-
Recite, Reconstruct, Recollect: Memorization in LMs as a Multifaceted Phenomenon
Authors:
USVSN Sai Prashanth,
Alvin Deng,
Kyle O'Brien,
Jyothir S V,
Mohammad Aflah Khan,
Jaydeep Borkar,
Christopher A. Choquette-Choo,
Jacob Ray Fuehne,
Stella Biderman,
Tracy Ke,
Katherine Lee,
Naomi Saphra
Abstract:
Memorization in language models is typically treated as a homogenous phenomenon, neglecting the specifics of the memorized data. We instead model memorization as the effect of a set of complex factors that describe each sample and relate it to the model and corpus. To build intuition around these factors, we break memorization down into a taxonomy: recitation of highly duplicated sequences, recons…
▽ More
Memorization in language models is typically treated as a homogenous phenomenon, neglecting the specifics of the memorized data. We instead model memorization as the effect of a set of complex factors that describe each sample and relate it to the model and corpus. To build intuition around these factors, we break memorization down into a taxonomy: recitation of highly duplicated sequences, reconstruction of inherently predictable sequences, and recollection of sequences that are neither. We demonstrate the usefulness of our taxonomy by using it to construct a predictive model for memorization. By analyzing dependencies and inspecting the weights of the predictive model, we find that different factors influence the likelihood of memorization differently depending on the taxonomic category.
△ Less
Submitted 25 June, 2024;
originally announced June 2024.
-
ALINA: Advanced Line Identification and Notation Algorithm
Authors:
Mohammed Abdul Hafeez Khan,
Parth Ganeriwala,
Siddhartha Bhattacharyya,
Natasha Neogi,
Raja Muthalagu
Abstract:
Labels are the cornerstone of supervised machine learning algorithms. Most visual recognition methods are fully supervised, using bounding boxes or pixel-wise segmentations for object localization. Traditional labeling methods, such as crowd-sourcing, are prohibitive due to cost, data privacy, amount of time, and potential errors on large datasets. To address these issues, we propose a novel annot…
▽ More
Labels are the cornerstone of supervised machine learning algorithms. Most visual recognition methods are fully supervised, using bounding boxes or pixel-wise segmentations for object localization. Traditional labeling methods, such as crowd-sourcing, are prohibitive due to cost, data privacy, amount of time, and potential errors on large datasets. To address these issues, we propose a novel annotation framework, Advanced Line Identification and Notation Algorithm (ALINA), which can be used for labeling taxiway datasets that consist of different camera perspectives and variable weather attributes (sunny and cloudy). Additionally, the CIRCular threshoLd pixEl Discovery And Traversal (CIRCLEDAT) algorithm has been proposed, which is an integral step in determining the pixels corresponding to taxiway line markings. Once the pixels are identified, ALINA generates corresponding pixel coordinate annotations on the frame. Using this approach, 60,249 frames from the taxiway dataset, AssistTaxi have been labeled. To evaluate the performance, a context-based edge map (CBEM) set was generated manually based on edge features and connectivity. The detection rate after testing the annotated labels with the CBEM set was recorded as 98.45%, attesting its dependability and effectiveness.
△ Less
Submitted 12 June, 2024;
originally announced June 2024.
-
Tuning the Electronic and Optical Properties of Impurity-Engineered Two-Dimensional Graphullerene Half-Semiconductors
Authors:
M. A. Khan,
Madeeha Atif,
Michael N. Leuenberger
Abstract:
A novel material consisting of a monolayer of C$_{60}$ buckyballs with hexagonal symmetry has recently been observed experimentally, named graphullerene. In this study, we present a comprehensive \textit{ab-initio} theoretical analysis of the electronic and optical properties of both pristine and impurity-engineered monolayer graphullerene using spin-dependent density functional theory (spin-DFT).…
▽ More
A novel material consisting of a monolayer of C$_{60}$ buckyballs with hexagonal symmetry has recently been observed experimentally, named graphullerene. In this study, we present a comprehensive \textit{ab-initio} theoretical analysis of the electronic and optical properties of both pristine and impurity-engineered monolayer graphullerene using spin-dependent density functional theory (spin-DFT). Our findings reveal that graphullerene is a direct band gap semiconductor with a band gap of approximately 1.5 eV at the $Γ$ point, agreeing well with experimental data. Notably, we demonstrate that by adding impurities, in particular substitutional nitrogen, substitutional boron, or adsorbent hydrogen, to graphullerene results in the formation of spin-dependent deep donor and deep acceptor levels, thereby giving rise to a variety of half-semiconductors. All the impurities exhibit a magnetic moment of approximately $μ_B$ per impurity. This impurity engineering enables the tuning of spin-polarized exciton properties in graphullerene, with spin-dependent band gap energies ranging from 0.43 eV ($λ\sim$ 2.9 $μ$m) to 1.5 eV ($λ\sim$ 820 nm), covering the near-infrared (NIR) and short-wavelength infrared (SWIR) regimes. Our results suggest that both pristine and impurity-engineered graphullerene have significant potential for the development of carbon-based 2D semiconductor spintronic and opto-spintronic devices.
△ Less
Submitted 26 May, 2024;
originally announced May 2024.
-
Heterogeneous virus classification using a functional deep learning model based on transmission electron microscopy images (Preprint)
Authors:
Niloy Sikder,
Md. Al-Masrur Khan,
Anupam Kumar Bairagi,
Mehedi Masud,
Jun Jiat Tiang,
Abdullah-Al Nahid
Abstract:
Viruses are submicroscopic agents that can infect all kinds of lifeforms and use their hosts' living cells to replicate themselves. Despite having some of the simplest genetic structures among all living beings, viruses are highly adaptable, resilient, and given the right conditions, are capable of causing unforeseen complications in their hosts' bodies. Due to their multiple transmission pathways…
▽ More
Viruses are submicroscopic agents that can infect all kinds of lifeforms and use their hosts' living cells to replicate themselves. Despite having some of the simplest genetic structures among all living beings, viruses are highly adaptable, resilient, and given the right conditions, are capable of causing unforeseen complications in their hosts' bodies. Due to their multiple transmission pathways, high contagion rate, and lethality, viruses are the biggest biological threat faced by animal and plant species. It is often challenging to promptly detect the presence of a virus in a possible host's body and accurately determine its type using manual examination techniques; however, it can be done using computer-based automatic diagnosis methods. Most notably, the analysis of Transmission Electron Microscopy (TEM) images has been proven to be quite successful in instant virus identification. Using TEM images collected from a recently published dataset, this article proposes a deep learning-based classification model to identify the type of virus within those images correctly. The methodology of this study includes two coherent image processing techniques to reduce the noise present in the raw microscopy images. Experimental results show that it can differentiate among the 14 types of viruses present in the dataset with a maximum of 97.44% classification accuracy and F1-score, which asserts the effectiveness and reliability of the proposed method. Implementing this scheme will impart a fast and dependable way of virus identification subsidiary to the thorough diagnostic procedures.
△ Less
Submitted 24 May, 2024;
originally announced May 2024.
-
Deep learning approaches to indoor wireless channel estimation for low-power communication
Authors:
Samrah Arif,
Muhammad Arif Khan,
Sabih Ur Rehman
Abstract:
In the rapidly growing development of the Internet of Things (IoT) infrastructure, achieving reliable wireless communication is a challenge. IoT devices operate in diverse environments with common signal interference and fluctuating channel conditions. Accurate channel estimation helps adapt the transmission strategies to current conditions, ensuring reliable communication. Traditional methods, su…
▽ More
In the rapidly growing development of the Internet of Things (IoT) infrastructure, achieving reliable wireless communication is a challenge. IoT devices operate in diverse environments with common signal interference and fluctuating channel conditions. Accurate channel estimation helps adapt the transmission strategies to current conditions, ensuring reliable communication. Traditional methods, such as Least Squares (LS) and Minimum Mean Squared Error (MMSE) estimation techniques, often struggle to adapt to the diverse and complex environments typical of IoT networks. This research article delves into the potential of Deep Learning (DL) to enhance channel estimation, focusing on the Received Signal Strength Indicator (RSSI) metric - a critical yet challenging aspect due to its susceptibility to noise and environmental factors. This paper presents two Fully Connected Neural Networks (FCNNs)-based Low Power (LP-IoT) channel estimation models, leveraging RSSI for accurate channel estimation in LP-IoT communication. Our Model A exhibits a remarkable 99.02% reduction in Mean Squared Error (MSE), and Model B demonstrates a notable 90.03% MSE reduction compared to the benchmarks set by current studies. Additionally, the comparative studies of our model A with other DL-based techniques show significant efficiency in our estimation models.
△ Less
Submitted 20 May, 2024;
originally announced May 2024.
