-
Adaptive Opponent Policy Detection in Multi-Agent MDPs: Real-Time Strategy Switch Identification Using Running Error Estimation
Authors:
Mohidul Haque Mridul,
Mohammad Foysal Khan,
Redwan Ahmed Rizvee,
Md Mosaddek Khan
Abstract:
In Multi-agent Reinforcement Learning (MARL), accurately perceiving opponents' strategies is essential for both cooperative and adversarial contexts, particularly within dynamic environments. While Proximal Policy Optimization (PPO) and related algorithms such as Actor-Critic with Experience Replay (ACER), Trust Region Policy Optimization (TRPO), and Deep Deterministic Policy Gradient (DDPG) perfo…
▽ More
In Multi-agent Reinforcement Learning (MARL), accurately perceiving opponents' strategies is essential for both cooperative and adversarial contexts, particularly within dynamic environments. While Proximal Policy Optimization (PPO) and related algorithms such as Actor-Critic with Experience Replay (ACER), Trust Region Policy Optimization (TRPO), and Deep Deterministic Policy Gradient (DDPG) perform well in single-agent, stationary environments, they suffer from high variance in MARL due to non-stationary and hidden policies of opponents, leading to diminished reward performance. Additionally, existing methods in MARL face significant challenges, including the need for inter-agent communication, reliance on explicit reward information, high computational demands, and sampling inefficiencies. These issues render them less effective in continuous environments where opponents may abruptly change their policies without prior notice. Against this background, we present OPS-DeMo (Online Policy Switch-Detection Model), an online algorithm that employs dynamic error decay to detect changes in opponents' policies. OPS-DeMo continuously updates its beliefs using an Assumed Opponent Policy (AOP) Bank and selects corresponding responses from a pre-trained Response Policy Bank. Each response policy is trained against consistently strategizing opponents, reducing training uncertainty and enabling the effective use of algorithms like PPO in multi-agent environments. Comparative assessments show that our approach outperforms PPO-trained models in dynamic scenarios like the Predator-Prey setting, providing greater robustness to sudden policy shifts and enabling more informed decision-making through precise opponent policy insights.
△ Less
Submitted 10 June, 2024;
originally announced June 2024.
-
Foreign Capital and Economic Growth: Evidence from Bangladesh
Authors:
Ummya Salma,
Md. Fazlul Huq Khan,
Md. Masum Billah
Abstract:
This study aims to examine the relationship between Foreign Direct Investment (FDI), personal remittances received, and official development assistance (ODA) in the economic growth of Bangladesh. The study utilizes time series data on Bangladesh from 1976 to 2021. Additionally, this research contributes to the existing literature by introducing the Foreign Capital Depthless Index (FCDI) and explor…
▽ More
This study aims to examine the relationship between Foreign Direct Investment (FDI), personal remittances received, and official development assistance (ODA) in the economic growth of Bangladesh. The study utilizes time series data on Bangladesh from 1976 to 2021. Additionally, this research contributes to the existing literature by introducing the Foreign Capital Depthless Index (FCDI) and exploring its impact on Bangladesh's economic growth. The results of the Vector Error Correction Model (VECM) suggest that the economic growth of Bangladesh depends on FDI, remittances, and aid in the long run. However, these variables do not exhibit a causal relationship with GDP in the short run. The relationship between FCDI and economic growth is positive in the long run. Nevertheless, the presence of these three variables has a more significant impact on the economic growth of Bangladesh
△ Less
Submitted 7 December, 2023;
originally announced December 2023.
-
Assessing the Promise and Pitfalls of ChatGPT for Automated Code Generation
Authors:
Muhammad Fawad Akbar Khan,
Max Ramsdell,
Erik Falor,
Hamid Karimi
Abstract:
This paper presents a comprehensive evaluation of the code generation capabilities of ChatGPT, a prominent large language model, compared to human programmers. A novel dataset of 131 code-generation prompts across 5 categories was curated to enable robust analysis. Code solutions were generated by both ChatGPT and humans for all prompts, resulting in 262 code samples. A meticulous manual assessmen…
▽ More
This paper presents a comprehensive evaluation of the code generation capabilities of ChatGPT, a prominent large language model, compared to human programmers. A novel dataset of 131 code-generation prompts across 5 categories was curated to enable robust analysis. Code solutions were generated by both ChatGPT and humans for all prompts, resulting in 262 code samples. A meticulous manual assessment methodology prioritized evaluating correctness, comprehensibility, and security using 14 established code quality metrics. The key findings reveal ChatGPT's strengths in crafting concise, efficient code with advanced constructs, showcasing strengths in data analysis tasks (93.1% accuracy) but limitations in visual-graphical challenges. Comparative analysis with human code highlights ChatGPT's inclination towards modular design and superior error handling. Additionally, machine learning models effectively distinguished ChatGPT from human code with up to 88% accuracy, suggesting detectable coding style disparities. By providing profound insights into ChatGPT's code generation capabilities and limitations through quantitative metrics and qualitative analysis, this study makes valuable contributions toward advancing AI-based programming assistants. The curated dataset and methodology offer a robust foundation for future research in this nascent domain. All data and codes are available on https://github.com/DSAatUSU/ChatGPT-promises-and-pitfalls.
△ Less
Submitted 5 November, 2023;
originally announced November 2023.
