-
Synthetic Data: Revisiting the Privacy-Utility Trade-off
Authors:
Fatima Jahan Sarmin,
Atiquer Rahman Sarkar,
Yang Wang,
Noman Mohammed
Abstract:
Synthetic data has been considered a better privacy-preserving alternative to traditionally sanitized data across various applications. However, a recent article challenges this notion, stating that synthetic data does not provide a better trade-off between privacy and utility than traditional anonymization techniques, and that it leads to unpredictable utility loss and highly unpredictable privac…
▽ More
Synthetic data has been considered a better privacy-preserving alternative to traditionally sanitized data across various applications. However, a recent article challenges this notion, stating that synthetic data does not provide a better trade-off between privacy and utility than traditional anonymization techniques, and that it leads to unpredictable utility loss and highly unpredictable privacy gain. The article also claims to have identified a breach in the differential privacy guarantees provided by PATEGAN and PrivBayes. When a study claims to refute or invalidate prior findings, it is crucial to verify and validate the study. In our work, we analyzed the implementation of the privacy game described in the article and found that it operated in a highly specialized and constrained environment, which limits the applicability of its findings to general cases. Our exploration also revealed that the game did not satisfy a crucial precondition concerning data distributions, which contributed to the perceived violation of the differential privacy guarantees offered by PATEGAN and PrivBayes. We also conducted a privacy-utility trade-off analysis in a more general and unconstrained environment. Our experimentation demonstrated that synthetic data achieves a more favorable privacy-utility trade-off compared to the provided implementation of k-anonymization, thereby reaffirming earlier conclusions.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Faraday tomography with CHIME: the `tadpole' feature G137+7
Authors:
Nasser Mohammed,
Anna Ordog,
Rebecca A. Booth,
Andrea Bracco,
Jo-Anne C. Brown,
Ettore Carretti,
John M. Dickey,
Simon Foreman,
Mark Halpern,
Marijke Haverkorn,
Alex S. Hill,
Joseph W Kania,
Roland Kothes,
T. L. Landecker,
Joshua MacEachern,
Kiyoshi W. Masui,
Aimee Menard,
Ryan R. Ransom,
Wolfgang Reich,
Patricia Reich,
J. Richard Shaw,
Seth R. Siegel,
Mehrnoosh Tahani,
Alec J. M. Thomson,
Tristan Pinsonneault-Marotte
, et al. (4 additional authors not shown)
Abstract:
A direct consequence of Faraday rotation is that the polarized radio sky does not resemble the total intensity sky at long wavelengths. We analyze G137+7, which is undetectable in total intensity but appears as a depolarization feature. We use the first polarization maps from the Canadian Hydrogen Intensity Map** Experiment. Our $400-729$ MHz bandwidth and angular resolution, $17'$ to $30'$, all…
▽ More
A direct consequence of Faraday rotation is that the polarized radio sky does not resemble the total intensity sky at long wavelengths. We analyze G137+7, which is undetectable in total intensity but appears as a depolarization feature. We use the first polarization maps from the Canadian Hydrogen Intensity Map** Experiment. Our $400-729$ MHz bandwidth and angular resolution, $17'$ to $30'$, allow us to use Faraday synthesis to analyze the polarization structure. In polarized intensity and polarization angle maps, we find a "tail" extending $10^\circ$ from the "head" and designate the combined object the "tadpole". Similar polarization angles, distinct from the background, indicate that the head and tail are physically associated. The head appears as a depolarized ring in single channels, but wideband observations show that it is a Faraday rotation feature. Our investigations of H I and H$α$ find no connections to the tadpole. The tail suggests motion of either the gas or an ionizing star through the ISM; the B2(e) star HD 20336 is a candidate. While the head features a coherent, $\sim -8$ rad m$^2$ Faraday depth, Faraday synthesis also identifies multiple components in both the head and tail. We verify the locations of the components in the spectra using QU fitting. Our results show that $\sim$octave-bandwidth Faraday rotation observations at $\sim 600$ MHz are sensitive to low-density ionized or partially-ionized gas which is undetectable in other tracers.
△ Less
Submitted 24 May, 2024;
originally announced May 2024.
-
GuideWalk -- Heterogeneous Data Fusion for Enhanced Learning -- A Multiclass Document Classification Case
Authors:
Sarmad N. Mohammed,
Semra Gündüç
Abstract:
One of the prime problems of computer science and machine learning is to extract information efficiently from large-scale, heterogeneous data. Text data, with its syntax, semantics, and even hidden information content, possesses an exceptional place among the data types in concern. The processing of the text data requires embedding, a method of translating the content of the text to numeric vector…
▽ More
One of the prime problems of computer science and machine learning is to extract information efficiently from large-scale, heterogeneous data. Text data, with its syntax, semantics, and even hidden information content, possesses an exceptional place among the data types in concern. The processing of the text data requires embedding, a method of translating the content of the text to numeric vectors. A correct embedding algorithm is the starting point for obtaining the full information content of the text data. In this work, a new embedding method based on the graph structure of the meaningful sentences is proposed. The design of the algorithm aims to construct an embedding vector that constitutes syntactic and semantic elements as well as the hidden content of the text data. The success of the proposed embedding method is tested in classification problems. Among the wide range of application areas, text classification is the best laboratory for embedding methods; the classification power of the method can be tested using dimensional reduction without any further processing. Furthermore, the method can be compared with different embedding algorithms and machine learning methods. The proposed method is tested with real-world data sets and eight well-known and successful embedding algorithms. The proposed embedding method shows significantly better classification for binary and multiclass datasets compared to well-known algorithms.
△ Less
Submitted 25 April, 2024;
originally announced April 2024.
-
Enabling Memory Safety of C Programs using LLMs
Authors:
Nausheen Mohammed,
Akash Lal,
Aseem Rastogi,
Subhajit Roy,
Rahul Sharma
Abstract:
Memory safety violations in low-level code, written in languages like C, continues to remain one of the major sources of software vulnerabilities. One method of removing such violations by construction is to port C code to a safe C dialect. Such dialects rely on programmer-supplied annotations to guarantee safety with minimal runtime overhead. This porting, however, is a manual process that impose…
▽ More
Memory safety violations in low-level code, written in languages like C, continues to remain one of the major sources of software vulnerabilities. One method of removing such violations by construction is to port C code to a safe C dialect. Such dialects rely on programmer-supplied annotations to guarantee safety with minimal runtime overhead. This porting, however, is a manual process that imposes significant burden on the programmer and, hence, there has been limited adoption of this technique.
The task of porting not only requires inferring annotations, but may also need refactoring/rewriting of the code to make it amenable to such annotations. In this paper, we use Large Language Models (LLMs) towards addressing both these concerns. We show how to harness LLM capabilities to do complex code reasoning as well as rewriting of large codebases. We also present a novel framework for whole-program transformations that leverages lightweight static analysis to break the transformation into smaller steps that can be carried out effectively by an LLM. We implement our ideas in a tool called MSA that targets the CheckedC dialect. We evaluate MSA on several micro-benchmarks, as well as real-world code ranging up to 20K lines of code. We showcase superior performance compared to a vanilla LLM baseline, as well as demonstrate improvement over a state-of-the-art symbolic (non-LLM) technique.
△ Less
Submitted 1 April, 2024;
originally announced April 2024.
-
De-identification is not always enough
Authors:
Atiquer Rahman Sarkar,
Yao-Shun Chuang,
Noman Mohammed,
Xiaoqian Jiang
Abstract:
For sharing privacy-sensitive data, de-identification is commonly regarded as adequate for safeguarding privacy. Synthetic data is also being considered as a privacy-preserving alternative. Recent successes with numerical and tabular data generative models and the breakthroughs in large generative language models raise the question of whether synthetically generated clinical notes could be a viabl…
▽ More
For sharing privacy-sensitive data, de-identification is commonly regarded as adequate for safeguarding privacy. Synthetic data is also being considered as a privacy-preserving alternative. Recent successes with numerical and tabular data generative models and the breakthroughs in large generative language models raise the question of whether synthetically generated clinical notes could be a viable alternative to real notes for research purposes. In this work, we demonstrated that (i) de-identification of real clinical notes does not protect records against a membership inference attack, (ii) proposed a novel approach to generate synthetic clinical notes using the current state-of-the-art large language models, (iii) evaluated the performance of the synthetically generated notes in a clinical domain task, and (iv) proposed a way to mount a membership inference attack where the target model is trained with synthetic data. We observed that when synthetically generated notes closely match the performance of real data, they also exhibit similar privacy concerns to the real data. Whether other approaches to synthetically generated clinical notes could offer better trade-offs and become a better alternative to sensitive real notes warrants further investigation.
△ Less
Submitted 31 January, 2024;
originally announced February 2024.
-
Shadow: A Novel Loss Function for Efficient Training in Siamese Networks
Authors:
Alif Elham Khan,
Mohammad Junayed Hasan,
Humayra Anjum,
Nabeel Mohammed
Abstract:
Despite significant recent advances in similarity detection tasks, existing approaches pose substantial challenges under memory constraints. One of the primary reasons for this is the use of computationally expensive metric learning loss functions such as Triplet Loss in Siamese networks. In this paper, we present a novel loss function called Shadow Loss that compresses the dimensions of an embedd…
▽ More
Despite significant recent advances in similarity detection tasks, existing approaches pose substantial challenges under memory constraints. One of the primary reasons for this is the use of computationally expensive metric learning loss functions such as Triplet Loss in Siamese networks. In this paper, we present a novel loss function called Shadow Loss that compresses the dimensions of an embedding space during loss calculation without loss of performance. The distance between the projections of the embeddings is learned from inputs on a compact projection space where distances directly correspond to a measure of class similarity. Projecting on a lower-dimension projection space, our loss function converges faster, and the resulting classified image clusters have higher inter-class and smaller intra-class distances. Shadow Loss not only reduces embedding dimensions favoring memory constraint devices but also consistently performs better than the state-of-the-art Triplet Margin Loss by an accuracy of 5\%-10\% across diverse datasets. The proposed loss function is also model agnostic, upholding its performance across several tested models. Its effectiveness and robustness across balanced, imbalanced, medical, and non-medical image datasets suggests that it is not specific to a particular model or dataset but demonstrates superior performance consistently while using less memory and computation.