-
Constraints on bulk viscosity in $f(Q,T)$ gravity from H(z)/Pantheon+ data
Authors:
M. Koussour,
Abdelghani Errehymy,
O. Donmez,
K. Myrzakulov,
M. A. Khan,
B. Çil,
E. Güdekli
Abstract:
In this study, we investigate the role of bulk viscosity in $f(Q,T)$ gravity in explaining late-time cosmic acceleration. This model, an extension of symmetric teleparallel gravity, introduces viscosity into cosmic matter dynamics for a more realistic representation. Specifically, we consider the linear form of $f (Q, T) =αQ + βT$, where $α$ and $β$ are free model parameters. To assess the model,…
▽ More
In this study, we investigate the role of bulk viscosity in $f(Q,T)$ gravity in explaining late-time cosmic acceleration. This model, an extension of symmetric teleparallel gravity, introduces viscosity into cosmic matter dynamics for a more realistic representation. Specifically, we consider the linear form of $f (Q, T) =αQ + βT$, where $α$ and $β$ are free model parameters. To assess the model, we derive its exact solution and use Hubble parameter $H(z)$ data and Pantheon + SNe Ia data for parameter estimation. We employ the $χ^2$ minimization technique alongside the MCMC random sampling method to determine the best-fit parameters. Then, we analyze the behavior of key cosmological parameters, including the deceleration parameter, bulk viscous matter-dominated universe density, effective pressure, and the effective EoS parameter, accounting for the viscous type fluid. We observe a transition in the deceleration parameter from a positive (decelerating) to a negative (accelerating) phase at transition redshift $z_t$. The matter density shows the expected positive behavior, while the pressure, influenced by viscosity, exhibits negative behavior, indicative of accelerating expansion. Furthermore, we investigate the energy conditions and find that while the NEC and DEC meet positivity criteria, the SEC is violated in the present and future epochs. The $Om(z)$ diagnostic suggests that our model aligns with quintessence behavior. Finally, our $f(Q,T)$ cosmological model, incorporating bulk viscosity effects, provides a compelling explanation for late-time cosmic behavior, consistent with observational data.
△ Less
Submitted 12 May, 2024;
originally announced May 2024.
-
Automating Code Adaptation for MLOps -- A Benchmarking Study on LLMs
Authors:
Harsh Patel,
Buvaneswari A. Ramanan,
Manzoor A. Khan,
Thomas Williams,
Brian Friedman,
Lawrence Drabeck
Abstract:
This paper explores the possibilities of the current generation of Large Language Models for incorporating Machine Learning Operations (MLOps) functionalities into ML training code bases. We evaluate the performance of OpenAI (gpt-3.5-turbo) and WizardCoder (open-source, 15B parameters) models on the automated accomplishment of various MLOps functionalities in different settings. We perform a benc…
▽ More
This paper explores the possibilities of the current generation of Large Language Models for incorporating Machine Learning Operations (MLOps) functionalities into ML training code bases. We evaluate the performance of OpenAI (gpt-3.5-turbo) and WizardCoder (open-source, 15B parameters) models on the automated accomplishment of various MLOps functionalities in different settings. We perform a benchmarking study that assesses the ability of these models to: (1) adapt existing code samples (Inlining) with component-specific MLOps functionality such as MLflow and Weights & Biases for experiment tracking, Optuna for hyperparameter optimization etc., and (2) perform the task of Translation from one component of an MLOps functionality to another, e.g., translating existing GitPython library based version control code to Data Version Control library based. We also propose three different approaches that involve teaching LLMs to comprehend the API documentation of the components as a reference while accomplishing the Translation tasks. In our evaluations, the gpt-3.5-turbo model significantly outperforms WizardCoder by achieving impressive Pass@3 accuracy in model optimization (55% compared to 0% by WizardCoder), experiment tracking (100%, compared to 62.5% by WizardCoder), model registration (92% compared to 42% by WizardCoder) and hyperparameter optimization (83% compared to 58% by WizardCoder) on average, in their best possible settings, showcasing its superior code adaptability performance in complex MLOps tasks.
△ Less
Submitted 10 May, 2024;
originally announced May 2024.
-
Cryptanalysis of the SIMON Cypher Using Neo4j
Authors:
Jonathan Cook,
Sabih ur Rehman,
M. Arif Khan
Abstract:
The exponential growth in the number of Internet of Things (IoT) devices has seen the introduction of several Lightweight Encryption Algorithms (LEA). While LEAs are designed to enhance the integrity, privacy and security of data collected and transmitted by IoT devices, it is hazardous to assume that all LEAs are secure and exhibit similar levels of protection. To improve encryption strength, cry…
▽ More
The exponential growth in the number of Internet of Things (IoT) devices has seen the introduction of several Lightweight Encryption Algorithms (LEA). While LEAs are designed to enhance the integrity, privacy and security of data collected and transmitted by IoT devices, it is hazardous to assume that all LEAs are secure and exhibit similar levels of protection. To improve encryption strength, cryptanalysts and algorithm designers routinely probe LEAs using various cryptanalysis techniques to identify vulnerabilities and limitations of LEAs. Despite recent improvements in the efficiency of cryptanalysis utilising heuristic methods and a Partial Difference Distribution Table (PDDT), the process remains inefficient, with the random nature of the heuristic inhibiting reproducible results. However, the use of a PDDT presents opportunities to identify relationships between differentials utilising knowledge graphs, leading to the identification of efficient paths throughout the PDDT. This paper introduces the novel use of knowledge graphs to identify intricate relationships between differentials in the SIMON LEA, allowing for the identification of optimal paths throughout the differentials, and increasing the effectiveness of the differential security analyses of SIMON.
△ Less
Submitted 7 May, 2024;
originally announced May 2024.
-
Overcoming LLM Challenges using RAG-Driven Precision in Coffee Leaf Disease Remediation
Authors:
Dr. Selva Kumar S,
Afifah Khan Mohammed Ajmal Khan,
Imadh Ajaz Banday,
Manikantha Gada,
Vibha Venkatesh Shanbhag
Abstract:
This research introduces an innovative AI-driven precision agriculture system, leveraging YOLOv8 for disease identification and Retrieval Augmented Generation (RAG) for context-aware diagnosis. Focused on addressing the challenges of diseases affecting the coffee production sector in Karnataka, The system integrates sophisticated object detection techniques with language models to address the inhe…
▽ More
This research introduces an innovative AI-driven precision agriculture system, leveraging YOLOv8 for disease identification and Retrieval Augmented Generation (RAG) for context-aware diagnosis. Focused on addressing the challenges of diseases affecting the coffee production sector in Karnataka, The system integrates sophisticated object detection techniques with language models to address the inherent constraints associated with Large Language Models (LLMs). Our methodology not only tackles the issue of hallucinations in LLMs, but also introduces dynamic disease identification and remediation strategies. Real-time monitoring, collaborative dataset expansion, and organizational involvement ensure the system's adaptability in diverse agricultural settings. The effect of the suggested system extends beyond automation, aiming to secure food supplies, protect livelihoods, and promote eco-friendly farming practices. By facilitating precise disease identification, the system contributes to sustainable and environmentally conscious agriculture, reducing reliance on pesticides. Looking to the future, the project envisions continuous development in RAG-integrated object detection systems, emphasizing scalability, reliability, and usability. This research strives to be a beacon for positive change in agriculture, aligning with global efforts toward sustainable and technologically enhanced food production.
△ Less
Submitted 2 May, 2024;
originally announced May 2024.
-
RSSI Estimation for Constrained Indoor Wireless Networks using ANN
Authors:
Samrah Arif,
M. Arif Khan,
Sabih Ur Rehman
Abstract:
In the expanding field of the Internet of Things (IoT), wireless channel estimation is a significant challenge. This is specifically true for low-power IoT (LP-IoT) communication, where efficiency and accuracy are extremely important. This research establishes two distinct LP-IoT wireless channel estimation models using Artificial Neural Networks (ANN): a Feature-based ANN model and a Sequence-bas…
▽ More
In the expanding field of the Internet of Things (IoT), wireless channel estimation is a significant challenge. This is specifically true for low-power IoT (LP-IoT) communication, where efficiency and accuracy are extremely important. This research establishes two distinct LP-IoT wireless channel estimation models using Artificial Neural Networks (ANN): a Feature-based ANN model and a Sequence-based ANN model. Both models have been constructed to enhance LP-IoT communication by lowering the estimation error in the LP-IoT wireless channel. The Feature-based model aims to capture complex patterns of measured Received Signal Strength Indicator (RSSI) data using environmental characteristics. The Sequence-based approach utilises predetermined categorisation techniques to estimate the RSSI sequence of specifically selected environment characteristics. The findings demonstrate that our suggested approaches attain remarkable precision in channel estimation, with an improvement in MSE of $88.29\%$ of the Feature-based model and $97.46\%$ of the Sequence-based model over existing research. Additionally, the comparative analysis of these techniques with traditional and other Deep Learning (DL)-based techniques also highlights the superior performance of our developed models and their potential in real-world IoT applications.
△ Less
Submitted 9 April, 2024;
originally announced April 2024.
-
Towards Reliable Latent Knowledge Estimation in LLMs: In-Context Learning vs. Prompting Based Factual Knowledge Extraction
Authors:
Qinyuan Wu,
Mohammad Aflah Khan,
Soumi Das,
Vedant Nanda,
Bishwamittra Ghosh,
Camila Kolling,
Till Speicher,
Laurent Bindschaedler,
Krishna P. Gummadi,
Evimaria Terzi
Abstract:
We propose an approach for estimating the latent knowledge embedded inside large language models (LLMs). We leverage the in-context learning (ICL) abilities of LLMs to estimate the extent to which an LLM knows the facts stored in a knowledge base. Our knowledge estimator avoids reliability concerns with previous prompting-based methods, is both conceptually simpler and easier to apply, and we demo…
▽ More
We propose an approach for estimating the latent knowledge embedded inside large language models (LLMs). We leverage the in-context learning (ICL) abilities of LLMs to estimate the extent to which an LLM knows the facts stored in a knowledge base. Our knowledge estimator avoids reliability concerns with previous prompting-based methods, is both conceptually simpler and easier to apply, and we demonstrate that it can surface more of the latent knowledge embedded in LLMs. We also investigate how different design choices affect the performance of ICL-based knowledge estimation. Using the proposed estimator, we perform a large-scale evaluation of the factual knowledge of a variety of open source LLMs, like OPT, Pythia, Llama(2), Mistral, Gemma, etc. over a large set of relations and facts from the Wikidata knowledge base. We observe differences in the factual knowledge between different model families and models of different sizes, that some relations are consistently better known than others but that models differ in the precise facts they know, and differences in the knowledge of base models and their finetuned counterparts.
