation (solvents, reference electrodes, and missed data points), we trained multiple supervised machine learning models reaching prediction errors similar to experimental uncertainty ($\sim$0.2 V). For experimental measurements of identical molecules reported in multiple studies, we identified the most likely value based on out-of-sample machine learning predictions. Using the trained machine learning models, we then estimated oxidation potentials of $\sim$132k small organic molecules from the QM9 data set, with predicted values spanning 0.21 to 3.46 V. Analysis of the QM9 predictions in terms of plausible descriptor-property trends suggests that aliphaticity increases the oxidation potential of an organic molecule on average from $\sim$1.5 V to $\sim$2 V, while an increase in number of heavy atoms lowers it systematically. The pipeline introduced offers significant reductions in human labor otherwise required for conventional manual data collection of experimental results, and exemplifies how to accelerate scientific research through automation.
△ Less
Submitted 1 August, 2023;
originally announced August 2023.
-
Code-Switched Urdu ASR for Noisy Telephonic Environment using Data Centric Approach with Hybrid HMM and CNN-TDNN
Authors:
Muhammad Danyal Khan,
Raheem Ali,
Arshad Aziz
Abstract:
Call Centers have huge amount of audio data which can be used for achieving valuable business insights and transcription of phone calls is manually tedious task. An effective Automated Speech Recognition system can accurately transcribe these calls for easy search through call history for specific context and content allowing automatic call monitoring, improving QoS through keyword search and sent…
▽ More
Call Centers have huge amount of audio data which can be used for achieving valuable business insights and transcription of phone calls is manually tedious task. An effective Automated Speech Recognition system can accurately transcribe these calls for easy search through call history for specific context and content allowing automatic call monitoring, improving QoS through keyword search and sentiment analysis. ASR for Call Center requires more robustness as telephonic environment are generally noisy. Moreover, there are many low-resourced languages that are on verge of extinction which can be preserved with help of Automatic Speech Recognition Technology. Urdu is the $10^{th}$ most widely spoken language in the world, with 231,295,440 worldwide still remains a resource constrained language in ASR. Regional call-center conversations operate in local language, with a mix of English numbers and technical terms generally causing a "code-switching" problem. Hence, this paper describes an implementation framework of a resource efficient Automatic Speech Recognition/ Speech to Text System in a noisy call-center environment using Chain Hybrid HMM and CNN-TDNN for Code-Switched Urdu Language. Using Hybrid HMM-DNN approach allowed us to utilize the advantages of Neural Network with less labelled data. Adding CNN with TDNN has shown to work better in noisy environment due to CNN's additional frequency dimension which captures extra information from noisy speech, thus improving accuracy. We collected data from various open sources and labelled some of the unlabelled data after analysing its general context and content from Urdu language as well as from commonly used words from other languages, primarily English and were able to achieve WER of 5.2% with noisy as well as clean environment in isolated words or numbers as well as in continuous spontaneous speech.
△ Less
Submitted 24 July, 2023;
originally announced July 2023.
-
Dr. KID: Direct Remeshing and K-set Isometric Decomposition for Scalable Physicalization of Organic Shapes
Authors:
Dawar Khan,
Ciril Bohak,
Ivan Viola
Abstract:
Dr. KID is an algorithm that uses isometric decomposition for the physicalization of potato-shaped organic models in a puzzle fashion. The algorithm begins with creating a simple, regular triangular surface mesh of organic shapes, followed by iterative k-means clustering and remeshing. For clustering, we need similarity between triangles (segments) which is defined as a distance function. The dist…
▽ More
Dr. KID is an algorithm that uses isometric decomposition for the physicalization of potato-shaped organic models in a puzzle fashion. The algorithm begins with creating a simple, regular triangular surface mesh of organic shapes, followed by iterative k-means clustering and remeshing. For clustering, we need similarity between triangles (segments) which is defined as a distance function. The distance function maps each triangle's shape to a single point in the virtual 3D space. Thus, the distance between the triangles indicates their degree of dissimilarity. K-means clustering uses this distance and sorts of segments into k classes. After this, remeshing is applied to minimize the distance between triangles within the same cluster by making their shapes identical. Clustering and remeshing are repeated until the distance between triangles in the same cluster reaches an acceptable threshold. We adopt a curvature-aware strategy to determine the surface thickness and finalize puzzle pieces for 3D printing. Identical hinges and holes are created for assembling the puzzle components. For smoother outcomes, we use triangle subdivision along with curvature-aware clustering, generating curved triangular patches for 3D printing. Our algorithm was evaluated using various models, and the 3D-printed results were analyzed. Findings indicate that our algorithm performs reliably on target organic shapes with minimal loss of input geometry.
△ Less
Submitted 24 July, 2023; v1 submitted 6 April, 2023;
originally announced April 2023.
-
Kernel based quantum machine learning at record rate : Many-body distribution functionals as compact representations
Authors:
Danish Khan,
Stefan Heinen,
O. Anatole von Lilienfeld
Abstract:
The feature vector map** used to represent chemical systems is a key factor governing the superior data-efficiency of kernel based quantum machine learning (QML) models applicable throughout chemical compound space. Unfortunately, the most accurate representations require a high dimensional feature map**, thereby imposing a considerable computational burden on model training and use. We introd…
▽ More
The feature vector map** used to represent chemical systems is a key factor governing the superior data-efficiency of kernel based quantum machine learning (QML) models applicable throughout chemical compound space. Unfortunately, the most accurate representations require a high dimensional feature map**, thereby imposing a considerable computational burden on model training and use. We introduce compact yet accurate, linear scaling QML representations based on atomic Gaussian many-body distribution functionals (MBDF), and their derivatives. Weighted density functions (DF) of MBDF values are used as global representations which are constant in size, i.e.~invariant with respect to the number of atoms. We report predictive performance and training data efficiency that is competitive with state of the art for two diverse datasets of organic molecules, QM9 and QMugs. Generalization capability has been investigated for atomization energies, HOMO-LUMO eigenvalues and gap, internal energies at 0 K, zero point vibrational energies, dipole moment norm, static isotropic polarizability, and heat capacity as encoded in QM9. MBDF based QM9 performance lowers the optimal Pareto front spanned between sampling and training cost to compute node minutes,~effectively sampling chemical compound space with chemical accuracy at a sampling rate of $\sim 48$ molecules per core second.
△ Less
Submitted 26 May, 2023; v1 submitted 28 March, 2023;
originally announced March 2023.
-
A Random Projection k Nearest Neighbours Ensemble for Classification via Extended Neighbourhood Rule
Authors:
Amjad Ali,
Muhammad Hamraz,
Dost Muhammad Khan,
Wajdan Deebani,
Zardad Khan
Abstract:
Ensembles based on k nearest neighbours (kNN) combine a large number of base learners, each constructed on a sample taken from a given training data. Typical kNN based ensembles determine the k closest observations in the training data bounded to a test sample point by a spherical region to predict its class. In this paper, a novel random projection extended neighbourhood rule (RPExNRule) ensemble…
▽ More
Ensembles based on k nearest neighbours (kNN) combine a large number of base learners, each constructed on a sample taken from a given training data. Typical kNN based ensembles determine the k closest observations in the training data bounded to a test sample point by a spherical region to predict its class. In this paper, a novel random projection extended neighbourhood rule (RPExNRule) ensemble is proposed where bootstrap samples from the given training data are randomly projected into lower dimensions for additional randomness in the base models and to preserve features information. It uses the extended neighbourhood rule (ExNRule) to fit kNN as base learners on randomly projected bootstrap samples.