-
Enhancing the Performance of Automated Grade Prediction in MOOC using Graph Representation Learning
Authors:
Soheila Farokhi,
Aswani Yaramala,
Jiangtao Huang,
Muhammad F. A. Khan,
Xiaojun Qi,
Hamid Karimi
Abstract:
In recent years, Massive Open Online Courses (MOOCs) have gained significant traction as a rapidly growing phenomenon in online learning. Unlike traditional classrooms, MOOCs offer a unique opportunity to cater to a diverse audience from different backgrounds and geographical locations. Renowned universities and MOOC-specific providers, such as Coursera, offer MOOC courses on various subjects. Aut…
▽ More
In recent years, Massive Open Online Courses (MOOCs) have gained significant traction as a rapidly growing phenomenon in online learning. Unlike traditional classrooms, MOOCs offer a unique opportunity to cater to a diverse audience from different backgrounds and geographical locations. Renowned universities and MOOC-specific providers, such as Coursera, offer MOOC courses on various subjects. Automated assessment tasks like grade and early dropout predictions are necessary due to the high enrollment and limited direct interaction between teachers and learners. However, current automated assessment approaches overlook the structural links between different entities involved in the downstream tasks, such as the students and courses. Our hypothesis suggests that these structural relationships, manifested through an interaction graph, contain valuable information that can enhance the performance of the task at hand. To validate this, we construct a unique knowledge graph for a large MOOC dataset, which will be publicly available to the research community. Furthermore, we utilize graph embedding techniques to extract latent structural information encoded in the interactions between entities in the dataset. These techniques do not require ground truth labels and can be utilized for various tasks. Finally, by combining entity-specific features, behavioral features, and extracted structural features, we enhance the performance of predictive machine learning models in student assignment grade prediction. Our experiments demonstrate that structural features can significantly improve the predictive performance of downstream assessment tasks. The code and data are available in \url{https://github.com/DSAatUSU/MOOPer_grade_prediction}
△ Less
Submitted 18 October, 2023;
originally announced October 2023.
-
The Connection Between Political Stability and Inflation: Insights from Four South Asian Nations
Authors:
Ummya Salma,
Md. Fazlul Huq Khan
Abstract:
This study explores the relationship between political stability and inflation in four South Asian countries, employing panel data spanning from 2001 to 2021. To analyze this relationship, the study utilizes the dynamic ordinary least square (DOLS) and fully modified ordinary least square (FMOLS) methods, which account for cross-sectional dependence and slope homogeneity in panel data analysis. Th…
▽ More
This study explores the relationship between political stability and inflation in four South Asian countries, employing panel data spanning from 2001 to 2021. To analyze this relationship, the study utilizes the dynamic ordinary least square (DOLS) and fully modified ordinary least square (FMOLS) methods, which account for cross-sectional dependence and slope homogeneity in panel data analysis. The findings consistently reveal that increased political stability is associated with lower inflation, while reduced political stability is linked to higher inflation.
△ Less
Submitted 12 October, 2023;
originally announced October 2023.
-
Leveraging Natural Language Processing For Public Health Screening On YouTube: A COVID-19 Case Study
Authors:
Ahrar Bin Aslam,
Zafi Sherhan Syed,
Muhammad Faiz Khan,
Asghar Baloch,
Muhammad Shehram Shah Syed
Abstract:
Background: Social media platforms have become a viable source of medical information, with patients and healthcare professionals using them to share health-related information and track diseases. Similarly, YouTube, the largest video-sharing platform in the world contains vlogs where individuals talk about their illnesses. The aim of our study was to investigate the use of Natural Language Proces…
▽ More
Background: Social media platforms have become a viable source of medical information, with patients and healthcare professionals using them to share health-related information and track diseases. Similarly, YouTube, the largest video-sharing platform in the world contains vlogs where individuals talk about their illnesses. The aim of our study was to investigate the use of Natural Language Processing (NLP) to identify the spoken content of YouTube vlogs related to the diagnosis of Coronavirus disease of 2019 (COVID-19) for public health screening. Methods: COVID-19 videos on YouTube were searched using relevant keywords. A total of 1000 videos being spoken in English were downloaded out of which 791 were classified as vlogs, 192 were non-vlogs, and 17 were deleted by the channel. The videos were converted into a textual format using Microsoft Streams. The textual data was preprocessed using basic and advanced preprocessing methods. A lexicon of 200 words was created which contained words related to COVID-19. The data was analyzed using topic modeling, word clouds, and lexicon matching. Results: The word cloud results revealed discussions about COVID-19 symptoms like "fever", along with generic terms such as "mask" and "isolation". Lexical analysis demonstrated that in 96.46% of videos, patients discussed generic terms, and in 95.45% of videos, people talked about COVID-19 symptoms. LDA Topic Modeling results also generated topics that successfully captured key themes and content related to our investigation of COVID-19 diagnoses in YouTube vlogs. Conclusion: By leveraging NLP techniques on YouTube vlogs public health practitioners can enhance their ability to mitigate the effects of pandemics and effectively respond to public health challenges.
△ Less
Submitted 1 June, 2023;
originally announced June 2023.
-
Macroeconomic factors and Stock exchange return: A Statistical Analysis
Authors:
Md. Fazlul Huq Khan,
Md. Masum Billah
Abstract:
The purpose of this research is to examine the relationship between the Dhaka Stock exchange index return and macroeconomic variables such as exchange rate, inflation, money supply etc. The long-term relationship between macroeconomic variables and stock market returns has been analyzed by using the Johnson Cointegration test, Augmented Dicky Fuller (ADF) and Phillip Perron (PP) tests. The results…
▽ More
The purpose of this research is to examine the relationship between the Dhaka Stock exchange index return and macroeconomic variables such as exchange rate, inflation, money supply etc. The long-term relationship between macroeconomic variables and stock market returns has been analyzed by using the Johnson Cointegration test, Augmented Dicky Fuller (ADF) and Phillip Perron (PP) tests. The results revealed the existence of cointegrating relationship between stock prices and the macroeconomic variables in the Dhaka stock exchange. The consumer price index, money supply, and exchange rates proved to be strongly associated with stock returns, while market capitalization was found to be negatively associated with stock returns. The findings suggest that in the long run, the Dhaka stock exchange is reactive to macroeconomic indicators.