△ Less
Submitted 19 April, 2024;
originally announced April 2024.
-
Lightweight Cryptanalysis of IoT Encryption Algorithms : Is Quota Sampling the Answer?
Authors:
Jonathan Cook,
Sabih ur Rehman,
M. Arif Khan
Abstract:
Rapid growth in the number of small sensor devices known as the Internet of Things (IoT) has seen the development of lightweight encryption algorithms. Two well-known lightweight algorithms are SIMON and SIMECK which have been specifically designed for use on resource-constrained IoT devices. These lightweight encryption algorithms are based on the efficient Feistel block structure which is known…
▽ More
Rapid growth in the number of small sensor devices known as the Internet of Things (IoT) has seen the development of lightweight encryption algorithms. Two well-known lightweight algorithms are SIMON and SIMECK which have been specifically designed for use on resource-constrained IoT devices. These lightweight encryption algorithms are based on the efficient Feistel block structure which is known to exhibit vulnerabilities to differential cryptanalysis. Consequently, it is necessary to test these algorithms for resilience against such attacks. While existing state-of-the-art research has demonstrated novel heuristic methods of differential cryptanalysis that improve time efficiency on previous techniques, the large state sizes of these encryption algorithms inhibit cryptanalysis time efficiency. In this paper, we introduce Versatile Investigative Sampling Technique for Advanced Cryptanalysis (VISTA-CRYPT) - a time-efficient enhancement of differential cryptanalysis of lightweight encryption algorithms. The proposed technique introduces a simple framework of quota sampling that produces state-of-the-art results with time reductions of up to $76\%$ over existing techniques. Further, we present a preliminary graph-based analysis of the output differentials for the identification of relationships within the data and future research opportunities to further enhance the performance of differential cryptanalysis. The code designed for this work and associated datasets will be available at https://github.com/johncook1979/simon-cryptanalysis.
△ Less
Submitted 11 April, 2024;
originally announced April 2024.
-
Synergy of Large Language Model and Model Driven Engineering for Automated Development of Centralized Vehicular Systems
Authors:
Nenad Petrovic,
Fengjunjie Pan,
Krzysztof Lebioda,
Vahid Zolfaghari,
Sven Kirchner,
Nils Purschke,
Muhammad Aqib Khan,
Viktor Vorobev,
Alois Knoll
Abstract:
We present a prototype of a tool leveraging the synergy of model driven engineering (MDE) and Large Language Models (LLM) for the purpose of software development process automation in the automotive industry. In this approach, the user-provided input is free form textual requirements, which are first translated to Ecore model instance representation using an LLM, which is afterwards checked for co…
▽ More
We present a prototype of a tool leveraging the synergy of model driven engineering (MDE) and Large Language Models (LLM) for the purpose of software development process automation in the automotive industry. In this approach, the user-provided input is free form textual requirements, which are first translated to Ecore model instance representation using an LLM, which is afterwards checked for consistency using Object Constraint Language (OCL) rules. After successful consistency check, the model instance is fed as input to another LLM for the purpose of code generation. The generated code is evaluated in a simulated environment using CARLA simulator connected to an example centralized vehicle architecture, in an emergency brake scenario.
△ Less
Submitted 8 April, 2024;
originally announced April 2024.
-
Investigating the Relationship between Simulation Parameters and Flow Variables in Simulating Atmospheric Gravity Waves in Wind Energy Applications
Authors:
Mehtab Ahmed Khan,
Dries Allaerts,
Simon Watson,
Matthew Churchfield
Abstract:
Wind farms, particularly offshore clusters, are becoming larger than ever before. Besides influencing wind farms and local meteorology downstream, large wind farms can trigger atmospheric gravity waves in the inversion layer and the free atmosphere aloft. Wind farm-induced gravity waves can cause adverse pressure gradients upstream of the wind farm, that contribute to the global blockage effect, a…
▽ More
Wind farms, particularly offshore clusters, are becoming larger than ever before. Besides influencing wind farms and local meteorology downstream, large wind farms can trigger atmospheric gravity waves in the inversion layer and the free atmosphere aloft. Wind farm-induced gravity waves can cause adverse pressure gradients upstream of the wind farm, that contribute to the global blockage effect, and favorable pressure gradients above and downstream of the wind farm that enhance wake recovery.
Numerical modeling is a powerful means of studying wind farm-induced atmospheric gravity waves, but it comes with the challenge of handling spurious reflections of these waves from domain boundaries. Approaches like radiation boundary conditions and forcing zones are used to avoid the reflections. However, the simulation setup heavily relies on ad-hoc processes. For instance, the widely used Rayleigh dam** method requires ad-hoc tuning to acquire a setup only applicable to a particular case. To surmount this hurdle, we conduct a systematic LES study for flow over a 2D hill and through wind farm canopies that explores the dependence of domain size and dam** layer setup on parameters driving linearly stratified atmospheric flows.
Mainly the internal waves in the free atmosphere reflect from the boundaries, therefore by simulation linearly stratified conditions we focus on internal waves only. The Froude number drives most of the internal wave properties, such as wavelengths, amplitude, and direction. Therefore, the domain sizing and Rayleigh dam** layer setup mainly depends on the Froude number. We anticipated the effective wavelengths to be the correct length scale to size the domain and dam** layer thickness. Also, the dam** coefficient is scaled with Brunt-Väisälä frequency.
△ Less
Submitted 22 March, 2024;
originally announced March 2024.
-
Advancing IIoT with Over-the-Air Federated Learning: The Role of Iterative Magnitude Pruning
Authors:
Fazal Muhammad Ali Khan,
Hatem Abou-Zeid,
Aryan Kaushik,
Syed Ali Hassan
Abstract:
The industrial Internet of Things (IIoT) under Industry 4.0 heralds an era of interconnected smart devices where data-driven insights and machine learning (ML) fuse to revolutionize manufacturing. A noteworthy development in IIoT is the integration of federated learning (FL), which addresses data privacy and security among devices. FL enables edge sensors, also known as peripheral intelligence uni…
▽ More
The industrial Internet of Things (IIoT) under Industry 4.0 heralds an era of interconnected smart devices where data-driven insights and machine learning (ML) fuse to revolutionize manufacturing. A noteworthy development in IIoT is the integration of federated learning (FL), which addresses data privacy and security among devices. FL enables edge sensors, also known as peripheral intelligence units (PIUs) to learn and adapt using their data locally, without explicit sharing of confidential data, to facilitate a collaborative yet confidential learning process. However, the lower memory footprint and computational power of PIUs inherently require deep neural network (DNN) models that have a very compact size. Model compression techniques such as pruning can be used to reduce the size of DNN models by removing unnecessary connections that have little impact on the model's performance, thus making the models more suitable for the limited resources of PIUs. Targeting the notion of compact yet robust DNN models, we propose the integration of iterative magnitude pruning (IMP) of the DNN model being trained in an over-the-air FL (OTA-FL) environment for IIoT. We provide a tutorial overview and also present a case study of the effectiveness of IMP in OTA-FL for an IIoT environment. Finally, we present future directions for enhancing and optimizing these deep compression techniques further, aiming to push the boundaries of IIoT capabilities in acquiring compact yet robust and high-performing DNN models.
△ Less
Submitted 21 March, 2024;
originally announced March 2024.
-
FedQNN: Federated Learning using Quantum Neural Networks
Authors:
Nouhaila Innan,
Muhammad Al-Zafar Khan,
Alberto Marchisio,
Muhammad Shafique,
Mohamed Bennai
Abstract:
In this study, we explore the innovative domain of Quantum Federated Learning (QFL) as a framework for training Quantum Machine Learning (QML) models via distributed networks. Conventional machine learning models frequently grapple with issues about data privacy and the exposure of sensitive information. Our proposed Federated Quantum Neural Network (FedQNN) framework emerges as a cutting-edge sol…
▽ More
In this study, we explore the innovative domain of Quantum Federated Learning (QFL) as a framework for training Quantum Machine Learning (QML) models via distributed networks. Conventional machine learning models frequently grapple with issues about data privacy and the exposure of sensitive information. Our proposed Federated Quantum Neural Network (FedQNN) framework emerges as a cutting-edge solution, integrating the singular characteristics of QML with the principles of classical federated learning. This work thoroughly investigates QFL, underscoring its capability to secure data handling in a distributed environment and facilitate cooperative learning without direct data sharing. Our research corroborates the concept through experiments across varied datasets, including genomics and healthcare, thereby validating the versatility and efficacy of our FedQNN framework. The results consistently exceed 86% accuracy across three distinct datasets, proving its suitability for conducting various QML tasks. Our research not only identifies the limitations of classical paradigms but also presents a novel framework to propel the field of QML into a new era of secure and collaborative innovation.
△ Less
Submitted 16 March, 2024;
originally announced March 2024.
