-
A unified approach for morphometrics and functional data analysis with machine learning for craniodental shape quantification in shrew species
Authors:
Aneesha Balachandran Pillay,
Dharini Pathmanathan,
Sophie Dabo-Niang,
Arpah Abu,
Hasmahzaiti Omar
Abstract:
This work proposes a functional data analysis approach for morphometrics with applications in classifying three shrew species (S. murinus, C. monticola and C. malayana) based on the images. The discrete landmark data of craniodental views (dorsal, jaw and lateral) are converted into continuous curves where the curves are represented as linear combinations of basis functions. A comparative study ba…
▽ More
This work proposes a functional data analysis approach for morphometrics with applications in classifying three shrew species (S. murinus, C. monticola and C. malayana) based on the images. The discrete landmark data of craniodental views (dorsal, jaw and lateral) are converted into continuous curves where the curves are represented as linear combinations of basis functions. A comparative study based on four machine learning algorithms such as naive Bayes, support vector machine, random forest, and generalized linear models was conducted on the predicted principal component scores obtained from the FDA approach and classical approach (combination of all three craniodental views and individual views). The FDA approach produced better results in separating the three clusters of shrew species compared to the classical method and the dorsal view gave the best representation in classifying the three shrew species. Overall, based on the FDA approach, GLM of the predicted PCA scores was the most accurate (95.4% accuracy) among the four classification models.
△ Less
Submitted 20 February, 2023;
originally announced February 2023.
-
QTRAJ 1.0: A Lindblad equation solver for heavy-quarkonium dynamics
Authors:
Hisham Ba Omar,
Miguel Ángel Escobedo,
Ajaharul Islam,
Michael Strickland,
Sabin Thapa,
Peter Vander Griend,
Johannes Heinrich Weber
Abstract:
We introduce an open-source package called QTraj that solves the Lindblad equation for heavy-quarkonium dynamics using the quantum trajectories algorithm. The package allows users to simulate the suppression of heavy-quarkonium states using externally-supplied input from 3+1D hydrodynamics simulations. The code uses a split-step pseudo-spectral method for updating the wave-function between jumps,…
▽ More
We introduce an open-source package called QTraj that solves the Lindblad equation for heavy-quarkonium dynamics using the quantum trajectories algorithm. The package allows users to simulate the suppression of heavy-quarkonium states using externally-supplied input from 3+1D hydrodynamics simulations. The code uses a split-step pseudo-spectral method for updating the wave-function between jumps, which is implemented using the open-source multi-threaded FFTW3 package. This allows one to have manifestly unitary evolution when using real-valued potentials. In this paper, we provide detailed documentation of QTraj 1.0, installation instructions, and present various tests and benchmarks of the code.
△ Less
Submitted 7 January, 2022; v1 submitted 13 July, 2021;
originally announced July 2021.
-
Structure Calculation and Reconstruction of Discrete State Dynamics from Residual Dipolar Couplings using REDCRAFT
Authors:
Casey A. Cole,
Rishi Mukhapadhyay,
Hanin Omar,
Mirko Hennig,
Homayoun Valafar
Abstract:
Residual Dipolar Couplings (RDCs) acquired by Nuclear Magnetic Resonance (NMR) spectroscopy can be an indispensable source of information in investigation of molecular structures and dynamics. Here we present a complete strategy for structure calculation and reconstruction of discrete state dynamics from RDC data. Our method utilizes the previously presented REDCRAFT software package and its dynam…
▽ More
Residual Dipolar Couplings (RDCs) acquired by Nuclear Magnetic Resonance (NMR) spectroscopy can be an indispensable source of information in investigation of molecular structures and dynamics. Here we present a complete strategy for structure calculation and reconstruction of discrete state dynamics from RDC data. Our method utilizes the previously presented REDCRAFT software package and its dynamic-profile analysis to complete the task of fragmented structure determination and identification of the onset of dynamics from RDC data. Fragmented structure determination was used to demonstrate successful structure calculation of static and dynamic domains for several models of dynamics. We provide a mechanism of producing an ensemble of conformations for the dynamical regions that describe any observed order tensor discrepancies between the static and dynamic domains within a protein. In addition, the presented method is capable of approximating relative occupancy of each conformational state. The developed methodology has been evaluated on simulated RDC data with 1Hz of error from an 83 residue α protein (PDBID 1A1Z), and a 213 residue α/\b{eta} protein DGCR8 (PDBID 2YT4). Using 1A1Z, various models of arc and complex two and three discrete-state dynamics were simulated. MD simulation was used to generate a 2-state dynamics for DGCR8. In both instances our method reproduced structure of the protein including the conformational ensemble to within less than 2Å. Based on our investigations, arc motions with more than 30° of rotation are recognized as internal dynamics and are reconstructed with sufficient accuracy. Furthermore, states with relative occupancies above 20% are consistently recognized and reconstructed successfully. Arc motions with magnitude of 15° or relative occupancy of less than 10% are consistently unrecognizable as dynamical regions.