△ Less
Submitted 21 March, 2023;
originally announced March 2023.
-
Optimal Extended Neighbourhood Rule $k$ Nearest Neighbours Ensemble
Authors:
Amjad Ali,
Zardad Khan,
Dost Muhammad Khan,
Saeed Aldahmani
Abstract:
The traditional k nearest neighbor (kNN) approach uses a distance formula within a spherical region to determine the k closest training observations to a test sample point. However, this approach may not work well when test point is located outside this region. Moreover, aggregating many base kNN learners can result in poor ensemble performance due to high classification errors. To address these i…
▽ More
The traditional k nearest neighbor (kNN) approach uses a distance formula within a spherical region to determine the k closest training observations to a test sample point. However, this approach may not work well when test point is located outside this region. Moreover, aggregating many base kNN learners can result in poor ensemble performance due to high classification errors. To address these issues, a new optimal extended neighborhood rule based ensemble method is proposed in this paper. This rule determines neighbors in k steps starting from the closest sample point to the unseen observation and selecting subsequent nearest data points until the required number of observations is reached. Each base model is constructed on a bootstrap sample with a random subset of features, and optimal models are selected based on out-of-bag performance after building a sufficient number of models. The proposed ensemble is compared with state-of-the-art methods on 17 benchmark datasets using accuracy, Cohen's kappa, and Brier score (BS). The performance of the proposed method is also assessed by adding contrived features in the original data.
△ Less
Submitted 15 February, 2024; v1 submitted 21 November, 2022;
originally announced November 2022.
-
A k nearest neighbours classifiers ensemble based on extended neighbourhood rule and features subsets
Authors:
Amjad Ali,
Muhammad Hamraz,
Naz Gul,
Dost Muhammad Khan,
Zardad Khan,
Saeed Aldahmani
Abstract:
kNN based ensemble methods minimise the effect of outliers by identifying a set of data points in the given feature space that are nearest to an unseen observation in order to predict its response by using majority voting. The ordinary ensembles based on kNN find out the k nearest observations in a region (bounded by a sphere) based on a predefined value of k. This scenario, however, might not wor…
▽ More
kNN based ensemble methods minimise the effect of outliers by identifying a set of data points in the given feature space that are nearest to an unseen observation in order to predict its response by using majority voting. The ordinary ensembles based on kNN find out the k nearest observations in a region (bounded by a sphere) based on a predefined value of k. This scenario, however, might not work in situations when the test observation follows the pattern of the closest data points with the same class that lie on a certain path not contained in the given sphere. This paper proposes a k nearest neighbour ensemble where the neighbours are determined in k steps. Starting from the first nearest observation of the test point, the algorithm identifies a single observation that is closest to the observation at the previous step. At each base learner in the ensemble, this search is extended to k steps on a random bootstrap sample with a random subset of features selected from the feature space. The final predicted class of the test point is determined by using a majority vote in the predicted classes given by all base models. This new ensemble method is applied on 17 benchmark datasets and compared with other classical methods, including kNN based models, in terms of classification accuracy, kappa and Brier score as performance metrics. Boxplots are also utilised to illustrate the difference in the results given by the proposed and other state-of-the-art methods. The proposed method outperformed the rest of the classical methods in the majority of cases. The paper gives a detailed simulation study for further assessment.
△ Less
Submitted 30 May, 2022;
originally announced May 2022.
-
Taking sides: Public Opinion over the Israel-Palestine Conflict in 2021
Authors:
Arsal Imtiaz,
Danish Khan,
Hanjia Lyu,
Jiebo Luo
Abstract:
The Israel-Palestine Conflict, one of the most enduring conflicts in history, dates back to the start of 20th century, with the establishment of the British Mandate in Palestine and has deeply rooted complex issues in politics, demography, religion, and other aspects, making it harder to attain resolve. To understand the conflict in 2021, we devise an observational study to aggregate stance held b…
▽ More
The Israel-Palestine Conflict, one of the most enduring conflicts in history, dates back to the start of 20th century, with the establishment of the British Mandate in Palestine and has deeply rooted complex issues in politics, demography, religion, and other aspects, making it harder to attain resolve. To understand the conflict in 2021, we devise an observational study to aggregate stance held by English-speaking countries. We collect Twitter data using popular hashtags around and specific to the conflict portraying opinions neutral or partial to the two parties. We use different tools and methods to classify tweets into pro-Palestinian, pro-Israel, or neutral. This paper further describes the implementation of data mining methodologies to obtain insights and reason the stance held by citizens around the conflict.
△ Less
Submitted 23 July, 2022; v1 submitted 15 January, 2022;
originally announced January 2022.
-
Model-Based Framework for exploiting sensors of IoT devices using a Botnet: A case study with Android
Authors:
Zubair Khaliq,
Dawood Ashraf Khan,
Asif Iqbal Baba,
Shahbaz Ali,
Sheikh Umar Farooq
Abstract:
Botnets have become a serious security threat not only to the Internet but also to the devices connected to it. Factors like the exponential growth of IoT, the COVID-19 pandemic that's swee** the planet, and the ever-larger number of cyber-criminals who now have access to or have developed increasingly more sophisticated tools are incentivizing the growth of botnets in this domain. The recent ou…
▽ More
Botnets have become a serious security threat not only to the Internet but also to the devices connected to it. Factors like the exponential growth of IoT, the COVID-19 pandemic that's swee** the planet, and the ever-larger number of cyber-criminals who now have access to or have developed increasingly more sophisticated tools are incentivizing the growth of botnets in this domain. The recent outbreak of botnets like Dark Nexus (derived from Qbot and Mirai), Mukashi, LeetHozer, Hoaxcalls, etc. shows the alarming rate at which this threat is converging. The botnets have attributes that make them an excellent platform for malicious activities in IoT devices. These IoT devices are used by organizations that need to both innovate and safeguard the personal and confidential data of their customers, employees, and business partners. The IoT devices have built-in sensors or actuators which can be exploited to monitor or control the physical environment of the entities connected to them thereby violating the fundamental concept of privacy-by-design of these devices. In this paper, we design and describe a modular botnet framework for IoT. Our framework is communication channel independent because it utilizes various available communication channels for command and control of an IoT device. The framework uses an enhanced centralized architecture associated with a novel Domain Fluxing Technique. The proposed framework will provide insights into how privacy in IoT devices can be incorporated at design time to check the sensors and actuators in these devices against malicious exploitation consequently preserving privacy. This paper includes design considerations, command and control structures, characteristics, capabilities, intrusion, and other related work. Furthermore, proof of concept Botnet is implemented and explained using the developed framework.
△ Less
Submitted 14 January, 2022;
originally announced January 2022.
