-
Optimizing Adaptive Video Streaming: A Fuzzy Logic Approach to Resource Allocation
Authors:
Koffka Khan
Abstract:
The demand for high-quality video streaming has propelled the evolution of adaptive streaming systems. Efficient resource allocation is paramount to ensuring optimal viewer experience, considering dynamic factors such as server load, network bandwidth, and viewer demand. This review paper investigates the application of fuzzy logic to enhance resource allocation in adaptive video streaming. Fuzzy…
▽ More
The demand for high-quality video streaming has propelled the evolution of adaptive streaming systems. Efficient resource allocation is paramount to ensuring optimal viewer experience, considering dynamic factors such as server load, network bandwidth, and viewer demand. This review paper investigates the application of fuzzy logic to enhance resource allocation in adaptive video streaming. Fuzzy logic, known for its adaptability in uncertain environments, offers a promising approach to address the complexities of resource optimization. We delve into the integration of fuzzy logic in resource allocation models, considering key parameters like server load, network bandwidth, and viewer demand. The paper provides a comprehensive examination of the benefits, challenges, and limitations associated with fuzzy logic-based resource allocation, supported by case studies illustrating successful implementations. Evaluation metrics are discussed to gauge the performance of this approach in comparison to traditional methods. The review concludes with insights into future directions, offering a roadmap for further advancements in the field of adaptive video streaming. "Optimizing Adaptive Video Streaming: A Fuzzy Logic Approach to Resource Allocation" aims to contribute to the ongoing discourse on intelligent resource management for enhanced video streaming quality and user satisfaction.
△ Less
Submitted 9 April, 2024;
originally announced July 2024.
-
Overcoming LLM Challenges using RAG-Driven Precision in Coffee Leaf Disease Remediation
Authors:
Dr. Selva Kumar S,
Afifah Khan Mohammed Ajmal Khan,
Imadh Ajaz Banday,
Manikantha Gada,
Vibha Venkatesh Shanbhag
Abstract:
This research introduces an innovative AI-driven precision agriculture system, leveraging YOLOv8 for disease identification and Retrieval Augmented Generation (RAG) for context-aware diagnosis. Focused on addressing the challenges of diseases affecting the coffee production sector in Karnataka, The system integrates sophisticated object detection techniques with language models to address the inhe…
▽ More
This research introduces an innovative AI-driven precision agriculture system, leveraging YOLOv8 for disease identification and Retrieval Augmented Generation (RAG) for context-aware diagnosis. Focused on addressing the challenges of diseases affecting the coffee production sector in Karnataka, The system integrates sophisticated object detection techniques with language models to address the inherent constraints associated with Large Language Models (LLMs). Our methodology not only tackles the issue of hallucinations in LLMs, but also introduces dynamic disease identification and remediation strategies. Real-time monitoring, collaborative dataset expansion, and organizational involvement ensure the system's adaptability in diverse agricultural settings. The effect of the suggested system extends beyond automation, aiming to secure food supplies, protect livelihoods, and promote eco-friendly farming practices. By facilitating precise disease identification, the system contributes to sustainable and environmentally conscious agriculture, reducing reliance on pesticides. Looking to the future, the project envisions continuous development in RAG-integrated object detection systems, emphasizing scalability, reliability, and usability. This research strives to be a beacon for positive change in agriculture, aligning with global efforts toward sustainable and technologically enhanced food production.
△ Less
Submitted 2 May, 2024;
originally announced May 2024.
-
Improving the interpretability of GNN predictions through conformal-based graph sparsification
Authors:
Pablo Sanchez-Martin,
Kinaan Aamir Khan,
Isabel Valera
Abstract:
Graph Neural Networks (GNNs) have achieved state-of-the-art performance in solving graph classification tasks. However, most GNN architectures aggregate information from all nodes and edges in a graph, regardless of their relevance to the task at hand, thus hindering the interpretability of their predictions. In contrast to prior work, in this paper we propose a GNN \emph{training} approach that j…
▽ More
Graph Neural Networks (GNNs) have achieved state-of-the-art performance in solving graph classification tasks. However, most GNN architectures aggregate information from all nodes and edges in a graph, regardless of their relevance to the task at hand, thus hindering the interpretability of their predictions. In contrast to prior work, in this paper we propose a GNN \emph{training} approach that jointly i) finds the most predictive subgraph by removing edges and/or nodes -- -\emph{without making assumptions about the subgraph structure} -- while ii) optimizing the performance of the graph classification task. To that end, we rely on reinforcement learning to solve the resulting bi-level optimization with a reward function based on conformal predictions to account for the current in-training uncertainty of the classifier. Our empirical results on nine different graph classification datasets show that our method competes in performance with baselines while relying on significantly sparser subgraphs, leading to more interpretable GNN-based predictions.
△ Less
Submitted 18 April, 2024;
originally announced April 2024.
-
Enhancing Adaptive Video Streaming through Fuzzy Logic-Based Content Recommendation Systems: A Comprehensive Review and Future Directions
Authors:
Koffka Khan
Abstract:
As the demand for high-quality video content continues to rise, adaptive video streaming plays a pivotal role in delivering an optimal viewing experience. However, traditional content recommendation systems face challenges in dynamically adapting to users' preferences, content features, and contextual information. This review paper explores the integration of fuzzy logic into content recommendatio…
▽ More
As the demand for high-quality video content continues to rise, adaptive video streaming plays a pivotal role in delivering an optimal viewing experience. However, traditional content recommendation systems face challenges in dynamically adapting to users' preferences, content features, and contextual information. This review paper explores the integration of fuzzy logic into content recommendation systems for adaptive video streaming. Fuzzy logic, known for handling uncertainty and imprecision, provides a promising framework for modeling and accommodating the dynamic nature of user preferences and contextual factors. The paper discusses the evolution of adaptive video streaming, reviews traditional content recommendation algorithms, and introduces fuzzy logic as a solution to enhance the adaptability of these systems. Through a comprehensive exploration of case studies and applications, the effectiveness of fuzzy logic in improving user satisfaction and system performance is highlighted. The review also addresses challenges associated with the integration of fuzzy logic and suggests future research directions to further advance this approach. The proposed framework offers insights into a dynamic and context-aware content recommendation system, contributing to the evolution of adaptive video streaming technologies.
△ Less
Submitted 9 April, 2024;
originally announced April 2024.
-
Self-Supervised Path Planning in UAV-aided Wireless Networks based on Active Inference
Authors:
Ali Krayani,
Khalid Khan,
Lucio Marcenaro,
Mario Marchese,
Carlo Regazzoni
Abstract:
This paper presents a novel self-supervised path-planning method for UAV-aided networks. First, we employed an optimizer to solve training examples offline and then used the resulting solutions as demonstrations from which the UAV can learn the world model to understand the environment and implicitly discover the optimizer's policy. UAV equipped with the world model can make real-time autonomous d…
▽ More
This paper presents a novel self-supervised path-planning method for UAV-aided networks. First, we employed an optimizer to solve training examples offline and then used the resulting solutions as demonstrations from which the UAV can learn the world model to understand the environment and implicitly discover the optimizer's policy. UAV equipped with the world model can make real-time autonomous decisions and engage in online planning using active inference. During planning, UAV can score different policies based on the expected surprise, allowing it to choose among alternative futures. Additionally, UAV can anticipate the outcomes of its actions using the world model and assess the expected surprise in a self-supervised manner. Our method enables quicker adaptation to new situations and better performance than traditional RL, leading to broader generalizability.
△ Less
Submitted 6 March, 2024;
originally announced March 2024.
-
Effects of underlying topology on quantum state discrimination
Authors:
Aatif Kaisar Khan,
Yasir Hassan Dar,
Elias C. Vagenas,
Salman Sajad Wani,
Saif Al-Kuwari,
Mir Faizal
Abstract:
In this work, we show that quantum state discrimination can be modified due to a change in the underlying topology of a system. In particular, we explicitly demonstrate that the quantum state discrimination of systems with underlying discrete topology differs from that of systems with underlying continuous topology. Such changes in the topology of a spacetime can occur in certain quantum gravity a…
▽ More
In this work, we show that quantum state discrimination can be modified due to a change in the underlying topology of a system. In particular, we explicitly demonstrate that the quantum state discrimination of systems with underlying discrete topology differs from that of systems with underlying continuous topology. Such changes in the topology of a spacetime can occur in certain quantum gravity approaches. In fact, all approaches to quantum gravity can be classified into two types: those with underlying continuous topology (such as string theory) and those with an underlying discrete topology (such as loop quantum gravity). We demonstrate that the topology of these two types of quantum gravity approaches has different effects on the quantum state discrimination of low-energy quantum systems. We also show that any modification of quantum mechanics, which does not change the underlying topology, does not modify quantum state discrimination.
△ Less
Submitted 21 February, 2024;
originally announced February 2024.
-
Navigating Cybersecurity Training: A Comprehensive Review
Authors:
Saif Al-Dean Qawasmeh,
Ali Abdullah S. AlQahtani,
Muhammad Khurram Khan
Abstract:
In the dynamic realm of cybersecurity, awareness training is crucial for strengthening defenses against cyber threats. This survey examines a spectrum of cybersecurity awareness training methods, analyzing traditional, technology-based, and innovative strategies. It evaluates the principles, efficacy, and constraints of each method, presenting a comparative analysis that highlights their pros and…
▽ More
In the dynamic realm of cybersecurity, awareness training is crucial for strengthening defenses against cyber threats. This survey examines a spectrum of cybersecurity awareness training methods, analyzing traditional, technology-based, and innovative strategies. It evaluates the principles, efficacy, and constraints of each method, presenting a comparative analysis that highlights their pros and cons. The study also investigates emerging trends like artificial intelligence and extended reality, discussing their prospective influence on the future of cybersecurity training. Additionally, it addresses implementation challenges and proposes solutions, drawing on insights from real-world case studies. The goal is to bolster the understanding of cybersecurity awareness training's current landscape, offering valuable perspectives for both practitioners and scholars.
