-
Integration of Self-Supervised BYOL in Semi-Supervised Medical Image Recognition
Authors:
Hao Feng,
Yuanzhe Jia,
Ruijia Xu,
Mukesh Prasad,
Ali Anaissi,
Ali Braytee
Abstract:
Image recognition techniques heavily rely on abundant labeled data, particularly in medical contexts. Addressing the challenges associated with obtaining labeled data has led to the prominence of self-supervised learning and semi-supervised learning, especially in scenarios with limited annotated data. In this paper, we proposed an innovative approach by integrating self-supervised learning into s…
▽ More
Image recognition techniques heavily rely on abundant labeled data, particularly in medical contexts. Addressing the challenges associated with obtaining labeled data has led to the prominence of self-supervised learning and semi-supervised learning, especially in scenarios with limited annotated data. In this paper, we proposed an innovative approach by integrating self-supervised learning into semi-supervised models to enhance medical image recognition. Our methodology commences with pre-training on unlabeled data utilizing the BYOL method. Subsequently, we merge pseudo-labeled and labeled datasets to construct a neural network classifier, refining it through iterative fine-tuning. Experimental results on three different datasets demonstrate that our approach optimally leverages unlabeled data, outperforming existing methods in terms of accuracy for medical image recognition.
△ Less
Submitted 16 April, 2024;
originally announced April 2024.
-
A Survey on Human-AI Teaming with Large Pre-Trained Models
Authors:
Vanshika Vats,
Marzia Binta Nizam,
Minghao Liu,
Ziyuan Wang,
Richard Ho,
Mohnish Sai Prasad,
Vincent Titterton,
Sai Venkat Malreddy,
Riya Aggarwal,
Yanwen Xu,
Lei Ding,
Jay Mehta,
Nathan Grinnell,
Li Liu,
Sijia Zhong,
Devanathan Nallur Gandamani,
Xinyi Tang,
Rohan Ghosalkar,
Celeste Shen,
Rachel Shen,
Nafisa Hussain,
Kesav Ravichandran,
James Davis
Abstract:
In the rapidly evolving landscape of artificial intelligence (AI), the collaboration between human intelligence and AI systems, known as Human-AI (HAI) Teaming, has emerged as a cornerstone for advancing problem-solving and decision-making processes. The advent of Large Pre-trained Models (LPtM) has significantly transformed this landscape, offering unprecedented capabilities by leveraging vast am…
▽ More
In the rapidly evolving landscape of artificial intelligence (AI), the collaboration between human intelligence and AI systems, known as Human-AI (HAI) Teaming, has emerged as a cornerstone for advancing problem-solving and decision-making processes. The advent of Large Pre-trained Models (LPtM) has significantly transformed this landscape, offering unprecedented capabilities by leveraging vast amounts of data to understand and predict complex patterns. This paper surveys the pivotal integration of LPtMs with HAI, emphasizing how these models enhance collaborative intelligence beyond traditional approaches. It examines the potential of LPtMs in augmenting human capabilities, discussing this collaboration for AI model improvements, effective teaming, ethical considerations, and their broad applied implications in various sectors. Through this exploration, the study sheds light on the transformative impact of LPtM-enhanced HAI Teaming, providing insights for future research, policy development, and strategic implementations aimed at harnessing the full potential of this collaboration for research and societal benefit.
△ Less
Submitted 26 June, 2024; v1 submitted 7 March, 2024;
originally announced March 2024.
-
Sign of the $hZZ$ coupling and implication for new physics
Authors:
Dipankar Das,
Anirban Kundu,
Miguel Levy,
Anugrah M. Prasad,
Ipsita Saha,
Agnivo Sarkar
Abstract:
The magnitudes of the couplings of the scalar resonance at 125 GeV with the SM particles are found to be consistent with those of the SM Higgs boson. However, the signs are not experimentally determined in most of the cases, a prime example being that with the $Z$-boson pair. In other words, $κ_Z^h$, the ratio of the couplings of the actual 125 GeV resonance with $ZZ$ and that of the SM Higgs boso…
▽ More
The magnitudes of the couplings of the scalar resonance at 125 GeV with the SM particles are found to be consistent with those of the SM Higgs boson. However, the signs are not experimentally determined in most of the cases, a prime example being that with the $Z$-boson pair. In other words, $κ_Z^h$, the ratio of the couplings of the actual 125 GeV resonance with $ZZ$ and that of the SM Higgs boson with the same, is consistent with both $+1$ and $-1$, the latter being the `wrong-sign'. We argue that the wrong-sign $hZZ$ coupling will necessitate the intervention of new physics below $\mathcal{O}\left(620\right)$ GeV to safeguard the underlying theory from unitarity violation. The strength of the new nonstandard couplings can be derived from the unitarity sum rules, which are comparable to the SM-Higgs couplings in magnitude. Thus the strong limits from the direct searches at the LHC can help us rule out the existence of such nonstandard particles with unusually large couplings thereby disfavoring the possibility of a wrong-sign $hZZ$ coupling.