-
Two-Person Adversarial Games are Zero-Sum: An Elaboration of a Folk Theorem
Authors:
M. Ali Khan,
Arthur Paul Pedersen,
David Schrittesser
Abstract:
The observation that every two-person adversarial game is an affine transformation of a zero-sum game is traceable to Luce-Raiffa (1957) and made explicit in Aumann (1987). Recent work of (ADP) Adler-Daskalakis-Papadimitriou (2009), and of Raimondo (2023) in increasing generality, proves what has so far remained a conjecture. We present two proofs of an even more general formulation: the first dra…
▽ More
The observation that every two-person adversarial game is an affine transformation of a zero-sum game is traceable to Luce-Raiffa (1957) and made explicit in Aumann (1987). Recent work of (ADP) Adler-Daskalakis-Papadimitriou (2009), and of Raimondo (2023) in increasing generality, proves what has so far remained a conjecture. We present two proofs of an even more general formulation: the first draws on multilinear utility theory developed by Fishburn-Roberts (1978); the second is a consequence of the ADP proof itself for a special case of a two-player game with a set of three actions.
△ Less
Submitted 22 May, 2024; v1 submitted 6 March, 2024;
originally announced March 2024.
-
Taking Second-life Batteries from Exhausted to Empowered using Experiments, Data Analysis, and Health Estimation
Authors:
Xiaofan Cui,
Muhammad Aadil Khan,
Gabriele Pozzato,
Surinder Singh,
Ratnesh Sharma,
Simona Onori
Abstract:
The reuse of retired electric vehicle batteries in grid energy storage offers environmental and economic benefits. This study concentrates on health monitoring algorithms for retired batteries deployed in grid storage. Over 15 months of testing, we collect, analyze, and publicize a dataset of second-life batteries, implementing a cycling protocol simulating grid energy storage load profiles within…
▽ More
The reuse of retired electric vehicle batteries in grid energy storage offers environmental and economic benefits. This study concentrates on health monitoring algorithms for retired batteries deployed in grid storage. Over 15 months of testing, we collect, analyze, and publicize a dataset of second-life batteries, implementing a cycling protocol simulating grid energy storage load profiles within a 3-4 V voltage window. Four machine-learning-based health estimation models, relying on online-accessible features and initial capacity, are compared, with the selected model achieving a mean absolute percentage error below 2.3% on test data. Additionally, an adaptive online health estimation algorithm is proposed by integrating a clustering-based method, thus limiting estimation errors during online deployment. These results showcase the feasibility of repurposing retired batteries for second-life applications. Based on obtained data and power demand, these second-life batteries exhibit potential for over a decade of grid energy storage use.
△ Less
Submitted 8 June, 2024; v1 submitted 29 February, 2024;
originally announced February 2024.
-
Towards Industry 5.0: A Systematic Literature Review on Sustainable and Green Composite Materials Supply Chains
Authors:
Md Rabiul Hasan,
Muztoba Ahmed Khan,
Thorsten Wuest
Abstract:
Sustainable supply chain management is a key objective of Industry 5.0, leveraging technologies like real-time data analytics, connectivity, and intelligent automation. At the same time, composite materials present benefits such as lightweight structures, crucial for reducing fuel consumption. This study investigates the intersection between sustainable supply chains and composites by analyzing th…
▽ More
Sustainable supply chain management is a key objective of Industry 5.0, leveraging technologies like real-time data analytics, connectivity, and intelligent automation. At the same time, composite materials present benefits such as lightweight structures, crucial for reducing fuel consumption. This study investigates the intersection between sustainable supply chains and composites by analyzing the current status, research gaps, methodologies, and future research opportunities through bibliometric analysis and a systematic review of the state of the art in the composite materials supply chain. A systematic literature review approach is employed to analyze the Scopus and Web of Science (WOS) databases, offering a comprehensive overview of the existing literature. Through bibliometric analysis, the study investigates countries, authors, citations, keywords, subject areas, and article themes within the metadata to provide additional context. An in-depth analysis of thirty selected papers (n=30) sheds light on the key contributions, major challenges, and Key Performance Indicators (KPIs) across various instances of composite material supply chains, resulting in a generalized overview. Furthermore, this research suggests future directions to link the sustainability efforts in composite materials supply chains with current research gaps. The study underscores diverse research themes in the field, highlighting a few influential works and presenting opportunities for advancement in this emerging area. Collectively, these findings offer valuable insights and a robust roadmap for future research in this domain.
△ Less
Submitted 8 February, 2024;
originally announced February 2024.
-
Probing Critical Learning Dynamics of PLMs for Hate Speech Detection
Authors:
Sarah Masud,
Mohammad Aflah Khan,
Vikram Goyal,
Md Shad Akhtar,
Tanmoy Chakraborty
Abstract:
Despite the widespread adoption, there is a lack of research into how various critical aspects of pretrained language models (PLMs) affect their performance in hate speech detection. Through five research questions, our findings and recommendations lay the groundwork for empirically investigating different aspects of PLMs' use in hate speech detection. We deep dive into comparing different pretrai…
▽ More
Despite the widespread adoption, there is a lack of research into how various critical aspects of pretrained language models (PLMs) affect their performance in hate speech detection. Through five research questions, our findings and recommendations lay the groundwork for empirically investigating different aspects of PLMs' use in hate speech detection. We deep dive into comparing different pretrained models, evaluating their seed robustness, finetuning settings, and the impact of pretraining data collection time. Our analysis reveals early peaks for downstream tasks during pretraining, the limited benefit of employing a more recent pretraining corpus, and the significance of specific layers during finetuning. We further call into question the use of domain-specific models and highlight the need for dynamic datasets for benchmarking hate speech detection.
△ Less
Submitted 3 February, 2024;
originally announced February 2024.
-
Haris: an Advanced Autonomous Mobile Robot for Smart Parking Assistance
Authors:
Layth Hamad,
Muhammad Asif Khan,
Hamid Menouar,
Fethi Filali,
Amr Mohamed
Abstract:
This paper presents Haris, an advanced autonomous mobile robot system for tracking the location of vehicles in crowded car parks using license plate recognition. The system employs simultaneous localization and map** (SLAM) for autonomous navigation and precise map** of the parking area, eliminating the need for GPS dependency. In addition, the system utilizes a sophisticated framework using c…
▽ More
This paper presents Haris, an advanced autonomous mobile robot system for tracking the location of vehicles in crowded car parks using license plate recognition. The system employs simultaneous localization and map** (SLAM) for autonomous navigation and precise map** of the parking area, eliminating the need for GPS dependency. In addition, the system utilizes a sophisticated framework using computer vision techniques for object detection and automatic license plate recognition (ALPR) for reading and associating license plate numbers with location data. This information is subsequently synchronized with a back-end service and made accessible to users via a user-friendly mobile app, offering effortless vehicle location and alleviating congestion within the parking facility. The proposed system has the potential to improve the management of short-term large outdoor parking areas in crowded places such as sports stadiums. The demo of the robot can be found on https://youtu.be/ZkTCM35fxa0?si=QjggJuN7M1o3oifx.
△ Less
Submitted 31 January, 2024;
originally announced January 2024.
-
Brain Tumor Diagnosis Using Quantum Convolutional Neural Networks
Authors:
Muhammad Al-Zafar Khan,
Nouhaila Innan,
Abdullah Al Omar Galib,
Mohamed Bennai
Abstract:
Integrating Quantum Convolutional Neural Networks (QCNNs) into medical diagnostics represents a transformative advancement in the classification of brain tumors. This research details a high-precision design and execution of a QCNN model specifically tailored to identify and classify brain cancer images. Our proposed QCNN architecture and algorithm have achieved an exceptional classification accur…
▽ More
Integrating Quantum Convolutional Neural Networks (QCNNs) into medical diagnostics represents a transformative advancement in the classification of brain tumors. This research details a high-precision design and execution of a QCNN model specifically tailored to identify and classify brain cancer images. Our proposed QCNN architecture and algorithm have achieved an exceptional classification accuracy of 99.67%, demonstrating the model's potential as a powerful tool for clinical applications. The remarkable performance of our model underscores its capability to facilitate rapid and reliable brain tumor diagnoses, potentially streamlining the decision-making process in treatment planning. These findings strongly support the further investigation and application of quantum computing and quantum machine learning methodologies in medical imaging, suggesting a future where quantum-enhanced diagnostics could significantly elevate the standard of patient care and treatment outcomes.
△ Less
Submitted 30 January, 2024; v1 submitted 28 January, 2024;
originally announced January 2024.
-
Multimodal Crowd Counting with Pix2Pix GANs
Authors:
Muhammad Asif Khan,
Hamid Menouar,
Ridha Hamila
Abstract:
Most state-of-the-art crowd counting methods use color (RGB) images to learn the density map of the crowd. However, these methods often struggle to achieve higher accuracy in densely crowded scenes with poor illumination. Recently, some studies have reported improvement in the accuracy of crowd counting models using a combination of RGB and thermal images. Although multimodal data can lead to bett…
▽ More
Most state-of-the-art crowd counting methods use color (RGB) images to learn the density map of the crowd. However, these methods often struggle to achieve higher accuracy in densely crowded scenes with poor illumination. Recently, some studies have reported improvement in the accuracy of crowd counting models using a combination of RGB and thermal images. Although multimodal data can lead to better predictions, multimodal data might not be always available beforehand. In this paper, we propose the use of generative adversarial networks (GANs) to automatically generate thermal infrared (TIR) images from color (RGB) images and use both to train crowd counting models to achieve higher accuracy. We use a Pix2Pix GAN network first to translate RGB images to TIR images. Our experiments on several state-of-the-art crowd counting models and benchmark crowd datasets report significant improvement in accuracy.