△ Less
Submitted 3 May, 2023;
originally announced May 2023.
-
On Lagrangian Coherent Structures in Laparoscopy
Authors:
Sandeep Kumar,
Caroline Crowley,
Mohammad Faraz Khan,
Miguel D. Bustamante,
Ronan Cahill,
Kevin Nolan
Abstract:
Laparoscopy is an electrosurgical medical operation often involving an application of high-frequency alternating current to remove undesired biological tissue from the insufflated abdomen accessible through inlet and outlets trocars. One of the main byproducts in this process are the gaseous particles, called surgical smoke, which is found hazardous for both the patient and the operating room staf…
▽ More
Laparoscopy is an electrosurgical medical operation often involving an application of high-frequency alternating current to remove undesired biological tissue from the insufflated abdomen accessible through inlet and outlets trocars. One of the main byproducts in this process are the gaseous particles, called surgical smoke, which is found hazardous for both the patient and the operating room staff. The elimination of this hazardous material is an area of active research in the medical community. Thus, understanding dynamics influenced by the underlying flow inside the abdomen is crucial. In this article, we propose a computational fluid dynamics model and analyse the velocity field in an insufflated abdomen shaped domain by identifying the Lagrangian Coherent Structures (LCS) that are responsible for the transportation, mixing and accumulation of the material particles in the flow. By calculating the mixing strength we show that the regions revealed by these material curves are dependent on the angle, positions and number of the outlets and inlets. Hence, a novel utility of LCS in medical surgery is presented that can detail the dynamics of surgical smoke informing better design of effective smoke removal technologies.
△ Less
Submitted 24 December, 2022;
originally announced December 2022.
-
Shapes2Toon: Generating Cartoon Characters from Simple Geometric Shapes
Authors:
Simanta Deb Turja,
Mohammad Imrul Jubair,
Md. Shafiur Rahman,
Md. Hasib Al Zadid,
Mohtasim Hossain Shovon,
Md. Faraz Kabir Khan
Abstract:
Cartoons are an important part of our entertainment culture. Though drawing a cartoon is not for everyone, creating it using an arrangement of basic geometric primitives that approximates that character is a fairly frequent technique in art. The key motivation behind this technique is that human bodies - as well as cartoon figures - can be split down into various basic geometric primitives. Numero…
▽ More
Cartoons are an important part of our entertainment culture. Though drawing a cartoon is not for everyone, creating it using an arrangement of basic geometric primitives that approximates that character is a fairly frequent technique in art. The key motivation behind this technique is that human bodies - as well as cartoon figures - can be split down into various basic geometric primitives. Numerous tutorials are available that demonstrate how to draw figures using an appropriate arrangement of fundamental shapes, thus assisting us in creating cartoon characters. This technique is very beneficial for children in terms of teaching them how to draw cartoons. In this paper, we develop a tool - shape2toon - that aims to automate this approach by utilizing a generative adversarial network which combines geometric primitives (i.e. circles) and generate a cartoon figure (i.e. Mickey Mouse) depending on the given approximation. For this purpose, we created a dataset of geometrically represented cartoon characters. We apply an image-to-image translation technique on our dataset and report the results in this paper. The experimental results show that our system can generate cartoon characters from input layout of geometric shapes. In addition, we demonstrate a web-based tool as a practical implication of our work.
△ Less
Submitted 3 November, 2022;
originally announced November 2022.
-
Book Cover Synthesis from the Summary
Authors:
Emdadul Haque,
Md. Faraz Kabir Khan,
Mohammad Imrul Jubair,
Jarin Anjum,
Abrar Zahir Niloy
Abstract:
The cover is the face of a book and is a point of attraction for the readers. Designing book covers is an essential task in the publishing industry. One of the main challenges in creating a book cover is representing the theme of the book's content in a single image. In this research, we explore ways to produce a book cover using artificial intelligence based on the fact that there exists a relati…
▽ More
The cover is the face of a book and is a point of attraction for the readers. Designing book covers is an essential task in the publishing industry. One of the main challenges in creating a book cover is representing the theme of the book's content in a single image. In this research, we explore ways to produce a book cover using artificial intelligence based on the fact that there exists a relationship between the summary of the book and its cover. Our key motivation is the application of text-to-image synthesis methods to generate images from given text or captions. We explore several existing text-to-image conversion techniques for this purpose and propose an approach to exploit these frameworks for producing book covers from provided summaries. We construct a dataset of English books that contains a large number of samples of summaries of existing books and their cover images. In this paper, we describe our approach to collecting, organizing, and pre-processing the dataset to use it for training models. We apply different text-to-image synthesis techniques to generate book covers from the summary and exhibit the results in this paper.
△ Less
Submitted 3 November, 2022;
originally announced November 2022.
-
Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms
Authors:
Muhammad Fahad Khan,
Khalid Saleem,
Mohammed Alotaibi,
Mohammad Mazyad Hazzazi,
Eid Rehman,
Aaqif Afzaal Abbasi,
Muhammad Asif Gondal
Abstract:
Internet of Things is an ecosystem of interconnected devices that are accessible through the internet. The recent research focuses on adding more smartness and intelligence to these edge devices. This makes them susceptible to various kinds of security threats. These edge devices rely on cryptographic techniques to encrypt the pre-processed data collected from the sensors deployed in the field. In…
▽ More
Internet of Things is an ecosystem of interconnected devices that are accessible through the internet. The recent research focuses on adding more smartness and intelligence to these edge devices. This makes them susceptible to various kinds of security threats. These edge devices rely on cryptographic techniques to encrypt the pre-processed data collected from the sensors deployed in the field. In this regard, block cipher has been one of the most reliable options through which data security is accomplished. The strength of block encryption algorithms against different attacks is dependent on its nonlinear primitive which is called Substitution Boxes. For the design of S-boxes mainly algebraic and chaos-based techniques are used but researchers also found various weaknesses in these techniques. On the other side, literature endorse the true random numbers for information security due to the reason that, true random numbers are purely non-deterministic. In this paper firstly a natural dynamical phenomenon is utilized for the generation of true random numbers based S-boxes. Secondly, a systematic literature review was conducted to know which metaheuristic optimization technique is highly adopted in the current decade for the optimization of S-boxes. Based on the outcome of Systematic Literature Review (SLR), genetic algorithm is chosen for the optimization of s-boxes. The results of our method validate that the proposed dynamic S-boxes are effective for the block ciphers. Moreover, our results showed that the proposed substitution boxes achieve better
△ Less
Submitted 19 June, 2022;
originally announced June 2022.