△ Less
Submitted 23 November, 2023;
originally announced November 2023.
-
BanLemma: A Word Formation Dependent Rule and Dictionary Based Bangla Lemmatizer
Authors:
Sadia Afrin,
Md. Shahad Mahmud Chowdhury,
Md. Ekramul Islam,
Faisal Ahamed Khan,
Labib Imam Chowdhury,
MD. Motahar Mahtab,
Nazifa Nuha Chowdhury,
Massud Forkan,
Neelima Kundu,
Hakim Arif,
Mohammad Mamun Or Rashid,
Mohammad Ruhul Amin,
Nabeel Mohammed
Abstract:
Lemmatization holds significance in both natural language processing (NLP) and linguistics, as it effectively decreases data density and aids in comprehending contextual meaning. However, due to the highly inflected nature and morphological richness, lemmatization in Bangla text poses a complex challenge. In this study, we propose linguistic rules for lemmatization and utilize a dictionary along w…
▽ More
Lemmatization holds significance in both natural language processing (NLP) and linguistics, as it effectively decreases data density and aids in comprehending contextual meaning. However, due to the highly inflected nature and morphological richness, lemmatization in Bangla text poses a complex challenge. In this study, we propose linguistic rules for lemmatization and utilize a dictionary along with the rules to design a lemmatizer specifically for Bangla. Our system aims to lemmatize words based on their parts of speech class within a given sentence. Unlike previous rule-based approaches, we analyzed the suffix marker occurrence according to the morpho-syntactic values and then utilized sequences of suffix markers instead of entire suffixes. To develop our rules, we analyze a large corpus of Bangla text from various domains, sources, and time periods to observe the word formation of inflected words. The lemmatizer achieves an accuracy of 96.36% when tested against a manually annotated test dataset by trained linguists and demonstrates competitive performance on three previously published Bangla lemmatization datasets. We are making the code and datasets publicly available at https://github.com/eblict-gigatech/BanLemma in order to contribute to the further advancement of Bangla NLP.
△ Less
Submitted 6 November, 2023;
originally announced November 2023.
-
Balancing exploration and exploitation phases in whale optimization algorithm: an insightful and empirical analysis
Authors:
Aram M. Ahmed,
Tarik A. Rashid,
Bryar A. Hassan,
Jaffer Majidpour,
Kaniaw A. Noori,
Chnoor Maheadeen Rahman,
Mohmad Hussein Abdalla,
Shko M. Qader,
Noor Tayfor,
Naufel B Mohammed
Abstract:
Agents of any metaheuristic algorithms are moving in two modes, namely exploration and exploitation. Obtaining robust results in any algorithm is strongly dependent on how to balance between these two modes. Whale optimization algorithm as a robust and well recognized metaheuristic algorithm in the literature, has proposed a novel scheme to achieve this balance. It has also shown superior results…
▽ More
Agents of any metaheuristic algorithms are moving in two modes, namely exploration and exploitation. Obtaining robust results in any algorithm is strongly dependent on how to balance between these two modes. Whale optimization algorithm as a robust and well recognized metaheuristic algorithm in the literature, has proposed a novel scheme to achieve this balance. It has also shown superior results on a wide range of applications. Moreover, in the previous chapter, an equitable and fair performance evaluation of the algorithm was provided. However, to this point, only comparison of the final results is considered, which does not explain how these results are obtained. Therefore, this chapter attempts to empirically analyze the WOA algorithm in terms of the local and global search capabilities i.e. the ratio of exploration and exploitation phases. To achieve this objective, the dimension-wise diversity measurement is employed, which, at various stages of the optimization process, statistically evaluates the population's convergence and diversity.
△ Less
Submitted 3 September, 2023;
originally announced October 2023.
-
ChatGPT-guided Semantics for Zero-shot Learning
Authors:
Fahimul Hoque Shubho,
Townim Faisal Chowdhury,
Ali Cheraghian,
Morteza Saberi,
Nabeel Mohammed,
Shafin Rahman
Abstract:
Zero-shot learning (ZSL) aims to classify objects that are not observed or seen during training. It relies on class semantic description to transfer knowledge from the seen classes to the unseen classes. Existing methods of obtaining class semantics include manual attributes or automatic word vectors from language models (like word2vec). We know attribute annotation is costly, whereas automatic wo…
▽ More
Zero-shot learning (ZSL) aims to classify objects that are not observed or seen during training. It relies on class semantic description to transfer knowledge from the seen classes to the unseen classes. Existing methods of obtaining class semantics include manual attributes or automatic word vectors from language models (like word2vec). We know attribute annotation is costly, whereas automatic word-vectors are relatively noisy. To address this problem, we explore how ChatGPT, a large language model, can enhance class semantics for ZSL tasks. ChatGPT can be a helpful source to obtain text descriptions for each class containing related attributes and semantics. We use the word2vec model to get a word vector using the texts from ChatGPT. Then, we enrich word vectors by combining the word embeddings from class names and descriptions generated by ChatGPT. More specifically, we leverage ChatGPT to provide extra supervision for the class description, eventually benefiting ZSL models. We evaluate our approach on various 2D image (CUB and AwA) and 3D point cloud (ModelNet10, ModelNet40, and ScanObjectNN) datasets and show that it improves ZSL performance. Our work contributes to the ZSL literature by applying ChatGPT for class semantics enhancement and proposing a novel word vector fusion method.
△ Less
Submitted 17 October, 2023;
originally announced October 2023.
-
LumiNet: The Bright Side of Perceptual Knowledge Distillation
Authors:
Md. Ismail Hossain,
M M Lutfe Elahi,
Sameera Ramasinghe,
Ali Cheraghian,
Fuad Rahman,
Nabeel Mohammed,
Shafin Rahman
Abstract:
In knowledge distillation literature, feature-based methods have dominated due to their ability to effectively tap into extensive teacher models. In contrast, logit-based approaches, which aim to distill `dark knowledge' from teachers, typically exhibit inferior performance compared to feature-based methods. To bridge this gap, we present LumiNet, a novel knowledge distillation algorithm designed…
▽ More
In knowledge distillation literature, feature-based methods have dominated due to their ability to effectively tap into extensive teacher models. In contrast, logit-based approaches, which aim to distill `dark knowledge' from teachers, typically exhibit inferior performance compared to feature-based methods. To bridge this gap, we present LumiNet, a novel knowledge distillation algorithm designed to enhance logit-based distillation. We introduce the concept of 'perception', aiming to calibrate logits based on the model's representation capability. This concept addresses overconfidence issues in logit-based distillation method while also introducing a novel method to distill knowledge from the teacher. It reconstructs the logits of a sample/instances by considering relationships with other samples in the batch. LumiNet excels on benchmarks like CIFAR-100, ImageNet, and MSCOCO, outperforming leading feature-based methods, e.g., compared to KD with ResNet18 and MobileNetV2 on ImageNet, it shows improvements of 1.5% and 2.05%, respectively.
△ Less
Submitted 9 March, 2024; v1 submitted 5 October, 2023;
originally announced October 2023.
-
High Performance Computing Applied to Logistic Regression: A CPU and GPU Implementation Comparison
Authors:
Nechba Mohammed,
Mouhajir Mohamed,
Sedjari Yassine
Abstract:
We present a versatile GPU-based parallel version of Logistic Regression (LR), aiming to address the increasing demand for faster algorithms in binary classification due to large data sets. Our implementation is a direct translation of the parallel Gradient Descent Logistic Regression algorithm proposed by X. Zou et al. [12]. Our experiments demonstrate that our GPU-based LR outperforms existing C…
▽ More
We present a versatile GPU-based parallel version of Logistic Regression (LR), aiming to address the increasing demand for faster algorithms in binary classification due to large data sets. Our implementation is a direct translation of the parallel Gradient Descent Logistic Regression algorithm proposed by X. Zou et al. [12]. Our experiments demonstrate that our GPU-based LR outperforms existing CPU-based implementations in terms of execution time while maintaining comparable f1 score. The significant acceleration of processing large datasets makes our method particularly advantageous for real-time prediction applications like image recognition, spam detection, and fraud detection. Our algorithm is implemented in a ready-to-use Python library available at : https://github.com/NechbaMohammed/SwiftLogisticReg
△ Less
Submitted 19 August, 2023;
originally announced August 2023.
-
CosSIF: Cosine similarity-based image filtering to overcome low inter-class variation in synthetic medical image datasets
Authors:
Mominul Islam,
Hasib Zunair,
Nabeel Mohammed
Abstract:
Crafting effective deep learning models for medical image analysis is a complex task, particularly in cases where the medical image dataset lacks significant inter-class variation. This challenge is further aggravated when employing such datasets to generate synthetic images using generative adversarial networks (GANs), as the output of GANs heavily relies on the input data. In this research, we p…
▽ More
Crafting effective deep learning models for medical image analysis is a complex task, particularly in cases where the medical image dataset lacks significant inter-class variation. This challenge is further aggravated when employing such datasets to generate synthetic images using generative adversarial networks (GANs), as the output of GANs heavily relies on the input data. In this research, we propose a novel filtering algorithm called Cosine Similarity-based Image Filtering (CosSIF). We leverage CosSIF to develop two distinct filtering methods: Filtering Before GAN Training (FBGT) and Filtering After GAN Training (FAGT). FBGT involves the removal of real images that exhibit similarities to images of other classes before utilizing them as the training dataset for a GAN. On the other hand, FAGT focuses on eliminating synthetic images with less discriminative features compared to real images used for training the GAN. Experimental results reveal that employing either the FAGT or FBGT method with modern transformer and convolutional-based networks leads to substantial performance gains in various evaluation metrics. FAGT implementation on the ISIC-2016 dataset surpasses the baseline method in terms of sensitivity by 1.59% and AUC by 1.88%. Furthermore, for the HAM10000 dataset, applying FABT outperforms the baseline approach in terms of recall by 13.75%, and with the sole implementation of FAGT, achieves a maximum accuracy of 94.44%.