△ Less
Submitted 14 February, 2024;
originally announced February 2024.
-
DQSSA: A Quantum-Inspired Solution for Maximizing Influence in Online Social Networks (Student Abstract)
Authors:
Aryaman Rao,
Parth Singh,
Dinesh Kumar Vishwakarma,
Mukesh Prasad
Abstract:
Influence Maximization is the task of selecting optimal nodes maximising the influence spread in social networks. This study proposes a Discretized Quantum-based Salp Swarm Algorithm (DQSSA) for optimizing influence diffusion in social networks. By discretizing meta-heuristic algorithms and infusing them with quantum-inspired enhancements, we address issues like premature convergence and low effic…
▽ More
Influence Maximization is the task of selecting optimal nodes maximising the influence spread in social networks. This study proposes a Discretized Quantum-based Salp Swarm Algorithm (DQSSA) for optimizing influence diffusion in social networks. By discretizing meta-heuristic algorithms and infusing them with quantum-inspired enhancements, we address issues like premature convergence and low efficacy. The proposed method, guided by quantum principles, offers a promising solution for Influence Maximisation. Experiments on four real-world datasets reveal DQSSA's superior performance as compared to established cutting-edge algorithms.
△ Less
Submitted 30 November, 2023;
originally announced November 2023.
-
Charge transfer due to defects in hexagonal boron nitride/graphene heterostructures: an ab initio study
Authors:
Madhava Krishna Prasad,
Oras A. Al-Ani,
Jonathan P. Goss,
Jonathan D. Mar
Abstract:
Using density functional theory (DFT), we study charge transfer between hexagonal boron nitride (h-BN) point defects and graphene in h-BN/graphene heterostructures for a range of intrinsic defects -- nitrogen vacancy, boron vacancy, nitrogen antisite and boron antisite. We show that traditional methods that calculate charge transfer by spatial discrimination of charge to different atoms suffer fro…
▽ More
Using density functional theory (DFT), we study charge transfer between hexagonal boron nitride (h-BN) point defects and graphene in h-BN/graphene heterostructures for a range of intrinsic defects -- nitrogen vacancy, boron vacancy, nitrogen antisite and boron antisite. We show that traditional methods that calculate charge transfer by spatial discrimination of charge to different atoms suffer from the misallocation of charge and introduce an alternative method that relies on the integration of the density of states. We also show that DFT calculations of charge transfer have cell size dependencies due to a change in the density of states in the vicinity of the defect levels. Our results indicate that the nitrogen and boron anitsites do not participate in charge transfer, whereas the nitrogen and boron vacancies experience the transfer of a whole electron. Additionally, we show that a change in the geometry of a defect corresponds to a change in the charge state of the defect. The results of our study will be invaluable for a wide variety of device applications that involve charge transfer between h-BN defects and graphene in h-BN/graphene heterostructures, while our methodology can be feasibly extended to a wide range of point defects and heterostructures.
△ Less
Submitted 11 January, 2023;
originally announced January 2023.