△ Less
Submitted 15 January, 2024;
originally announced January 2024.
-
Curriculum for Crowd Counting -- Is it Worthy?
Authors:
Muhammad Asif Khan,
Hamid Menouar,
Ridha Hamila
Abstract:
Recent advances in deep learning techniques have achieved remarkable performance in several computer vision problems. A notably intuitive technique called Curriculum Learning (CL) has been introduced recently for training deep learning models. Surprisingly, curriculum learning achieves significantly improved results in some tasks but marginal or no improvement in others. Hence, there is still a de…
▽ More
Recent advances in deep learning techniques have achieved remarkable performance in several computer vision problems. A notably intuitive technique called Curriculum Learning (CL) has been introduced recently for training deep learning models. Surprisingly, curriculum learning achieves significantly improved results in some tasks but marginal or no improvement in others. Hence, there is still a debate about its adoption as a standard method to train supervised learning models. In this work, we investigate the impact of curriculum learning in crowd counting using the density estimation method. We performed detailed investigations by conducting 112 experiments using six different CL settings using eight different crowd models. Our experiments show that curriculum learning improves the model learning performance and shortens the convergence time.
△ Less
Submitted 15 January, 2024;
originally announced January 2024.
-
Online Adaptive Data-driven State-of-health Estimation for Second-life Batteries with BIBO Stability Guarantees
Authors:
Xiaofan Cui,
Muhammad Aadil Khan,
Simona Onori
Abstract:
A key challenge that is currently hindering the widespread deployment and use of retired electric vehicle (EV) batteries for second-life (SL) applications is the ability to accurately estimate and monitor their state of health (SOH). Second-life battery systems can be sourced from different battery packs with a lack of knowledge of their historical usage.
To facilitate the on-the-field use of SL…
▽ More
A key challenge that is currently hindering the widespread deployment and use of retired electric vehicle (EV) batteries for second-life (SL) applications is the ability to accurately estimate and monitor their state of health (SOH). Second-life battery systems can be sourced from different battery packs with a lack of knowledge of their historical usage.
To facilitate the on-the-field use of SL batteries, this paper introduces an online adaptive health estimation strategy with guaranteed stability. This method relies exclusively on operational data that can be accessed in real-time from SL batteries. The adaptation algorithm is designed to ensure bounded-input-bounded-output (BIBO) stability. The effectiveness of the proposed approach is shown on a laboratory-aged experimental data set of retired EV batteries. The estimator gains are dynamically adapted to accommodate the distinct characteristics of each individual cell, making it a promising candidate for future SL battery management systems (BMS2).
△ Less
Submitted 7 January, 2024;
originally announced January 2024.
-
Language Detection for Transliterated Content
Authors:
Selva Kumar S,
Afifah Khan Mohammed Ajmal Khan,
Chirag Manjeshwar,
Imadh Ajaz Banday
Abstract:
In the contemporary digital era, the Internet functions as an unparalleled catalyst, dismantling geographical and linguistic barriers particularly evident in texting. This evolution facilitates global communication, transcending physical distances and fostering dynamic cultural exchange. A notable trend is the widespread use of transliteration, where the English alphabet is employed to convey mess…
▽ More
In the contemporary digital era, the Internet functions as an unparalleled catalyst, dismantling geographical and linguistic barriers particularly evident in texting. This evolution facilitates global communication, transcending physical distances and fostering dynamic cultural exchange. A notable trend is the widespread use of transliteration, where the English alphabet is employed to convey messages in native languages, posing a unique challenge for language technology in accurately detecting the source language. This paper addresses this challenge through a dataset of phone text messages in Hindi and Russian transliterated into English utilizing BERT for language classification and Google Translate API for transliteration conversion. The research pioneers innovative approaches to identify and convert transliterated text, navigating challenges in the diverse linguistic landscape of digital communication. Emphasizing the pivotal role of comprehensive datasets for training Large Language Models LLMs like BERT, our model showcases exceptional proficiency in accurately identifying and classifying languages from transliterated text. With a validation accuracy of 99% our models robust performance underscores its reliability. The comprehensive exploration of transliteration dynamics supported by innovative approaches and cutting edge technologies like BERT, positions our research at the forefront of addressing unique challenges in the linguistic landscape of digital communication. Beyond contributing to language identification and transliteration capabilities this work holds promise for applications in content moderation, analytics and fostering a globally connected community engaged in meaningful dialogue.
△ Less
Submitted 9 January, 2024;
originally announced January 2024.
-
Real-Time Object Detection in Occluded Environment with Background Cluttering Effects Using Deep Learning
Authors:
Syed Muhammad Aamir,
Hongbin Ma,
Malak Abid Ali Khan,
Muhammad Aaqib
Abstract:
Detection of small, undetermined moving objects or objects in an occluded environment with a cluttered background is the main problem of computer vision. This greatly affects the detection accuracy of deep learning models. To overcome these problems, we concentrate on deep learning models for real-time detection of cars and tanks in an occluded environment with a cluttered background employing SSD…
▽ More
Detection of small, undetermined moving objects or objects in an occluded environment with a cluttered background is the main problem of computer vision. This greatly affects the detection accuracy of deep learning models. To overcome these problems, we concentrate on deep learning models for real-time detection of cars and tanks in an occluded environment with a cluttered background employing SSD and YOLO algorithms and improved precision of detection and reduce problems faced by these models. The developed method makes the custom dataset and employs a preprocessing technique to clean the noisy dataset. For training the developed model we apply the data augmentation technique to balance and diversify the data. We fine-tuned, trained, and evaluated these models on the established dataset by applying these techniques and highlighting the results we got more accurately than without applying these techniques. The accuracy and frame per second of the SSD-Mobilenet v2 model are higher than YOLO V3 and YOLO V4. Furthermore, by employing various techniques like data enhancement, noise reduction, parameter optimization, and model fusion we improve the effectiveness of detection and recognition. We further added a counting algorithm, and target attributes experimental comparison, and made a graphical user interface system for the developed model with features of object counting, alerts, status, resolution, and frame per second. Subsequently, to justify the importance of the developed method analysis of YOLO V3, V4, and SSD were incorporated. Which resulted in the overall completion of the proposed method.
△ Less
Submitted 1 January, 2024;
originally announced January 2024.
-
Value of Information and Timing-aware Scheduling for Federated Learning
Authors:
Muhammad Azeem Khan,
Howard H. Yang,
Zihan Chen,
Antonio Iera,
Nikolaos Pappas
Abstract:
Data possesses significant value as it fuels advancements in AI. However, protecting the privacy of the data generated by end-user devices has become crucial. Federated Learning (FL) offers a solution by preserving data privacy during training. FL brings the model directly to User Equipments (UEs) for local training by an access point (AP). The AP periodically aggregates trained parameters from UE…
▽ More
Data possesses significant value as it fuels advancements in AI. However, protecting the privacy of the data generated by end-user devices has become crucial. Federated Learning (FL) offers a solution by preserving data privacy during training. FL brings the model directly to User Equipments (UEs) for local training by an access point (AP). The AP periodically aggregates trained parameters from UEs, enhancing the model and sending it back to them. However, due to communication constraints, only a subset of UEs can update parameters during each global aggregation. Consequently, develo** innovative scheduling algorithms is vital to enable complete FL implementation and enhance FL convergence. In this paper, we present a scheduling policy combining Age of Update (AoU) concepts and data Shapley metrics. This policy considers the freshness and value of received parameter updates from individual data sources and real-time channel conditions to enhance FL's operational efficiency. The proposed algorithm is simple, and its effectiveness is demonstrated through simulations.
△ Less
Submitted 16 December, 2023;
originally announced December 2023.
-
Vision Encoder-Decoder Models for AI Coaching
Authors:
Jyothi S Nayak,
Afifah Khan Mohammed Ajmal Khan,
Chirag Manjeshwar,
Imadh Ajaz Banday
Abstract:
This research paper introduces an innovative AI coaching approach by integrating vision-encoder-decoder models. The feasibility of this method is demonstrated using a Vision Transformer as the encoder and GPT-2 as the decoder, achieving a seamless integration of visual input and textual interaction. Departing from conventional practices of employing distinct models for image recognition and text-b…
▽ More
This research paper introduces an innovative AI coaching approach by integrating vision-encoder-decoder models. The feasibility of this method is demonstrated using a Vision Transformer as the encoder and GPT-2 as the decoder, achieving a seamless integration of visual input and textual interaction. Departing from conventional practices of employing distinct models for image recognition and text-based coaching, our integrated architecture directly processes input images, enabling natural question-and-answer dialogues with the AI coach. This unique strategy simplifies model architecture while enhancing the overall user experience in human-AI interactions. We showcase sample results to demonstrate the capability of the model. The results underscore the methodology's potential as a promising paradigm for creating efficient AI coach models in various domains involving visual inputs. Importantly, this potential holds true regardless of the particular visual encoder or text decoder chosen. Additionally, we conducted experiments with different sizes of GPT-2 to assess the impact on AI coach performance, providing valuable insights into the scalability and versatility of our proposed methodology.
△ Less
Submitted 9 November, 2023;
originally announced November 2023.