-
BAN-Cap: A Multi-Purpose English-Bangla Image Descriptions Dataset
Authors:
Mohammad Faiyaz Khan,
S. M. Sadiq-Ur-Rahman Shifath,
Md Saiful Islam
Abstract:
As computers have become efficient at understanding visual information and transforming it into a written representation, research interest in tasks like automatic image captioning has seen a significant leap over the last few years. While most of the research attention is given to the English language in a monolingual setting, resource-constrained languages like Bangla remain out of focus, predom…
▽ More
As computers have become efficient at understanding visual information and transforming it into a written representation, research interest in tasks like automatic image captioning has seen a significant leap over the last few years. While most of the research attention is given to the English language in a monolingual setting, resource-constrained languages like Bangla remain out of focus, predominantly due to a lack of standard datasets. Addressing this issue, we present a new dataset BAN-Cap following the widely used Flickr8k dataset, where we collect Bangla captions of the images provided by qualified annotators. Our dataset represents a wider variety of image caption styles annotated by trained people from different backgrounds. We present a quantitative and qualitative analysis of the dataset and the baseline evaluation of the recent models in Bangla image captioning. We investigate the effect of text augmentation and demonstrate that an adaptive attention-based model combined with text augmentation using Contextualized Word Replacement (CWR) outperforms all state-of-the-art models for Bangla image captioning. We also present this dataset's multipurpose nature, especially on machine translation for Bangla-English and English-Bangla. This dataset and all the models will be useful for further research.
△ Less
Submitted 28 May, 2022;
originally announced May 2022.
-
Block Ciphers Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knights Tour Chain
Authors:
Muhammad Fahad Khan,
Khalid Saleem,
Tariq Shah,
Mohammad Mazyad Hazzazi,
Ismail Bahkali,
Piyush Kumar Shukla
Abstract:
The protection of confidential information is a global issue and block encryption algorithms are the most reliable option. The famous information theorist, Claude Shannon has given two desirable characteristics that should exist in a strong cipher which are substitution and permutation in their fundamental research on Communication Theory of Secrecy Systems. block ciphers strictly follow the subst…
▽ More
The protection of confidential information is a global issue and block encryption algorithms are the most reliable option. The famous information theorist, Claude Shannon has given two desirable characteristics that should exist in a strong cipher which are substitution and permutation in their fundamental research on Communication Theory of Secrecy Systems. block ciphers strictly follow the substitution and permutation principle to generate a ciphertext. The actual strength of the block ciphers against several attacks is entirely based on its substitution characteristic, which is gained by using the S-Box. In the current literature, algebraic structure-based and chaos-based techniques are highly used for the construction of S-boxes because both these techniques have favourable features for S-box construction, but also various attacks of these techniques have been identified. True randomness has been universally recognized as the ideal method for cipher primitives design because true random numbers are unpredictable, irreversible, and unreproducible. The basic concept of the proposed technique is the extraction of true random bits from underwater acoustic waves and to design a novel technique for the dynamic generation of S-boxes using the chain of knights tour. The proposed method satisfies all standard evaluation tests of S-boxes construction and true random numbers generation. Two million bits have been analyzed using the NIST randomness test suite, and the results show that underwater sound waves are an impeccable entropy source for true randomness. Additionally, our dynamically generated S-boxes have better or equal strength, over the latest published S-boxes (2020 to 2021). According to our knowledge first time, this type of research has been done, in which natural randomness of underwater acoustic waves has been used for the construction of block cipher's S-Box
△ Less
Submitted 26 May, 2022;
originally announced May 2022.
-
On the Feasibility of 4.9 GHz Public Safety Band as Spectrum Option for Internet of Vehicles
Authors:
Muhammad Faizan Rizwan Khan,
Seungmo Kim
Abstract:
There is an unprecedented impetus on the advancement of internet of vehicles (IoV). The vehicle-to-everything (V2X) communication is well acknowledged as the key technology in constitution of the IoV. Nevertheless, the spectrum for V2X communication is undergoing a massive change in the United States: a majority of the bandwidth has been reallocated to Wi-Fi leaving even less than a half of the ba…
▽ More
There is an unprecedented impetus on the advancement of internet of vehicles (IoV). The vehicle-to-everything (V2X) communication is well acknowledged as the key technology in constitution of the IoV. Nevertheless, the spectrum for V2X communication is undergoing a massive change in the United States: a majority of the bandwidth has been reallocated to Wi-Fi leaving even less than a half of the bandwidth for V2X. This motivates investigation of other candidate spectrum bands for operation of V2X communication as an urgent effort to guarantee efficient operations of IoV. To this line, this paper studies the feasibility of sharing the 4.9 GHz public safety band between the incumbent systems and V2X users.
△ Less
Submitted 24 December, 2021;
originally announced December 2021.