-
Science Priorities for the Extraction of the Solid MSR Samples from their Sample Tubes
Authors:
N. Dauphas,
S. S. Russell,
D. Beaty,
F. Thiessen,
J. Barnes,
L. Bonal,
J. Bridges,
T. Bristow,
J. Eiler,
L. Ferriere,
T. Fornaro,
J. Gattacceca,
B. Hoffman,
E. J. Javaux,
T. Kleine,
H. Y. McSween,
M. Prasad,
L. Rampe,
M. Schmidt,
B. Schoene,
K. L. Siebach,
J. Stern,
N. Tosca
Abstract:
Preservation of the chemical and structural integrity of samples that will be brought back from Mars is paramount to achieving the scientific objectives of MSR. Given our knowledge of the nature of the samples retrieved at Jezero by Perseverance, at least two options need to be tested for opening the sample tubes: (1) One or two radial cuts at the end of the tube to slide the sample out. (2) Two r…
▽ More
Preservation of the chemical and structural integrity of samples that will be brought back from Mars is paramount to achieving the scientific objectives of MSR. Given our knowledge of the nature of the samples retrieved at Jezero by Perseverance, at least two options need to be tested for opening the sample tubes: (1) One or two radial cuts at the end of the tube to slide the sample out. (2) Two radial cuts at the ends of the tube and two longitudinal cuts to lift the upper half of the tube and access the sample. Strategy 1 will likely minimize contamination but incurs the risk of affecting the physical integrity of weakly consolidated samples. Strategy 2 will be optimal for preserving the physical integrity of the samples but increases the risk of contamination and mishandling of the sample as more manipulations and additional equipment will be needed. A flexible approach to opening the sample tubes is therefore required, and several options need to be available, depending on the nature of the rock samples returned. Both opening strategies 1 and 2 may need to be available when the samples are returned to handle different sample types (e.g., loosely bound sediments vs. indurated magmatic rocks). This question should be revisited after engineering tests are performed on analogue samples. The MSR sample tubes will have to be opened under stringent BSL4 conditions and this aspect needs to be integrated into the planning.
△ Less
Submitted 11 January, 2023;
originally announced January 2023.
-
SS-CPGAN: Self-Supervised Cut-and-Pasting Generative Adversarial Network for Object Segmentation
Authors:
Kunal Chaturvedi,
Ali Braytee,
Jun Li,
Mukesh Prasad
Abstract:
This paper proposes a novel self-supervised based Cut-and-Paste GAN to perform foreground object segmentation and generate realistic composite images without manual annotations. We accomplish this goal by a simple yet effective self-supervised approach coupled with the U-Net based discriminator. The proposed method extends the ability of the standard discriminators to learn not only the global dat…
▽ More
This paper proposes a novel self-supervised based Cut-and-Paste GAN to perform foreground object segmentation and generate realistic composite images without manual annotations. We accomplish this goal by a simple yet effective self-supervised approach coupled with the U-Net based discriminator. The proposed method extends the ability of the standard discriminators to learn not only the global data representations via classification (real/fake) but also learn semantic and structural information through pseudo labels created using the self-supervised task. The proposed method empowers the generator to create meaningful masks by forcing it to learn informative per-pixel as well as global image feedback from the discriminator. Our experiments demonstrate that our proposed method significantly outperforms the state-of-the-art methods on the standard benchmark datasets.
△ Less
Submitted 4 April, 2023; v1 submitted 1 January, 2023;
originally announced January 2023.
-
Democratic three Higgs-doublet models: the custodial limit and wrong-sign Yukawa
Authors:
Dipankar Das,
Miguel Levy,
Palash B. Pal,
Anugrah M. Prasad,
Ipsita Saha,
Ayushi Srivastava
Abstract:
We study two novel aspects of democratic 3HDMs -- the custodial limit and the possibility of wrong-sign Yukawa couplings. In the custodial limit, the democratic 3HDMs can easily negotiate the constraints from the electroweak $T$-parameter. We also uncover the possibility of having wrong-sign Yukawa couplings in democratic 3HDMs, as in the case of 2HDMs. We show that a democratic 3HDM encompasses a…
▽ More
We study two novel aspects of democratic 3HDMs -- the custodial limit and the possibility of wrong-sign Yukawa couplings. In the custodial limit, the democratic 3HDMs can easily negotiate the constraints from the electroweak $T$-parameter. We also uncover the possibility of having wrong-sign Yukawa couplings in democratic 3HDMs, as in the case of 2HDMs. We show that a democratic 3HDM encompasses all the wrong-sign possibilities entertained by 2HDMs, and has considerably more leeway in the wrong-sign limit as compared to the 2HDM case. Our study underscores the importance of reporting analysis in the kappa-formalism without any implicit assumptions on the signs of the kappas.
△ Less
Submitted 2 March, 2023; v1 submitted 31 December, 2022;
originally announced January 2023.