-
Artificial Intelligence in Software Testing : Impact, Problems, Challenges and Prospect
Authors:
Zubair Khaliq,
Sheikh Umar Farooq,
Dawood Ashraf Khan
Abstract:
Artificial Intelligence (AI) is making a significant impact in multiple areas like medical, military, industrial, domestic, law, arts as AI is capable to perform several roles such as managing smart factories, driving autonomous vehicles, creating accurate weather forecasts, detecting cancer and personal assistants, etc. Software testing is the process of putting the software to test for some abno…
▽ More
Artificial Intelligence (AI) is making a significant impact in multiple areas like medical, military, industrial, domestic, law, arts as AI is capable to perform several roles such as managing smart factories, driving autonomous vehicles, creating accurate weather forecasts, detecting cancer and personal assistants, etc. Software testing is the process of putting the software to test for some abnormal behaviour of the software. Software testing is a tedious, laborious and most time-consuming process. Automation tools have been developed that help to automate some activities of the testing process to enhance quality and timely delivery. Over time with the inclusion of continuous integration and continuous delivery (CI/CD) pipeline, automation tools are becoming less effective. The testing community is turning to AI to fill the gap as AI is able to check the code for bugs and errors without any human intervention and in a much faster way than humans. In this study, we aim to recognize the impact of AI technologies on various software testing activities or facets in the STLC. Further, the study aims to recognize and explain some of the biggest challenges software testers face while applying AI to testing. The paper also proposes some key contributions of AI in the future to the domain of software testing.
△ Less
Submitted 14 January, 2022;
originally announced January 2022.
-
Performance Evaluation of Ad Hoc Multicast Routing Protocols to Facilitate Video Streaming in VANETS
Authors:
Muhammad Danish Khan,
Arshad Shaikh
Abstract:
Vehicular Ad Hoc Network (VANET) is a type of mobile ad hoc network (MANET) that facilitates communication among vehicles. VANET provides inter-vehicular communications to serve for the application like road traffic safety and traffic efficiency. Infotainment service has been an anticipating trend in VANETs, and video streaming has a high potential in VANET. Although, this emerging technology is t…
▽ More
Vehicular Ad Hoc Network (VANET) is a type of mobile ad hoc network (MANET) that facilitates communication among vehicles. VANET provides inter-vehicular communications to serve for the application like road traffic safety and traffic efficiency. Infotainment service has been an anticipating trend in VANETs, and video streaming has a high potential in VANET. Although, this emerging technology is trending, there are still some issues like QoS provisions, decentralized medium access control, node coverage area, and finding and maintaining routes due to highly dynamic topology. These issues make multicast communication difficult in VANETs. Numerous routing protocols and routing strategies have been projected to cope with these issues. Lots of work has taken place to assess and measure the performances of these protocols in VANETs but these protocols are rarely analyzed for performance under stress of real time video multicast. In this study two different multicast routing protocols viz. Multicast Ad hoc On Demand Distance Vector (MAODV) and Protocol for Unified Multicasting through Announcements (PUMA) are evaluated for facilitating video streaming in VANETS. The protocols are examined against the QoS parameters such as Network Throughput, Packet Delivery Ratio (PDR), Average end to end Delay, and Normalized Routing Load (NRL). Variable Bit Rate (VBR) traffic is used to evaluate the performances of protocol. PUMA, at the end, showed better performance against different QoS provisions in different scenarios
△ Less
Submitted 29 August, 2021;
originally announced August 2021.
-
VisDrone-CC2020: The Vision Meets Drone Crowd Counting Challenge Results
Authors:
Dawei Du,
Longyin Wen,
Pengfei Zhu,
Heng Fan,
Qinghua Hu,
Haibin Ling,
Mubarak Shah,
Junwen Pan,
Ali Al-Ali,
Amr Mohamed,
Bakour Imene,
Bin Dong,
Binyu Zhang,
Bouchali Hadia Nesma,
Chenfeng Xu,
Chenzhen Duan,
Ciro Castiello,
Corrado Mencar,
Dingkang Liang,
Florian Krüger,
Gennaro Vessio,
Giovanna Castellano,
Jieru Wang,
Junyu Gao,
Khalid Abualsaud
, et al. (30 additional authors not shown)
Abstract:
Crowd counting on the drone platform is an interesting topic in computer vision, which brings new challenges such as small object inference, background clutter and wide viewpoint. However, there are few algorithms focusing on crowd counting on the drone-captured data due to the lack of comprehensive datasets. To this end, we collect a large-scale dataset and organize the Vision Meets Drone Crowd C…
▽ More
Crowd counting on the drone platform is an interesting topic in computer vision, which brings new challenges such as small object inference, background clutter and wide viewpoint. However, there are few algorithms focusing on crowd counting on the drone-captured data due to the lack of comprehensive datasets. To this end, we collect a large-scale dataset and organize the Vision Meets Drone Crowd Counting Challenge (VisDrone-CC2020) in conjunction with the 16th European Conference on Computer Vision (ECCV 2020) to promote the developments in the related fields. The collected dataset is formed by $3,360$ images, including $2,460$ images for training, and $900$ images for testing. Specifically, we manually annotate persons with points in each video frame. There are $14$ algorithms from $15$ institutes submitted to the VisDrone-CC2020 Challenge. We provide a detailed analysis of the evaluation results and conclude the challenge. More information can be found at the website: \url{http://www.aiskyeye.com/}.
△ Less
Submitted 19 July, 2021;
originally announced July 2021.
-
Braille to Text Translation for Bengali Language: A Geometric Approach
Authors:
Minhas Kamal,
Dr. Amin Ahsan Ali,
Dr. Muhammad Asif Hossain Khan,
Dr. Mohammad Shoyaib
Abstract:
Braille is the only system to visually impaired people for reading and writing. However, general people cannot read Braille. So, teachers and relatives find it hard to assist them with learning. Almost every major language has software solutions for this translation purpose. However, in Bengali there is an absence of this useful tool. Here, we propose Braille to Text Translator, which takes image…
▽ More
Braille is the only system to visually impaired people for reading and writing. However, general people cannot read Braille. So, teachers and relatives find it hard to assist them with learning. Almost every major language has software solutions for this translation purpose. However, in Bengali there is an absence of this useful tool. Here, we propose Braille to Text Translator, which takes image of these tactile alphabets, and translates them to plain text. Image deterioration, scan-time page rotation, and braille dot deformation are the principal issues in this scheme. All of these challenges are directly checked using special image processing and geometric structure analysis. The technique yields 97.25% accuracy in recognizing Braille characters.
△ Less
Submitted 2 December, 2020;
originally announced December 2020.
-
MolDesigner: Interactive Design of Efficacious Drugs with Deep Learning
Authors:
Kexin Huang,
Tianfan Fu,
Dawood Khan,
Ali Abid,
Ali Abdalla,
Abubakar Abid,
Lucas M. Glass,
Marinka Zitnik,
Cao Xiao,
Jimeng Sun
Abstract:
The efficacy of a drug depends on its binding affinity to the therapeutic target and pharmacokinetics. Deep learning (DL) has demonstrated remarkable progress in predicting drug efficacy. We develop MolDesigner, a human-in-the-loop web user-interface (UI), to assist drug developers leverage DL predictions to design more effective drugs. A developer can draw a drug molecule in the interface. In the…
▽ More
The efficacy of a drug depends on its binding affinity to the therapeutic target and pharmacokinetics. Deep learning (DL) has demonstrated remarkable progress in predicting drug efficacy. We develop MolDesigner, a human-in-the-loop web user-interface (UI), to assist drug developers leverage DL predictions to design more effective drugs. A developer can draw a drug molecule in the interface. In the backend, more than 17 state-of-the-art DL models generate predictions on important indices that are crucial for a drug's efficacy. Based on these predictions, drug developers can edit the drug molecule and reiterate until satisfaction. MolDesigner can make predictions in real-time with a latency of less than a second.