△ Less
Submitted 15 October, 2023; v1 submitted 25 July, 2023;
originally announced July 2023.
-
SentiGOLD: A Large Bangla Gold Standard Multi-Domain Sentiment Analysis Dataset and its Evaluation
Authors:
Md. Ekramul Islam,
Labib Chowdhury,
Faisal Ahamed Khan,
Shazzad Hossain,
Sourave Hossain,
Mohammad Mamun Or Rashid,
Nabeel Mohammed,
Mohammad Ruhul Amin
Abstract:
This study introduces SentiGOLD, a Bangla multi-domain sentiment analysis dataset. Comprising 70,000 samples, it was created from diverse sources and annotated by a gender-balanced team of linguists. SentiGOLD adheres to established linguistic conventions agreed upon by the Government of Bangladesh and a Bangla linguistics committee. Unlike English and other languages, Bangla lacks standard sentim…
▽ More
This study introduces SentiGOLD, a Bangla multi-domain sentiment analysis dataset. Comprising 70,000 samples, it was created from diverse sources and annotated by a gender-balanced team of linguists. SentiGOLD adheres to established linguistic conventions agreed upon by the Government of Bangladesh and a Bangla linguistics committee. Unlike English and other languages, Bangla lacks standard sentiment analysis datasets due to the absence of a national linguistics framework. The dataset incorporates data from online video comments, social media posts, blogs, news, and other sources while maintaining domain and class distribution rigorously. It spans 30 domains (e.g., politics, entertainment, sports) and includes 5 sentiment classes (strongly negative, weakly negative, neutral, and strongly positive). The annotation scheme, approved by the national linguistics committee, ensures a robust Inter Annotator Agreement (IAA) with a Fleiss' kappa score of 0.88. Intra- and cross-dataset evaluation protocols are applied to establish a standard classification system. Cross-dataset evaluation on the noisy SentNoB dataset presents a challenging test scenario. Additionally, zero-shot experiments demonstrate the generalizability of SentiGOLD. The top model achieves a macro f1 score of 0.62 (intra-dataset) across 5 classes, setting a benchmark, and 0.61 (cross-dataset from SentNoB) across 3 classes, comparable to the state-of-the-art. Fine-tuned sentiment analysis model can be accessed at https://sentiment.bangla.gov.bd.
△ Less
Submitted 9 June, 2023;
originally announced June 2023.
-
BenCoref: A Multi-Domain Dataset of Nominal Phrases and Pronominal Reference Annotations
Authors:
Shadman Rohan,
Mojammel Hossain,
Mohammad Mamun Or Rashid,
Nabeel Mohammed
Abstract:
Coreference Resolution is a well studied problem in NLP. While widely studied for English and other resource-rich languages, research on coreference resolution in Bengali largely remains unexplored due to the absence of relevant datasets. Bengali, being a low-resource language, exhibits greater morphological richness compared to English. In this article, we introduce a new dataset, BenCoref, compr…
▽ More
Coreference Resolution is a well studied problem in NLP. While widely studied for English and other resource-rich languages, research on coreference resolution in Bengali largely remains unexplored due to the absence of relevant datasets. Bengali, being a low-resource language, exhibits greater morphological richness compared to English. In this article, we introduce a new dataset, BenCoref, comprising coreference annotations for Bengali texts gathered from four distinct domains. This relatively small dataset contains 5200 mention annotations forming 502 mention clusters within 48,569 tokens. We describe the process of creating this dataset and report performance of multiple models trained using BenCoref. We expect that our work provides some valuable insights on the variations in coreference phenomena across several domains in Bengali and encourages the development of additional resources for Bengali. Furthermore, we found poor crosslingual performance at zero-shot setting from English, highlighting the need for more language-specific resources for this task.
△ Less
Submitted 3 July, 2023; v1 submitted 7 April, 2023;
originally announced April 2023.
-
COLT: Cyclic Overlap** Lottery Tickets for Faster Pruning of Convolutional Neural Networks
Authors:
Md. Ismail Hossain,
Mohammed Rakib,
M. M. Lutfe Elahi,
Nabeel Mohammed,
Shafin Rahman
Abstract:
Pruning refers to the elimination of trivial weights from neural networks. The sub-networks within an overparameterized model produced after pruning are often called Lottery tickets. This research aims to generate winning lottery tickets from a set of lottery tickets that can achieve similar accuracy to the original unpruned network. We introduce a novel winning ticket called Cyclic Overlap** Lo…
▽ More
Pruning refers to the elimination of trivial weights from neural networks. The sub-networks within an overparameterized model produced after pruning are often called Lottery tickets. This research aims to generate winning lottery tickets from a set of lottery tickets that can achieve similar accuracy to the original unpruned network. We introduce a novel winning ticket called Cyclic Overlap** Lottery Ticket (COLT) by data splitting and cyclic retraining of the pruned network from scratch. We apply a cyclic pruning algorithm that keeps only the overlap** weights of different pruned models trained on different data segments. Our results demonstrate that COLT can achieve similar accuracies (obtained by the unpruned model) while maintaining high sparsities. We show that the accuracy of COLT is on par with the winning tickets of Lottery Ticket Hypothesis (LTH) and, at times, is better. Moreover, COLTs can be generated using fewer iterations than tickets generated by the popular Iterative Magnitude Pruning (IMP) method. In addition, we also notice COLTs generated on large datasets can be transferred to small ones without compromising performance, demonstrating its generalizing capability. We conduct all our experiments on Cifar-10, Cifar-100 & TinyImageNet datasets and report superior performance than the state-of-the-art methods.
△ Less
Submitted 24 December, 2022;
originally announced December 2022.
-
LMFLOSS: A Hybrid Loss For Imbalanced Medical Image Classification
Authors:
Abu Adnan Sadi,
Labib Chowdhury,
Nursrat Jahan,
Mohammad Newaz Sharif Rafi,
Radeya Chowdhury,
Faisal Ahamed Khan,
Nabeel Mohammed
Abstract:
Automatic medical image classification is a very important field where the use of AI has the potential to have a real social impact. However, there are still many challenges that act as obstacles to making practically effective solutions. One of those is the fact that most of the medical imaging datasets have a class imbalance problem. This leads to the fact that existing AI techniques, particular…
▽ More
Automatic medical image classification is a very important field where the use of AI has the potential to have a real social impact. However, there are still many challenges that act as obstacles to making practically effective solutions. One of those is the fact that most of the medical imaging datasets have a class imbalance problem. This leads to the fact that existing AI techniques, particularly neural network-based deep-learning methodologies, often perform poorly in such scenarios. Thus this makes this area an interesting and active research focus for researchers. In this study, we propose a novel loss function to train neural network models to mitigate this critical issue in this important field. Through rigorous experiments on three independently collected datasets of three different medical imaging domains, we empirically show that our proposed loss function consistently performs well with an improvement between 2%-10% macro f1 when compared to the baseline models. We hope that our work will precipitate new research toward a more generalized approach to medical image classification.
△ Less
Submitted 24 December, 2022;
originally announced December 2022.
-
Knowledge Distillation approach towards Melanoma Detection
Authors:
Md. Shakib Khan,
Kazi Nabiul Alam,
Abdur Rab Dhruba,
Hasib Zunair,
Nabeel Mohammed
Abstract:
Melanoma is regarded as the most threatening among all skin cancers. There is a pressing need to build systems which can aid in the early detection of melanoma and enable timely treatment to patients. Recent methods are geared towards machine learning based systems where the task is posed as image recognition, tag dermoscopic images of skin lesions as melanoma or non-melanoma. Even though these me…
▽ More
Melanoma is regarded as the most threatening among all skin cancers. There is a pressing need to build systems which can aid in the early detection of melanoma and enable timely treatment to patients. Recent methods are geared towards machine learning based systems where the task is posed as image recognition, tag dermoscopic images of skin lesions as melanoma or non-melanoma. Even though these methods show promising results in terms of accuracy, they are computationally quite expensive to train, that questions the ability of these models to be deployable in a clinical setting or memory constraint devices. To address this issue, we focus on building simple and performant models having few layers, less than ten compared to hundreds. As well as with fewer learnable parameters, 0.26 million (M) compared to 42.5M using knowledge distillation with the goal to detect melanoma from dermoscopic images. First, we train a teacher model using a ResNet-50 to detect melanoma. Using the teacher model, we train the student model known as Distilled Student Network (DSNet) which has around 0.26M parameters using knowledge distillation achieving an accuracy of 91.7%. We compare against ImageNet pre-trained models such MobileNet, VGG-16, Inception-V3, EfficientNet-B0, ResNet-50 and ResNet-101. We find that our approach works well in terms of inference runtime compared to other pre-trained models, 2.57 seconds compared to 14.55 seconds. We find that DSNet (0.26M parameters), which is 15 times smaller, consistently performs better than EfficientNet-B0 (4M parameters) in both melanoma and non-melanoma detection across Precision, Recall and F1 scores
△ Less
Submitted 14 October, 2022;
originally announced October 2022.
-
Less is More: Facial Landmarks can Recognize a Spontaneous Smile
Authors:
Md. Tahrim Faroque,
Yan Yang,
Md Zakir Hossain,
Sheikh Motahar Naim,
Nabeel Mohammed,
Shafin Rahman
Abstract:
Smile veracity classification is a task of interpreting social interactions. Broadly, it distinguishes between spontaneous and posed smiles. Previous approaches used hand-engineered features from facial landmarks or considered raw smile videos in an end-to-end manner to perform smile classification tasks. Feature-based methods require intervention from human experts on feature engineering and heav…
▽ More
Smile veracity classification is a task of interpreting social interactions. Broadly, it distinguishes between spontaneous and posed smiles. Previous approaches used hand-engineered features from facial landmarks or considered raw smile videos in an end-to-end manner to perform smile classification tasks. Feature-based methods require intervention from human experts on feature engineering and heavy pre-processing steps. On the contrary, raw smile video inputs fed into end-to-end models bring more automation to the process with the cost of considering many redundant facial features (beyond landmark locations) that are mainly irrelevant to smile veracity classification. It remains unclear to establish discriminative features from landmarks in an end-to-end manner. We present a MeshSmileNet framework, a transformer architecture, to address the above limitations. To eliminate redundant facial features, our landmarks input is extracted from Attention Mesh, a pre-trained landmark detector. Again, to discover discriminative features, we consider the relativity and trajectory of the landmarks. For the relativity, we aggregate facial landmark that conceptually formats a curve at each frame to establish local spatial features. For the trajectory, we estimate the movements of landmark composed features across time by self-attention mechanism, which captures pairwise dependency on the trajectory of the same landmark. This idea allows us to achieve state-of-the-art performances on UVA-NEMO, BBC, MMI Facial Expression, and SPOS datasets.