-
Overview of the HASOC Subtrack at FIRE 2023: Identification of Tokens Contributing to Explicit Hate in English by Span Detection
Authors:
Sarah Masud,
Mohammad Aflah Khan,
Md. Shad Akhtar,
Tanmoy Chakraborty
Abstract:
As hate speech continues to proliferate on the web, it is becoming increasingly important to develop computational methods to mitigate it. Reactively, using black-box models to identify hateful content can perplex users as to why their posts were automatically flagged as hateful. On the other hand, proactive mitigation can be achieved by suggesting rephrasing before a post is made public. However,…
▽ More
As hate speech continues to proliferate on the web, it is becoming increasingly important to develop computational methods to mitigate it. Reactively, using black-box models to identify hateful content can perplex users as to why their posts were automatically flagged as hateful. On the other hand, proactive mitigation can be achieved by suggesting rephrasing before a post is made public. However, both mitigation techniques require information about which part of a post contains the hateful aspect, i.e., what spans within a text are responsible for conveying hate. Better detection of such spans can significantly reduce explicitly hateful content on the web. To further contribute to this research area, we organized HateNorm at HASOC-FIRE 2023, focusing on explicit span detection in English Tweets. A total of 12 teams participated in the competition, with the highest macro-F1 observed at 0.58.
△ Less
Submitted 16 November, 2023;
originally announced November 2023.
-
Electronic structure in a transition metal dipnictide TaAs2
Authors:
Sabin Regmi,
Cheng-Yi Huang,
Mojammel A. Khan,
Baokai Wang,
Anup Pradhan Sakhya,
M. Mofazzel Hosen,
Jesse Thompson,
Bahadur Singh,
Jonathan D. Denlinger,
Masahiro Ishigami,
J. F. Mitchell,
Dariusz Kaczorowski,
Arun Bansil,
Madhab Neupane
Abstract:
The family of transition metal dipnictides (TMDs) has been of theoretical and experimental interest because this family hosts topological states and extremely large magnetoresistance (MR). Recently, TaAs2, a member of this family, has been predicted to support a topological crystalline insulating state. Here, by using high resolution. Angle resolved photoemission spectroscopy (ARPES), we reveal bo…
▽ More
The family of transition metal dipnictides (TMDs) has been of theoretical and experimental interest because this family hosts topological states and extremely large magnetoresistance (MR). Recently, TaAs2, a member of this family, has been predicted to support a topological crystalline insulating state. Here, by using high resolution. Angle resolved photoemission spectroscopy (ARPES), we reveal both closed and open pockets in the metallic Fermi surface and linearly dispersive bands on the (201) surface, along with the presence of extreme MR observed from magneto-transport measurements. A comparison of the ARPES results with first-principles computations show that the linearly dispersive bands on the measured surface of TaAs2 are trivial bulk bands. The absence of symmetry-protected surface state on the (201) surface indicates its topologically dark nature. The presence of open Fermi surface features suggests that the open orbit fermiology could contribute to the extremely large MR of TaAs.
△ Less
Submitted 15 November, 2023;
originally announced November 2023.
-
Determination of toxic comments and unintended model bias minimization using Deep learning approach
Authors:
Md Azim Khan
Abstract:
Online conversations can be toxic and subjected to threats, abuse, or harassment. To identify toxic text comments, several deep learning and machine learning models have been proposed throughout the years. However, recent studies demonstrate that because of the imbalances in the training data, some models are more likely to show unintended biases including gender bias and identity bias. In this re…
▽ More
Online conversations can be toxic and subjected to threats, abuse, or harassment. To identify toxic text comments, several deep learning and machine learning models have been proposed throughout the years. However, recent studies demonstrate that because of the imbalances in the training data, some models are more likely to show unintended biases including gender bias and identity bias. In this research, our aim is to detect toxic comment and reduce the unintended bias concerning identity features such as race, gender, sex, religion by fine-tuning an attention based model called BERT(Bidirectional Encoder Representation from Transformers). We apply weighted loss to address the issue of unbalanced data and compare the performance of a fine-tuned BERT model with a traditional Logistic Regression model in terms of classification and bias minimization. The Logistic Regression model with the TFIDF vectorizer achieve 57.1% accuracy, and fine-tuned BERT model's accuracy is 89%. Code is available at https://github.com/zim10/Determine_Toxic_comment_and_identity_bias.git
△ Less
Submitted 8 November, 2023;
originally announced November 2023.
-
Preserving the knowledge of long clinical texts using aggregated ensembles of large language models
Authors:
Mohammad Junayed Hasan,
Suhra Noor,
Mohammad Ashrafuzzaman Khan
Abstract:
Clinical texts, such as admission notes, discharge summaries, and progress notes, contain rich and valuable information that can be used for various clinical outcome prediction tasks. However, applying large language models, such as BERT-based models, to clinical texts poses two major challenges: the limitation of input length and the diversity of data sources. This paper proposes a novel method t…
▽ More
Clinical texts, such as admission notes, discharge summaries, and progress notes, contain rich and valuable information that can be used for various clinical outcome prediction tasks. However, applying large language models, such as BERT-based models, to clinical texts poses two major challenges: the limitation of input length and the diversity of data sources. This paper proposes a novel method to preserve the knowledge of long clinical texts using aggregated ensembles of large language models. Unlike previous studies which use model ensembling or text aggregation methods separately, we combine ensemble learning with text aggregation and train multiple large language models on two clinical outcome tasks: mortality prediction and length of stay prediction. We show that our method can achieve better results than baselines, ensembling, and aggregation individually, and can improve the performance of large language models while handling long inputs and diverse datasets. We conduct extensive experiments on the admission notes from the MIMIC-III clinical database by combining multiple unstructured and high-dimensional datasets, demonstrating our method's effectiveness and superiority over existing approaches. We also provide a comprehensive analysis and discussion of our results, highlighting our method's applications and limitations for future research in the domain of clinical healthcare. The results and analysis of this study is supportive of our method assisting in clinical healthcare systems by enabling clinical decision-making with robust performance overcoming the challenges of long text inputs and varied datasets.
△ Less
Submitted 2 November, 2023;
originally announced November 2023.
-
Visible to Thermal image Translation for improving visual task in low light conditions
Authors:
Md Azim Khan
Abstract:
Several visual tasks, such as pedestrian detection and image-to-image translation, are challenging to accomplish in low light using RGB images. Heat variation of objects in thermal images can be used to overcome this. In this work, an end-to-end framework, which consists of a generative network and a detector network, is proposed to translate RGB image into Thermal ones and compare generated therm…
▽ More
Several visual tasks, such as pedestrian detection and image-to-image translation, are challenging to accomplish in low light using RGB images. Heat variation of objects in thermal images can be used to overcome this. In this work, an end-to-end framework, which consists of a generative network and a detector network, is proposed to translate RGB image into Thermal ones and compare generated thermal images with real data. We have collected images from two different locations using the Parrot Anafi Thermal drone. After that, we created a two-stream network, preprocessed, augmented, the image data, and trained the generator and discriminator models from scratch. The findings demonstrate that it is feasible to translate RGB training data to thermal data using GAN. As a result, thermal data can now be produced more quickly and affordably, which is useful for security and surveillance applications.
△ Less
Submitted 8 November, 2023; v1 submitted 31 October, 2023;
originally announced October 2023.
-
Assessing the Influence of Different Types of Probing on Adversarial Decision-Making in a Deception Game
Authors:
Md Abu Sayed,
Mohammad Ariful Islam Khan,
Bryant A Allsup,
Joshua Zamora,
Palvi Aggarwal
Abstract:
Deception, which includes leading cyber-attackers astray with false information, has shown to be an effective method of thwarting cyber-attacks. There has been little investigation of the effect of probing action costs on adversarial decision-making, despite earlier studies on deception in cybersecurity focusing primarily on variables like network size and the percentage of honeypots utilized in g…
▽ More
Deception, which includes leading cyber-attackers astray with false information, has shown to be an effective method of thwarting cyber-attacks. There has been little investigation of the effect of probing action costs on adversarial decision-making, despite earlier studies on deception in cybersecurity focusing primarily on variables like network size and the percentage of honeypots utilized in games. Understanding human decision-making when prompted with choices of various costs is essential in many areas such as in cyber security. In this paper, we will use a deception game (DG) to examine different costs of probing on adversarial decisions. To achieve this we utilized an IBLT model and a delayed feedback mechanism to mimic knowledge of human actions. Our results were taken from an even split of deception and no deception to compare each influence. It was concluded that probing was slightly taken less as the cost of probing increased. The proportion of attacks stayed relatively the same as the cost of probing increased. Although a constant cost led to a slight decrease in attacks. Overall, our results concluded that the different probing costs do not have an impact on the proportion of attacks whereas it had a slightly noticeable impact on the proportion of probing.
△ Less
Submitted 8 January, 2024; v1 submitted 15 September, 2023;
originally announced October 2023.
-
Crowd Counting in Harsh Weather using Image Denoising with Pix2Pix GANs
Authors:
Muhammad Asif Khan,
Hamid Menouar,
Ridha Hamila
Abstract:
Visual crowd counting estimates the density of the crowd using deep learning models such as convolution neural networks (CNNs). The performance of the model heavily relies on the quality of the training data that constitutes crowd images. In harsh weather such as fog, dust, and low light conditions, the inference performance may severely degrade on the noisy and blur images. In this paper, we prop…
▽ More
Visual crowd counting estimates the density of the crowd using deep learning models such as convolution neural networks (CNNs). The performance of the model heavily relies on the quality of the training data that constitutes crowd images. In harsh weather such as fog, dust, and low light conditions, the inference performance may severely degrade on the noisy and blur images. In this paper, we propose the use of Pix2Pix generative adversarial network (GAN) to first denoise the crowd images prior to passing them to the counting model. A Pix2Pix network is trained using synthetic noisy images generated from original crowd images and then the pretrained generator is then used in the inference engine to estimate the crowd density in unseen, noisy crowd images. The performance is tested on JHU-Crowd dataset to validate the significance of the proposed method particularly when high reliability and accuracy are required.