△ Less
Submitted 20 January, 2024;
originally announced January 2024.
-
Language Detection for Transliterated Content
Authors:
Selva Kumar S,
Afifah Khan Mohammed Ajmal Khan,
Chirag Manjeshwar,
Imadh Ajaz Banday
Abstract:
In the contemporary digital era, the Internet functions as an unparalleled catalyst, dismantling geographical and linguistic barriers particularly evident in texting. This evolution facilitates global communication, transcending physical distances and fostering dynamic cultural exchange. A notable trend is the widespread use of transliteration, where the English alphabet is employed to convey mess…
▽ More
In the contemporary digital era, the Internet functions as an unparalleled catalyst, dismantling geographical and linguistic barriers particularly evident in texting. This evolution facilitates global communication, transcending physical distances and fostering dynamic cultural exchange. A notable trend is the widespread use of transliteration, where the English alphabet is employed to convey messages in native languages, posing a unique challenge for language technology in accurately detecting the source language. This paper addresses this challenge through a dataset of phone text messages in Hindi and Russian transliterated into English utilizing BERT for language classification and Google Translate API for transliteration conversion. The research pioneers innovative approaches to identify and convert transliterated text, navigating challenges in the diverse linguistic landscape of digital communication. Emphasizing the pivotal role of comprehensive datasets for training Large Language Models LLMs like BERT, our model showcases exceptional proficiency in accurately identifying and classifying languages from transliterated text. With a validation accuracy of 99% our models robust performance underscores its reliability. The comprehensive exploration of transliteration dynamics supported by innovative approaches and cutting edge technologies like BERT, positions our research at the forefront of addressing unique challenges in the linguistic landscape of digital communication. Beyond contributing to language identification and transliteration capabilities this work holds promise for applications in content moderation, analytics and fostering a globally connected community engaged in meaningful dialogue.
△ Less
Submitted 9 January, 2024;
originally announced January 2024.
-
EyePreserve: Identity-Preserving Iris Synthesis
Authors:
Siamul Karim Khan,
Patrick Tinsley,
Mahsa Mitcheff,
Patrick Flynn,
Kevin W. Bowyer,
Adam Czajka
Abstract:
Synthesis of same-identity biometric iris images, both for existing and non-existing identities while preserving the identity across a wide range of pupil sizes, is complex due to intricate iris muscle constriction mechanism, requiring a precise model of iris non-linear texture deformations to be embedded into the synthesis pipeline. This paper presents the first method of fully data-driven, ident…
▽ More
Synthesis of same-identity biometric iris images, both for existing and non-existing identities while preserving the identity across a wide range of pupil sizes, is complex due to intricate iris muscle constriction mechanism, requiring a precise model of iris non-linear texture deformations to be embedded into the synthesis pipeline. This paper presents the first method of fully data-driven, identity-preserving, pupil size-varying s ynthesis of iris images. This approach is capable of synthesizing images of irises with different pupil sizes representing non-existing identities as well as non-linearly deforming the texture of iris images of existing subjects given the segmentation mask of the target iris image. Iris recognition experiments suggest that the proposed deformation model not only preserves the identity when changing the pupil size but offers better similarity between same-identity iris samples with significant differences in pupil size, compared to state-of-the-art linear and non-linear (bio-mechanical-based) iris deformation models. Two immediate applications of the proposed approach are: (a) synthesis of, or enhancement of the existing biometric datasets for iris recognition, mimicking those acquired with iris sensors, and (b) hel** forensic human experts in examining iris image pairs with significant differences in pupil dilation. Source codes and weights of the models are made available with the paper.
△ Less
Submitted 11 March, 2024; v1 submitted 19 December, 2023;
originally announced December 2023.
-
McDuff and Prime von Neumann algebras arising from Thompson-Like Groups
Authors:
Rolando de Santiago,
Patrick DeBonis,
Krishnendu Khan
Abstract:
In this paper we show that the cloning system construction of Skipper and Zaremsky [SZ21], under sufficient conditions, gives rise to Thompson-Like groups which are stable; in particular, these are McDuff groups in the sense of Deprez and Vaes [DV18]. This answers a question of Bashwinger and Zaremsky posed in [BZ23] in the affirmative. We show that the von Neumann algebra of the Higman-Thompson g…
▽ More
In this paper we show that the cloning system construction of Skipper and Zaremsky [SZ21], under sufficient conditions, gives rise to Thompson-Like groups which are stable; in particular, these are McDuff groups in the sense of Deprez and Vaes [DV18]. This answers a question of Bashwinger and Zaremsky posed in [BZ23] in the affirmative. We show that the von Neumann algebra of the Higman-Thompson groups, $L(V_d)$, is a prime II$_1$ factor. Our method also provides evidence towards the primeness conjecture for group von Neumann algebras associated to non-elementary acylindrically hyperbolic group by showing a class of acylindrically hyperbolic group yield prime von Neumann algebras.
△ Less
Submitted 15 December, 2023; v1 submitted 13 December, 2023;
originally announced December 2023.
-
Vision Encoder-Decoder Models for AI Coaching
Authors:
Jyothi S Nayak,
Afifah Khan Mohammed Ajmal Khan,
Chirag Manjeshwar,
Imadh Ajaz Banday
Abstract:
This research paper introduces an innovative AI coaching approach by integrating vision-encoder-decoder models. The feasibility of this method is demonstrated using a Vision Transformer as the encoder and GPT-2 as the decoder, achieving a seamless integration of visual input and textual interaction. Departing from conventional practices of employing distinct models for image recognition and text-b…
▽ More
This research paper introduces an innovative AI coaching approach by integrating vision-encoder-decoder models. The feasibility of this method is demonstrated using a Vision Transformer as the encoder and GPT-2 as the decoder, achieving a seamless integration of visual input and textual interaction. Departing from conventional practices of employing distinct models for image recognition and text-based coaching, our integrated architecture directly processes input images, enabling natural question-and-answer dialogues with the AI coach. This unique strategy simplifies model architecture while enhancing the overall user experience in human-AI interactions. We showcase sample results to demonstrate the capability of the model. The results underscore the methodology's potential as a promising paradigm for creating efficient AI coach models in various domains involving visual inputs. Importantly, this potential holds true regardless of the particular visual encoder or text decoder chosen. Additionally, we conducted experiments with different sizes of GPT-2 to assess the impact on AI coach performance, providing valuable insights into the scalability and versatility of our proposed methodology.
△ Less
Submitted 9 November, 2023;
originally announced November 2023.
-
Comprehensive Survey: Biometric User Authentication Application, Evaluation, and Discussion
Authors:
Reem Alrawili,
Ali Abdullah S. AlQahtani,
Muhammad Khurram Khan
Abstract:
This paper conducts an extensive review of biometric user authentication literature, addressing three primary research questions: (1) commonly used biometric traits and their suitability for specific applications, (2) performance factors such as security, convenience, and robustness, and potential countermeasures against cyberattacks, and (3) factors affecting biometric system accuracy and po-tent…
▽ More
This paper conducts an extensive review of biometric user authentication literature, addressing three primary research questions: (1) commonly used biometric traits and their suitability for specific applications, (2) performance factors such as security, convenience, and robustness, and potential countermeasures against cyberattacks, and (3) factors affecting biometric system accuracy and po-tential improvements. Our analysis delves into physiological and behavioral traits, exploring their pros and cons. We discuss factors influencing biometric system effectiveness and highlight areas for enhancement. Our study differs from previous surveys by extensively examining biometric traits, exploring various application domains, and analyzing measures to mitigate cyberattacks. This paper aims to inform researchers and practitioners about the biometric authentication landscape and guide future advancements.
△ Less
Submitted 20 January, 2024; v1 submitted 7 July, 2023;
originally announced November 2023.
-
1,1-Diphenyl-2-picrylhydrazyl and superoxide anion radical scavenging 1 activities of heterocyclic 2-oxo-1,2,3,4-tetrahydropyrimidines
Authors:
Shahida Perveen,
Qurat-ul-Ain,
Sarosh Iqbal,
Sheeba Wajid,
Khalid Muhammad khan,
Muhammad Iqbal Choudhary
Abstract:
To investigate1,1-Diphenyl-2-picrylhydrazyl (DPPH) and superoxide radical (SOR) 17 scavenging activities of 2-oxo-1,2,3,4-tetrahydropyrimidines derivatives. Free radicals are 18 highly unstable and reactive molecules/atoms. In the body, free radicals form during 19 normal and abnormal metabolism in the body and cause serious damage to other 20 biomolecules through generating oxidative stress (OS).…
▽ More
To investigate1,1-Diphenyl-2-picrylhydrazyl (DPPH) and superoxide radical (SOR) 17 scavenging activities of 2-oxo-1,2,3,4-tetrahydropyrimidines derivatives. Free radicals are 18 highly unstable and reactive molecules/atoms. In the body, free radicals form during 19 normal and abnormal metabolism in the body and cause serious damage to other 20 biomolecules through generating oxidative stress (OS). If free radicals induced OS does 21 not neutralized properly, host multiple pathologies including several types of cancers.
△ Less
Submitted 16 October, 2023;
originally announced October 2023.