△ Less
Submitted 9 October, 2022;
originally announced October 2022.
-
Bangla-Wave: Improving Bangla Automatic Speech Recognition Utilizing N-gram Language Models
Authors:
Mohammed Rakib,
Md. Ismail Hossain,
Nabeel Mohammed,
Fuad Rahman
Abstract:
Although over 300M around the world speak Bangla, scant work has been done in improving Bangla voice-to-text transcription due to Bangla being a low-resource language. However, with the introduction of the Bengali Common Voice 9.0 speech dataset, Automatic Speech Recognition (ASR) models can now be significantly improved. With 399hrs of speech recordings, Bengali Common Voice is the largest and mo…
▽ More
Although over 300M around the world speak Bangla, scant work has been done in improving Bangla voice-to-text transcription due to Bangla being a low-resource language. However, with the introduction of the Bengali Common Voice 9.0 speech dataset, Automatic Speech Recognition (ASR) models can now be significantly improved. With 399hrs of speech recordings, Bengali Common Voice is the largest and most diversified open-source Bengali speech corpus in the world. In this paper, we outperform the SOTA pretrained Bengali ASR models by finetuning a pretrained wav2vec2 model on the common voice dataset. We also demonstrate how to significantly improve the performance of an ASR model by adding an n-gram language model as a post-processor. Finally, we do some experiments and hyperparameter tuning to generate a robust Bangla ASR model that is better than the existing ASR models.
△ Less
Submitted 13 September, 2022;
originally announced September 2022.
-
Integration of Reconfigurable Intelligent Surfaces in Dynamical Energy Analysis
Authors:
Sergio Terranova,
Martin Richter,
Neekar M Mohammed,
Gabriele Gradoni,
Gregor Tanner
Abstract:
Reconfigurable intelligent surfaces have been recently investigated for their potentials to offer significant performance improvements in the next generation wireless telecommunication systems (5G and beyond / 6G). Intelligent surfaces are programmed to control the electromagnetic propagation and obtain the desired wavefront by tuning the local reflection phase of unit elements. Predicting the ele…
▽ More
Reconfigurable intelligent surfaces have been recently investigated for their potentials to offer significant performance improvements in the next generation wireless telecommunication systems (5G and beyond / 6G). Intelligent surfaces are programmed to control the electromagnetic propagation and obtain the desired wavefront by tuning the local reflection phase of unit elements. Predicting the electromagnetic propagation in the RIS-assisted wireless channel accurately is a significant challenge for researchers and becomes crucial for Telecom operators to properly allocate the radio resources. We propose the use of an Eulerian ray-tracing method, the Dynamical Energy Analysis (DEA), as a coverage planning tool capable of account for the EM interaction between reconfigurable intelligent surfaces and the surrounding environment. The main characteristics that make DEA suitable for this purpose are discussed and some preliminary results of the reflective surface integration within the DEA code will be presented.
△ Less
Submitted 14 September, 2022;
originally announced September 2022.
-
Electromagnetic Illusion in Smart Environments
Authors:
Hamidreza Taghvaee,
Mir Lodro,
Neekar M Mohammed,
Sergio Terranova,
Sendy Phang,
Martin Richter,
Gabriele Gradoni
Abstract:
Metasurfaces can be designed to achieve prescribed functionality. Careful meta-atom design and arrangement achieve homogeneous and inhomogeneous layouts that can enable exceptional capabilities to manipulate incident waves. Inherently, the control of scattering waves is crucial in wireless communications and stealth technologies. Low-profile and light-weight coatings that offer comprehensive manip…
▽ More
Metasurfaces can be designed to achieve prescribed functionality. Careful meta-atom design and arrangement achieve homogeneous and inhomogeneous layouts that can enable exceptional capabilities to manipulate incident waves. Inherently, the control of scattering waves is crucial in wireless communications and stealth technologies. Low-profile and light-weight coatings that offer comprehensive manipulation are highly desirable for applications including camouflaging, deceptive sensing, radar cognition control, and defense security. Here, we propose a method that achieves electromagnetic illusion without altering the object. A proof of principle is proposed and practiced for one-dimensional media. The idea is to engineer the environment instead of the object coating. This work paves the way for versatile designs that will improve electromagnetic security applications with the aid of smart environments.
△ Less
Submitted 10 September, 2022;
originally announced September 2022.
-
TPM: Transition Probability Matrix -- Graph Structural Feature based Embedding
Authors:
Sarmad N. Mohammed,
Semra Gündüç
Abstract:
In this work, Transition Probability Matrix (TPM) is proposed as a new method for extracting the features of nodes in the graph. The proposed method uses random walks to capture the connectivity structure of a node's close neighborhood. The information obtained from random walks is converted to anonymous walks to extract the topological features of nodes. In the embedding process of nodes, anonymo…
▽ More
In this work, Transition Probability Matrix (TPM) is proposed as a new method for extracting the features of nodes in the graph. The proposed method uses random walks to capture the connectivity structure of a node's close neighborhood. The information obtained from random walks is converted to anonymous walks to extract the topological features of nodes. In the embedding process of nodes, anonymous walks are used since they capture the topological similarities of connectivities better than random walks. Therefore the obtained embedding vectors have richer information about the underlying connectivity structure. The method is applied to node classification and link prediction tasks. The performance of the proposed algorithm is superior to the state-of-the-art algorithms in the recent literature. Moreover, the extracted information about the connectivity structure of similar networks is used to link prediction and node classification tasks for a completely new graph.
△ Less
Submitted 3 March, 2023; v1 submitted 7 August, 2022;
originally announced August 2022.
-
LILA-BOTI : Leveraging Isolated Letter Accumulations By Ordering Teacher Insights for Bangla Handwriting Recognition
Authors:
Md. Ismail Hossain,
Mohammed Rakib,
Sabbir Mollah,
Fuad Rahman,
Nabeel Mohammed
Abstract:
Word-level handwritten optical character recognition (OCR) remains a challenge for morphologically rich languages like Bangla. The complexity arises from the existence of a large number of alphabets, the presence of several diacritic forms, and the appearance of complex conjuncts. The difficulty is exacerbated by the fact that some graphemes occur infrequently but remain indispensable, so addressi…
▽ More
Word-level handwritten optical character recognition (OCR) remains a challenge for morphologically rich languages like Bangla. The complexity arises from the existence of a large number of alphabets, the presence of several diacritic forms, and the appearance of complex conjuncts. The difficulty is exacerbated by the fact that some graphemes occur infrequently but remain indispensable, so addressing the class imbalance is required for satisfactory results. This paper addresses this issue by introducing two knowledge distillation methods: Leveraging Isolated Letter Accumulations By Ordering Teacher Insights (LILA-BOTI) and Super Teacher LILA-BOTI. In both cases, a Convolutional Recurrent Neural Network (CRNN) student model is trained with the dark knowledge gained from a printed isolated character recognition teacher model. We conducted inter-dataset testing on \emph{BN-HTRd} and \emph{BanglaWriting} as our evaluation protocol, thus setting up a challenging problem where the results would better reflect the performance on unseen data. Our evaluations achieved up to a 3.5% increase in the F1-Macro score for the minor classes and up to 4.5% increase in our overall word recognition rate when compared with the base model (No KD) and conventional KD.
△ Less
Submitted 23 May, 2022;
originally announced May 2022.
-
Rethinking Task-Incremental Learning Baselines
Authors:
Md Sazzad Hossain,
Pritom Saha,
Townim Faisal Chowdhury,
Shafin Rahman,
Fuad Rahman,
Nabeel Mohammed
Abstract:
It is common to have continuous streams of new data that need to be introduced in the system in real-world applications. The model needs to learn newly added capabilities (future tasks) while retaining the old knowledge (past tasks). Incremental learning has recently become increasingly appealing for this problem. Task-incremental learning is a kind of incremental learning where task identity of n…
▽ More
It is common to have continuous streams of new data that need to be introduced in the system in real-world applications. The model needs to learn newly added capabilities (future tasks) while retaining the old knowledge (past tasks). Incremental learning has recently become increasingly appealing for this problem. Task-incremental learning is a kind of incremental learning where task identity of newly included task (a set of classes) remains known during inference. A common goal of task-incremental methods is to design a network that can operate on minimal size, maintaining decent performance. To manage the stability-plasticity dilemma, different methods utilize replay memory of past tasks, specialized hardware, regularization monitoring etc. However, these methods are still less memory efficient in terms of architecture growth or input data costs. In this study, we present a simple yet effective adjustment network (SAN) for task incremental learning that achieves near state-of-the-art performance while using minimal architectural size without using memory instances compared to previous state-of-the-art approaches. We investigate this approach on both 3D point cloud object (ModelNet40) and 2D image (CIFAR10, CIFAR100, MiniImageNet, MNIST, PermutedMNIST, notMNIST, SVHN, and FashionMNIST) recognition tasks and establish a strong baseline result for a fair comparison with existing methods. On both 2D and 3D domains, we also observe that SAN is primarily unaffected by different task orders in a task-incremental setting.
△ Less
Submitted 23 May, 2022;
originally announced May 2022.