△ Less
Submitted 11 October, 2023;
originally announced October 2023.
-
Separately Convex and Separately Continuous Preferences: On Results of Schmeidler, Shafer, and Bergstrom-Parks-Rader
Authors:
Metin Uyanik,
Aniruddha Ghosh,
M. Ali Khan
Abstract:
We provide necessary and sufficient conditions for a correspondence taking values in a finite-dimensional Euclidean space to be open so as to revisit the pioneering work of Schmeidler (1969), Shafer (1974), Shafer-Sonnenschein (1975) and Bergstrom-Rader-Parks (1976) to answer several questions they and their followers left open. We introduce the notion of separate convexity for a correspondence an…
▽ More
We provide necessary and sufficient conditions for a correspondence taking values in a finite-dimensional Euclidean space to be open so as to revisit the pioneering work of Schmeidler (1969), Shafer (1974), Shafer-Sonnenschein (1975) and Bergstrom-Rader-Parks (1976) to answer several questions they and their followers left open. We introduce the notion of separate convexity for a correspondence and use it to relate to classical notions of continuity while giving salience to the notion of separateness as in the interplay of separate continuity and separate convexity of binary relations. As such, we provide a consolidation of the convexity-continuity postulates from a broad inter-disciplinary perspective and comment on how the qualified notions proposed here have implications of substantive interest for choice theory.
△ Less
Submitted 30 September, 2023;
originally announced October 2023.
-
Financial Fraud Detection using Quantum Graph Neural Networks
Authors:
Nouhaila Innan,
Abhishek Sawaika,
Ashim Dhor,
Siddhant Dutta,
Sairupa Thota,
Husayn Gokal,
Nandan Patel,
Muhammad Al-Zafar Khan,
Ioannis Theodonis,
Mohamed Bennai
Abstract:
Financial fraud detection is essential for preventing significant financial losses and maintaining the reputation of financial institutions. However, conventional methods of detecting financial fraud have limited effectiveness, necessitating the need for new approaches to improve detection rates. In this paper, we propose a novel approach for detecting financial fraud using Quantum Graph Neural Ne…
▽ More
Financial fraud detection is essential for preventing significant financial losses and maintaining the reputation of financial institutions. However, conventional methods of detecting financial fraud have limited effectiveness, necessitating the need for new approaches to improve detection rates. In this paper, we propose a novel approach for detecting financial fraud using Quantum Graph Neural Networks (QGNNs). QGNNs are a type of neural network that can process graph-structured data and leverage the power of Quantum Computing (QC) to perform computations more efficiently than classical neural networks. Our approach uses Variational Quantum Circuits (VQC) to enhance the performance of the QGNN. In order to evaluate the efficiency of our proposed method, we compared the performance of QGNNs to Classical Graph Neural Networks using a real-world financial fraud detection dataset. The results of our experiments showed that QGNNs achieved an AUC of $0.85$, which outperformed classical GNNs. Our research highlights the potential of QGNNs and suggests that QGNNs are a promising new approach for improving financial fraud detection.
△ Less
Submitted 3 September, 2023;
originally announced September 2023.
-
A Survey of Network Requirements for Enabling Effective Cyber Deception
Authors:
Md Abu Sayed,
Moqsadur Rahman,
Mohammad Ariful Islam Khan,
Deepak Tosh
Abstract:
In the evolving landscape of cybersecurity, the utilization of cyber deception has gained prominence as a proactive defense strategy against sophisticated attacks. This paper presents a comprehensive survey that investigates the crucial network requirements essential for the successful implementation of effective cyber deception techniques. With a focus on diverse network architectures and topolog…
▽ More
In the evolving landscape of cybersecurity, the utilization of cyber deception has gained prominence as a proactive defense strategy against sophisticated attacks. This paper presents a comprehensive survey that investigates the crucial network requirements essential for the successful implementation of effective cyber deception techniques. With a focus on diverse network architectures and topologies, we delve into the intricate relationship between network characteristics and the deployment of deception mechanisms. This survey provides an in-depth analysis of prevailing cyber deception frameworks, highlighting their strengths and limitations in meeting the requirements for optimal efficacy. By synthesizing insights from both theoretical and practical perspectives, we contribute to a comprehensive understanding of the network prerequisites crucial for enabling robust and adaptable cyber deception strategies.
△ Less
Submitted 8 January, 2024; v1 submitted 31 August, 2023;
originally announced September 2023.
-
Visual Crowd Analysis: Open Research Problems
Authors:
Muhammad Asif Khan,
Hamid Menouar,
Ridha Hamila
Abstract:
Over the last decade, there has been a remarkable surge in interest in automated crowd monitoring within the computer vision community. Modern deep-learning approaches have made it possible to develop fully-automated vision-based crowd-monitoring applications. However, despite the magnitude of the issue at hand, the significant technological advancements, and the consistent interest of the researc…
▽ More
Over the last decade, there has been a remarkable surge in interest in automated crowd monitoring within the computer vision community. Modern deep-learning approaches have made it possible to develop fully-automated vision-based crowd-monitoring applications. However, despite the magnitude of the issue at hand, the significant technological advancements, and the consistent interest of the research community, there are still numerous challenges that need to be overcome. In this article, we delve into six major areas of visual crowd analysis, emphasizing the key developments in each of these areas. We outline the crucial unresolved issues that must be tackled in future works, in order to ensure that the field of automated crowd monitoring continues to progress and thrive. Several surveys related to this topic have been conducted in the past. Nonetheless, this article thoroughly examines and presents a more intuitive categorization of works, while also depicting the latest breakthroughs within the field, incorporating more recent studies carried out within the last few years in a concise manner. By carefully choosing prominent works with significant contributions in terms of novelty or performance gains, this paper presents a more comprehensive exposition of advancements in the current state-of-the-art.
△ Less
Submitted 24 August, 2023; v1 submitted 21 August, 2023;
originally announced August 2023.
-
Quantum State Tomography using Quantum Machine Learning
Authors:
Nouhaila Innan,
Owais Ishtiaq Siddiqui,
Shivang Arora,
Tamojit Ghosh,
Yasemin Poyraz Koçak,
Dominic Paragas,
Abdullah Al Omar Galib,
Muhammad Al-Zafar Khan,
Mohamed Bennai
Abstract:
Quantum State Tomography (QST) is a fundamental technique in Quantum Information Processing (QIP) for reconstructing unknown quantum states. However, the conventional QST methods are limited by the number of measurements required, which makes them impractical for large-scale quantum systems. To overcome this challenge, we propose the integration of Quantum Machine Learning (QML) techniques to enha…
▽ More
Quantum State Tomography (QST) is a fundamental technique in Quantum Information Processing (QIP) for reconstructing unknown quantum states. However, the conventional QST methods are limited by the number of measurements required, which makes them impractical for large-scale quantum systems. To overcome this challenge, we propose the integration of Quantum Machine Learning (QML) techniques to enhance the efficiency of QST. In this paper, we conduct a comprehensive investigation into various approaches for QST, encompassing both classical and quantum methodologies; We also implement different QML approaches for QST and demonstrate their effectiveness on various simulated and experimental quantum systems, including multi-qubit networks. Our results show that our QML-based QST approach can achieve high fidelity (98%) with significantly fewer measurements than conventional methods, making it a promising tool for practical QIP applications.
△ Less
Submitted 20 August, 2023;
originally announced August 2023.
-
Financial Fraud Detection: A Comparative Study of Quantum Machine Learning Models
Authors:
Nouhaila Innan,
Muhammad Al-Zafar Khan,
Mohamed Bennai
Abstract:
In this research, a comparative study of four Quantum Machine Learning (QML) models was conducted for fraud detection in finance. We proved that the Quantum Support Vector Classifier model achieved the highest performance, with F1 scores of 0.98 for fraud and non-fraud classes. Other models like the Variational Quantum Classifier, Estimator Quantum Neural Network (QNN), and Sampler QNN demonstrate…
▽ More
In this research, a comparative study of four Quantum Machine Learning (QML) models was conducted for fraud detection in finance. We proved that the Quantum Support Vector Classifier model achieved the highest performance, with F1 scores of 0.98 for fraud and non-fraud classes. Other models like the Variational Quantum Classifier, Estimator Quantum Neural Network (QNN), and Sampler QNN demonstrate promising results, propelling the potential of QML classification for financial applications. While they exhibit certain limitations, the insights attained pave the way for future enhancements and optimisation strategies. However, challenges exist, including the need for more efficient Quantum algorithms and larger and more complex datasets. The article provides solutions to overcome current limitations and contributes new insights to the field of Quantum Machine Learning in fraud detection, with important implications for its future development.
△ Less
Submitted 9 August, 2023;
originally announced August 2023.