△ Less
Submitted 5 October, 2020;
originally announced October 2020.
-
Toward an Abstract Model of Programmable Data Plane Devices
Authors:
Debobroto Das Robin,
Dr. Javed I. Khan
Abstract:
SDN divides the networking landscape into 2 parts: control and data plane. SDN expanded it's foot mark starting with OpenFlow based highly flexible control plane and rigid data plane. Innovation and improvement in hardware design and development is bringing various new architectures for data plane. Data plane is becoming more programmable then ever before. A common abstract model of data plane is…
▽ More
SDN divides the networking landscape into 2 parts: control and data plane. SDN expanded it's foot mark starting with OpenFlow based highly flexible control plane and rigid data plane. Innovation and improvement in hardware design and development is bringing various new architectures for data plane. Data plane is becoming more programmable then ever before. A common abstract model of data plane is required to develop complex application over these heterogeneous data plane devices. It can also provide insight about performance optimization and bench-marking of programmable data plane devices. Moreover, to understand and utilize data plane's programmability, a detailed structural analysis and an identifiable matrix to compare different devices are required. In this work, an improved and structured abstract model of the programmable data plane devices is presented and features of its components are discussed in detail. Several commercially available programmable data plane devices are also compared based on those features.
△ Less
Submitted 19 August, 2020;
originally announced August 2020.
-
Capillary rise in vuggy media
Authors:
Hasan J. Khan,
Ayaz Mehmani,
Maša Prodanović,
David DiCarlo,
Dayeed J. Khan
Abstract:
Carbonates are highly heterogeneous formations with large variations in pore size distribution and pore space topology, which results in complex multiphase flow behavior. Here we investigate the spontaneous imbibition behavior of fluids in vuggy carbonates. Glass beads of 1.0 mm diameter, with dissolvable inclusions, are sintered to form multiple configurations of heterogeneous vuggy core with var…
▽ More
Carbonates are highly heterogeneous formations with large variations in pore size distribution and pore space topology, which results in complex multiphase flow behavior. Here we investigate the spontaneous imbibition behavior of fluids in vuggy carbonates. Glass beads of 1.0 mm diameter, with dissolvable inclusions, are sintered to form multiple configurations of heterogeneous vuggy core with variations in matrix porosity, vug size, vug spatial location, and number of vugs. The core fabrication process is repeatable and allows the impact of vug textural properties to be investigated in a controlled manner.
Capillary rise experiments are conducted in these proxy vuggy carbonate core and compared with the homogeneous non-vuggy core as reference. Continuous optical imaging is performed to track the position of the air-water interface in the cores. To understand the change in capillary height in the presence of a vug, a volume-of-fluid two-phase numerical simulation is performed in a parallel set of connected and disconnected tubes. Finally x-ray tomography scans are performed to identify the shape of the air-water interface in a select few cores.
The results can be summarized as follows: disconnected vugs result in higher capillary rise compared to non-vuggy porous media. The vugs act as capillary barriers, diverting fluid flow to the adjacent connected channels, which ultimately results in a higher overall capillary rise.
The results of this work highlight that radius of spontaneous invasion of aqueous phases, such as fracture fluid and hazardous wastes, are affected by vug porosity but not their distribution.
△ Less
Submitted 26 June, 2020;
originally announced June 2020.
-
Event-Triggered Output Synchronization of Heterogeneous Nonlinear Multi-Agents
Authors:
Gulam Dastagir Khan,
Zhiyong Chen,
Yamin Yan
Abstract:
This paper addresses the output synchronization problem for heterogeneous nonlinear multi-agent systems with distributed event-based controllers. Employing the two-step synchronization process, we first outline the distributed event-triggered consensus controllers for linear reference models under a directed communication topology. It is further shown that the subsequent triggering instants are ba…
▽ More
This paper addresses the output synchronization problem for heterogeneous nonlinear multi-agent systems with distributed event-based controllers. Employing the two-step synchronization process, we first outline the distributed event-triggered consensus controllers for linear reference models under a directed communication topology. It is further shown that the subsequent triggering instants are based on intermittent communication. Secondly, by using certain input-to-state stability (ISS) property, we design an event-triggered perturbed output regulation controller for each nonlinear multi-agent. The ISS technique used in this paper is based on the milder condition that each agent has a certain ISS property from input (actuator) disturbance to state rather than measurement (sensor) disturbance to state. With the two-step design, the objective of output synchronization is successfully achieved with Zeno behavior avoided.
△ Less
Submitted 21 August, 2019;
originally announced August 2019.
-
Gradio: Hassle-Free Sharing and Testing of ML Models in the Wild
Authors:
Abubakar Abid,
Ali Abdalla,
Ali Abid,
Dawood Khan,
Abdulrahman Alfozan,
James Zou
Abstract:
Accessibility is a major challenge of machine learning (ML). Typical ML models are built by specialists and require specialized hardware/software as well as ML experience to validate. This makes it challenging for non-technical collaborators and endpoint users (e.g. physicians) to easily provide feedback on model development and to gain trust in ML. The accessibility challenge also makes collabora…
▽ More
Accessibility is a major challenge of machine learning (ML). Typical ML models are built by specialists and require specialized hardware/software as well as ML experience to validate. This makes it challenging for non-technical collaborators and endpoint users (e.g. physicians) to easily provide feedback on model development and to gain trust in ML. The accessibility challenge also makes collaboration more difficult and limits the ML researcher's exposure to realistic data and scenarios that occur in the wild. To improve accessibility and facilitate collaboration, we developed an open-source Python package, Gradio, which allows researchers to rapidly generate a visual interface for their ML models. Gradio makes accessing any ML model as easy as sharing a URL. Our development of Gradio is informed by interviews with a number of machine learning researchers who participate in interdisciplinary collaborations. Their feedback identified that Gradio should support a variety of interfaces and frameworks, allow for easy sharing of the interface, allow for input manipulation and interactive inference by the domain expert, as well as allow embedding the interface in iPython notebooks. We developed these features and carried out a case study to understand Gradio's usefulness and usability in the setting of a machine learning collaboration between a researcher and a cardiologist.
△ Less
Submitted 6 June, 2019;
originally announced June 2019.
-
A survey of advances in vision-based vehicle re-identification
Authors:
Sultan Daud Khan,
Habib Ullah
Abstract:
Vehicle re-identification (V-reID) has become significantly popular in the community due to its applications and research significance. In particular, the V-reID is an important problem that still faces numerous open challenges. This paper reviews different V-reID methods including sensor based methods, hybrid methods, and vision based methods which are further categorized into hand-crafted featur…
▽ More
Vehicle re-identification (V-reID) has become significantly popular in the community due to its applications and research significance. In particular, the V-reID is an important problem that still faces numerous open challenges. This paper reviews different V-reID methods including sensor based methods, hybrid methods, and vision based methods which are further categorized into hand-crafted feature based methods and deep feature based methods. The vision based methods make the V-reID problem particularly interesting, and our review systematically addresses and evaluates these methods for the first time. We conduct experiments on four comprehensive benchmark datasets and compare the performances of recent hand-crafted feature based methods and deep feature based methods. We present the detail analysis of these methods in terms of mean average precision (mAP) and cumulative matching curve (CMC). These analyses provide objective insight into the strengths and weaknesses of these methods. We also provide the details of different V-reID datasets and critically discuss the challenges and future trends of V-reID methods.