-
Inverse Laplace transform based on Widder's method for Tsallis exponential
Authors:
S. S. Naina Mohammed,
K. Jeevanandham,
A. Basherrudin Mahmud Ahmed,
Md. Manirul Ali,
R. Chandrashekar
Abstract:
A generalization of the Laplace transform based on the generalized Tsallis $q$-exponential is given in the present work for a new type of kernel. We also define the inverse transform for this generalized transform based on the complex integration method. We prove identities corresponding to the Laplace transform and inverse transform like the $q$-convolution theorem, the action of generalized deri…
▽ More
A generalization of the Laplace transform based on the generalized Tsallis $q$-exponential is given in the present work for a new type of kernel. We also define the inverse transform for this generalized transform based on the complex integration method. We prove identities corresponding to the Laplace transform and inverse transform like the $q$-convolution theorem, the action of generalized derivative and generalized integration on the Laplace transform. We then derive a $q$-generalization of the inverse Laplace transform based on the Post-Widder's method which bypasses the necessity for a complex contour integration. We demonstrate the usefulness of this in computing the Laplace and inverse Laplace transform of some elementary functions. Finally we use the Post-Widder's method based inverse Laplace transform to compute the density of states from the partition function for the case of a generalized classical ideal gas and linear harmonic oscillator in $D$-dimensions.
△ Less
Submitted 11 May, 2022; v1 submitted 7 May, 2022;
originally announced May 2022.
-
VISTA: Vision Transformer enhanced by U-Net and Image Colorfulness Frame Filtration for Automatic Retail Checkout
Authors:
Md. Istiak Hossain Shihab,
Nazia Tasnim,
Hasib Zunair,
Labiba Kanij Rupty,
Nabeel Mohammed
Abstract:
Multi-class product counting and recognition identifies product items from images or videos for automated retail checkout. The task is challenging due to the real-world scenario of occlusions where product items overlap, fast movement in the conveyor belt, large similarity in overall appearance of the items being scanned, novel products, and the negative impact of misidentifying items. Further, th…
▽ More
Multi-class product counting and recognition identifies product items from images or videos for automated retail checkout. The task is challenging due to the real-world scenario of occlusions where product items overlap, fast movement in the conveyor belt, large similarity in overall appearance of the items being scanned, novel products, and the negative impact of misidentifying items. Further, there is a domain bias between training and test sets, specifically, the provided training dataset consists of synthetic images and the test set videos consist of foreign objects such as hands and tray. To address these aforementioned issues, we propose to segment and classify individual frames from a video sequence. The segmentation method consists of a unified single product item- and hand-segmentation followed by entropy masking to address the domain bias problem. The multi-class classification method is based on Vision Transformers (ViT). To identify the frames with target objects, we utilize several image processing methods and propose a custom metric to discard frames not having any product items. Combining all these mechanisms, our best system achieves 3rd place in the AI City Challenge 2022 Track 4 with an F1 score of 0.4545. Code will be available at
△ Less
Submitted 23 April, 2022;
originally announced April 2022.
-
Quantum coherence dynamics of displaced squeezed thermal state in a Non-Markovian environment
Authors:
Md. Manirul Ali,
R. Chandrashekar,
S. S. Naina Mohammed
Abstract:
The dynamical behavior of quantum coherence of a displaced squeezed thermal state in contact with an external bath is discussed in the present work. We use a Fano-Anderson type of Hamiltonian to model the environment and solve the quantum Langevin equation. From the solution of the quantum Langevin equation we obtain the Green's functions which are used to calculate the expectation value of the qu…
▽ More
The dynamical behavior of quantum coherence of a displaced squeezed thermal state in contact with an external bath is discussed in the present work. We use a Fano-Anderson type of Hamiltonian to model the environment and solve the quantum Langevin equation. From the solution of the quantum Langevin equation we obtain the Green's functions which are used to calculate the expectation value of the quadrature operators which are in turn used to construct the covariance matrix. We use a relative entropy based measure to calculate the quantum coherence of the mode. The single mode squeezed thermal state is studied in the Ohmic, sub-Ohmic and the super-Ohmic limits for different values of the mean photon number. In all these limits, we find that when the coupling between the system and the environment is weak, the coherence decays monotonically and exhibit a Markovian nature. When the system and the environment are strongly coupled, we observe that the evolution is initially Markovian and after some time it becomes non-Markovian. The non-Markovian effect is due to the environmental back action on the system. Finally, we also present the steady state dynamics of the coherence in the long time limit in both low and high temperature regime. We find that the qualitative behavior remains the same in both the low and high temperature limits. But quantitative values differ because the coherence in the system is lower due to thermal decoherence.
△ Less
Submitted 3 February, 2022;
originally announced February 2022.
-
Dynamic Rectification Knowledge Distillation
Authors:
Fahad Rahman Amik,
Ahnaf Ismat Tasin,
Silvia Ahmed,
M. M. Lutfe Elahi,
Nabeel Mohammed
Abstract:
Knowledge Distillation is a technique which aims to utilize dark knowledge to compress and transfer information from a vast, well-trained neural network (teacher model) to a smaller, less capable neural network (student model) with improved inference efficiency. This approach of distilling knowledge has gained popularity as a result of the prohibitively complicated nature of such cumbersome models…
▽ More
Knowledge Distillation is a technique which aims to utilize dark knowledge to compress and transfer information from a vast, well-trained neural network (teacher model) to a smaller, less capable neural network (student model) with improved inference efficiency. This approach of distilling knowledge has gained popularity as a result of the prohibitively complicated nature of such cumbersome models for deployment on edge computing devices. Generally, the teacher models used to teach smaller student models are cumbersome in nature and expensive to train. To eliminate the necessity for a cumbersome teacher model completely, we propose a simple yet effective knowledge distillation framework that we termed Dynamic Rectification Knowledge Distillation (DR-KD). Our method transforms the student into its own teacher, and if the self-teacher makes wrong predictions while distilling information, the error is rectified prior to the knowledge being distilled. Specifically, the teacher targets are dynamically tweaked by the agency of ground-truth while distilling the knowledge gained from traditional training. Our proposed DR-KD performs remarkably well in the absence of a sophisticated cumbersome teacher model and achieves comparable performance to existing state-of-the-art teacher-free knowledge distillation frameworks when implemented by a low-cost dynamic mannered teacher. Our approach is all-encompassing and can be utilized for any deep neural network training that requires categorization or object recognition. DR-KD enhances the test accuracy on Tiny ImageNet by 2.65% over prominent baseline models, which is significantly better than any other knowledge distillation approach while requiring no additional training costs.
△ Less
Submitted 26 January, 2022;
originally announced January 2022.
-
Degree-Based Random Walk Approach for Graph Embedding
Authors:
Sarmad N. Mohammed,
Semra Gündüç
Abstract:
Graph embedding, representing local and global neighborhood information by numerical vectors, is a crucial part of the mathematical modeling of a wide range of real-world systems. Among the embedding algorithms, random walk-based algorithms have proven to be very successful. These algorithms collect information by creating numerous random walks with a redefined number of steps. Creating random wal…
▽ More
Graph embedding, representing local and global neighborhood information by numerical vectors, is a crucial part of the mathematical modeling of a wide range of real-world systems. Among the embedding algorithms, random walk-based algorithms have proven to be very successful. These algorithms collect information by creating numerous random walks with a redefined number of steps. Creating random walks is the most demanding part of the embedding process. The computation demand increases with the size of the network. Moreover, for real-world networks, considering all nodes on the same footing, the abundance of low-degree nodes creates an imbalanced data problem. In this work, a computationally less intensive and node connectivity aware uniform sampling method is proposed. In the proposed method, the number of random walks is created proportionally with the degree of the node. The advantages of the proposed algorithm become more enhanced when the algorithm is applied to large graphs. A comparative study by using two networks namely CORA and CiteSeer is presented. Comparing with the fixed number of walks case, the proposed method requires 50% less computational effort to reach the same accuracy for node classification and link prediction calculations.
△ Less
Submitted 5 July, 2022; v1 submitted 21 October, 2021;
originally announced October 2021.
-
Deployment of Polar Codes for Mission-Critical Machine-Type Communication Over Wireless Networks
Authors:
Najib Ahmed Mohammed,
Ali Mohammed Mansoor,
Rodina Binti Ahmad,
Saaidal Razalli Bin Azzuhri
Abstract:
Mission critical Machine-type Communication, also referred to as Ultra-reliable Low Latency Communication is primarily characterized by communication that provides ultra-high reliability and very low latency to concurrently transmit short commands to a massive number of connected devices. While the reduction in PHY layer overhead and improvement in channel coding techniques are pivotal in reducing…
▽ More
Mission critical Machine-type Communication, also referred to as Ultra-reliable Low Latency Communication is primarily characterized by communication that provides ultra-high reliability and very low latency to concurrently transmit short commands to a massive number of connected devices. While the reduction in PHY layer overhead and improvement in channel coding techniques are pivotal in reducing latency and improving reliability, the current wireless standards dedicated to support mcMTC rely heavily on adopting the bottom layers of general-purpose wireless standards and customizing only the upper layers. The mcMTC has a significant technical impact on the design of all layers of the communication protocol stack. In this paper, an innovative bottom-up approach has been proposed for mcMTC applications through PHY layer targeted at improving the transmission reliability by implementing ultra-reliable channel coding scheme in the PHY layer of IEEE 802.11a bearing in mind short packet transmission system. To achieve this aim, we analyzed and compared the channel coding performance of convolutional codes, LDPC codes, and polar codes in wireless network on the condition of short data packet transmission. The Viterbi decoding algorithm, logarithmic belief propagation algorithm, and cyclic redundancy check - successive cancellation list decoding algorithm were adopted to CC, LDPC codes, and polar codes, respectively. Consequently, a new PHY layer for mcMTC has been proposed. The reliability of the proposed approach has been validated by simulation in terms of Bit error rate vs. SNR. The simulation results demonstrate that the reliability of IEEE 802.11a standard has been significantly improved to be at PER less 10e-5 with the implementation of polar codes. The results also show that the general-purpose wireless networks are prominent in providing short packet mcMTC with the modification needed.
△ Less
Submitted 6 October, 2021;
originally announced October 2021.