-
Mobilkit: A Python Toolkit for Urban Resilience and Disaster Risk Management Analytics using High Frequency Human Mobility Data
Authors:
Enrico Ubaldi,
Takahiro Yabe,
Nicholas K. W. Jones,
Maham Faisal Khan,
Satish V. Ukkusuri,
Riccardo Di Clemente,
Emanuele Strano
Abstract:
Increasingly available high-frequency location datasets derived from smartphones provide unprecedented insight into trajectories of human mobility. These datasets can play a significant and growing role in informing preparedness and response to natural disasters. However, limited tools exist to enable rapid analytics using mobility data, and tend not to be tailored specifically for disaster risk m…
▽ More
Increasingly available high-frequency location datasets derived from smartphones provide unprecedented insight into trajectories of human mobility. These datasets can play a significant and growing role in informing preparedness and response to natural disasters. However, limited tools exist to enable rapid analytics using mobility data, and tend not to be tailored specifically for disaster risk management. We present an open-source, Python-based toolkit designed to conduct replicable and scalable post-disaster analytics using GPS location data. Privacy, system capabilities, and potential expansions of \textit{Mobilkit} are discussed.
△ Less
Submitted 16 September, 2021; v1 submitted 29 July, 2021;
originally announced July 2021.
-
Location Data Reveals Disproportionate Disaster Impact Amongst the Poor: A Case Study of the 2017 Puebla Earthquake Using Mobilkit
Authors:
Takahiro Yabe,
Nicholas K W Jones,
Nancy Lozano-Gracia,
Maham Faisal Khan,
Satish V. Ukkusuri,
Samuel Fraiberger,
Aleister Montfort
Abstract:
Location data obtained from smartphones is increasingly finding use cases in disaster risk management. Where traditionally, CDR has provided the predominant digital footprint for human mobility, GPS data now has immense potential in terms of improved spatiotemporal accuracy, volume, availability, and accessibility. GPS data has already proven invaluable in a range of pre- and post-disaster use cas…
▽ More
Location data obtained from smartphones is increasingly finding use cases in disaster risk management. Where traditionally, CDR has provided the predominant digital footprint for human mobility, GPS data now has immense potential in terms of improved spatiotemporal accuracy, volume, availability, and accessibility. GPS data has already proven invaluable in a range of pre- and post-disaster use cases, such as quantifying displacement, measuring rates of return and recovery, evaluating accessibility to critical resources, planning for resilience. Despite its popularity and potential, however, the use of GPS location data in DRM is still nascent, with several use cases yet to be explored. In this paper, we consider the 2017 Puebla Earthquake in Mexico to (i) validate and expand upon post-disaster analysis applications using GPS data, and (ii) illustrate the use of a new toolkit, Mobilkit, to facilitate scalable, replicable extensions of this work for a wide range of disasters, including earthquakes, typhoons, flooding, and beyond.
△ Less
Submitted 28 July, 2021;
originally announced July 2021.
-
Improved Bengali Image Captioning via deep convolutional neural network based encoder-decoder model
Authors:
Mohammad Faiyaz Khan,
S. M. Sadiq-Ur-Rahman Shifath,
Md. Saiful Islam
Abstract:
Image Captioning is an arduous task of producing syntactically and semantically correct textual descriptions of an image in natural language with context related to the image. Existing notable pieces of research in Bengali Image Captioning (BIC) are based on encoder-decoder architecture. This paper presents an end-to-end image captioning system utilizing a multimodal architecture by combining a on…
▽ More
Image Captioning is an arduous task of producing syntactically and semantically correct textual descriptions of an image in natural language with context related to the image. Existing notable pieces of research in Bengali Image Captioning (BIC) are based on encoder-decoder architecture. This paper presents an end-to-end image captioning system utilizing a multimodal architecture by combining a one-dimensional convolutional neural network (CNN) to encode sequence information with a pre-trained ResNet-50 model image encoder for extracting region-based visual features. We investigate our approach's performance on the BanglaLekhaImageCaptions dataset using the existing evaluation metrics and perform a human evaluation for qualitative analysis. Experiments show that our approach's language encoder captures the fine-grained information in the caption, and combined with the image features, it generates accurate and diversified caption. Our work outperforms all the existing BIC works and achieves a new state-of-the-art (SOTA) performance by scoring 0.651 on BLUE-1, 0.572 on CIDEr, 0.297 on METEOR, 0.434 on ROUGE, and 0.357 on SPICE.
△ Less
Submitted 14 February, 2021;
originally announced February 2021.
-
A transformer based approach for fighting COVID-19 fake news
Authors:
S. M. Sadiq-Ur-Rahman Shifath,
Mohammad Faiyaz Khan,
Md. Saiful Islam
Abstract:
The rapid outbreak of COVID-19 has caused humanity to come to a stand-still and brought with it a plethora of other problems. COVID-19 is the first pandemic in history when humanity is the most technologically advanced and relies heavily on social media platforms for connectivity and other benefits. Unfortunately, fake news and misinformation regarding this virus is also available to people and ca…
▽ More
The rapid outbreak of COVID-19 has caused humanity to come to a stand-still and brought with it a plethora of other problems. COVID-19 is the first pandemic in history when humanity is the most technologically advanced and relies heavily on social media platforms for connectivity and other benefits. Unfortunately, fake news and misinformation regarding this virus is also available to people and causing some massive problems. So, fighting this infodemic has become a significant challenge. We present our solution for the "Constraint@AAAI2021 - COVID19 Fake News Detection in English" challenge in this work. After extensive experimentation with numerous architectures and techniques, we use eight different transformer-based pre-trained models with additional layers to construct a stacking ensemble classifier and fine-tuned them for our purpose. We achieved 0.979906542 accuracy, 0.979913119 precision, 0.979906542 recall, and 0.979907901 f1-score on the test dataset of the competition.
△ Less
Submitted 28 January, 2021;
originally announced January 2021.