-
CKS: A Community-based K-shell Decomposition Approach using Community Bridge Nodes for Influence Maximization
Authors:
Inder Khatri,
Aaryan Gupta,
Arjun Choudhry,
Aryan Tyagi,
Dinesh Kumar Vishwakarma,
Mukesh Prasad
Abstract:
Social networks have enabled user-specific advertisements and recommendations on their platforms, which puts a significant focus on Influence Maximisation (IM) for target advertising and related tasks. The aim is to identify nodes in the network which can maximize the spread of information through a diffusion cascade. We propose a community structures-based approach that employs K-Shell algorithm…
▽ More
Social networks have enabled user-specific advertisements and recommendations on their platforms, which puts a significant focus on Influence Maximisation (IM) for target advertising and related tasks. The aim is to identify nodes in the network which can maximize the spread of information through a diffusion cascade. We propose a community structures-based approach that employs K-Shell algorithm with community structures to generate a score for the connections between seed nodes and communities. Further, our approach employs entropy within communities to ensure the proper spread of information within the communities. We validate our approach on four publicly available networks and show its superiority to four state-of-the-art approaches while still being relatively efficient.
△ Less
Submitted 26 November, 2022;
originally announced November 2022.
-
An Emotion-guided Approach to Domain Adaptive Fake News Detection using Adversarial Learning
Authors:
Arkajyoti Chakraborty,
Inder Khatri,
Arjun Choudhry,
Pankaj Gupta,
Dinesh Kumar Vishwakarma,
Mukesh Prasad
Abstract:
Recent works on fake news detection have shown the efficacy of using emotions as a feature for improved performance. However, the cross-domain impact of emotion-guided features for fake news detection still remains an open problem. In this work, we propose an emotion-guided, domain-adaptive, multi-task approach for cross-domain fake news detection, proving the efficacy of emotion-guided models in…
▽ More
Recent works on fake news detection have shown the efficacy of using emotions as a feature for improved performance. However, the cross-domain impact of emotion-guided features for fake news detection still remains an open problem. In this work, we propose an emotion-guided, domain-adaptive, multi-task approach for cross-domain fake news detection, proving the efficacy of emotion-guided models in cross-domain settings for various datasets.
△ Less
Submitted 26 November, 2022;
originally announced November 2022.
-
Emotion-guided Cross-domain Fake News Detection using Adversarial Domain Adaptation
Authors:
Arjun Choudhry,
Inder Khatri,
Arkajyoti Chakraborty,
Dinesh Kumar Vishwakarma,
Mukesh Prasad
Abstract:
Recent works on fake news detection have shown the efficacy of using emotions as a feature or emotions-based features for improved performance. However, the impact of these emotion-guided features for fake news detection in cross-domain settings, where we face the problem of domain shift, is still largely unexplored. In this work, we evaluate the impact of emotion-guided features for cross-domain…
▽ More
Recent works on fake news detection have shown the efficacy of using emotions as a feature or emotions-based features for improved performance. However, the impact of these emotion-guided features for fake news detection in cross-domain settings, where we face the problem of domain shift, is still largely unexplored. In this work, we evaluate the impact of emotion-guided features for cross-domain fake news detection, and further propose an emotion-guided, domain-adaptive approach using adversarial learning. We prove the efficacy of emotion-guided models in cross-domain settings for various combinations of source and target datasets from FakeNewsAMT, Celeb, Politifact and Gossipcop datasets.
△ Less
Submitted 24 November, 2022;
originally announced November 2022.
-
Influence Maximization in Social Networks using Discretized Harris Hawks Optimization Algorithm and Neighbour Scout Strategy
Authors:
Inder Khatri,
Arjun Choudhry,
Aryaman Rao,
Aryan Tyagi,
Dinesh Kumar Vishwakarma,
Mukesh Prasad
Abstract:
Influence Maximization (IM) is the task of determining k optimal influential nodes in a social network to maximize the influence spread using a propagation model. IM is a prominent problem for viral marketing, and helps significantly in social media advertising. However, develo** effective algorithms with minimal time complexity for real-world social networks still remains a challenge. While tra…
▽ More
Influence Maximization (IM) is the task of determining k optimal influential nodes in a social network to maximize the influence spread using a propagation model. IM is a prominent problem for viral marketing, and helps significantly in social media advertising. However, develo** effective algorithms with minimal time complexity for real-world social networks still remains a challenge. While traditional heuristic approaches have been applied for IM, they often result in minimal performance gains over the computationally expensive Greedy-based and Reverse Influence Sampling-based approaches. In this paper, we propose the discretization of the nature-inspired Harris Hawks Optimisation meta-heuristic algorithm using community structures for optimal selection of seed nodes for influence spread. In addition to Harris Hawks intelligence, we employ a neighbour scout strategy algorithm to avoid blindness and enhance the searching ability of the hawks. Further, we use a candidate nodes-based random population initialization approach, and these candidate nodes aid in accelerating the convergence process for the entire populace. We evaluate the efficacy of our proposed DHHO approach on six social networks using the Independent Cascade model for information diffusion. We observe that DHHO is comparable or better than competing meta-heuristic approaches for Influence Maximization across five metrics, and performs noticeably better than competing heuristic approaches.