△ Less
Submitted 30 May, 2019;
originally announced May 2019.
-
Non-Determinism in Neural Networks for Adversarial Robustness
Authors:
Daanish Ali Khan,
Linhong Li,
Ninghao Sha,
Zhuoran Liu,
Abelino Jimenez,
Bhiksha Raj,
Rita Singh
Abstract:
Recent breakthroughs in the field of deep learning have led to advancements in a broad spectrum of tasks in computer vision, audio processing, natural language processing and other areas. In most instances where these tasks are deployed in real-world scenarios, the models used in them have been shown to be susceptible to adversarial attacks, making it imperative for us to address the challenge of…
▽ More
Recent breakthroughs in the field of deep learning have led to advancements in a broad spectrum of tasks in computer vision, audio processing, natural language processing and other areas. In most instances where these tasks are deployed in real-world scenarios, the models used in them have been shown to be susceptible to adversarial attacks, making it imperative for us to address the challenge of their adversarial robustness. Existing techniques for adversarial robustness fall into three broad categories: defensive distillation techniques, adversarial training techniques, and randomized or non-deterministic model based techniques. In this paper, we propose a novel neural network paradigm that falls under the category of randomized models for adversarial robustness, but differs from all existing techniques under this category in that it models each parameter of the network as a statistical distribution with learnable parameters. We show experimentally that this framework is highly robust to a variety of white-box and black-box adversarial attacks, while preserving the task-specific performance of the traditional neural network model.
△ Less
Submitted 26 May, 2019;
originally announced May 2019.
-
Towards a Crowd Analytic Framework For Crowd Management in Majid-al-Haram
Authors:
Sultan Daud Khan,
Muhammad Tayyab,
Muhammad Khurram Amin,
Akram Nour,
Anas Basalamah,
Saleh Basalamah,
Sohaib Ahmad Khan
Abstract:
The scared cities of Makkah Al Mukarramah and Madina Al Munawarah host millions of pilgrims every year. During Hajj, the movement of large number of people has a unique spatial and temporal constraints, which makes Hajj one of toughest challenges for crowd management. In this paper, we propose a computer vision based framework that automatically analyses video sequence and computes important measu…
▽ More
The scared cities of Makkah Al Mukarramah and Madina Al Munawarah host millions of pilgrims every year. During Hajj, the movement of large number of people has a unique spatial and temporal constraints, which makes Hajj one of toughest challenges for crowd management. In this paper, we propose a computer vision based framework that automatically analyses video sequence and computes important measurements which include estimation of crowd density, identification of dominant patterns, detection and localization of congestion. In addition, we analyze helpful statistics of the crowd like speed, and direction, that could provide support to crowd management personnel. The framework presented in this paper indicate that new advances in computer vision and machine learning can be leveraged effectively for challenging and high density crowd management applications. However, significant customization of existing approaches is required to apply them to the challenging crowd management situations in Masjid Al Haram. Our results paint a promising picture for deployment of computer vision technologies to assist in quantitative measurement of crowd size, density and congestion.
△ Less
Submitted 14 September, 2017;
originally announced September 2017.
-
Towards a Dedicated Computer Vision Tool set for Crowd Simulation Models
Authors:
Sultan Daud Khan,
Muhammad Saqib,
Michael Blumenstein
Abstract:
As the population of world is increasing, and even more concentrated in urban areas, ensuring public safety is becoming a taunting job for security personnel and crowd managers. Mass events like sports, festivals, concerts, political gatherings attract thousand of people in a constraint environment,therefore adequate safety measures should be adopted. Despite safety measures, crowd disasters still…
▽ More
As the population of world is increasing, and even more concentrated in urban areas, ensuring public safety is becoming a taunting job for security personnel and crowd managers. Mass events like sports, festivals, concerts, political gatherings attract thousand of people in a constraint environment,therefore adequate safety measures should be adopted. Despite safety measures, crowd disasters still occur frequently. Understanding underlying dynamics and behavior of crowd is becoming areas of interest for most of computer scientists. In recent years, researchers developed several models for understanding crowd dynamics. These models should be properly calibrated and validated by means of data acquired in the field. In this paper, we developed a computer vision tool set that can be helpful not only in initializing the crowd simulation models but can also validate the simulation results. The main features of proposed tool set are: (1) Crowd flow segmentation and crowd counting, (2) Identifying source/sink location for understanding crowd behavior, (3) Group detection and tracking in crowds.
△ Less
Submitted 1 September, 2017;
originally announced September 2017.
-
Regenerative Soot-IX: C3 as the dominant, stable carbon cluster in high pressure sooting discharges
Authors:
Sohail Ahmad Janjua,
M. Ahmad,
S. D. Khan,
R. Khalid,
A. Aleem,
Shoaib Ahmad
Abstract:
Results are presented that have been obtained while operating the graphite hollow cathode duoplasmatron ion source in dual mode under constant discharge current. This dual mode operation enabled us to obtain the mass and emission spectra simultaneously. In mass spectra C3 is the main feature but C4 and C5 are also prominent, whereas in emission spectra C2 is also there and its presence shows that…
▽ More
Results are presented that have been obtained while operating the graphite hollow cathode duoplasmatron ion source in dual mode under constant discharge current. This dual mode operation enabled us to obtain the mass and emission spectra simultaneously. In mass spectra C3 is the main feature but C4 and C5 are also prominent, whereas in emission spectra C2 is also there and its presence shows that it is in an excited state rather than in an ionic state. These facts provide evidence that C3 is produced due to the regeneration of a soot forming sequence and leave it in ionic state. C3 is a stable molecule and the only dominant species among the carbon clusters that survives in a regenerative sooting environment at high-pressure discharges.
△ Less
Submitted 15 November, 2016;
originally announced November 2016.
-
Carbon cluster diagnostics-III: Direct Recoil Spectroscopy (DRS) versus ExB Velocity Analysis
Authors:
Shoaib Ahmad,
S. A. Janjua,
M. Ahmad,
B. Ahmad,
S. D. Khan,
Rahila Khalid
Abstract:
A comparative study is being reported on the identification of heavy carbon clusters using two different techniques namely the Direct Recoil Spectroscopy (DRS) and velocity spectrometry using a Wien ExB velocity filter. In both the techniques carbon clusters are formed in situ either under energetic heavy ion bombardment of graphite surfaces for which DRS is employed or these are emitted from the…
▽ More
A comparative study is being reported on the identification of heavy carbon clusters using two different techniques namely the Direct Recoil Spectroscopy (DRS) and velocity spectrometry using a Wien ExB velocity filter. In both the techniques carbon clusters are formed in situ either under energetic heavy ion bombardment of graphite surfaces for which DRS is employed or these are emitted from the regenerative sooting discharges and analyzed using ExB velocity analysis.
△ Less
Submitted 19 September, 2016;
originally announced September 2016.