-
Uncovering socioeconomic gaps in mobility reduction during the COVID-19 pandemic using location data
Authors:
Samuel P. Fraiberger,
Pablo Astudillo,
Lorenzo Candeago,
Alex Chunet,
Nicholas K. W. Jones,
Maham Faisal Khan,
Bruno Lepri,
Nancy Lozano Gracia,
Lorenzo Lucchini,
Emanuele Massaro,
Aleister Montfort
Abstract:
Using smartphone location data from Colombia, Mexico, and Indonesia, we investigate how non-pharmaceutical policy interventions intended to mitigate the spread of the COVID-19 pandemic impact human mobility. In all three countries, we find that following the implementation of mobility restriction measures, human movement decreased substantially. Importantly, we also uncover large and persistent di…
▽ More
Using smartphone location data from Colombia, Mexico, and Indonesia, we investigate how non-pharmaceutical policy interventions intended to mitigate the spread of the COVID-19 pandemic impact human mobility. In all three countries, we find that following the implementation of mobility restriction measures, human movement decreased substantially. Importantly, we also uncover large and persistent differences in mobility reduction between wealth groups: on average, users in the top decile of wealth reduced their mobility up to twice as much as users in the bottom decile. For decision-makers seeking to efficiently allocate resources to response efforts, these findings highlight that smartphone location data can be leveraged to tailor policies to the needs of specific socioeconomic groups, especially the most vulnerable.
△ Less
Submitted 27 July, 2020; v1 submitted 26 June, 2020;
originally announced June 2020.
-
Analysis of Coauthorship Network in Political Science using Centrality Measures
Authors:
Adeel Ahmed,
Muhammad Fahad Khan,
Muhammad Usman,
Khalid Saleem
Abstract:
In recent era, networks of data are growing massively and forming a shape of complex structure. Data scientists try to analyze different complex networks and utilize these networks to understand the complex structure of a network in a meaningful way. There is a need to detect and identify such a complex network in order to know how these networks provide communication means while using the complex…
▽ More
In recent era, networks of data are growing massively and forming a shape of complex structure. Data scientists try to analyze different complex networks and utilize these networks to understand the complex structure of a network in a meaningful way. There is a need to detect and identify such a complex network in order to know how these networks provide communication means while using the complex structure. Social network analysis provides methods to explore and analyze such complex networks using graph theories, network properties and community detection algorithms. In this paper, an analysis of coauthorship network of Public Relation and Public Administration subjects of Microsoft Academic Graph (MAG) is presented, using common centrality measures. The authors belong to different research and academic institutes present all over the world. Cohesive groups of authors have been identified and ranked on the basis of centrality measures, such as betweenness, degree, page rank and closeness. Experimental results show the discovery of authors who are good in specific domain, have a strong field knowledge and maintain collaboration among their peers in the field of Public Relations and Public Administration.
△ Less
Submitted 11 February, 2019;
originally announced February 2019.
-
Idiosyncratic Approach to Visualize Degradation of Black Phosphorus
Authors:
Bilal Abbas Naqvi,
Muhammad Arslan Shehzad,
Janghwan Cha,
Kyung Ah Min,
M. Farooq Khan,
Sajjad Hussain,
Seo Yongho,
Suklyun Hong,
Eom Jonghwa,
Jung Jongwan
Abstract:
Black Phosphorus (BP) is an excellent material for post graphene era due to its layer dependent band gap, high mobility and high Ion/Ioff. However, its poor stability in ambient poses a great challenge in its practical and long-term usage. Optical visualization of oxidized BP is the key and foremost step for its successful passivation from the ambience. Here, we have done a systematic study of the…
▽ More
Black Phosphorus (BP) is an excellent material for post graphene era due to its layer dependent band gap, high mobility and high Ion/Ioff. However, its poor stability in ambient poses a great challenge in its practical and long-term usage. Optical visualization of oxidized BP is the key and foremost step for its successful passivation from the ambience. Here, we have done a systematic study of the oxidation of BP and developed a technique to optically identify the oxidation of BP using Liquid Crystal (LC). Interestingly we found that rapid oxidation of thin layers of BP makes them disappear and can be envisaged by using the alignment of LC. The molecular dynamics simulations also proved the preferential alignment of LC on oxidized BP. We believe that this simple technique will be effective in passivation efforts of BP and will enable it for exploitation of its properties in the field of electronics.
△ Less
Submitted 7 June, 2018;
originally announced June 2018.
-
Dynamics of liquid crystal on hexagonal lattice
Authors:
Muhammad Arslan Shehzad,
Junsu Lee,
Sang Hoon Park,
Imtisal Akhtar,
Muhammad Farooq Khan,
Sajjad Hussain,
Jonghwa Eom,
Jongwan Jung,
Gunn Kim,
Chanyong Hwang,
Yongho Seo
Abstract:
Nematic liquid crystal (LC) molecules adsorbed on two dimensional materials are aligned along the crystal directions of the hexagonal lattice. It was demonstrated that short electric pulses can reorient the aligned LC molecules in the preferred armchair direction of hexagonal boron nitride (h-BN). Several states with a variety of colors were obtained by changing the direction and strength of the e…
▽ More
Nematic liquid crystal (LC) molecules adsorbed on two dimensional materials are aligned along the crystal directions of the hexagonal lattice. It was demonstrated that short electric pulses can reorient the aligned LC molecules in the preferred armchair direction of hexagonal boron nitride (h-BN). Several states with a variety of colors were obtained by changing the direction and strength of the electric pulses. The ab initio calculations based on density functional theory was carried out to determine the favorable adsorption configurations of the LC molecules on the h-BN surface. A non-volatile display, in which pixel resolution can be determined by grains of hexagonal surface, is proposed, which can offer a pathway towards dynamic high-quality pixels with low power consumption, and could define a new paradigm for all non-volatile display applications.