-
Federated Learning Algorithms for Generalized Mixed-effects Model (GLMM) on Horizontally Partitioned Data from Distributed Sources
Authors:
Wentao Li,
Jiayi Tong,
Md. Monowar Anjum,
Noman Mohammed,
Yong Chen,
Xiaoqian Jiang
Abstract:
Objectives: This paper develops two algorithms to achieve federated generalized linear mixed effect models (GLMM), and compares the developed model's outcomes with each other, as well as that from the standard R package (`lme4').
Methods: The log-likelihood function of GLMM is approximated by two numerical methods (Laplace approximation and Gaussian Hermite approximation), which supports federat…
▽ More
Objectives: This paper develops two algorithms to achieve federated generalized linear mixed effect models (GLMM), and compares the developed model's outcomes with each other, as well as that from the standard R package (`lme4').
Methods: The log-likelihood function of GLMM is approximated by two numerical methods (Laplace approximation and Gaussian Hermite approximation), which supports federated decomposition of GLMM to bring computation to data.
Results: Our developed method can handle GLMM to accommodate hierarchical data with multiple non-independent levels of observations in a federated setting. The experiment results demonstrate comparable (Laplace) and superior (Gaussian-Hermite) performances with simulated and real-world data.
Conclusion: We developed and compared federated GLMMs with different approximations, which can support researchers in analyzing biomedical data to accommodate mixed effects and address non-independence due to hierarchical structures (i.e., institutes, region, country, etc.).
△ Less
Submitted 7 June, 2022; v1 submitted 28 September, 2021;
originally announced September 2021.
-
Curricular SincNet: Towards Robust Deep Speaker Recognition by Emphasizing Hard Samples in Latent Space
Authors:
Labib Chowdhury,
Mustafa Kamal,
Najia Hasan,
Nabeel Mohammed
Abstract:
Deep learning models have become an increasingly preferred option for biometric recognition systems, such as speaker recognition. SincNet, a deep neural network architecture, gained popularity in speaker recognition tasks due to its parameterized sinc functions that allow it to work directly on the speech signal. The original SincNet architecture uses the softmax loss, which may not be the most su…
▽ More
Deep learning models have become an increasingly preferred option for biometric recognition systems, such as speaker recognition. SincNet, a deep neural network architecture, gained popularity in speaker recognition tasks due to its parameterized sinc functions that allow it to work directly on the speech signal. The original SincNet architecture uses the softmax loss, which may not be the most suitable choice for recognition-based tasks. Such loss functions do not impose inter-class margins nor differentiate between easy and hard training samples. Curriculum learning, particularly those leveraging angular margin-based losses, has proven very successful in other biometric applications such as face recognition. The advantage of such a curriculum learning-based techniques is that it will impose inter-class margins as well as taking to account easy and hard samples. In this paper, we propose Curricular SincNet (CL-SincNet), an improved SincNet model where we use a curricular loss function to train the SincNet architecture. The proposed model is evaluated on multiple datasets using intra-dataset and inter-dataset evaluation protocols. In both settings, the model performs competitively with other previously published work. In the case of inter-dataset testing, it achieves the best overall results with a reduction of 4\% error rate compare to SincNet and other published work.
△ Less
Submitted 21 August, 2021;
originally announced August 2021.
-
De-identification of Unstructured Clinical Texts from Sequence to Sequence Perspective
Authors:
Md Monowar Anjum,
Noman Mohammed,
Xiaoqian Jiang
Abstract:
In this work, we propose a novel problem formulation for de-identification of unstructured clinical text. We formulate the de-identification problem as a sequence to sequence learning problem instead of a token classification problem. Our approach is inspired by the recent state-of -the-art performance of sequence to sequence learning models for named entity recognition. Early experimentation of o…
▽ More
In this work, we propose a novel problem formulation for de-identification of unstructured clinical text. We formulate the de-identification problem as a sequence to sequence learning problem instead of a token classification problem. Our approach is inspired by the recent state-of -the-art performance of sequence to sequence learning models for named entity recognition. Early experimentation of our proposed approach achieved 98.91% recall rate on i2b2 dataset. This performance is comparable to current state-of-the-art models for unstructured clinical text de-identification.
△ Less
Submitted 10 September, 2021; v1 submitted 18 August, 2021;
originally announced August 2021.
-
Comparison of forecasting of the risk of coronavirus (COVID 19) in high quality and low quality healthcare systems, using ANN models
Authors:
Aseel Sameer Mohamed,
Nooriya A. Mohammed
Abstract:
COVID 19 is a disease that has abnormal over 170 nations worldwide. The number of infected people (either sick or dead) has been growing at a worrying ratio in virtually all the affected countries. Forecasting procedures can be instructed so hel** in scheming well plans and in captivating creative conclusions. These procedures measure the conditions of the previous thus allowing well forecasts a…
▽ More
COVID 19 is a disease that has abnormal over 170 nations worldwide. The number of infected people (either sick or dead) has been growing at a worrying ratio in virtually all the affected countries. Forecasting procedures can be instructed so hel** in scheming well plans and in captivating creative conclusions. These procedures measure the conditions of the previous thus allowing well forecasts around the state to arise in the future. These predictions strength helps to make contradiction of likely pressures and significances. Forecasting procedures production a very main character in elastic precise predictions. In this case study used two models in order to diagnose optimal approach by compared the outputs. This study was introduced forecasting procedures into Artificial Neural Network models compared with regression model. Data collected from Al Kindy Teaching Hospital from the period of 28/5/2019 to 28/7/2019 show an energetic part in forecasting. Forecasting of a disease can be done founded on several parameters such as the age, gender, number of daily infections, number of patient with other disease and number of death. Though, forecasting procedures arise with their private data of tests. This study chats these tests and also offers a set of commendations for the persons who are presently hostile the global COVID 19 disease.
△ Less
Submitted 16 July, 2021; v1 submitted 1 July, 2021;
originally announced July 2021.
-
ViPTT-Net: Video pretraining of spatio-temporal model for tuberculosis type classification from chest CT scans
Authors:
Hasib Zunair,
Aimon Rahman,
Nabeel Mohammed
Abstract:
Pretraining has sparked groundswell of interest in deep learning workflows to learn from limited data and improve generalization. While this is common for 2D image classification tasks, its application to 3D medical imaging tasks like chest CT interpretation is limited. We explore the idea of whether pretraining a model on realistic videos could improve performance rather than training the model f…
▽ More
Pretraining has sparked groundswell of interest in deep learning workflows to learn from limited data and improve generalization. While this is common for 2D image classification tasks, its application to 3D medical imaging tasks like chest CT interpretation is limited. We explore the idea of whether pretraining a model on realistic videos could improve performance rather than training the model from scratch, intended for tuberculosis type classification from chest CT scans. To incorporate both spatial and temporal features, we develop a hybrid convolutional neural network (CNN) and recurrent neural network (RNN) model, where the features are extracted from each axial slice of the CT scan by a CNN, these sequence of image features are input to a RNN for classification of the CT scan. Our model termed as ViPTT-Net, was trained on over 1300 video clips with labels of human activities, and then fine-tuned on chest CT scans with labels of tuberculosis type. We find that pretraining the model on videos lead to better representations and significantly improved model validation performance from a kappa score of 0.17 to 0.35, especially for under-represented class samples. Our best method achieved 2nd place in the ImageCLEF 2021 Tuberculosis - TBT classification task with a kappa score of 0.20 on the final test set with only image information (without using clinical meta-data). All codes and models are made available.
△ Less
Submitted 26 May, 2021;
originally announced May 2021.
-
An Amharic News Text classification Dataset
Authors:
Israel Abebe Azime,
Nebil Mohammed
Abstract:
In NLP, text classification is one of the primary problems we try to solve and its uses in language analyses are indisputable. The lack of labeled training data made it harder to do these tasks in low resource languages like Amharic. The task of collecting, labeling, annotating, and making valuable this kind of data will encourage junior researchers, schools, and machine learning practitioners to…
▽ More
In NLP, text classification is one of the primary problems we try to solve and its uses in language analyses are indisputable. The lack of labeled training data made it harder to do these tasks in low resource languages like Amharic. The task of collecting, labeling, annotating, and making valuable this kind of data will encourage junior researchers, schools, and machine learning practitioners to implement existing classification models in their language. In this short paper, we aim to introduce the Amharic text classification dataset that consists of more than 50k news articles that were categorized into 6 classes. This dataset is made available with easy baseline performances to encourage studies and better performance experiments.
△ Less
Submitted 10 March, 2021;
originally announced March 2021.
-
Can a regulatory risk measure induce profit-maximizing risk capital allocations? The case of Conditional Tail Expectation
Authors:
Nawaf Mohammed,
Edward Furman,
Jianxi Su
Abstract:
Risk capital allocations (RCAs) are an important tool in quantitative risk management, where they are utilized to, e.g., gauge the profitability of distinct business units, determine the price of a new product, and conduct the marginal economic capital analysis. Nevertheless, the notion of RCA has been living in the shadow of another, closely related notion, of risk measure (RM) in the sense that…
▽ More
Risk capital allocations (RCAs) are an important tool in quantitative risk management, where they are utilized to, e.g., gauge the profitability of distinct business units, determine the price of a new product, and conduct the marginal economic capital analysis. Nevertheless, the notion of RCA has been living in the shadow of another, closely related notion, of risk measure (RM) in the sense that the latter notion often shapes the fashion in which the former notion is implemented. In fact, as the majority of the RCAs known nowadays are induced by RMs, the popularity of the two are apparently very much correlated. As a result, it is the RCA that is induced by the Conditional Tail Expectation (CTE) RM that has arguably prevailed in scholarly literature and applications. Admittedly, the CTE RM is a sound mathematical object and an important regulatory RM, but its appropriateness is controversial in, e.g., profitability analysis and pricing. In this paper, we address the question as to whether or not the RCA induced by the CTE RM may concur with alternatives that arise from the context of profit maximization. More specifically, we provide exhaustive description of all those probabilistic model settings, in which the mathematical and regulatory CTE RM may also reflect the risk perception of a profit-maximizing insurer.
△ Less
Submitted 26 August, 2021; v1 submitted 9 February, 2021;
originally announced February 2021.