-
Regenerative Soot-VII: Population inversion of He I and Ne I in regenerative sooting discharges
Authors:
Sajid Hussain,
A Aleem,
Rahila Khalid,
S D Khan,
A Ellahi,
S A Janjua,
Shoaib Ahmad
Abstract:
The mechanisms for population inversion among the excited states of He I and Ne I in regenerative sooting discharges have been investigated as a function of the geometry and the physical parameters of the graphite hollow cathode sources. The effect of the state of sooting of the hollow cathode, the gas pressure and the role of the cycling of the discharge current idis on the population inversion o…
▽ More
The mechanisms for population inversion among the excited states of He I and Ne I in regenerative sooting discharges have been investigated as a function of the geometry and the physical parameters of the graphite hollow cathode sources. The effect of the state of sooting of the hollow cathode, the gas pressure and the role of the cycling of the discharge current idis on the population inversion of the excited He I and Ne I levels have been investigated.
△ Less
Submitted 17 September, 2016;
originally announced September 2016.
-
Modelling of C2 addition route to the formation of C60
Authors:
Sabih D Khan,
Shoaib Ahmad
Abstract:
To understand the phenomenon of fullerene growth during its synthesis, an attempt is made to model a minimum energy growth route using a semi-empirical quantum mechanics code. C2 addition leading to C60 was modelled and three main routes, i.e. cyclic ring growth, pentagon and fullerene road, were studied. The growth starts with linear chains and, at n = 10, ring structures begins to dominate. The…
▽ More
To understand the phenomenon of fullerene growth during its synthesis, an attempt is made to model a minimum energy growth route using a semi-empirical quantum mechanics code. C2 addition leading to C60 was modelled and three main routes, i.e. cyclic ring growth, pentagon and fullerene road, were studied. The growth starts with linear chains and, at n = 10, ring structures begins to dominate. The rings continue to grow and, at some point n > 30, they transform into close-cage fullerenes and the growth is shown to progress by the fullerene road until C60 is formed. The computer simulations predict a transition from a C38 ring to fullerene. Other growth mechanisms could also occur in the energetic environment commonly encountered in fullerene synthesis, but our purpose was to identify a minimal energy route which is the most probable structure. Our results also indicate that, at n = 20, the corannulene structure is energetically more stable than the corresponding fullerene and graphene sheet, however a ring structure has lower energy among all the structures up to n 6 40. Additionally, we have also proved that the fullerene road is energetically more favored than the pentagon road. The overall growth leading to cage closure for n = 60 may not occur by a single route but by a combination of more than one route.
△ Less
Submitted 7 September, 2016;
originally announced September 2016.
-
The degenerate Fermi gas of $π$ electrons in fullerenes and the $σ$ surface instabilities
Authors:
Shoaib Ahmad,
Sabih D Khan,
Sadia Manzoor
Abstract:
The departure from perfect spherical symmetry in the case of fullerenes, C60 being the sole exception, induces instabilities due to the stresses generated by the pentagonal protrusions in the sigma-bonded surfaces. By assuming sigma and pi separability and treating pi electrons as a degenerate Fermi gas in the two shells around the central sigma structure, the resulting degeneracy pressures can fu…
▽ More
The departure from perfect spherical symmetry in the case of fullerenes, C60 being the sole exception, induces instabilities due to the stresses generated by the pentagonal protrusions in the sigma-bonded surfaces. By assuming sigma and pi separability and treating pi electrons as a degenerate Fermi gas in the two shells around the central sigma structure, the resulting degeneracy pressures can further enhance the sigma-surface initiated instabilities for non-icosahedral structures especially for those smaller than C60 as well as the icosahedral fullerenes that are larger than C60, with large protrusions. Under certain circumstances the net degeneracy pressure across the sigma surface might have structure-stabilizing effect. The role of the pi electron degeneracy in a broad range of fullerenes from C20 to C1500 and its effects on fullerene stability is investigated.
△ Less
Submitted 5 September, 2016;
originally announced September 2016.
-
The Effect of Multi-core Communication Architecture on System Performance
Authors:
Bilal Habib,
Ahmed Anber,
Sultan Daud Khan
Abstract:
MPSoCs are gaining popularity because of its potential to solve computationally expensive applications. A multi-core processor combines two or more independent cores (normally a CPU) into a single package composed of a single integrated circuit (Chip). However, as the number of components on a single chip and their performance continue to increase, a shift from computation-based to communication-b…
▽ More
MPSoCs are gaining popularity because of its potential to solve computationally expensive applications. A multi-core processor combines two or more independent cores (normally a CPU) into a single package composed of a single integrated circuit (Chip). However, as the number of components on a single chip and their performance continue to increase, a shift from computation-based to communication-based design becomes mandatory. As a result, the communication architecture plays a major role in the area, performance, and energy consumption of the overall system. In this paper, multiple soft-cores (IPs) such as Micro Blaze in an FPGA is used to study the effect of different connection topologies on the performance of a parallel program.
△ Less
Submitted 13 April, 2016;
originally announced April 2016.
-
Perytons and their Possible Sources
Authors:
Mohammad Danish Khan
Abstract:
Perytons are terrestrial signals that exhibit dispersion measure (DM) similar to pulsars. In trying to identify terrestrial sources of such perytons, investigation into signals from airborne equipment (aircraft), RFI emissions from electronics and lightning phenomenon reveals that the possible sources of perytons could be lightning phenomenon. Narrow Bipolar Pulses (NBPs) and Terrestrial Gamma Fla…
▽ More
Perytons are terrestrial signals that exhibit dispersion measure (DM) similar to pulsars. In trying to identify terrestrial sources of such perytons, investigation into signals from airborne equipment (aircraft), RFI emissions from electronics and lightning phenomenon reveals that the possible sources of perytons could be lightning phenomenon. Narrow Bipolar Pulses (NBPs) and Terrestrial Gamma Flashes (TGFs) are good investigational candidates.
△ Less
Submitted 20 April, 2014;
originally announced April 2014.
-
Comparative Analysis of Routing Protocols for Under Water Wireless Sensor Networks
Authors:
S. Ahmed,
I. U. Khan,
M. B. Rasheed,
M. Ilahi,
R. D. Khan,
S. H. Bouk,
N. Javaid
Abstract:
Underwater Wireless Sensor Networks are significantly different from terrestrial sensor networks due to peculiar characteristics of low bandwidth, high latency, limited energy, node float mobility and high error probability. These features bring many challenges to the network protocol design of UWSNs. Several routing protocols have been developed in recent years for these networks. One of the majo…
▽ More
Underwater Wireless Sensor Networks are significantly different from terrestrial sensor networks due to peculiar characteristics of low bandwidth, high latency, limited energy, node float mobility and high error probability. These features bring many challenges to the network protocol design of UWSNs. Several routing protocols have been developed in recent years for these networks. One of the major difficulties in comparison and validation of the performance of these proposals is the lack of a common standard to model the acoustic propagation in the harsh underwater environment. In this paper we analyze the evolution of certain underwater routing protocols like VBF, DBR, H2-DAB, QELAR etc. in terms of their localization techniques, energy minimization characteristics and holding time calculations. The design of each protocol follows certain goals i.e. reduction of energy consumption, improvement of communication latency, achievement of robustness and scalability etc. This paper examines the main approaches and challenges in the design and implementation of underwater sensor networks. The detailed descriptions of the selected protocols contribute in understanding the direction of the current research on routing layer in UWSN.
△ Less
Submitted 5 June, 2013;
originally announced June 2013.