△ Less
Submitted 1 June, 2018;
originally announced June 2018.
-
Steganography between Silence Intervals of Audio in Video Content Using Chaotic Maps
Authors:
Muhammad Fahad Khan,
Faisal Baig,
Saira Beg
Abstract:
Steganography is the art of hiding data, in such a way that it is undetectable under traffic-pattern analysis and the data hidden is only known to the receiver and the sender. In this paper new method of text steganography over the silence interval of audio in a video file, is presented. In the proposed method first the audio signal is extracted from the video. After doing audio enhancement, the d…
▽ More
Steganography is the art of hiding data, in such a way that it is undetectable under traffic-pattern analysis and the data hidden is only known to the receiver and the sender. In this paper new method of text steganography over the silence interval of audio in a video file, is presented. In the proposed method first the audio signal is extracted from the video. After doing audio enhancement, the data on the audio signal is steganographed using new technique and then audio signal is rewritten in video file again. http://www.learnrnd.com/All_latest_research_findings.php
To enhance the security level we apply chaotic maps on arbitrary text. Furthermore, the algorithm in this paper, gives a technique which states that undetectable stegotext and cover-text has same probability distribution and no statistical test can detect the presence of the hidden message. http://www.learnrnd.com/detail.php?id=Biohack_Eyes_through_Chlorin_e6_eye_drop_:Stanford_University_Research
Moreover, hidden message does not affect the transmission rate of video file at all.
△ Less
Submitted 14 October, 2016;
originally announced October 2016.
-
Text writing in the air
Authors:
Saira Beg,
M. Fahad Khan,
Faisal Baig
Abstract:
This paper presents a real time video based pointing method which allows sketching and writing of English text over air in front of mobile camera. Proposed method have two main tasks: first it track the colored finger tip in the video frames and then apply English OCR over plotted images in order to recognize the written characters. Moreover, proposed method provides a natural human-system interac…
▽ More
This paper presents a real time video based pointing method which allows sketching and writing of English text over air in front of mobile camera. Proposed method have two main tasks: first it track the colored finger tip in the video frames and then apply English OCR over plotted images in order to recognize the written characters. Moreover, proposed method provides a natural human-system interaction in such way that it do not require keypad, stylus, pen or glove etc for character input. For the experiments, we have developed an application using OpenCv with JAVA language. We tested the proposed method on Samsung Galaxy3 android mobile. Results show that proposed algorithm gains the average accuracy of 92.083% when tested for different shaped alphabets. Here, more than 3000 different Magnetic 3D shaped characters were used [Ref: http://learnrnd.com/news.php?id=Magnetic_3D_Bio_Printing]. Our proposed system is the software based approach and relevantly very simple, fast and easy. It does not require sensors or any hardware rather than camera and red tape. Moreover, proposed methodology can be applicable for all disconnected languages but having one issue that it is color sensitive in such a way that existence of any red color in the background before starting the character writing can lead to false results.
△ Less
Submitted 27 April, 2016;
originally announced April 2016.
-
Compress Voice Transference over low Signal Strength in Satellite Communication
Authors:
Saira Beg,
M. Fahad Khan,
Faisal Baig
Abstract:
This paper presents the comparison of compression algorithms for voice transferring method over SMS in satellite communication. Voice transferring method over SMS is useful in situations when signal strength is low and due to poor signal strength voice call connection is not possible to initiate or signal dropped during voice call. This method has one serious flaw that it produces large number of…
▽ More
This paper presents the comparison of compression algorithms for voice transferring method over SMS in satellite communication. Voice transferring method over SMS is useful in situations when signal strength is low and due to poor signal strength voice call connection is not possible to initiate or signal dropped during voice call. This method has one serious flaw that it produces large number of SMS while converting voice into SMS. Such issue is catered to some extend by employing any compression algorithm. In this paper our major aim is to find best compression scheme for said method, for that purpose we compare 6 different types of compression algorithms which are; LZW (Lempel-Ziv-Welch), Huffman coding, PPM (Prediction by partial matching), Arithmetic Coding (AC), BWT (Burrows-Wheeler-Transform), LZMA (Lempel-Ziv-Markov chain). This comparison shows that PPM compression method offers better compression ratio and produce small number of SMS. For experimentation we use Thuraya SG-2520 satellite phone. Moreover, we develop an application using J2ME platform[Ref:a]. We tested that application more than 100 times and then we compare the result in terms of compression ratio of each algorithm and number of connected SMS produce after each compression method. The result of this study will help developers to choose better compression scheme for their respective applications. http://www.learnrnd.com/news.php?id=ISSUES_IN_MOLECULAR_COMMUNICATIONS
△ Less
Submitted 26 April, 2016;
originally announced April 2016.
-
Self-Similar Graphs
Authors:
Kiran B. Chilakamarri,
M. F. Khan,
C. E. Larson,
C. J. Tymczak
Abstract:
For any graph $G$ on $n$ vertices and for any {\em symmetric} subgraph $J$ of $K_{n,n}$, we construct an infinite sequence of graphs based on the pair $(G,J)$. The First graph in the sequence is $G$, then at each stage replacing every vertex of the previous graph by a copy of $G$ and every edge of the previous graph by a copy of $J$ the new graph is constructed. We call these graphs {\em self-simi…
▽ More
For any graph $G$ on $n$ vertices and for any {\em symmetric} subgraph $J$ of $K_{n,n}$, we construct an infinite sequence of graphs based on the pair $(G,J)$. The First graph in the sequence is $G$, then at each stage replacing every vertex of the previous graph by a copy of $G$ and every edge of the previous graph by a copy of $J$ the new graph is constructed. We call these graphs {\em self-similar} graphs. We are interested in delineating those pairs $(G,J)$ for which the chromatic numbers of the graphs in the sequence are bounded. Here we have some partial results. When $G$ is a complete graph and $J$ is a special matching we show that every graph in the resulting sequence is an {\em expander} graph.