-
CAMP: A Context-Aware Cricket Players Performance Metric
Authors:
Muhammad Sohaib Ayub,
Naimat Ullah,
Sarwan Ali,
Imdad Ullah Khan,
Mian Muhammad Awais,
Muhammad Asad Khan,
Safiullah Faizullah
Abstract:
Cricket is the second most popular sport after soccer in terms of viewership. However, the assessment of individual player performance, a fundamental task in team sports, is currently primarily based on aggregate performance statistics, including average runs and wickets taken. We propose Context-Aware Metric of player Performance, CAMP, to quantify individual players' contributions toward a crick…
▽ More
Cricket is the second most popular sport after soccer in terms of viewership. However, the assessment of individual player performance, a fundamental task in team sports, is currently primarily based on aggregate performance statistics, including average runs and wickets taken. We propose Context-Aware Metric of player Performance, CAMP, to quantify individual players' contributions toward a cricket match outcome. CAMP employs data mining methods and enables effective data-driven decision-making for selection and drafting, coaching and training, team line-ups, and strategy development. CAMP incorporates the exact context of performance, such as opponents' strengths and specific circumstances of games, such as pressure situations. We empirically evaluate CAMP on data of limited-over cricket matches between 2001 and 2019. In every match, a committee of experts declares one player as the best player, called Man of the M}atch (MoM). The top two rated players by CAMP match with MoM in 83\% of the 961 games. Thus, the CAMP rating of the best player closely matches that of the domain experts. By this measure, CAMP significantly outperforms the current best-known players' contribution measure based on the Duckworth-Lewis-Stern (DLS) method.
△ Less
Submitted 14 July, 2023;
originally announced July 2023.
-
The Art of Embedding Fusion: Optimizing Hate Speech Detection
Authors:
Mohammad Aflah Khan,
Neemesh Yadav,
Mohit Jain,
Sanyam Goyal
Abstract:
Hate speech detection is a challenging natural language processing task that requires capturing linguistic and contextual nuances. Pre-trained language models (PLMs) offer rich semantic representations of text that can improve this task. However there is still limited knowledge about ways to effectively combine representations across PLMs and leverage their complementary strengths. In this work, w…
▽ More
Hate speech detection is a challenging natural language processing task that requires capturing linguistic and contextual nuances. Pre-trained language models (PLMs) offer rich semantic representations of text that can improve this task. However there is still limited knowledge about ways to effectively combine representations across PLMs and leverage their complementary strengths. In this work, we shed light on various combination techniques for several PLMs and comprehensively analyze their effectiveness. Our findings show that combining embeddings leads to slight improvements but at a high computational cost and the choice of combination has marginal effect on the final outcome. We also make our codebase public at https://github.com/aflah02/The-Art-of-Embedding-Fusion-Optimizing-Hate-Speech-Detection .
△ Less
Submitted 8 October, 2023; v1 submitted 26 June, 2023;
originally announced June 2023.
-
Numerical analysis of the stochastic Stefan problem
Authors:
Jerome Droniou,
Muhammad Awais Khan,
Kim Ngan Le
Abstract:
The gradient discretisation method (GDM) -- a generic framework encompassing many numerical methods -- is studied for a general stochastic Stefan problem with multiplicative noise. The convergence of the numerical solutions is proved by compactness method using discrete functional analysis tools, Skorohod theorem and the martingale representation theorem. The generic convergence results establishe…
▽ More
The gradient discretisation method (GDM) -- a generic framework encompassing many numerical methods -- is studied for a general stochastic Stefan problem with multiplicative noise. The convergence of the numerical solutions is proved by compactness method using discrete functional analysis tools, Skorohod theorem and the martingale representation theorem. The generic convergence results established in the GDM framework are applicable to a range of different numerical methods, including for example mass-lumped finite elements, but also some finite volume methods, mimetic methods, lowest-order virtual element methods, etc. Theoretical results are complemented by numerical tests based on two methods that fit in GDM framework.
△ Less
Submitted 26 June, 2023; v1 submitted 22 June, 2023;
originally announced June 2023.
-
Beyond Negativity: Re-Analysis and Follow-Up Experiments on Hope Speech Detection
Authors:
Neemesh Yadav,
Mohammad Aflah Khan,
Diksha Sethi,
Raghav Sahni
Abstract:
Health experts assert that hope plays a crucial role in enhancing individuals' physical and mental well-being, facilitating their recovery, and promoting restoration. Hope speech refers to comments, posts and other social media messages that offer support, reassurance, suggestions, inspiration, and insight. The detection of hope speech involves the analysis of such textual content, with the aim of…
▽ More
Health experts assert that hope plays a crucial role in enhancing individuals' physical and mental well-being, facilitating their recovery, and promoting restoration. Hope speech refers to comments, posts and other social media messages that offer support, reassurance, suggestions, inspiration, and insight. The detection of hope speech involves the analysis of such textual content, with the aim of identifying messages that invoke positive emotions in people. Our study aims to find computationally efficient yet comparable/superior methods for hope speech detection. We also make our codebase public at https://github.com/aflah02/Hope_Speech_Detection
△ Less
Submitted 10 May, 2023;
originally announced June 2023.
-
Conservation Laws for the Nonlinear Klein-Gordon Equation in (1+1)-, (2+1), and (3+1)-dimensions
Authors:
Muhammad Al-Zafar Khan
Abstract:
We study soliton solutions to the Klein-Gordon equation via Lie symmetries and the travelling-wave ansatz. It is shown, by taking a linear combination of the spatial and temporal Lie point symmetries, that soliton solutions naturally exist, and the resulting field lies in the complex plane. We normalize the field over a finite spatial interval, and thereafter, specify one of the integration consta…
▽ More
We study soliton solutions to the Klein-Gordon equation via Lie symmetries and the travelling-wave ansatz. It is shown, by taking a linear combination of the spatial and temporal Lie point symmetries, that soliton solutions naturally exist, and the resulting field lies in the complex plane. We normalize the field over a finite spatial interval, and thereafter, specify one of the integration constants in terms of the other. Solutions to a specific type of nonlinear Klein-Gordon equation are studied via the sine-cosine method, and a real soliton wave is obtained. Lastly, the multiplier method is used to construct conservation laws for this particular nonlinear Klein-Gordon equation in (3 + 1)-dimensions.
△ Less
Submitted 16 May, 2023;
originally announced May 2023.
-
Lie Symmetry Analysis of the Einstein-Maxwell Equations for Quark Stars
Authors:
Muhammad Al-Zafar Khan,
Riven Narain
Abstract:
We derive the Lie point symmetries for the MIT Bag Model for quark stars in relativistic astrophysics. Four cases of reduction arise; three cases of specific values of the measure of the anisotropy variation, and one general case, which we postulate as a specific relationship between the two gravitational potentials. We demonstrate the applicability of the model by generating two closed form solut…
▽ More
We derive the Lie point symmetries for the MIT Bag Model for quark stars in relativistic astrophysics. Four cases of reduction arise; three cases of specific values of the measure of the anisotropy variation, and one general case, which we postulate as a specific relationship between the two gravitational potentials. We demonstrate the applicability of the model by generating two closed form solutions that satisfy the master gravitational equation and we match the interior geometries of the gravitating hyperspheres with the external solution given by the Reissner-Nordström metric at the stellar boundary. Lastly, we produce a general class of solutions that are attainable for smooth and continuous functions and generate two exact solutions using this model.
△ Less
Submitted 18 May, 2023;
originally announced May 2023.
-
Soliton Solutions and Conservation Laws for a Self-interacting Scalar Field in \(φ^{4}\) Theory
Authors:
Muhammad Al-Zafar Khan,
Mervlyn Moodley,
Francesco Petruccione
Abstract:
We calculate soliton solutions to the scalar field equation of motion that arises for the 4th-order extended Lagrangian (\(φ^{4}\) theory) in quantum field theory using the extended hyperbolic tangent and the sine-cosine methods. Using the former technique, ten complex soliton waves are obtained; we graphically represent three of these profiles using density plots. In the latter case, two real sol…
▽ More
We calculate soliton solutions to the scalar field equation of motion that arises for the 4th-order extended Lagrangian (\(φ^{4}\) theory) in quantum field theory using the extended hyperbolic tangent and the sine-cosine methods. Using the former technique, ten complex soliton waves are obtained; we graphically represent three of these profiles using density plots. In the latter case, two real soliton solutions are obtained, of which, we demonstrate the wave profile for the positive case. Using the multiplier method, we calculate conservation laws in \((1 + 1)\)-, \((2 + 1)\)-, and \((3 + 1)\)-dimensions producing three, six, and ten conservation laws respectively. Lastly, we reflect on the application of conservation laws in particle physics and phenomenology.
△ Less
Submitted 16 May, 2023;
originally announced May 2023.
-
Conservation Laws for a Thermal Reservoir Model in Open Quantum Systems
Authors:
Muhammad Al-Zafar Khan,
Mervlyn Moodley,
Francesco Petruccione
Abstract:
We construct Lie point symmetries, a closed-form solution and conservation laws using a non-Noetherian approach for a specific case of the Gorini-Kossakowski-Sudarshan-Lindblad equation that has been recast for the study of non-relativistic free particles in a thermal reservoir environment. Conservation laws are constructed subsequently using the Ibragimov method via a solution to the adjoint form…
▽ More
We construct Lie point symmetries, a closed-form solution and conservation laws using a non-Noetherian approach for a specific case of the Gorini-Kossakowski-Sudarshan-Lindblad equation that has been recast for the study of non-relativistic free particles in a thermal reservoir environment. Conservation laws are constructed subsequently using the Ibragimov method via a solution to the adjoint form of the equation of motion via its corresponding scalaing symmetry. A general computational framework for obtaining all conserved vectors is exhibited some triplets of conserved quantities are calculated in full.
△ Less
Submitted 16 May, 2023;
originally announced May 2023.