-
Advanced LEACH: A Static Clustering-based Heteroneous Routing Protocol for WSNs
Authors:
A. Iqbal,
M. Akbar,
N. Javaid,
S. H. Bouk,
M. Ilahi,
R. D. Khan
Abstract:
Wireless Sensors Networks (WSNs) have a big application in heterogeneous networks. In this paper, we propose and evaluate Advanced Low-Energy Adaptive Clustering Hierarchy (Ad-LEACH) which is static clustering based heterogeneous routing protocol. The complete network field is first divided into static clusters and then in each cluster separate Ad-LEACH protocol is applied. Our proposed protocol i…
▽ More
Wireless Sensors Networks (WSNs) have a big application in heterogeneous networks. In this paper, we propose and evaluate Advanced Low-Energy Adaptive Clustering Hierarchy (Ad-LEACH) which is static clustering based heterogeneous routing protocol. The complete network field is first divided into static clusters and then in each cluster separate Ad-LEACH protocol is applied. Our proposed protocol is inherited from LEACH with a cluster head selection criteria of Distributed Energy-Efficient Clustering (DEEC). This enables Ad-LEACH to cope with the heterogeneous nature of nodes. Due to small static clusters, each node reduces its broadcast message power because it only has to cover a small area. We perform simulations in MATLAB to check the efficiency of Ad-LEACH. The Simulation results show that Ad-LEACH outperforms LEACH and DEEC in energy efficiency as well as throughput.
△ Less
Submitted 5 June, 2013;
originally announced June 2013.
-
Control Strategies for Mobile Robot With Obstacle Avoidance
Authors:
M. Zohaib,
M. Pasha,
R. A. Riaz,
N. Javaid,
M. Ilahi,
R. D. Khan
Abstract:
Obstacle avoidance is an important task in the field of robotics, since the goal of autonomous robot is to reach the destination without collision. Several algorithms have been proposed for obstacle avoidance, having drawbacks and benefits. In this survey paper, we mainly discussed different algorithms for robot navigation with obstacle avoidance. We also compared all provided algorithms and menti…
▽ More
Obstacle avoidance is an important task in the field of robotics, since the goal of autonomous robot is to reach the destination without collision. Several algorithms have been proposed for obstacle avoidance, having drawbacks and benefits. In this survey paper, we mainly discussed different algorithms for robot navigation with obstacle avoidance. We also compared all provided algorithms and mentioned their characteristics; advantages and disadvantages, so that we can select final efficient algorithm by fusing discussed algorithms. Comparison table is provided for justifying the area of interest
△ Less
Submitted 5 June, 2013;
originally announced June 2013.
-
Home Energy Management Systems in Future Smart Grids
Authors:
I. Khan,
A. Mahmood,
N. Javaid,
S. Razzaq,
R. D. Khan,
M. Ilahi
Abstract:
We present a detailed review of various Home Energy Management Schemes (HEM,s). HEM,s will increase savings, reduce peak demand and Pto Average Ratio (PAR). Among various applications of smart grid technologies, home energy management is probably the most important one to be addressed. Various steps have been taken by utilities for efficient energy consumption.New pricing schemes like Time of Use…
▽ More
We present a detailed review of various Home Energy Management Schemes (HEM,s). HEM,s will increase savings, reduce peak demand and Pto Average Ratio (PAR). Among various applications of smart grid technologies, home energy management is probably the most important one to be addressed. Various steps have been taken by utilities for efficient energy consumption.New pricing schemes like Time of Use (ToU), Real Time Pricing (RTP), Critical Peak Pricing (CPP), Inclining Block Rates (IBR) etc have been been devised for future smart grids.Home appliances and/or distributed energy resources coordination (Local Generation) along with different pricing schemes leads towards efficient energy consumption. This paper addresses various communication and optimization based residential energy management schemes and different communication and networking technologies involved in these schemes.
△ Less
Submitted 5 June, 2013;
originally announced June 2013.
-
A Survey of Different Residential Energy Consumption Controlling Techniques for Autonomous DSM in Future Smart Grid Communications
Authors:
M. N. Ullah,
A. Mahmood,
S. Razzaq,
M. Ilahi,
R. D. Khan,
N. Javaid
Abstract:
In this work, we present a survey of residential load controlling techniques to implement demand side management in future smart grid. Power generation sector facing important challenges both in quality and quantity to meet the increasing requirements of consumers. Energy efficiency, reliability, economics and integration of new energy resources are important issues to enhance the stability of pow…
▽ More
In this work, we present a survey of residential load controlling techniques to implement demand side management in future smart grid. Power generation sector facing important challenges both in quality and quantity to meet the increasing requirements of consumers. Energy efficiency, reliability, economics and integration of new energy resources are important issues to enhance the stability of power system infrastructure. Optimal energy consumption scheduling minimizes the energy consumption cost and reduce the peak-to-average ratio (PAR) as well as peak load demand in peak hours. In this work, we discuss different energy consumption scheduling schemes that schedule the household appliances in real-time to achieve minimum energy consumption cost and reduce peak load curve in peak hours to shape the peak load demand.
△ Less
Submitted 5 June, 2013;
originally announced June 2013.
-
Evaluating and Comparing Probability of Path Loss in DSDV, OLSR and DYMO at 802.11 and 802.11p
Authors:
S. Wasiq,
N. Javaid,
M. Ilahi,
R. D. Khan,
U. Qasim,
Z. A. Khan
Abstract:
In this paper, we present path loss model for VANETs and simulate three routing protocols; Destination Sequenced Distance Vector (DSDV), Optimized Link State Routing (OLSR) and Dynamic MANET On-demand (DYMO) to evaluate and compare their performance using NS-2. The main contribution of this work is enhancement of existing techniques to achieve high efficiency of the underlying networks. After exte…
▽ More
In this paper, we present path loss model for VANETs and simulate three routing protocols; Destination Sequenced Distance Vector (DSDV), Optimized Link State Routing (OLSR) and Dynamic MANET On-demand (DYMO) to evaluate and compare their performance using NS-2. The main contribution of this work is enhancement of existing techniques to achieve high efficiency of the underlying networks. After extensive simulations in NS-2, we conclude that DSDV best performs with 802.11p while DYMO gives outstanding performance with 802.11.
△ Less
Submitted 4 June, 2013;
originally announced June 2013.
-
Modeling and Simulating Network Connectivity in Routing Protocols for MANETs and VANETs
Authors:
W. Arshad,
N. Javaid,
R. D. Khan,
M. Ilahi,
U. Qasim,
Z. A. Khan
Abstract:
This paper presents a framework for node distribution with respect to density, network connectivity and communication time. Using NS2, we evaluate and compare performance of three routing protocols; Ad-hoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR) and Fisheye State Routing (FSR) both in MANETs (IEEE 802.11) and VANETs (IEEE 802.11p). We further enhanced these protocols by chan…
▽ More
This paper presents a framework for node distribution with respect to density, network connectivity and communication time. Using NS2, we evaluate and compare performance of three routing protocols; Ad-hoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR) and Fisheye State Routing (FSR) both in MANETs (IEEE 802.11) and VANETs (IEEE 802.11p). We further enhanced these protocols by changing their routing information exchange intervals; MOD AODV, MOD DSR and MOD FSR. A comprehensive simulation work is performed for the comparison of these routing protocols for varying motilities and scalabilities of nodes. As a result, we can say that AODV outperforms DSR and FSR both in MANETs and VANETs.
△ Less
Submitted 4 June, 2013;
originally announced June 2013.