-
Particle initialization effects on Lyman-$α$ forest statistics in cosmological SPH simulations
Authors:
Nabendu Kumar Khan,
Girish Kulkarni,
James S. Bolton,
Martin G. Haehnelt,
Vid Iršič,
Ewald Puchwein,
Shikhar Asthana
Abstract:
Confronting measurements of the Lyman-$α$ forest with cosmological hydrodynamical simulations has produced stringent constraints on models of particle dark matter and the thermal and ionization state of the intergalactic medium. We investigate the robustness of such models of the Lyman-$α$ forest, focussing on the effect of particle initial conditions on the Lyman-$α$ forest statistics in cosmolog…
▽ More
Confronting measurements of the Lyman-$α$ forest with cosmological hydrodynamical simulations has produced stringent constraints on models of particle dark matter and the thermal and ionization state of the intergalactic medium. We investigate the robustness of such models of the Lyman-$α$ forest, focussing on the effect of particle initial conditions on the Lyman-$α$ forest statistics in cosmological SPH simulations. We study multiple particle initialization algorithms in simulations that are designed to be identical in other respects. In agreement with the literature, we find that the correct linear theory evolution is obtained when a glass-like configuration is used for initial unperturbed gas particle positions alongside a regular grid configuration for dark matter particles and the use of non-identical initial density perturbations for gas and dark matter. However, we report that this introduces a large scale-dependent distortion in the one-dimensional Lyman-$α$ transmission power spectrum at small scales ($k > 0.05$ s/km). The effect is close to $50\%$ at $k\sim 0.1$ s/km, and persists at higher resolution. This can severely bias inferences in parameters such as the dark matter particle mass. By considering multiple initial conditions codes and their variations, we also study the impact of a variety of other assumptions and algorithmic choices, such as adaptive softening, background radiation density, particle staggering, and perturbation theory accuracy, on the matter power spectrum, the Lyman-$α$ flux power spectrum, and the Lyman-$α$ flux PDF. This work reveals possible pathways towards more accurate theoretical models of the Lyman-$α$ forest to match the quality of upcoming measurements.
△ Less
Submitted 29 February, 2024; v1 submitted 11 October, 2023;
originally announced October 2023.
-
Benzophenone Semicarbazones as Potential alpha-glucosidase and Prolyl Endopeptidase Inhibitor: In-vitro free radical scavenging, enzyme inhibition, mechanistic, and molecular docking studies
Authors:
Qurat-ul-Ain Sidra Rafi,
Khairullah,
Saeedullah,
Arshia Arshia,
Reaz Uddin,
Atia-ul-Wahab,
Khalid Mohammed Khan,
M. Iqbal Choudhary
Abstract:
$α$-glucosidase and prolylendopeptidase has altered expression and activity patterns in neurological disease, type 2diabetes respectively and several cancers. Here we screened a series 1-29 benzophenone semicarbazone derivatives for in vitro free radical scavenging, alpha-glucosidase and prolylendopeptidase inhibition activities. Seven derivatives were identified as potential free radical scavenge…
▽ More
$α$-glucosidase and prolylendopeptidase has altered expression and activity patterns in neurological disease, type 2diabetes respectively and several cancers. Here we screened a series 1-29 benzophenone semicarbazone derivatives for in vitro free radical scavenging, alpha-glucosidase and prolylendopeptidase inhibition activities. Seven derivatives were identified as potential free radical scavengers, 14 as alpha-glucosidase, and 9 as prolylendopeptidase inhibitors. Kinetic studies on the most promising inhibitors were performed. Compounds 23, 27, 25 and 28 were found as inhibitor of alpha-glucosidase, while compound 26 inhibited both prolylendopeptidase and alpha-glucosidase. The binding modes and binding free energy of the multi targeted inhibitor 26 were predicted by molecular docking studies. These results provide insights on prolylendopeptidase and alpha-glucosidase inhibition of compound 26 for further development as therapeutic agents for neoplastic, neurological, and endocrine disorders.
△ Less
Submitted 2 October, 2023;
originally announced October 2023.
-
Estimation of In-Vitro Free Radical Scavenging and Cytotoxic Activities of Thiocarbohydrazones Derivatives
Authors:
Qurat-ul-Ain,
Munira Taj Muhammad Khalid Mohammed Khan,
M. Iqbal Choudhary
Abstract:
Objective: To investigate free radical scavenging potential of thiocarbohydrazones derivatives for the discovery of antioxidant compounds of synthetic origin. Method: Eighteen thiocarbohydrazones derivatives were screened for antioxidant activities by using in vitro radical inhibition assay. Cytotoxicity all derivatives were evaluated using invitro cytotoxicity assay on mouse fibroblast cell line.…
▽ More
Objective: To investigate free radical scavenging potential of thiocarbohydrazones derivatives for the discovery of antioxidant compounds of synthetic origin. Method: Eighteen thiocarbohydrazones derivatives were screened for antioxidant activities by using in vitro radical inhibition assay. Cytotoxicity all derivatives were evaluated using invitro cytotoxicity assay on mouse fibroblast cell line. Results: various compounds of the have shown significant radical scavenging activities as compared with the standard drug butylated hydroxytoluene. In addition in an in vitro cell cytotoxicity assay selected analogues were found to be non-cytotoxic against fibroblast 3T3 cell line. Conclusion: Taken together, these findings all compound this series could be further evaluated in in vivo model of oxidative stress to develop as a therapeutic agent against oxidative stress related disorders due to exhibiting excellent free radical scavenging properties and having their non cytotoxic nature against normal cells.
△ Less
Submitted 2 October, 2023;
originally announced October 2023.
-
Randomize to Generalize: Domain Randomization for Runway FOD Detection
Authors:
Javaria Farooq,
Nayyer Aafaq,
M Khizer Ali Khan,
Ammar Saleem,
M Ibraheem Siddiqui
Abstract:
Tiny Object Detection is challenging due to small size, low resolution, occlusion, background clutter, lighting conditions and small object-to-image ratio. Further, object detection methodologies often make underlying assumption that both training and testing data remain congruent. However, this presumption often leads to decline in performance when model is applied to out-of-domain(unseen) data.…
▽ More
Tiny Object Detection is challenging due to small size, low resolution, occlusion, background clutter, lighting conditions and small object-to-image ratio. Further, object detection methodologies often make underlying assumption that both training and testing data remain congruent. However, this presumption often leads to decline in performance when model is applied to out-of-domain(unseen) data. Techniques like synthetic image generation are employed to improve model performance by leveraging variations in input data. Such an approach typically presumes access to 3D-rendered datasets. In contrast, we propose a novel two-stage methodology Synthetic Randomized Image Augmentation (SRIA), carefully devised to enhance generalization capabilities of models encountering 2D datasets, particularly with lower resolution which is more practical in real-world scenarios. The first stage employs a weakly supervised technique to generate pixel-level segmentation masks. Subsequently, the second stage generates a batch-wise synthesis of artificial images, carefully designed with an array of diverse augmentations. The efficacy of proposed technique is illustrated on challenging foreign object debris (FOD) detection. We compare our results with several SOTA models including CenterNet, SSD, YOLOv3, YOLOv4, YOLOv5, and Outer Vit on a publicly available FOD-A dataset. We also construct an out-of-distribution test set encompassing 800 annotated images featuring a corpus of ten common categories. Notably, by harnessing merely 1.81% of objects from source training data and amalgamating with 29 runway background images, we generate 2227 synthetic images. Subsequent model retraining via transfer learning, utilizing enriched dataset generated by domain randomization, demonstrates significant improvement in detection accuracy. We report that detection accuracy improved from an initial 41% to 92% for OOD test set.
△ Less
Submitted 23 September, 2023;
originally announced September 2023.
-
Enhancing Congestion Control to Improve User Experience in IoT Using LSTM Network
Authors:
Atta Ur Rahman,
Bibi Saqia,
Wali Ullah Khan,
Khaled Rabie,
Mahmood Alam,
Khairullah Khan
Abstract:
This study suggests a new strategy for improving congestion control by deploying Long Short-Term Memory (LSTM) networks. LSTMs are recurrent neural networks (RNN), that excel at capturing temporal relationships and patterns in data. IoT-specific data such as network traffic patterns, device interactions, and congestion occurrences are gathered and analyzed. The gathered data is used to create and…
▽ More
This study suggests a new strategy for improving congestion control by deploying Long Short-Term Memory (LSTM) networks. LSTMs are recurrent neural networks (RNN), that excel at capturing temporal relationships and patterns in data. IoT-specific data such as network traffic patterns, device interactions, and congestion occurrences are gathered and analyzed. The gathered data is used to create and train an LSTM network architecture specific to the IoT environment. Then, the LSTM model's predictive skills are incorporated into the congestion control methods. This work intends to optimize congestion management methods using LSTM networks, which results in increased user satisfaction and dependable IoT connectivity. Utilizing metrics like throughput, latency, packet loss, and user satisfaction, the success of the suggested strategy is evaluated. Evaluation of performance includes rigorous testing and comparison to conventional congestion control methods.
△ Less
Submitted 19 September, 2023;
originally announced September 2023.
-
A Reinforcement Learning Framework with Region-Awareness and Shared Path Experience for Efficient Routing in Networks-on-Chip
Authors:
Kamil Khan,
Sudeep Pasricha
Abstract:
Network-on-chip (NoC) architectures provide a scalable, high-performance, and reliable interconnect for emerging manycore systems. The routing policies used in NoCs have a significant impact on overall performance. Prior efforts have proposed reinforcement learning (RL)-based adaptive routing policies to avoid congestion and minimize latency in NoCs. The output quality of RL policies depends on se…
▽ More
Network-on-chip (NoC) architectures provide a scalable, high-performance, and reliable interconnect for emerging manycore systems. The routing policies used in NoCs have a significant impact on overall performance. Prior efforts have proposed reinforcement learning (RL)-based adaptive routing policies to avoid congestion and minimize latency in NoCs. The output quality of RL policies depends on selecting a representative cost function and an effective update mechanism. Unfortunately, existing RL policies for NoC routing fail to represent path contention and regional congestion in the cost function. Moreover, the experience of packet flows sharing the same route is not fully incorporated into the RL update mechanism. In this paper, we present a novel regional congestion-aware RL-based NoC routing policy called Q-RASP that is capable of sharing experience from packets using the same routes. Q-RASP improves average packet latency by up to 18.3% and reduces NoC energy consumption by up to 6.7% with minimal area overheads compared to state-of-the-art RL-based NoC routing implementations.
△ Less
Submitted 21 July, 2023;
originally announced July 2023.