△ Less
Submitted 17 November, 2022;
originally announced November 2022.
-
A Spreader Ranking Algorithm for Extremely Low-budget Influence Maximization in Social Networks using Community Bridge Nodes
Authors:
Aaryan Gupta,
Inder Khatri,
Arjun Choudhry,
Pranav Chandhok,
Dinesh Kumar Vishwakarma,
Mukesh Prasad
Abstract:
In recent years, social networking platforms have gained significant popularity among the masses like connecting with people and propagating ones thoughts and opinions. This has opened the door to user-specific advertisements and recommendations on these platforms, bringing along a significant focus on Influence Maximisation (IM) on social networks due to its wide applicability in target advertisi…
▽ More
In recent years, social networking platforms have gained significant popularity among the masses like connecting with people and propagating ones thoughts and opinions. This has opened the door to user-specific advertisements and recommendations on these platforms, bringing along a significant focus on Influence Maximisation (IM) on social networks due to its wide applicability in target advertising, viral marketing, and personalized recommendations. The aim of IM is to identify certain nodes in the network which can help maximize the spread of certain information through a diffusion cascade. While several works have been proposed for IM, most were inefficient in exploiting community structures to their full extent. In this work, we propose a community structures-based approach, which employs a K-Shell algorithm in order to generate a score for the connections between seed nodes and communities for low-budget scenarios. Further, our approach employs entropy within communities to ensure the proper spread of information within the communities. We choose the Independent Cascade (IC) model to simulate information spread and evaluate it on four evaluation metrics. We validate our proposed approach on eight publicly available networks and find that it significantly outperforms the baseline approaches on these metrics, while still being relatively efficient.
△ Less
Submitted 17 November, 2022;
originally announced November 2022.
-
The Effectiveness of Social Media Engagement Strategy on Disaster Fundraising
Authors:
Vivek Velivela,
Chahat Raj,
Muhammad Salman Tiwana,
Raj Prasanna,
Mahendra Samarawickrama,
Mukesh Prasad
Abstract:
Social media has been a powerful tool and an integral part of communication, especially during natural disasters. Social media platforms help nonprofits in effective disaster management by disseminating crucial information to various communities at the earliest. Besides spreading information to every corner of the world, various platforms incorporate many features that give access to host online f…
▽ More
Social media has been a powerful tool and an integral part of communication, especially during natural disasters. Social media platforms help nonprofits in effective disaster management by disseminating crucial information to various communities at the earliest. Besides spreading information to every corner of the world, various platforms incorporate many features that give access to host online fundraising events, process online donations, etc. The current literature lacks the theoretical structure investigating the correlation between social media engagement and crisis management. Large nonprofit organisations like the Australian Red Cross have upscaled their operations to help nearly 6,000 bushfire survivors through various grants and helped 21,563 people with psychological support and other assistance through their recovery program (Australian Red Cross, 2021). This paper considers the case of bushfires in Australia 2019-2020 to inspect the role of social media in escalating fundraising via analysing the donation data of the Australian Red Cross from October 2019 - March 2020 and analysing the level of public interaction with their Facebook page and its content in the same period.
△ Less
Submitted 19 October, 2022;
originally announced October 2022.