-
Evaluating Wireless Reactive Routing Protocols with Linear Programming Model for Wireless Ad-hoc Networks
Authors:
N. Javaid,
M. Ilahi,
R. D. Khan,
L. Ali,
U. Qasim,
Z. A. Khan
Abstract:
In Wireless Ad-hoc Networks, nodes are free to move randomly and organize themselves arbitrarily, thus topology may change quickly and capriciously. In Mobile Ad-hoc NETworks, specially Wireless Multi-hop Networks provide users with facility of quick communication. In Wireless Multi-hop Networks, routing protocols with energy efficient and delay reduction techniques are needed to fulfill users dem…
▽ More
In Wireless Ad-hoc Networks, nodes are free to move randomly and organize themselves arbitrarily, thus topology may change quickly and capriciously. In Mobile Ad-hoc NETworks, specially Wireless Multi-hop Networks provide users with facility of quick communication. In Wireless Multi-hop Networks, routing protocols with energy efficient and delay reduction techniques are needed to fulfill users demands. In this paper, we present Linear Programming models to assess and enhance reactive routing protocols. To practically examine constraints of respective Linear Programming models over reactive protocols, we select AODV, DSR and DYMO. It is deduced from analytical simulations of Linear Programming models in MATLAB that quick route repair reduces routing latency and optimizations of retransmission attempts results efficient energy utilization. To provide quick repair, we enhance AODV and DSR. To practically examine the efficiency of enhanced protocols in different scenarios of Wireless Multi-hop Networks, we conduct simulations using NS-2. From simulation results, enhanced DSR and AODV achieve efficient output by optimizing routing latencies and routing load in terms of retransmission attempts.
△ Less
Submitted 4 June, 2013;
originally announced June 2013.
-
Evaluating Wireless Proactive Routing Protocols under Mobility and Scalability Constraints
Authors:
N. Javaid,
R. D. Khan,
M. Ilahi,
L. Ali,
Z. A. Khan,
U. Qasim
Abstract:
Wireless Multi-hop Networks (WMhNs) provide users with the facility to communicate while moving with whatever the node speed, the node density and the number of traffic flows they want, without any unwanted delay and/or disruption. This paper contributes Linear Programming models (LP_models) for WMhNs. In WMhNs, different routing protocols are used to facilitate users demand(s). To practically exa…
▽ More
Wireless Multi-hop Networks (WMhNs) provide users with the facility to communicate while moving with whatever the node speed, the node density and the number of traffic flows they want, without any unwanted delay and/or disruption. This paper contributes Linear Programming models (LP_models) for WMhNs. In WMhNs, different routing protocols are used to facilitate users demand(s). To practically examine the constraints of respective LP_models over different routing techniques, we select three proactive routing protocols; Destination Sequence Distance Vector (DSDV), Fish-eye State Routing (FSR) and Optimized Link State Routing (OLSR). These protocols are simulated in two important scenarios regarding to user demands; mobilities and different network flows. To evaluate the performance, we further relate the protocols strategy effects on respective constraints in selected network scenarios.
△ Less
Submitted 4 June, 2013;
originally announced June 2013.
-
On generalized topological groups
Authors:
Murad Hussain,
Moiz Ud Din Khan,
Cenap Özel
Abstract:
In this work, we will introduce the notion of generalized topological groups using generalized topological structure and generalized continuity defined by ?A. Cs?asz?ar [2]. We will discuss some basic properties of this kind of structures and connectedness properties of this structures are given. Keywords: Generalized topology; generalized continuity; generalized topological groups; generalized co…
▽ More
In this work, we will introduce the notion of generalized topological groups using generalized topological structure and generalized continuity defined by ?A. Cs?asz?ar [2]. We will discuss some basic properties of this kind of structures and connectedness properties of this structures are given. Keywords: Generalized topology; generalized continuity; generalized topological groups; generalized connectedness.
△ Less
Submitted 17 May, 2012;
originally announced May 2012.
-
An Adaptive Design Methodology for Reduction of Product Development Risk
Authors:
Hara Gopal Mani Pakala,
Dr. Plh Varaprasad,
Dr. Raju Kvsvn,
Dr. Ibrahim Khan
Abstract:
Embedded systems interaction with environment inherently complicates understanding of requirements and their correct implementation. However, product uncertainty is highest during early stages of development. Design verification is an essential step in the development of any system, especially for Embedded System. This paper introduces a novel adaptive design methodology, which incorporates step-w…
▽ More
Embedded systems interaction with environment inherently complicates understanding of requirements and their correct implementation. However, product uncertainty is highest during early stages of development. Design verification is an essential step in the development of any system, especially for Embedded System. This paper introduces a novel adaptive design methodology, which incorporates step-wise prototy** and verification. With each adaptive step product-realization level is enhanced while decreasing the level of product uncertainty, thereby reducing the overall costs. The back-bone of this frame-work is the development of Domain Specific Operational (DOP) Model and the associated Verification Instrumentation for Test and Evaluation, developed based on the DOP model. Together they generate functionally valid test-sequence for carrying out prototype evaluation. With the help of a case study 'Multimode Detection Subsystem' the application of this method is sketched. The design methodologies can be compared by defining and computing a generic performance criterion like Average design-cycle Risk. For the case study, by computing Average design-cycle Risk, it is shown that the adaptive method reduces the product development risk for a small increase in the total design cycle time.
△ Less
Submitted 17 December, 2011;
originally announced December 2011.
-
Coulomb breakup of $^6\rm{Li}$ into $α\,+\,\rm{d}$ in the field of ion $^{208}\rm{Pb}$
Authors:
B. F. Irgaziev,
Jameel-Un Nabi,
Darwish Khan
Abstract:
The triple differential cross section of $^{208}\rm{Pb}(^6\rm{Li};α,\rm{d})^{208}\rm{Pb}$ elastic Coulomb breakup is calculated using the semiclassical method. We fit the parameters of the Woods-Saxon potential using the experimental $α-\rm{d}$ phase shifts for different states to describe the relative motion of $α$-particle and deuteron. In order to check the validity of the two particle approach…
▽ More
The triple differential cross section of $^{208}\rm{Pb}(^6\rm{Li};α,\rm{d})^{208}\rm{Pb}$ elastic Coulomb breakup is calculated using the semiclassical method. We fit the parameters of the Woods-Saxon potential using the experimental $α-\rm{d}$ phase shifts for different states to describe the relative motion of $α$-particle and deuteron. In order to check the validity of the two particle approach for $α-d$ system we apply a potential model to describe the $^2\rm{H}(α,γ)^6\rm{Li}$ radiative capture. Our results for the Coulomb breakup of $^6\rm{Li}$ show large value of the forward-backward asymmetry of the $α$-particle and deuteron emission around zero energy in the $^6\rm{Li}$ center-of-mass (c.m.) system. Comparison of the results of our calculation with experimental data gives evidence for the dominance of the Coulomb dissociation mechanism at the $α-d$ relative energy larger than $E_{α\,d}>300\,\rm{keV}$ and sufficiently big contribution of nuclear distortion at $E_{α\,d}$ near zero energy, but essentially smaller than the value reported in Ref.[F. Hammache et al. Phys.Rev. C82, 065802 (2010)].
△ Less
Submitted 28 December, 2011; v1 submitted 25 May, 2011;
originally announced May 2011.