△ Less
Submitted 8 October, 2013;
originally announced October 2013.
-
Implementation Of Back-Propagation Neural Network For Isolated Bangla Speech Recognition
Authors:
Md. Ali Hossain,
Md. Mijanur Rahman,
Uzzal Kumar Prodhan,
Md. Farukuzzaman Khan
Abstract:
This paper is concerned with the development of Back-propagation Neural Network for Bangla Speech Recognition. In this paper, ten bangla digits were recorded from ten speakers and have been recognized. The features of these speech digits were extracted by the method of Mel Frequency Cepstral Coefficient (MFCC) analysis. The mfcc features of five speakers were used to train the network with Back pr…
▽ More
This paper is concerned with the development of Back-propagation Neural Network for Bangla Speech Recognition. In this paper, ten bangla digits were recorded from ten speakers and have been recognized. The features of these speech digits were extracted by the method of Mel Frequency Cepstral Coefficient (MFCC) analysis. The mfcc features of five speakers were used to train the network with Back propagation algorithm. The mfcc features of ten bangla digit speeches, from 0 to 9, of another five speakers were used to test the system. All the methods and algorithms used in this research were implemented using the features of Turbo C and C++ languages. From our investigation it is seen that the developed system can successfully encode and analyze the mfcc features of the speech signal to recognition. The developed system achieved recognition rate about 96.332% for known speakers (i.e., speaker dependent) and 92% for unknown speakers (i.e., speaker independent).
△ Less
Submitted 17 August, 2013;
originally announced August 2013.
-
Controlling Home Appliances Remotely through Voice Command
Authors:
Faisal Baig,
Saira Beg,
Muhammad Fahad Khan
Abstract:
Controlling appliances is a main part of automation. The main object of Home automation is to provide a wireless communication link of home appliances to the remote user. The main objective of this work is to make such a system which controls the home appliances remotely. This paper discusses two methods of controlling home appliances one is via voice to text SMS and other is to use the mobile as…
▽ More
Controlling appliances is a main part of automation. The main object of Home automation is to provide a wireless communication link of home appliances to the remote user. The main objective of this work is to make such a system which controls the home appliances remotely. This paper discusses two methods of controlling home appliances one is via voice to text SMS and other is to use the mobile as a remote control, this system will provide a benefit to the elderly and disable people and also to those who are unaware of ty** an SMS.
△ Less
Submitted 8 December, 2012;
originally announced December 2012.
-
Transference & Retrieval of Pulse-code modulation Audio over Short Messaging Service
Authors:
Muhammad Fahad Khan,
Saira Beg
Abstract:
The paper presents the method of transferring PCM (Pulse-Code Modulation) based audio messages through SMS (Short Message Service) over GSM (Global System for Mobile Communications) network. As SMS is text based service, and could not send voice. Our method enables voice transferring through SMS, by converting PCM audio into characters. Than Huffman coding compression technique is applied in order…
▽ More
The paper presents the method of transferring PCM (Pulse-Code Modulation) based audio messages through SMS (Short Message Service) over GSM (Global System for Mobile Communications) network. As SMS is text based service, and could not send voice. Our method enables voice transferring through SMS, by converting PCM audio into characters. Than Huffman coding compression technique is applied in order to reduce numbers of characters which will latterly set as payload text of SMS. Testing the said method we develop an application using J2me platform
△ Less
Submitted 19 May, 2012;
originally announced May 2012.
-
Stereo image Transference & Retrieval over SMS
Authors:
Muhammad Fahad Khan,
Saira Beg
Abstract:
Paper presents the way of transferring stereo images using SMS over GSM network. Generally, Stereo image is composed of two stereoscopic images in such way that gives three dimensional affect when viewed. GSM have two short messaging services, which can transfer images and sounds etc. Such services are known as; MMS (Multimedia Messaging Service) and EMS (Extended Messaging Service). EMS can send…
▽ More
Paper presents the way of transferring stereo images using SMS over GSM network. Generally, Stereo image is composed of two stereoscopic images in such way that gives three dimensional affect when viewed. GSM have two short messaging services, which can transfer images and sounds etc. Such services are known as; MMS (Multimedia Messaging Service) and EMS (Extended Messaging Service). EMS can send Predefined sounds, animation and images but have limitation that it does not support widely. MMS can send much higher contents than EMS but need 3G and other network capability in order to send large size data up to 1000 bytes. Other limitations are Portability, content adaption etc. Our major aim in this paper is to provide an alternative way of sending stereo images over SMS which is widely supported than EMS. We develop an application using J2ME Platform.
△ Less
Submitted 6 January, 2012;
originally announced January 2012.
-
Transferring Voice using SMS over GSM Network
Authors:
Muhammad Fahad Khan,
Saira Beg
Abstract:
The paper presents a methodology of transmitting voice in SMS (Short Message Service) over GSM network. Usually SMS contents are text based and limited to 140 bytes. It supports national and international roaming, but also supported by other telecommunication such as TDMA (Time Division Multiple Access), CDMA (Code Division Multiple Access) as well. It can sent/ receive simultaneously with other s…
▽ More
The paper presents a methodology of transmitting voice in SMS (Short Message Service) over GSM network. Usually SMS contents are text based and limited to 140 bytes. It supports national and international roaming, but also supported by other telecommunication such as TDMA (Time Division Multiple Access), CDMA (Code Division Multiple Access) as well. It can sent/ receive simultaneously with other services. Such features make it favorable for this methodology. For this an application is developed using J2ME platform which is supported by all mobile phones in the world. This algorithm's test is conducted on N95 having Symbian Operating System (OS).
△ Less
Submitted 23 December, 2011;
originally announced December 2011.