-
Quantum coherence and the principle of microscopic reversibility
Authors:
K. Khan,
W. F. Magalhaes,
Jailson S. Araujo,
B. de Lima Bernardo,
Gabriel H. Aguilar
Abstract:
The principle of microscopic reversibility is a fundamental element in the formulation of fluctuation relations and the Onsager reciprocal relations. As such, a clear description of whether and how this principle is adapted to the quantum mechanical scenario might be essential to a better understanding of nonequilibrium quantum processes. Here, we propose a quantum generalization of this principle…
▽ More
The principle of microscopic reversibility is a fundamental element in the formulation of fluctuation relations and the Onsager reciprocal relations. As such, a clear description of whether and how this principle is adapted to the quantum mechanical scenario might be essential to a better understanding of nonequilibrium quantum processes. Here, we propose a quantum generalization of this principle, which highlights the role played by coherence in the symmetry relations involving the probability of observing a quantum transition and that of the corresponding time reversed process. We study the implications of our findings in the framework of a qubit system interacting with a thermal reservoir, and implement an optical experiment that simulates the dynamics. Our theoretical and experimental results show that the influence of coherence is more decisive at low temperatures and that the maximum departure from the classical case does not take place for maximally coherent states. Classical predictions are recovered in the appropriate limits.
△ Less
Submitted 24 October, 2023; v1 submitted 17 July, 2023;
originally announced July 2023.
-
Serious Games: An Updated Systematic Literature Review
Authors:
Shuja Ud Din,
Muhammad Zeeshan Baig,
Muhammad Khateeb Khan
Abstract:
Serious games are simulation software designed to assist people in learning the practical concepts of various application fields such as Health, wellness, Education and Culture. People improve their individual knowledge, skills and attitude through training. This study identified the changing trends with existing studied applications, approaches and methods. We collected 37 papers from Google Scho…
▽ More
Serious games are simulation software designed to assist people in learning the practical concepts of various application fields such as Health, wellness, Education and Culture. People improve their individual knowledge, skills and attitude through training. This study identified the changing trends with existing studied applications, approaches and methods. We collected 37 papers from Google Scholar, Elsevier, Springer, IEEE Xplore and ACM Digital library. We have collected the evidence answer to six research questions and analyzed the result and identify the change in trends with the comparison with previous systematic literature review (SLR) results. We achieved the best results by techniques (questionnaires and interviews) and procedure (pre/post). Our findings will be useful for practitioners and researchers who can test serious games in different fields.
△ Less
Submitted 31 May, 2023;
originally announced June 2023.
-
5G/6G-Enabled Metaverse Technologies: Taxonomy, Applications, and Open Security Challenges with Future Research Directions
Authors:
Muhammad Adil,
Houbing Song,
Muhammad Khurram Khan,
Ahmed Farouk,
Zhanpeng **
Abstract:
Internet technology has proven to be a vital contributor to many cutting-edge innovations that have given humans access to interact virtually with objects. Until now, numerous virtual systems had been developed for digital transformation to enable access to thousands of services and applications that range from virtual gaming to social networks. However, the majority of these systems lack to maint…
▽ More
Internet technology has proven to be a vital contributor to many cutting-edge innovations that have given humans access to interact virtually with objects. Until now, numerous virtual systems had been developed for digital transformation to enable access to thousands of services and applications that range from virtual gaming to social networks. However, the majority of these systems lack to maintain consistency during interconnectivity and communication. To explore this discussion, in the recent past a new term, Metaverse has been introduced, which is the combination of meta and universe that describes a shared virtual environment, where a number of technologies, such as 4th and 5th generation technologies, VR, ML algorithms etc., work collectively to support each other for the sake of one objective, which is the virtual accessibility of objects via one network platform. With the development, integration, and virtualization of technologies, a lot of improvement in daily life applications is expected, but at the same time, there is a big challenge for the research community to secure this platform from external and external threats, because this technology is exposed to many cybersecurity attacks. Hence, it is imperative to systematically review and understand the taxonomy, applications, open security challenges, and future research directions of the emerging Metaverse technologies. In this paper, we have made useful efforts to present a comprehensive survey regarding Metaverse technology by taking into account the aforesaid parameters. Following this, in the initial phase, we explored the future of Metaverse in the presence of 4th and 5th generation technologies. Thereafter, we discussed the possible attacks to set a preface for the open security challenges. Based on that, we suggested potential research directions that could be beneficial to address these challenges cost-effectively.
△ Less
Submitted 25 May, 2023;
originally announced May 2023.
-
Interfacial origin of unconventional spin-orbit torque in Py/$γ-$IrMn$_{3}$
Authors:
Akash Kumar,
Pankhuri Gupta,
Niru Chowdhury,
Kacho Imtiyaz Ali Khan,
Utkarsh Shashank,
Surbhi Gupta,
Yasuhiro Fukuma,
Sujeet Chaudhary,
Pranaba Kishor Muduli
Abstract:
Angle-resolved spin-torque ferromagnetic resonance measurements are carried out in heterostructures consisting of Py (Ni$_{81}$Fe$_{19}$) and a noncollinear antiferromagnetic quantum material $γ-$IrMn$_{3}$. The structural characterization reveals that $γ-$IrMn$_{3}$ is polycrystalline in nature. A large exchange bias of 158~Oe is found in Py/$γ-$IrMn$_{3}$ at room temperature, while $γ-$IrMn…
▽ More
Angle-resolved spin-torque ferromagnetic resonance measurements are carried out in heterostructures consisting of Py (Ni$_{81}$Fe$_{19}$) and a noncollinear antiferromagnetic quantum material $γ-$IrMn$_{3}$. The structural characterization reveals that $γ-$IrMn$_{3}$ is polycrystalline in nature. A large exchange bias of 158~Oe is found in Py/$γ-$IrMn$_{3}$ at room temperature, while $γ-$IrMn$_{3}$/Py and Py/Cu/$γ-$IrMn$_{3}$ exhibited no exchange bias. Regardless of the exchange bias and stacking sequence, we observe a substantial unconventional out-of-plane anti-dam** torque when $γ-$IrMn$_{3}$ is in direct contact with Py. The magnitude of the out-of-plane spin-orbit torque efficiency is found to be twice as large as the in-plane spin-orbit torque efficiency. The unconventional spin-orbit torque vanishes when a Cu spacer is introduced between Py and $γ-$IrMn$_{3}$, indicating that the unconventional spin-orbit torque in this system originates at the interface. These findings are important for realizing efficient antiferromagnet-based spintronic devices via interfacial engineering.
△ Less
Submitted 8 May, 2023;
originally announced May 2023.
-
Global quantum discord and von Neumann entropy in multipartite two-level atomic systems
Authors:
M. Ibrahim,
M. Usman,
Khalid Khan
Abstract:
We have computed the global quantum discord and von Neumann entropy of multipartite two-level atomic systems interacting with a single-mode Fock field. We use Tavis-Cumming model. We have explored how quantum correlations and quantum entanglement evolve with time in such systems. The quantum system is prepared initially in a mixed state and different parameters are varied to see how they affect th…
▽ More
We have computed the global quantum discord and von Neumann entropy of multipartite two-level atomic systems interacting with a single-mode Fock field. We use Tavis-Cumming model. We have explored how quantum correlations and quantum entanglement evolve with time in such systems. The quantum system is prepared initially in a mixed state and different parameters are varied to see how they affect the information processing in the system. The dynamical character of the global quantum discord and von Neumann entropy show an interplay between classical and non-classical correlations. Photons in this model play an important role to assist the global quantum discord and von Neumann entropy and we observed that the effects of the field on the global quantum discord and von Neumann entropy reside in the time evolution of the system indicating that both atom and field states have become entangled. The global quantum discord is assisted in a non-linear fashion with the number of photons in the system. The global quantum discord and von Neumann entropy show linear behavior with each other in the dynamics of the system. The effects of intrinsic decoherence on the dynamics of the global quantum discord and von Neumann entropy are also studied. We have extrapolated the results for a large photon number on the system. We have studied the effect of the change in the size of the system on the maximum value of global quantum discord and von Neumann entropy and we have estimated the scaling coefficients for this behavior.
△ Less
Submitted 23 March, 2023;
originally announced March 2023.
-
Gyroid-like metamaterials: Topology optimization and Deep Learning
Authors:
Asha Viswanath,
Diab W Abueidda,
Mohamad Modrek,
Kamran A Khan,
Seid Koric,
Rashid K. Abu Al-Rub
Abstract:
Triply periodic minimal surface (TPMS) metamaterials characterized by mathematically-controlled topologies exhibit better mechanical properties compared to uniform structures. The unit cell topology of such metamaterials can be further optimized to improve a desired mechanical property for a specific application. However, such inverse design involves multiple costly 3D finite element analyses in t…
▽ More
Triply periodic minimal surface (TPMS) metamaterials characterized by mathematically-controlled topologies exhibit better mechanical properties compared to uniform structures. The unit cell topology of such metamaterials can be further optimized to improve a desired mechanical property for a specific application. However, such inverse design involves multiple costly 3D finite element analyses in topology optimization and hence has not been attempted. Data-driven models have recently gained popularity as surrogate models in the geometrical design of metamaterials. Gyroid-like unit cells are designed using a novel voxel algorithm, a homogenization-based topology optimization, and a Heaviside filter to attain optimized densities of 0-1 configuration. Few optimization data are used as input-output for supervised learning of the topology optimization process from a 3D CNN model. These models could then be used to instantaneously predict the optimized unit cell geometry for any topology parameters, thus alleviating the need to run any topology optimization for future design. The high accuracy of the model was demonstrated by a low mean square error metric and a high dice coefficient metric. This accelerated design of 3D metamaterials opens the possibility of designing any computationally costly problems involving complex geometry of metamaterials with multi-objective properties or multi-scale applications.
△ Less
Submitted 17 March, 2023;
originally announced March 2023.