△ Less
Submitted 18 March, 2021;
originally announced March 2021.
-
De Novo Assembly of Uca minax Transcriptome from Next Generation Sequencing
Authors:
Hanin Omar,
Casey A. Cole,
Arjang Fahim,
Giuliana Gusmaroli,
Stephen Borgianini,
Homayoun Valafar
Abstract:
High-throughput cDNA sequencing (RNA-seq) is a very powerful technique to quantify gene expression in an unbiased way. The Crustacean family is among the groups of organisms sparsely represented in current genomic databases. Here we present transcriptome data from Uca minax (red-jointed fiddler crab) as an opportunity to extend our knowledge. Next generation sequencing was performed on six tissue…
▽ More
High-throughput cDNA sequencing (RNA-seq) is a very powerful technique to quantify gene expression in an unbiased way. The Crustacean family is among the groups of organisms sparsely represented in current genomic databases. Here we present transcriptome data from Uca minax (red-jointed fiddler crab) as an opportunity to extend our knowledge. Next generation sequencing was performed on six tissue samples from Uca minax using the Illumina HiSeq system. Six Transcriptome libraries were created using Trinity; a free, open-source software tool for de novo transcriptome assembly of high-throughput mRNA sequencing (RNA-seq) data with the absence of a reference genome. In addition, several tools that aid in management of data were used, such as RSEM, Bowtie, Blast, and IGV; a tool for visualizing RNA-seq analysis results. Fast quality control (FastQC) analysis of the raw sequenced files revealed that both adapter and PCR primer sequences were prevalently present, which may require a preprocessing step.
△ Less
Submitted 9 January, 2020;
originally announced January 2020.
-
IRONHIDE: A Secure Multicore that Efficiently Mitigates Microarchitecture State Attacks for Interactive Applications
Authors:
Hamza Omar,
Omer Khan
Abstract:
Microprocessors enable aggressive hardware virtualization by means of which multiple processes temporally execute on the system. These security-critical and ordinary processes interact with each other to assure application progress. However, temporal sharing of hardware resources exposes the processor to various microarchitecture state attacks. State-of-the-art secure processors, such as MI6 adopt…
▽ More
Microprocessors enable aggressive hardware virtualization by means of which multiple processes temporally execute on the system. These security-critical and ordinary processes interact with each other to assure application progress. However, temporal sharing of hardware resources exposes the processor to various microarchitecture state attacks. State-of-the-art secure processors, such as MI6 adopt Intel's SGX enclave execution model. MI6 architects strong isolation by statically isolating shared memory state, and purging the microarchitecture state of private core, cache, and TLB resources on every enclave entry and exit. The purging overhead significantly impacts performance as the interactivity across the secure and insecure processes increases. This paper proposes IRONHIDE that implements strong isolation in the context of multicores to form spatially isolated secure and insecure clusters of cores. For an interactive application comprising of secure and insecure processes, IRONHIDE pins the secure process(es) to the secure cluster, where they execute and interact with the insecure process(es) without incurring the microarchitecture state purging overheads on every interaction event. IRONHIDE improves performance by 2.1x over the MI6 baseline for a set of user and OS interactive applications. Moreover, IRONHIDE improves performance by 20% over an SGX-like baseline, while also ensuring strong isolation guarantees against microarchitecture state attacks.
△ Less
Submitted 27 January, 2020; v1 submitted 29 April, 2019;
originally announced April 2019.
-
Exploiting the Tradeoff between Program Accuracy and Soft-error Resiliency Overhead for Machine Learning Workloads
Authors:
Qingchuan Shi,
Hamza Omar,
Omer Khan
Abstract:
To protect multicores from soft-error perturbations, resiliency schemes have been developed with high coverage but high power and performance overheads. Emerging safety-critical machine learning applications are increasingly being deployed on these platforms. Moreover, these systems are exposed to harsh environments, such as unmanned aerial vehicles (UAVs) and self-driving cars. Due to the unique…
▽ More
To protect multicores from soft-error perturbations, resiliency schemes have been developed with high coverage but high power and performance overheads. Emerging safety-critical machine learning applications are increasingly being deployed on these platforms. Moreover, these systems are exposed to harsh environments, such as unmanned aerial vehicles (UAVs) and self-driving cars. Due to the unique structure and computational behavior of such applications, research has been done on relaxing their accuracy for performance benefits. We observe that not all transient errors affect program correctness, some errors only affect program accuracy, i.e., the program completes with certain acceptable deviations from error free outcome. This paper illustrates the idea of cross-layer soft-error resilience using machine learning workloads, where program accuracy is introduced as a tradeoff to deliver resilient yet efficient execution on futuristic large-scale multicores.
△ Less
Submitted 9 July, 2017;
originally announced July 2017.