-
PAARS: Privacy Aware Access Regulation System
Authors:
Md. Monowar Anjum,
Noman Mohammed
Abstract:
During pandemics, health officials usually recommend access monitoring and regulation protocols/systems in places that are major activity centres. As organizations adhere to those recommendations, they often fail to implement proper privacy requirements to prevent privacy loss of the users of those protocols or systems. This is a very timely issue as health authorities across the world are increas…
▽ More
During pandemics, health officials usually recommend access monitoring and regulation protocols/systems in places that are major activity centres. As organizations adhere to those recommendations, they often fail to implement proper privacy requirements to prevent privacy loss of the users of those protocols or systems. This is a very timely issue as health authorities across the world are increasingly putting these regulations in place to mitigate the spread of the current pandemic. A number of solutions have been proposed to mitigate these privacy issues existing in current models of contact tracing or access regulations systems. However, a prevalent pattern among these solutions are they mainly focus on protecting users privacy from server side and involve Bluetooth based ephemeral identifier exchange between users. Another pattern is all the current solutions try to solve the problem in city-wide or nation-wide level. In this paper, we propose a system, PAARS, which approaches the privacy issues in access monitoring/regulation systems from a micro level. We solve the privacy issues in access monitoring/regulation systems without any exchange of any ephemeral identifiers between users. Moreover, our proposed system provides privacy on both server side and the user side by using secure hashing and differential privacy mechanism.
△ Less
Submitted 18 December, 2020;
originally announced December 2020.
-
Uniformizing Techniques to Process CT scans with 3D CNNs for Tuberculosis Prediction
Authors:
Hasib Zunair,
Aimon Rahman,
Nabeel Mohammed,
Joseph Paul Cohen
Abstract:
A common approach to medical image analysis on volumetric data uses deep 2D convolutional neural networks (CNNs). This is largely attributed to the challenges imposed by the nature of the 3D data: variable volume size, GPU exhaustion during optimization. However, dealing with the individual slices independently in 2D CNNs deliberately discards the depth information which results in poor performanc…
▽ More
A common approach to medical image analysis on volumetric data uses deep 2D convolutional neural networks (CNNs). This is largely attributed to the challenges imposed by the nature of the 3D data: variable volume size, GPU exhaustion during optimization. However, dealing with the individual slices independently in 2D CNNs deliberately discards the depth information which results in poor performance for the intended task. Therefore, it is important to develop methods that not only overcome the heavy memory and computation requirements but also leverage the 3D information. To this end, we evaluate a set of volume uniformizing methods to address the aforementioned issues. The first method involves sampling information evenly from a subset of the volume. Another method exploits the full geometry of the 3D volume by interpolating over the z-axis. We demonstrate performance improvements using controlled ablation studies as well as put this approach to the test on the ImageCLEF Tuberculosis Severity Assessment 2019 benchmark. We report 73% area under curve (AUC) and binary classification accuracy (ACC) of 67.5% on the test set beating all methods which leveraged only image information (without using clinical meta-data) achieving 5-th position overall. All codes and models are made available at https://github.com/hasibzunair/uniformizing-3D.
△ Less
Submitted 26 July, 2020;
originally announced July 2020.
-
CPU and GPU Accelerated Fully Homomorphic Encryption
Authors:
Toufique Morshed,
Md Momin Al Aziz,
Noman Mohammed
Abstract:
Fully Homomorphic Encryption (FHE) is one of the most promising technologies for privacy protection as it allows an arbitrary number of function computations over encrypted data. However, the computational cost of these FHE systems limits their widespread applications. In this paper, our objective is to improve the performance of FHE schemes by designing efficient parallel frameworks. In particula…
▽ More
Fully Homomorphic Encryption (FHE) is one of the most promising technologies for privacy protection as it allows an arbitrary number of function computations over encrypted data. However, the computational cost of these FHE systems limits their widespread applications. In this paper, our objective is to improve the performance of FHE schemes by designing efficient parallel frameworks. In particular, we choose Torus Fully Homomorphic Encryption (TFHE) as it offers exact results for an infinite number of boolean gate (e.g., AND, XOR) evaluations. We first extend the gate operations to algebraic circuits such as addition, multiplication, and their vector and matrix equivalents. Secondly, we consider the multi-core CPUs to improve the efficiency of both the gate and the arithmetic operations. Finally, we port the TFHE to the Graphics Processing Units (GPU) and device novel optimizations for boolean and arithmetic circuits employing the multitude of cores. We also experimentally analyze both the CPU and GPU parallel frameworks for different numeric representations (16 to 32-bit). Our GPU implementation outperforms the existing technique, and it achieves a speedup of 20x for any 32-bit boolean operation and 14.5x for multiplications.
△ Less
Submitted 5 May, 2020;
originally announced May 2020.
-
Regolith behavior under asteroid-level gravity conditions: low-velocity impact experiments
Authors:
Julie Brisset,
Joshua E. Colwell,
Adrienne Dove,
Sumayya Abukhalil,
Christopher Cox,
Nadia Mohammed
Abstract:
The dusty regolith covering the surfaces of asteroids and planetary satellites differs in size, shape, and composition from terrestrial soil particles and is subject to very different environmental conditions. Experimental studies of the response of planetary regolith in the relevant environmental conditions are thus necessary to facilitate future Solar System exploration activities. We combined t…
▽ More
The dusty regolith covering the surfaces of asteroids and planetary satellites differs in size, shape, and composition from terrestrial soil particles and is subject to very different environmental conditions. Experimental studies of the response of planetary regolith in the relevant environmental conditions are thus necessary to facilitate future Solar System exploration activities. We combined the results and provided new data analysis elements for a series of impact experiments into simulated planetary regolith in low-gravity conditions using two experimental setups: the Physics of Regolith Impacts in Microgravity Experiment (PRIME) and the COLLisions Into Dust Experiment (COLLIDE). Results of these experimental campaigns found that there is a significant change in the regolith behavior with the gravity environment. In a 10-2g environment (Lunar g levels), only embedding of the impactor was observed and ejecta production was produced for most impacts at > 20 cm/s. Once at microgravity levels (<10-4g), the lowest impact energies also produced impactor rebound. In these microgravity conditions, ejecta started to be produced for impacts at > 10 cm/s. The measured ejecta speeds were lower than the ones measured at reduced-gravity levels, but the ejected masses were higher. The mean ejecta velocity shows a power-law dependence on the impact energy with an index of ~0.7. When projectile rebound occurred, we observed that its coefficients of restitution on the bed of regolith simulant decrease by a factor of 10 with increasing impact speeds from ~5 cm/s up to 100 cm/s. We could also observe an increased cohesion between the JSC-1 grains compared to the quartz sand targets.
△ Less
Submitted 2 October, 2018;
originally announced October 2018.
-
Chittron: An Automatic Bangla Image Captioning System
Authors:
Motiur Rahman,
Nabeel Mohammed,
Nafees Mansoor,
Sifat Momen
Abstract:
Automatic image caption generation aims to produce an accurate description of an image in natural language automatically. However, Bangla, the fifth most widely spoken language in the world, is lagging considerably in the research and development of such domain. Besides, while there are many established data sets to related to image annotation in English, no such resource exists for Bangla yet. He…
▽ More
Automatic image caption generation aims to produce an accurate description of an image in natural language automatically. However, Bangla, the fifth most widely spoken language in the world, is lagging considerably in the research and development of such domain. Besides, while there are many established data sets to related to image annotation in English, no such resource exists for Bangla yet. Hence, this paper outlines the development of "Chittron", an automatic image captioning system in Bangla. Moreover, to address the data set availability issue, a collection of 16,000 Bangladeshi contextual images has been accumulated and manually annotated in Bangla. This data set is then used to train a model which integrates a pre-trained VGG16 image embedding model with stacked LSTM layers. The model is trained to predict the caption when the input is an image, one word at a time. The results show that the model has successfully been able to learn a working language model and to generate captions of images quite accurately in many cases. The results are evaluated mainly qualitatively. However, BLEU scores are also reported. It is expected that a better result can be obtained with a bigger and more varied data set.
△ Less
Submitted 2 September, 2018;
originally announced September 2018.
-
BanglaLekha-Isolated: A Comprehensive Bangla Handwritten Character Dataset
Authors:
Mithun Biswas,
Rafiqul Islam,
Gautam Kumar Shom,
Md Shopon,
Nabeel Mohammed,
Sifat Momen,
Md Anowarul Abedin
Abstract:
Bangla handwriting recognition is becoming a very important issue nowadays. It is potentially a very important task specially for Bangla speaking population of Bangladesh and West Bengal. By kee** that in our mind we are introducing a comprehensive Bangla handwritten character dataset named BanglaLekha-Isolated. This dataset contains Bangla handwritten numerals, basic characters and compound cha…
▽ More
Bangla handwriting recognition is becoming a very important issue nowadays. It is potentially a very important task specially for Bangla speaking population of Bangladesh and West Bengal. By kee** that in our mind we are introducing a comprehensive Bangla handwritten character dataset named BanglaLekha-Isolated. This dataset contains Bangla handwritten numerals, basic characters and compound characters. This dataset was collected from multiple geographical location within Bangladesh and includes sample collected from a variety of aged groups. This dataset can also be used for other classification problems i.e: gender, age, district. This is the largest dataset on Bangla handwritten characters yet.
△ Less
Submitted 22 February, 2017;
originally announced March 2017.