-
Single and two-cells shape analysis from energy functionals for three-dimensional vertex models
Authors:
Ahmad K. Khan,
Cécilia Olivesi,
Jose J. Muñoz
Abstract:
Vertex models have been extensively used for simulating the evolution of multicellular systems, and have given rise to important global properties concerning their macroscopic rheology or jamming transitions. These models are based on the definition of an energy functional, which fully determines the cellular response and conclusions. While two-dimensional vertex models have been widely employed,…
▽ More
Vertex models have been extensively used for simulating the evolution of multicellular systems, and have given rise to important global properties concerning their macroscopic rheology or jamming transitions. These models are based on the definition of an energy functional, which fully determines the cellular response and conclusions. While two-dimensional vertex models have been widely employed, three-dimensional models are far more scarce, mainly due to the large amount of configurations that they may adopt and the complex geometrical transitions they undergo. We here investigate the shape of single and two-cells configurations as a function of the energy terms, and we study the dependence of the final shape on the model parameters: namely the exponent of the term penalising cell-cell adhesion and surface contractility. In single cell analysis, we deduce analytically the radius and limit values of the contractility for linear and quadratic surface energy terms, in 2D and 3D. In two-cells systems, we deduce the evolution of the aspect ratio. While in functionals with linear surface terms yield the same aspect ratio in 2D and 3D, the configurations when using quadratic surface terms are distinct. We relate our results with well-known solutions from capillarity theory, and verify our analytical findings with a three-dimensional vertex model.
△ Less
Submitted 29 June, 2023; v1 submitted 7 February, 2023;
originally announced February 2023.
-
Pluto's Surface Map** using Unsupervised Learning from Near-Infrared Observations of LEISA/Ralph
Authors:
A. Emran,
C. M. Dalle Ore,
C. J. Ahrens,
M. K. H. Khan,
V. F. Chevrier,
D. P. Cruikshank
Abstract:
We map the surface of Pluto using an unsupervised machine learning technique using the near-infrared observations of the LEISA/Ralph instrument onboard NASA's New Horizons spacecraft. The principal component reduced Gaussian mixture model was implemented to investigate the geographic distribution of the surface units across the dwarf planet. We also present the likelihood of each surface unit at t…
▽ More
We map the surface of Pluto using an unsupervised machine learning technique using the near-infrared observations of the LEISA/Ralph instrument onboard NASA's New Horizons spacecraft. The principal component reduced Gaussian mixture model was implemented to investigate the geographic distribution of the surface units across the dwarf planet. We also present the likelihood of each surface unit at the image pixel level. Average I/F spectra of each unit were analyzed -- in terms of the position and strengths of absorption bands of abundant volatiles such as N${}_{2}$, CH${}_{4}$, and CO and nonvolatile H${}_{2}$O -- to connect the unit to surface composition, geology, and geographic location. The distribution of surface units shows a latitudinal pattern with distinct surface compositions of volatiles -- consistent with the existing literature. However, previous map** efforts were based primarily on compositional analysis using spectral indices (indicators) or implementation of complex radiative transfer models, which need (prior) expert knowledge, label data, or optical constants of representative endmembers. We prove that an application of unsupervised learning in this instance renders a satisfactory result in map** the spatial distribution of ice compositions without any prior information or label data. Thus, such an application is specifically advantageous for a planetary surface map** when label data are poorly constrained or completely unknown, because an understanding of surface material distribution is vital for volatile transport modeling at the planetary scale. We emphasize that the unsupervised learning used in this study has wide applicability and can be expanded to other planetary bodies of the Solar System for map** surface material distribution.
△ Less
Submitted 15 January, 2023;
originally announced January 2023.
-
Re-thinking Spatial Confounding in Spatial Linear Mixed Models
Authors:
Kori Khan,
Candace Berrett
Abstract:
In the last two decades, considerable research has been devoted to a phenomenon known as spatial confounding. Spatial confounding is thought to occur when there is multicollinearity between a covariate and the random effect in a spatial regression model. This multicollinearity is considered highly problematic when the inferential goal is estimating regression coefficients and various methodologies…
▽ More
In the last two decades, considerable research has been devoted to a phenomenon known as spatial confounding. Spatial confounding is thought to occur when there is multicollinearity between a covariate and the random effect in a spatial regression model. This multicollinearity is considered highly problematic when the inferential goal is estimating regression coefficients and various methodologies have been proposed to attempt to alleviate it. Recently, it has become apparent that many of these methodologies are flawed, yet the field continues to expand. In this paper, we offer a novel perspective of synthesizing the work in the field of spatial confounding. We propose that at least two distinct phenomena are currently conflated with the term spatial confounding. We refer to these as the ``analysis model'' and the ``data generation'' types of spatial confounding. We show that these two issues can lead to contradicting conclusions about whether spatial confounding exists and whether methods to alleviate it will improve inference. Our results also illustrate that in most cases, traditional spatial linear mixed models do help to improve inference on regression coefficients. Drawing on the insights gained, we offer a path forward for research in spatial confounding.
△ Less
Submitted 21 June, 2024; v1 submitted 13 January, 2023;
originally announced January 2023.
-
A Generalized Variable Importance Metric and Estimator for Black Box Machine Learning Models
Authors:
Mohammad Kaviul Anam Khan,
Olli Saarela,
Rafal Kustra
Abstract:
In this paper we define a population parameter, ``Generalized Variable Importance Metric (GVIM)'', to measure importance of predictors for black box machine learning methods, where the importance is not represented by model-based parameter. GVIM is defined for each input variable, using the true conditional expectation function, and it measures the variable's importance in affecting a continuous o…
▽ More
In this paper we define a population parameter, ``Generalized Variable Importance Metric (GVIM)'', to measure importance of predictors for black box machine learning methods, where the importance is not represented by model-based parameter. GVIM is defined for each input variable, using the true conditional expectation function, and it measures the variable's importance in affecting a continuous or a binary response. We extend previously published results to show that the defined GVIM can be represented as a function of the Conditional Average Treatment Effect (CATE) for any kind of a predictor, which gives it a causal interpretation and further justification as an alternative to classical measures of significance that are only available in simple parametric models. Extensive set of simulations using realistically complex relationships between covariates and outcomes and number of regression techniques of varying degree of complexity show the performance of our proposed estimator of the GVIM.
△ Less
Submitted 23 December, 2023; v1 submitted 19 December, 2022;
originally announced December 2022.
-
Shapes2Toon: Generating Cartoon Characters from Simple Geometric Shapes
Authors:
Simanta Deb Turja,
Mohammad Imrul Jubair,
Md. Shafiur Rahman,
Md. Hasib Al Zadid,
Mohtasim Hossain Shovon,
Md. Faraz Kabir Khan
Abstract:
Cartoons are an important part of our entertainment culture. Though drawing a cartoon is not for everyone, creating it using an arrangement of basic geometric primitives that approximates that character is a fairly frequent technique in art. The key motivation behind this technique is that human bodies - as well as cartoon figures - can be split down into various basic geometric primitives. Numero…
▽ More
Cartoons are an important part of our entertainment culture. Though drawing a cartoon is not for everyone, creating it using an arrangement of basic geometric primitives that approximates that character is a fairly frequent technique in art. The key motivation behind this technique is that human bodies - as well as cartoon figures - can be split down into various basic geometric primitives. Numerous tutorials are available that demonstrate how to draw figures using an appropriate arrangement of fundamental shapes, thus assisting us in creating cartoon characters. This technique is very beneficial for children in terms of teaching them how to draw cartoons. In this paper, we develop a tool - shape2toon - that aims to automate this approach by utilizing a generative adversarial network which combines geometric primitives (i.e. circles) and generate a cartoon figure (i.e. Mickey Mouse) depending on the given approximation. For this purpose, we created a dataset of geometrically represented cartoon characters. We apply an image-to-image translation technique on our dataset and report the results in this paper. The experimental results show that our system can generate cartoon characters from input layout of geometric shapes. In addition, we demonstrate a web-based tool as a practical implication of our work.
△ Less
Submitted 3 November, 2022;
originally announced November 2022.
-
Book Cover Synthesis from the Summary
Authors:
Emdadul Haque,
Md. Faraz Kabir Khan,
Mohammad Imrul Jubair,
Jarin Anjum,
Abrar Zahir Niloy
Abstract:
The cover is the face of a book and is a point of attraction for the readers. Designing book covers is an essential task in the publishing industry. One of the main challenges in creating a book cover is representing the theme of the book's content in a single image. In this research, we explore ways to produce a book cover using artificial intelligence based on the fact that there exists a relati…
▽ More
The cover is the face of a book and is a point of attraction for the readers. Designing book covers is an essential task in the publishing industry. One of the main challenges in creating a book cover is representing the theme of the book's content in a single image. In this research, we explore ways to produce a book cover using artificial intelligence based on the fact that there exists a relationship between the summary of the book and its cover. Our key motivation is the application of text-to-image synthesis methods to generate images from given text or captions. We explore several existing text-to-image conversion techniques for this purpose and propose an approach to exploit these frameworks for producing book covers from provided summaries. We construct a dataset of English books that contains a large number of samples of summaries of existing books and their cover images. In this paper, we describe our approach to collecting, organizing, and pre-processing the dataset to use it for training models. We apply different text-to-image synthesis techniques to generate book covers from the summary and exhibit the results in this paper.
△ Less
Submitted 3 November, 2022;
originally announced November 2022.
-
ImageCAS: A Large-Scale Dataset and Benchmark for Coronary Artery Segmentation based on Computed Tomography Angiography Images
Authors:
An Zeng,
Chunbiao Wu,
Mei** Huang,
Jian Zhuang,
Shanshan Bi,
Dan Pan,
Najeeb Ullah,
Kaleem Nawaz Khan,
Tianchen Wang,
Yiyu Shi,
Xiaomeng Li,
Guisen Lin,
Xiaowei Xu
Abstract:
Cardiovascular disease (CVD) accounts for about half of non-communicable diseases. Vessel stenosis in the coronary artery is considered to be the major risk of CVD. Computed tomography angiography (CTA) is one of the widely used noninvasive imaging modalities in coronary artery diagnosis due to its superior image resolution. Clinically, segmentation of coronary arteries is essential for the diagno…
▽ More
Cardiovascular disease (CVD) accounts for about half of non-communicable diseases. Vessel stenosis in the coronary artery is considered to be the major risk of CVD. Computed tomography angiography (CTA) is one of the widely used noninvasive imaging modalities in coronary artery diagnosis due to its superior image resolution. Clinically, segmentation of coronary arteries is essential for the diagnosis and quantification of coronary artery disease. Recently, a variety of works have been proposed to address this problem. However, on one hand, most works rely on in-house datasets, and only a few works published their datasets to the public which only contain tens of images. On the other hand, their source code have not been published, and most follow-up works have not made comparison with existing works, which makes it difficult to judge the effectiveness of the methods and hinders the further exploration of this challenging yet critical problem in the community. In this paper, we propose a large-scale dataset for coronary artery segmentation on CTA images. In addition, we have implemented a benchmark in which we have tried our best to implement several typical existing methods. Furthermore, we propose a strong baseline method which combines multi-scale patch fusion and two-stage processing to extract the details of vessels. Comprehensive experiments show that the proposed method achieves better performance than existing works on the proposed large-scale dataset. The benchmark and the dataset are published at https://github.com/XiaoweiXu/ImageCAS-A-Large-Scale-Dataset-and-Benchmark-for-Coronary-Artery-Segmentation-based-on-CT.