-
Connecting the Dots: Privacy Leakage via Write-Access Patterns to the Main Memory
Authors:
Tara Merin John,
Syed Kamran Haider,
Hamza Omar,
Marten van Dijk
Abstract:
Data-dependent access patterns of an application to an untrusted storage system are notorious for leaking sensitive information about the user's data. Previous research has shown how an adversary capable of monitoring both read and write requests issued to the memory can correlate them with the application to learn its sensitive data. However, information leakage through only the write access patt…
▽ More
Data-dependent access patterns of an application to an untrusted storage system are notorious for leaking sensitive information about the user's data. Previous research has shown how an adversary capable of monitoring both read and write requests issued to the memory can correlate them with the application to learn its sensitive data. However, information leakage through only the write access patterns is less obvious and not well studied in the current literature. In this work, we demonstrate an actual attack on power-side-channel resistant Montgomery's ladder based modular exponentiation algorithm commonly used in public key cryptography. We infer the complete 512-bit secret exponent in $\sim3.5$ minutes by virtue of just the write access patterns of the algorithm to the main memory. In order to learn the victim algorithm's write access patterns under realistic settings, we exploit a compromised DMA device to take frequent snapshots of the application's address space, and then run a simple differential analysis on these snapshots to find the write access sequence. The attack has been shown on an Intel Core(TM) i7-4790 3.60GHz processor based system. We further discuss a possible attack on McEliece public-key cryptosystem that also exploits the write-access patterns to learn the secret key.
△ Less
Submitted 17 June, 2017; v1 submitted 13 February, 2017;
originally announced February 2017.
-
A Novel (k,n) Secret Sharing Scheme from Quadratic Residues for Grayscale Images
Authors:
El-Tigani B. Abdelsatir,
Sahar Salahaldeen,
Hyam Omar,
Afra Hashim
Abstract:
A new grayscale image encryption algorithm based on $(k,n)$ threshold secret sharing is proposed. The scheme allows a secret image to be transformed into $n$ shares, where any $k \le n$ shares can be used to reconstruct the secret image, while the knowledge of $k-1$ or fewer shares leaves no sufficient information about the secret image and it becomes hard to decrypt the transmitted image. In the…
▽ More
A new grayscale image encryption algorithm based on $(k,n)$ threshold secret sharing is proposed. The scheme allows a secret image to be transformed into $n$ shares, where any $k \le n$ shares can be used to reconstruct the secret image, while the knowledge of $k-1$ or fewer shares leaves no sufficient information about the secret image and it becomes hard to decrypt the transmitted image. In the proposed scheme, the pixels of the secret image are first permuted and then encrypted by using quadratic residues. In the final stage, the encrypted image is shared into n shadow images using polynomials of Shamir scheme. The proposed scheme is provably secure and the experimental results shows that the scheme performs well while maintaining high levels of quality in the reconstructed image.
△ Less
Submitted 22 August, 2014; v1 submitted 14 August, 2014;
originally announced August 2014.
-
A Rewriting View of Simple Ty**
Authors:
Aaron Stump,
Garrin Kimmell,
Hans Zantema,
Ruba El Haj Omar
Abstract:
This paper shows how a recently developed view of ty** as small-step abstract reduction, due to Kuan, MacQueen, and Findler, can be used to recast the development of simple type theory from a rewriting perspective. We show how standard meta-theoretic results can be proved in a completely new way, using the rewriting view of simple ty**. These meta-theoretic results include standard type prese…
▽ More
This paper shows how a recently developed view of ty** as small-step abstract reduction, due to Kuan, MacQueen, and Findler, can be used to recast the development of simple type theory from a rewriting perspective. We show how standard meta-theoretic results can be proved in a completely new way, using the rewriting view of simple ty**. These meta-theoretic results include standard type preservation and progress properties for simply typed lambda calculus, as well as generalized versions where ty** is taken to include both abstract and concrete reduction. We show how automated analysis tools developed in the term-rewriting community can be used to help automate the proofs for this meta-theory. Finally, we show how to adapt a standard proof of normalization of simply typed lambda calculus, for the rewriting approach to ty**.
△ Less
Submitted 26 February, 2013; v1 submitted 5 November, 2012;
originally announced November 2012.
-
Towards Analog Reverse Time Computation
Authors:
O. Habibi,
U. R. Patihnedj,
M. O. Dhar
Abstract:
We report the consequences of a destabilization process on a simulated General Purpose Analog Computer. This new technology overcomes problems linked with serial ambiguity, and provides an analog bias to encode algorithms whose complexity is over polynomial. We also implicitly demonstrate how countermesures of the Stochastic Aperture Degeneracy could efficiently reach higher computational classe…
▽ More
We report the consequences of a destabilization process on a simulated General Purpose Analog Computer. This new technology overcomes problems linked with serial ambiguity, and provides an analog bias to encode algorithms whose complexity is over polynomial. We also implicitly demonstrate how countermesures of the Stochastic Aperture Degeneracy could efficiently reach higher computational classes, and would open a road towards Analog Reverse Time Computation.
△ Less
Submitted 7 April, 2006; v1 submitted 5 April, 2006;
originally announced April 2006.