-
SAFETY: Secure gwAs in Federated Environment Through a hYbrid solution with Intel SGX and Homomorphic Encryption
Authors:
Md Nazmus Sadat,
Md Momin Al Aziz,
Noman Mohammed,
Feng Chen,
Shuang Wang,
Xiaoqian Jiang
Abstract:
Recent studies demonstrate that effective healthcare can benefit from using the human genomic information. For instance, analysis of tumor genomes has revealed 140 genes whose mutations contribute to cancer. As a result, many institutions are using statistical analysis of genomic data, which are mostly based on genome-wide association studies (GWAS). GWAS analyze genome sequence variations in orde…
▽ More
Recent studies demonstrate that effective healthcare can benefit from using the human genomic information. For instance, analysis of tumor genomes has revealed 140 genes whose mutations contribute to cancer. As a result, many institutions are using statistical analysis of genomic data, which are mostly based on genome-wide association studies (GWAS). GWAS analyze genome sequence variations in order to identify genetic risk factors for diseases. These studies often require pooling data from different sources together in order to unravel statistical patterns or relationships between genetic variants and diseases. In this case, the primary challenge is to fulfill one major objective: accessing multiple genomic data repositories for collaborative research in a privacy-preserving manner. Due to the sensitivity and privacy concerns regarding the genomic data, multi-jurisdictional laws and policies of cross-border genomic data sharing are enforced among different regions of the world. In this article, we present SAFETY, a hybrid framework, which can securely perform GWAS on federated genomic datasets using homomorphic encryption and recently introduced secure hardware component of Intel Software Guard Extensions (Intel SGX) to ensure high efficiency and privacy at the same time. Different experimental settings show the efficacy and applicability of such hybrid framework in secure conduction of GWAS. To the best of our knowledge, this hybrid use of homomorphic encryption along with Intel SGX is not proposed or experimented to this date. Our proposed framework, SAFETY is up to 4.82 times faster than the best existing secure computation technique.
△ Less
Submitted 7 March, 2017;
originally announced March 2017.
-
Secure Count Query on Encrypted Genomic Data
Authors:
Mohammad Zahidul Hasan,
Md Safiur Rahman Mahdi,
Noman Mohammed
Abstract:
Capturing the vast amount of meaningful information encoded in the human genome is a fascinating research problem. The outcome of these researches have significant influences in a number of health related fields --- personalized medicine, paternity testing and disease susceptibility testing are a few to be named. To facilitate these types of large scale biomedical research projects, it oftentimes…
▽ More
Capturing the vast amount of meaningful information encoded in the human genome is a fascinating research problem. The outcome of these researches have significant influences in a number of health related fields --- personalized medicine, paternity testing and disease susceptibility testing are a few to be named. To facilitate these types of large scale biomedical research projects, it oftentimes requires to share genomic and clinical data collected by disparate organizations among themselves. In that case, it is of utmost importance to ensure that sharing, managing and analyzing the data does not reveal the identity of the individuals who contribute their genomic samples. The task of storage and computation on the shared data can be delegated to third party cloud infrastructures, equipped with large storage and high performance computation resources. Outsourcing these sensitive genomic data to the third party cloud storage is associated with the challenges of the potential loss, theft or misuse of the data as the server administrator cannot be completely trusted as well as there is no guarantee that the security of the server will not be breached. In this paper, we provide a model for secure sharing and computation on genomic data in a semi-honest third party cloud server. The security of the shared data is guaranteed through encryption while making the overall computation fast and scalable enough for real-life large-scale biomedical applications. We evaluated the efficiency of our proposed model on a database of Single-Nucleotide Polymorphism (SNP) sequences and experimental results demonstrate that a query of 50 SNPs in a database of 50000 records, where each record contains 300 SNPs, takes approximately 6 seconds.
△ Less
Submitted 4 March, 2017;
originally announced March 2017.
-
Sentiment Analysis on Bangla and Romanized Bangla Text (BRBT) using Deep Recurrent models
Authors:
A. Hassan,
M. R. Amin,
N. Mohammed,
A. K. A. Azad
Abstract:
Sentiment Analysis (SA) is an action research area in the digital age. With rapid and constant growth of online social media sites and services, and the increasing amount of textual data such as - statuses, comments, reviews etc. available in them, application of automatic SA is on the rise. However, most of the research works on SA in natural language processing (NLP) are based on English languag…
▽ More
Sentiment Analysis (SA) is an action research area in the digital age. With rapid and constant growth of online social media sites and services, and the increasing amount of textual data such as - statuses, comments, reviews etc. available in them, application of automatic SA is on the rise. However, most of the research works on SA in natural language processing (NLP) are based on English language. Despite being the sixth most widely spoken language in the world, Bangla still does not have a large and standard dataset. Because of this, recent research works in Bangla have failed to produce results that can be both comparable to works done by others and reusable as step** stones for future researchers to progress in this field. Therefore, we first tried to provide a textual dataset - that includes not just Bangla, but Romanized Bangla texts as well, is substantial, post-processed and multiple validated, ready to be used in SA experiments. We tested this dataset in Deep Recurrent model, specifically, Long Short Term Memory (LSTM), using two types of loss functions - binary crossentropy and categorical crossentropy, and also did some experimental pre-training by using data from one validation to pre-train the other and vice versa. Lastly, we documented the results along with some analysis on them, which were promising.
△ Less
Submitted 23 November, 2016; v1 submitted 2 October, 2016;
originally announced October 2016.
-
Feature Selection for Classification under Anonymity Constraint
Authors:
Baichuan Zhang,
Noman Mohammed,
Vachik Dave,
Mohammad Al Hasan
Abstract:
Over the last decade, proliferation of various online platforms and their increasing adoption by billions of users have heightened the privacy risk of a user enormously. In fact, security researchers have shown that sparse microdata containing information about online activities of a user although anonymous, can still be used to disclose the identity of the user by cross-referencing the data with…
▽ More
Over the last decade, proliferation of various online platforms and their increasing adoption by billions of users have heightened the privacy risk of a user enormously. In fact, security researchers have shown that sparse microdata containing information about online activities of a user although anonymous, can still be used to disclose the identity of the user by cross-referencing the data with other data sources. To preserve the privacy of a user, in existing works several methods (k-anonymity, l-diversity, differential privacy) are proposed that ensure a dataset which is meant to share or publish bears small identity disclosure risk. However, the majority of these methods modify the data in isolation, without considering their utility in subsequent knowledge discovery tasks, which makes these datasets less informative. In this work, we consider labeled data that are generally used for classification, and propose two methods for feature selection considering two goals: first, on the reduced feature set the data has small disclosure risk, and second, the utility of the data is preserved for performing a classification task. Experimental results on various real-world datasets show that the method is effective and useful in practice.
△ Less
Submitted 5 February, 2017; v1 submitted 22 December, 2015;
originally announced December 2015.
-
A class of energy based ensembles in Tsallis statistics
Authors:
R. Chandrashekar,
S. S. Naina Mohammed
Abstract:
A comprehensive investigation is carried out on the class of energy based ensembles. The eight ensembles are divided into two main classes. In the isothermal class of ensembles the individual members are at the same temperature. A unified framework is evolved to describe the four isothermal ensembles. Such a description is provided both in the second and the third constraint formalisms. The isothe…
▽ More
A comprehensive investigation is carried out on the class of energy based ensembles. The eight ensembles are divided into two main classes. In the isothermal class of ensembles the individual members are at the same temperature. A unified framework is evolved to describe the four isothermal ensembles. Such a description is provided both in the second and the third constraint formalisms. The isothermal- isobaric, grandcanonical and the generalized ensembles are illustrated through a study of the classical nonrelativistic and the extreme relativistic ideal gas models. In the adiabatic class of ensembles the individual members of the ensemble have the same value of the heat function and a unified formulation to described all the four ensembles is given. The nonrelativistic and the extreme relativistic ideal gases are studied in the isoenthalpic-isobaric ensemble, the adiabatic ensemble with number fluctuations, and, the adiabatic ensemble with number and particle fluctuations.
△ Less
Submitted 7 February, 2011;
originally announced February 2011.
-
Nonextensive statistics of relativistic ideal gas
Authors:
R. Chakrabarti,
R. Chandrashekar,
S. S. Naina Mohammed
Abstract:
We obtain the specific heat in the third constraint scenario for a canonical ensemble of a nonextensive extreme relativistic ideal gas in a closed form. The canonical ensemble of N particles in D dimensions is well-defined for the choice of the deformation parameter in the range 0 < q < 1 + 1 / DN. For a relativistic ideal gas with particles of arbitrary mass a perturbative scheme in the nonexte…
▽ More
We obtain the specific heat in the third constraint scenario for a canonical ensemble of a nonextensive extreme relativistic ideal gas in a closed form. The canonical ensemble of N particles in D dimensions is well-defined for the choice of the deformation parameter in the range 0 < q < 1 + 1 / DN. For a relativistic ideal gas with particles of arbitrary mass a perturbative scheme in the nonextensivity parameter (1 - q) is developed by employing an infinite product expansion of the q-exponential, and a direct transformation of the internal energy from the second to the third constraint picture. All thermodynamic quantities may be uniformly evaluated to any desired perturbative order.
△ Less
Submitted 1 August, 2009;
originally announced August 2009.
-
High Transmission Bit Rate of A thermal Arrayed Waveguide Grating (AWG) Module in Passive Optical Networks
Authors:
Abd El Naser A. Mohammed,
Ahmed Nabih Zaki Rashed,
Gaber E. S. M. El Abyad,
Abd El Fattah A. Saad
Abstract:
In the present paper, high transmission bit rate of a thermal arrayed waveguide grating (AWG) which is composed of lithium niobate (LiNbO3)/polymethyl metha acrylate (PMMA) hybrid materials on a silicon substrate in Passive Optical Networks (PONs) has parametrically analyzed and investigated over wide range of the affecting parameters. We have theoretically investigated the temperature dependent…
▽ More
In the present paper, high transmission bit rate of a thermal arrayed waveguide grating (AWG) which is composed of lithium niobate (LiNbO3)/polymethyl metha acrylate (PMMA) hybrid materials on a silicon substrate in Passive Optical Networks (PONs) has parametrically analyzed and investigated over wide range of the affecting parameters. We have theoretically investigated the temperature dependent wavelength shift of the arrayed waveguide grating (AWG) depends on the refractive-indices of the materials and the size of the waveguide. A thermalization of the AWG can be realized by selecting proper values of the material and structural parameters of the device. Moreover, we have analyzed the data transmission bit rate of a thermal AWG in passsive optical networks (PONs) based on Maximum Time Division Multiplexing (MTDM) technique.
△ Less
Submitted 19 June, 2009;
originally announced June 2009.