△ Less
Submitted 17 October, 2023; v1 submitted 3 November, 2022;
originally announced November 2022.
-
Shining a Light on Forensic Black-Box Studies
Authors:
Kori Khan,
Alicia L. Carriquiry
Abstract:
Forensic science plays a critical role in the United States criminal justice system. For decades, many feature-based fields of forensic science, such as firearm and toolmark identification, developed outside the scientific community's purview. The results of these studies are widely relied on by judges nationwide. However, this reliance is misplaced. Black-box studies to date suffer from inappropr…
▽ More
Forensic science plays a critical role in the United States criminal justice system. For decades, many feature-based fields of forensic science, such as firearm and toolmark identification, developed outside the scientific community's purview. The results of these studies are widely relied on by judges nationwide. However, this reliance is misplaced. Black-box studies to date suffer from inappropriate sampling methods and high rates of missingness. Current black-box studies ignore both problems in arriving at the error rate estimates presented to courts. We explore the impact of each type of limitation using available data from black-box studies and court materials. We show that black-box studies rely on non-representative samples of examiners. Using a case study of a popular ballistics study, we find evidence that these unrepresentative samples may commit fewer errors than the wider population from which they came. We also find evidence that the missingness in black-box studies is non-ignorable. Using data from a recent latent print study, we show that ignoring this missingness likely results in systematic underestimates of error rates. Finally, we offer concrete steps to overcome these limitations.
△ Less
Submitted 1 June, 2023; v1 submitted 28 September, 2022;
originally announced September 2022.
-
Artificial Intelligence for Cybersecurity: Threats, Attacks and Mitigation
Authors:
Abhilash Chakraborty,
Anupam Biswas,
Ajoy Kumar Khan
Abstract:
With the advent of the digital era, every day-to-day task is automated due to technological advances. However, technology has yet to provide people with enough tools and safeguards. As the internet connects more-and-more devices around the globe, the question of securing the connected devices grows at an even spiral rate. Data thefts, identity thefts, fraudulent transactions, password compromises,…
▽ More
With the advent of the digital era, every day-to-day task is automated due to technological advances. However, technology has yet to provide people with enough tools and safeguards. As the internet connects more-and-more devices around the globe, the question of securing the connected devices grows at an even spiral rate. Data thefts, identity thefts, fraudulent transactions, password compromises, and system breaches are becoming regular everyday news. The surging menace of cyber-attacks got a jolt from the recent advancements in Artificial Intelligence. AI is being applied in almost every field of different sciences and engineering. The intervention of AI not only automates a particular task but also improves efficiency by many folds. So it is evident that such a scrumptious spread would be very appetizing to cybercriminals. Thus the conventional cyber threats and attacks are now ``intelligent" threats. This article discusses cybersecurity and cyber threats along with both conventional and intelligent ways of defense against cyber-attacks. Furthermore finally, end the discussion with the potential prospects of the future of AI in cybersecurity.
△ Less
Submitted 27 September, 2022;
originally announced September 2022.
-
Large spin Hall conductivity in epitaxial thin films of kagome antiferromagnet Mn$_3$Sn at room temperature
Authors:
Himanshu Bangar,
Kacho Imtiyaz Ali Khan,
Akash Kumar,
Niru Chowdhury,
Prasanta Kumar Muduli,
Pranaba Kishor Muduli
Abstract:
Mn$_3$Sn is a non-collinear antiferromagnetic quantum material that exhibits a magnetic Weyl semimetallic state and has great potential for efficient memory devices. High-quality epitaxial $c$-plane Mn$_3$Sn thin films have been grown on a sapphire substrate using a Ru seed layer. Using spin pum** induced inverse spin Hall effect measurements on $c$-plane epitaxial Mn$_3$Sn/Ni$_{80}$Fe$_{20}$, w…
▽ More
Mn$_3$Sn is a non-collinear antiferromagnetic quantum material that exhibits a magnetic Weyl semimetallic state and has great potential for efficient memory devices. High-quality epitaxial $c$-plane Mn$_3$Sn thin films have been grown on a sapphire substrate using a Ru seed layer. Using spin pum** induced inverse spin Hall effect measurements on $c$-plane epitaxial Mn$_3$Sn/Ni$_{80}$Fe$_{20}$, we measure spin-diffusion length ($λ_{\rm Mn_3Sn}$), and spin Hall conductivity ($σ_{\rm{SH}}$) of Mn$_3$Sn thin films: $λ_{\rm Mn_3Sn}=0.42\pm 0.04$ nm and $σ_{\rm{SH}}=-702~\hbar/ e~Ω^{-1}$cm$^{-1}$. While $λ_{\rm Mn_3Sn}$ is consistent with earlier studies, $σ_{\rm{SH}}$ is an order of magnitude higher and of the opposite sign. The behavior is explained on the basis of excess Mn, which shifts the Fermi level in our films, leading to the observed behavior. Our findings demonstrate a technique for engineering $σ_{\rm{SH}}$ of Mn$_3$Sn films by employing Mn composition for functional spintronic devices.
△ Less
Submitted 6 September, 2022;
originally announced September 2022.
-
DeformIrisNet: An Identity-Preserving Model of Iris Texture Deformation
Authors:
Siamul Karim Khan,
Patrick Tinsley,
Adam Czajka
Abstract:
Nonlinear iris texture deformations due to pupil size variations are one of the main factors responsible for within-class variance of genuine comparison scores in iris recognition. In dominant approaches to iris recognition, the size of a ring-shaped iris region is linearly scaled to a canonical rectangle, used further in encoding and matching. However, the biological complexity of the iris sphinc…
▽ More
Nonlinear iris texture deformations due to pupil size variations are one of the main factors responsible for within-class variance of genuine comparison scores in iris recognition. In dominant approaches to iris recognition, the size of a ring-shaped iris region is linearly scaled to a canonical rectangle, used further in encoding and matching. However, the biological complexity of the iris sphincter and dilator muscles causes the movements of iris features to be nonlinear in a function of pupil size, and not solely organized along radial paths. Alternatively to the existing theoretical models based on the biomechanics of iris musculature, in this paper we propose a novel deep autoencoder-based model that can effectively learn complex movements of iris texture features directly from the data. The proposed model takes two inputs, (a) an ISO-compliant near-infrared iris image with initial pupil size, and (b) the binary mask defining the target shape of the iris. The model makes all the necessary nonlinear deformations to the iris texture to match the shape of the iris in an image (a) with the shape provided by the target mask (b). The identity-preservation component of the loss function helps the model in finding deformations that preserve identity and not only the visual realism of the generated samples. We also demonstrate two immediate applications of this model: better compensation for iris texture deformations in iris recognition algorithms, compared to linear models, and the creation of a generative algorithm that can aid human forensic examiners, who may need to compare iris images with a large difference in pupil dilation. We offer the source codes and model weights available along with this paper.
△ Less
Submitted 18 October, 2022; v1 submitted 18 July, 2022;
originally announced July 2022.
-
Deformation of Nanowires and Nanotubes
Authors:
Aatif Kaisar Khan,
Salman Sajad Wani,
Aasiya Shaikh,
Yas Yamin,
Naveed Ahmad Shah,
Yermek O. Aitenov,
Mir Faizal,
Suhail Lone
Abstract:
In this article, we have investigated the consequences of the next to the leading order correction to the effective field theory of nanostructures. This has been done by analyzing the effects of deformed Heisenberg algebra on nanowires and nanotubes. We first deform the Schrodinger equation with cylindrical topology. Then specific solutions to the deformed Schrodinger equation with different bound…
▽ More
In this article, we have investigated the consequences of the next to the leading order correction to the effective field theory of nanostructures. This has been done by analyzing the effects of deformed Heisenberg algebra on nanowires and nanotubes. We first deform the Schrodinger equation with cylindrical topology. Then specific solutions to the deformed Schrodinger equation with different boundary conditions are studied. These deformed solutions are used to investigate the consequences of the deformation on the energy of nanowires and nanotubes.
△ Less
Submitted 10 April, 2023; v1 submitted 14 July, 2022;
originally announced July 2022.
-
RACE: A Reinforcement Learning Framework for Improved Adaptive Control of NoC Channel Buffers
Authors:
Kamil Khan,
Sudeep Pasricha,
Ryan Gary Kim
Abstract:
Network-on-chip (NoC) architectures rely on buffers to store flits to cope with contention for router resources during packet switching. Recently, reversible multi-function channel (RMC) buffers have been proposed to simultaneously reduce power and enable adaptive NoC buffering between adjacent routers. While adaptive buffering can improve NoC performance by maximizing buffer utilization, controll…
▽ More
Network-on-chip (NoC) architectures rely on buffers to store flits to cope with contention for router resources during packet switching. Recently, reversible multi-function channel (RMC) buffers have been proposed to simultaneously reduce power and enable adaptive NoC buffering between adjacent routers. While adaptive buffering can improve NoC performance by maximizing buffer utilization, controlling the RMC buffer allocations requires a congestion-aware, scalable, and proactive policy. In this work, we present RACE, a novel reinforcement learning (RL) framework that utilizes better awareness of network congestion and a new reward metric ("falsefulls") to help guide the RL agent towards better RMC buffer control decisions. We show that RACE reduces NoC latency by up to 48.9%, and energy consumption by up to 47.1% against state-of-the-art NoC buffer control policies.
△ Less
Submitted 25 May, 2022;
originally announced May 2022.
-
TRUST XAI: Model-Agnostic Explanations for AI With a Case Study on IIoT Security
Authors:
Maede Zolanvari,
Zebo Yang,
Khaled Khan,
Raj Jain,
Nader Meskin
Abstract:
Despite AI's significant growth, its "black box" nature creates challenges in generating adequate trust. Thus, it is seldom utilized as a standalone unit in IoT high-risk applications, such as critical industrial infrastructures, medical systems, and financial applications, etc. Explainable AI (XAI) has emerged to help with this problem. However, designing appropriately fast and accurate XAI is st…
▽ More
Despite AI's significant growth, its "black box" nature creates challenges in generating adequate trust. Thus, it is seldom utilized as a standalone unit in IoT high-risk applications, such as critical industrial infrastructures, medical systems, and financial applications, etc. Explainable AI (XAI) has emerged to help with this problem. However, designing appropriately fast and accurate XAI is still challenging, especially in numerical applications. Here, we propose a universal XAI model named Transparency Relying Upon Statistical Theory (TRUST), which is model-agnostic, high-performing, and suitable for numerical applications. Simply put, TRUST XAI models the statistical behavior of the AI's outputs in an AI-based system. Factor analysis is used to transform the input features into a new set of latent variables. We use mutual information to rank these variables and pick only the most influential ones on the AI's outputs and call them "representatives" of the classes. Then we use multi-modal Gaussian distributions to determine the likelihood of any new sample belonging to each class. We demonstrate the effectiveness of TRUST in a case study on cybersecurity of the industrial Internet of things (IIoT) using three different cybersecurity datasets. As IIoT is a prominent application that deals with numerical data. The results show that TRUST XAI provides explanations for new random samples with an average success rate of 98%. Compared with LIME, a popular XAI model, TRUST is shown to be superior in the context of performance, speed, and the method of explainability. In the end, we also show how TRUST is explained to the user.
△ Less
Submitted 2 May, 2022;
originally announced May 2022.
-
Intelligent Reflective Surface Deployment in 6G: A Comprehensive Survey
Authors:
Faisal Naeem,
Georges Kaddoum,
Saud Khan,
Komal S. Khan
Abstract:
Intelligent reflecting surfaces (IRSs) are considered a promising technology that can smartly reconfigure the wireless environment to enhance the performance of future wireless networks. However, the deployment of IRSs still faces challenges due to highly dynamic and mobile unmanned aerial vehicle (UAV) enabled wireless environments to achieve higher capacity. This paper sheds light on the differe…
▽ More
Intelligent reflecting surfaces (IRSs) are considered a promising technology that can smartly reconfigure the wireless environment to enhance the performance of future wireless networks. However, the deployment of IRSs still faces challenges due to highly dynamic and mobile unmanned aerial vehicle (UAV) enabled wireless environments to achieve higher capacity. This paper sheds light on the different deployment strategies for IRSs in future terrestrial and non-terrestrial networks. Specifically, in this paper, we introduce key theoretical concepts underlying the IRS paradigm and discuss the design aspects related to the deployment of IRSs in 6G networks. We also explore optimization-based IRS deployment techniques to improve system performance in terrestrial and aerial IRSs. Furthermore, we survey model-free reinforcement learning (RL) techniques from the deployment aspect to address the challenges of achieving higher capacity in complex and mobile IRS-assisted UAV wireless systems. Finally, we highlight challenges and future research directions from the deployment aspect of IRSs for improving system performance for the future 6G network.
△ Less
Submitted 6 November, 2022; v1 submitted 3 April, 2022;
originally announced April 2022.
-
Semidirect product rigidity of group von Neumann algebras arising from class $\mathscr{S}$, inductive limits and fundamental group
Authors:
Sayan Das,
Krishnendu Khan
Abstract:
In this article we study property (T) groups arising from Rips construction in geometric group theory in the spirit of \cite{CDK19} and certain inductive limit groups from this class. Using interplay between Popa's deformation/rigidity and methods in geometric group theory we are able to extend the class of groups considered in \cite{CDK19} that remembers semidirect product features while passing…
▽ More
In this article we study property (T) groups arising from Rips construction in geometric group theory in the spirit of \cite{CDK19} and certain inductive limit groups from this class. Using interplay between Popa's deformation/rigidity and methods in geometric group theory we are able to extend the class of groups considered in \cite{CDK19} that remembers semidirect product features while passing to the group von Neumann algebras. Combining these results with the method developed in \cite{CDHK20} we are able to produce more examples of property (T) group factors with trivial fundamental group. The inductive limit groups do not have property (T) and provides examples of more factors with trivial fundamental group. We are also able to show Cartan rigidity for these groups.
△ Less
Submitted 9 February, 2022;
originally announced February 2022.
-
Privacy of distributed optimality schemes in power networks
Authors:
Andreas Kasis,
Kanwal Khan,
Marios M. Polycarpou,
Stelios Timotheou
Abstract:
The increasing participation of local generation and controllable demand units within the power network motivates the use of distributed schemes for their control. Simultaneously, it raises two issues; achieving an optimal power allocation among these units, and securing the privacy of the generation/demand profiles. This study considers the problem of designing distributed optimality schemes that…
▽ More
The increasing participation of local generation and controllable demand units within the power network motivates the use of distributed schemes for their control. Simultaneously, it raises two issues; achieving an optimal power allocation among these units, and securing the privacy of the generation/demand profiles. This study considers the problem of designing distributed optimality schemes that preserve the privacy of the generation and controllable demand units within the secondary frequency control timeframe. We propose a consensus scheme that includes the generation/demand profiles within its dynamics, kee** this information private when knowledge of its internal dynamics is not available. However, the prosumption profiles may be inferred using knowledge of its internal model. We resolve this by proposing a privacy-preserving scheme which ensures that the generation/demand cannot be inferred from the communicated signals. For both proposed schemes, we provide analytic stability, optimality and privacy guarantees and show that the secondary frequency control objectives are satisfied. The presented schemes are distributed, locally verifiable and applicable to arbitrary network topologies. Our analytic results are verified with simulations on a 140-bus system, where we demonstrate that the proposed schemes offer enhanced privacy properties, enable an optimal power allocation and preserve the stability of the power network.
△ Less
Submitted 30 January, 2023; v1 submitted 25 January, 2022;
originally announced January 2022.
-
Computing with R-INLA: Accuracy and reproducibility with implications for the analysis of COVID-19 data
Authors:
Kori Khan,
Hengrui Luo,
Wenna Xi
Abstract:
The statistical methods used to analyze medical data are becoming increasingly complex. Novel statistical methods increasingly rely on simulation studies to assess their validity. Such assessments typically appear in statistical or computational journals, and the methodology is later introduced to the medical community through tutorials. This can be problematic if applied researchers use the metho…
▽ More
The statistical methods used to analyze medical data are becoming increasingly complex. Novel statistical methods increasingly rely on simulation studies to assess their validity. Such assessments typically appear in statistical or computational journals, and the methodology is later introduced to the medical community through tutorials. This can be problematic if applied researchers use the methodologies in settings that have not been evaluated. In this paper, we explore a case study of one such method that has become popular in the analysis of coronavirus disease 2019 (COVID-19) data. The integrated nested Laplace approximations (INLA), as implemented in the R-INLA package, approximates the marginal posterior distributions of target parameters that would have been obtained from a fully Bayesian analysis. We seek to answer an important question: Does existing research on the accuracy of INLA's approximations support how researchers are currently using it to analyze COVID-19 data? We identify three limitations to work assessing INLA's accuracy: 1) inconsistent definitions of accuracy, 2) a lack of studies validating how researchers are actually using INLA, and 3) a lack of research into the reproducibility of INLA's output. We explore the practical impact of each limitation with simulation studies based on models and data used in COVID-19 research. Our results suggest existing methods of assessing the accuracy of the INLA technique may not support how COVID-19 researchers are using it. Guided in part by our results, we offer a proposed set of minimum guidelines for researchers using statistical methodologies primarily validated through simulation studies.
△ Less
Submitted 1 November, 2021;
originally announced November 2021.
-
Coherent energy fluctuation theorems: theory and experiment
Authors:
K. Khan,
J. Sales Araújo,
W. F. Magalhães,
G. H. Aguilar,
B. de Lima Bernardo
Abstract:
Heat, work and entropy production: the statistical distribution of such quantities are constrained by the fluctuation theorems (FT), which reveal crucial properties about the nature of non-equilibrium dynamics. In this paper we report theoretical and experimental results regarding two FT for a new quantity, named coherent energy, which is an energy form directly associated with the coherences of t…
▽ More
Heat, work and entropy production: the statistical distribution of such quantities are constrained by the fluctuation theorems (FT), which reveal crucial properties about the nature of non-equilibrium dynamics. In this paper we report theoretical and experimental results regarding two FT for a new quantity, named coherent energy, which is an energy form directly associated with the coherences of the quantum state. We also demonstrate that this quantity behaves as a thermodynamic arrow of time for unitary evolutions, that is, in the absence of entropy production. The experiment is implemented in an all-optical setup in which the system is encoded in the polarization of one photon of a pair. The FT are demonstrated using the two-point measurement protocol, executed using the other photon of the pair, allowing to assess the probability distributions directly from the outcomes of the experiment.
△ Less
Submitted 13 October, 2021;
originally announced October 2021.
-
Infrared dielectric functions and Brillouin zone center phonons of $α$-Ga$_2$O$_3$ compared to $α$-Al$_2$O$_3$
Authors:
Megan Stokey,
Rafal Korlacki,
Matthew Hilfiker,
Sean Knight,
Steffen Richter,
Vanya Darakchieva,
Riena **no,
Yong** Cho,
Huili Grace Xing,
Debdeep Jena,
Yuichi Oshima,
Kamruzzaman Khan,
Elaheh Ahmadi,
Mathias Schubert
Abstract:
We determine the anisotropic dielectric functions of rhombohedral $α$-Ga$_2$O$_3$ by far-infrared and infrared generalized spectroscopic ellipsometry and derive all transverse optical and longitudinal optical phonon mode frequencies and broadening parameters. We also determine the high frequency and static dielectric constants. We perform density functional theory computations and determine the ph…
▽ More
We determine the anisotropic dielectric functions of rhombohedral $α$-Ga$_2$O$_3$ by far-infrared and infrared generalized spectroscopic ellipsometry and derive all transverse optical and longitudinal optical phonon mode frequencies and broadening parameters. We also determine the high frequency and static dielectric constants. We perform density functional theory computations and determine the phonon dispersion for all branches in the Brillouin zone, and we derive all phonon mode parameters at the Brillouin zone center including Raman-active, infrared-active, and silent modes. Excellent agreement is obtained between our experimental and computation results as well as among all previously reported partial information from experiment and theory. We also compute the same information for $α$-Al$_2$O$_3$, the binary parent compound for the emerging alloy of $α$-(Al$_{x}$Ga$_{1-x}$)$_2$O$_3$, and use results from previous investigations [Schubert, Tiwald, and Herzinger, Phys. Rev. B 61, 8187 (2000)] to compare all properties among the two isostructural compounds. From both experimental and theoretical investigations we compute the frequency shifts of all modes between the two compounds. Additionally, we calculate overlap parameters between phonon mode eigenvectors and discuss the possible evolution of all phonon modes into the ternary alloy system and whether modes may form single mode or more complex mode behaviors.
△ Less
Submitted 26 August, 2021;
originally announced August 2021.
-
Banach and Suzuki-type fixed point theorems in Generalized $n$-metric spaces with an application
Authors:
Kamran Alam Khan
Abstract:
Mustafa and Sims [12] introduced the notion of $G$-metric as a possible generalization of usual notion of a metric space. The author generalized the notion of G-metric to more than three variables and introduced the concept of Generalized $n$-metric spaces [10]. In this paper, We prove Banach fixed point theorem and a Suzuki-type fixed point theorem in Generalized $n$-metric spaces. We also discus…
▽ More
Mustafa and Sims [12] introduced the notion of $G$-metric as a possible generalization of usual notion of a metric space. The author generalized the notion of G-metric to more than three variables and introduced the concept of Generalized $n$-metric spaces [10]. In this paper, We prove Banach fixed point theorem and a Suzuki-type fixed point theorem in Generalized $n$-metric spaces. We also discuss applications to certain functional equations arising in dynamic programming.
△ Less
Submitted 8 August, 2021;
originally announced August 2021.
-
A Payload Optimization Method for Federated Recommender Systems
Authors:
Farwa K. Khan,
Adrian Flanagan,
Kuan E. Tan,
Zareen Alamgir,
Muhammad Ammad-Ud-Din
Abstract:
We introduce the payload optimization method for federated recommender systems (FRS). In federated learning (FL), the global model payload that is moved between the server and users depends on the number of items to recommend. The model payload grows when there is an increasing number of items. This becomes challenging for an FRS if it is running in production mode. To tackle the payload challenge…
▽ More
We introduce the payload optimization method for federated recommender systems (FRS). In federated learning (FL), the global model payload that is moved between the server and users depends on the number of items to recommend. The model payload grows when there is an increasing number of items. This becomes challenging for an FRS if it is running in production mode. To tackle the payload challenge, we formulated a multi-arm bandit solution that selected part of the global model and transmitted it to all users. The selection process was guided by a novel reward function suitable for FL systems. So far as we are aware, this is the first optimization method that seeks to address item dependent payloads. The method was evaluated using three benchmark recommendation datasets. The empirical validation confirmed that the proposed method outperforms the simpler methods that do not benefit from the bandits for the purpose of item selection. In addition, we have demonstrated the usefulness of our proposed method by rigorously evaluating the effects of a payload reduction on the recommendation performance degradation. Our method achieved up to a 90\% reduction in model payload, yielding only a $\sim$4\% - 8\% loss in the recommendation performance for highly sparse datasets
△ Less
Submitted 27 July, 2021;
originally announced July 2021.
-
Consumer, Commercial and Industrial IoT (In)Security: Attack Taxonomy and Case Studies
Authors:
Christos Xenofontos,
Ioannis Zografopoulos,
Charalambos Konstantinou,
Alireza Jolfaei,
Muhammad Khurram Khan,
Kim-Kwang Raymond Choo
Abstract:
Internet of Things (IoT) devices are becoming ubiquitous in our lives, with applications spanning from the consumer domain to commercial and industrial systems. The steep growth and vast adoption of IoT devices reinforce the importance of sound and robust cybersecurity practices during the device development life-cycles. IoT-related vulnerabilities, if successfully exploited can affect, not only t…
▽ More
Internet of Things (IoT) devices are becoming ubiquitous in our lives, with applications spanning from the consumer domain to commercial and industrial systems. The steep growth and vast adoption of IoT devices reinforce the importance of sound and robust cybersecurity practices during the device development life-cycles. IoT-related vulnerabilities, if successfully exploited can affect, not only the device itself, but also the application field in which the IoT device operates. Evidently, identifying and addressing every single vulnerability is an arduous, if not impossible, task. Attack taxonomies can assist in classifying attacks and their corresponding vulnerabilities. Security countermeasures and best practices can then be leveraged to mitigate threats and vulnerabilities before they emerge into catastrophic attacks and ensure overall secure IoT operation. Therefore, in this paper, we provide an attack taxonomy which takes into consideration the different layers of IoT stack, i.e., device, infrastructure, communication, and service, and each layer's designated characteristics which can be exploited by adversaries. Furthermore, using nine real-world cybersecurity incidents, that had targeted IoT devices deployed in the consumer, commercial, and industrial sectors, we describe the IoT-related vulnerabilities, exploitation procedures, attacks, impacts, and potential mitigation mechanisms and protection strategies. These (and many other) incidents highlight the underlying security concerns of IoT systems and demonstrate the potential attack impacts of such connected ecosystems, while the proposed taxonomy provides a systematic procedure to categorize attacks based on the affected layer and corresponding impact.
△ Less
Submitted 13 May, 2021;
originally announced May 2021.
-
Operating Room (Re)Scheduling with Bed Management via ASP
Authors:
Carmine Dodaro,
Giuseppe Galatà,
Muhammad Kamran Khan,
Marco Maratea,
Ivan Porro
Abstract:
The Operating Room Scheduling (ORS) problem is the task of assigning patients to operating rooms, taking into account different specialties, lengths and priority scores of each planned surgery, operating room session durations, and the availability of beds for the entire length of stay both in the Intensive Care Unit and in the wards. A proper solution to the ORS problem is of primary importance f…
▽ More
The Operating Room Scheduling (ORS) problem is the task of assigning patients to operating rooms, taking into account different specialties, lengths and priority scores of each planned surgery, operating room session durations, and the availability of beds for the entire length of stay both in the Intensive Care Unit and in the wards. A proper solution to the ORS problem is of primary importance for the healthcare service quality and the satisfaction of patients in hospital environments. In this paper we first present a solution to the problem based on Answer Set Programming (ASP). The solution is tested on benchmarks with realistic sizes and parameters, on three scenarios for the target length on 5-day scheduling, common in small-medium sized hospitals, and results show that ASP is a suitable solving methodology for the ORS problem in such setting. Then, we also performed a scalability analysis on the schedule length up to 15 days, which still shows the suitability of our solution also on longer plan horizons. Moreover, we also present an ASP solution for the rescheduling problem, i.e. when the off-line schedule cannot be completed for some reason. Finally, we introduce a web framework for managing ORS problems via ASP that allows a user to insert the main parameters of the problem, solve a specific instance, and show results graphically in real-time. Under consideration in Theory and Practice of Logic Programming (TPLP).
△ Less
Submitted 5 May, 2021;
originally announced May 2021.
-
Op2Vec: An Opcode Embedding Technique and Dataset Design for End-to-End Detection of Android Malware
Authors:
Kaleem Nawaz Khan,
Najeeb Ullah,
Sikandar Ali,
Muhammad Salman Khan,
Mohammad Nauman,
Anwar Ghani
Abstract:
Android is one of the leading operating systems for smart phones in terms of market share and usage. Unfortunately, it is also an appealing target for attackers to compromise its security through malicious applications. To tackle this issue, domain experts and researchers are trying different techniques to stop such attacks. All the attempts of securing Android platform are somewhat successful. Ho…
▽ More
Android is one of the leading operating systems for smart phones in terms of market share and usage. Unfortunately, it is also an appealing target for attackers to compromise its security through malicious applications. To tackle this issue, domain experts and researchers are trying different techniques to stop such attacks. All the attempts of securing Android platform are somewhat successful. However, existing detection techniques have severe shortcomings, including the cumbersome process of feature engineering. Designing representative features require expert domain knowledge. There is a need for minimizing human experts' intervention by circumventing handcrafted feature engineering. Deep learning could be exploited by extracting deep features automatically. Previous work has shown that operational codes (opcodes) of executables provide key information to be used with deep learning models for detection process of malicious applications. The only challenge is to feed opcodes information to deep learning models. Existing techniques use one-hot encoding to tackle the challenge. However, the one-hot encoding scheme has severe limitations. In this paper, we introduce; (1) a novel technique for opcodes embedding, which we name Op2Vec, (2) based on the learned Op2Vec we have developed a dataset for end-to-end detection of android malware. Introducing the end-to-end Android malware detection technique avoids expert-intensive handcrafted features extraction, and ensures automation. Some of the recent deep learning-based techniques showed significantly improved results when tested with the proposed approach and achieved an average detection accuracy of 97.47%, precision of 0.976 and F1 score of 0.979.
△ Less
Submitted 1 March, 2022; v1 submitted 10 April, 2021;
originally announced April 2021.