-
Analysing Donors' Behaviour in Non-profit Organisations for Disaster Resilience: The 2019--2020 Australian Bushfires Case Study
Authors:
Dilini Rajapaksha,
Kacper Sokol,
Jeffrey Chan,
Flora Salim,
Mukesh Prasad,
Mahendra Samarawickrama
Abstract:
With the advancement and proliferation of technology, non-profit organisations have embraced social media platforms to improve their operational capabilities through brand advocacy, among many other strategies. The effect of such social media campaigns on these institutions, however, remains largely underexplored, especially during disaster periods. This work introduces and applies a quantitative…
▽ More
With the advancement and proliferation of technology, non-profit organisations have embraced social media platforms to improve their operational capabilities through brand advocacy, among many other strategies. The effect of such social media campaigns on these institutions, however, remains largely underexplored, especially during disaster periods. This work introduces and applies a quantitative investigative framework to understand how social media influence the behaviour of donors and their usage of these platforms throughout (natural) disasters. More specifically, we explore how on-line engagement -- as captured by Facebook interactions and Google search trends -- corresponds to the donors' behaviour during the catastrophic 2019--2020 Australian bushfire season. To discover this relationship, we analyse the record of donations made to the Australian Red Cross throughout this period. Our exploratory study reveals that social media campaigns are effective in encouraging on-line donations made via a dedicated website. We also compare this mode of giving to more regular, direct deposit gifting.
△ Less
Submitted 14 October, 2022;
originally announced October 2022.
-
Long-ranged spectral correlations in eigenstate phases
Authors:
Mahaveer Prasad,
Abhishodh Prakash,
J. H. Pixley,
Manas Kulkarni
Abstract:
We study non-local measures of spectral correlations and their utility in characterizing and distinguishing between the distinct eigenstate phases of quantum chaotic and many-body localized systems. We focus on two related quantities, the spectral form factor and the density of all spectral gaps, and show that they furnish unique signatures that can be used to sharply identify the two phases. We d…
▽ More
We study non-local measures of spectral correlations and their utility in characterizing and distinguishing between the distinct eigenstate phases of quantum chaotic and many-body localized systems. We focus on two related quantities, the spectral form factor and the density of all spectral gaps, and show that they furnish unique signatures that can be used to sharply identify the two phases. We demonstrate this by numerically studying three one-dimensional quantum spin chain models with (i) quenched disorder, (ii) periodic drive (Floquet), and (iii) quasiperiodic detuning. We also clarify in what ways the signatures are universal and in what ways they are not. More generally, this thorough analysis is expected to play a useful role in classifying phases of disorder systems.
△ Less
Submitted 26 December, 2023; v1 submitted 18 July, 2022;
originally announced July 2022.
-
Transition to chaos in extended systems and their quantum impurity models
Authors:
Mahaveer Prasad,
Hari Kumar Yadalam,
Manas Kulkarni,
Camille Aron
Abstract:
Chaos sets a fundamental limit to quantum-information processing schemes. We study the onset of chaos in spatially extended quantum many-body systems that are relevant to quantum optical devices. We consider an extended version of the Tavis-Cummings model on a finite chain. By studying level-spacing statistics, adjacent gap ratios, and spectral form factors, we observe the transition from integrab…
▽ More
Chaos sets a fundamental limit to quantum-information processing schemes. We study the onset of chaos in spatially extended quantum many-body systems that are relevant to quantum optical devices. We consider an extended version of the Tavis-Cummings model on a finite chain. By studying level-spacing statistics, adjacent gap ratios, and spectral form factors, we observe the transition from integrability to chaos as the hop** between the Tavis-Cummings sites is increased above a finite value. The results are obtained by means of exact numerical diagonalization which becomes notoriously hard for extended lattice geometries. In an attempt to circumvent these difficulties, we identify a minimal single-site quantum impurity model that successfully captures the spectral properties of the lattice model. This approach is intended to be adaptable to other lattice models with large local Hilbert spaces.
△ Less
Submitted 30 November, 2023; v1 submitted 2 May, 2022;
originally announced May 2022.
-
Distributionally Robust Observable Strategic Queues
Authors:
Yijie Wang,
Madhushini Narayana Prasad,
Grani A. Hanasusanto,
John J. Hasenbein
Abstract:
This paper presents an extension of Naor's analysis on the join-or-balk problem in observable M/M/1 queues. While all other Markovian assumptions still hold, we explore this problem assuming uncertain arrival rates under the distributionally robust settings. We first study the problem with the classical moment ambiguity set, where the support, mean, and mean-absolute deviation of the underlying di…
▽ More
This paper presents an extension of Naor's analysis on the join-or-balk problem in observable M/M/1 queues. While all other Markovian assumptions still hold, we explore this problem assuming uncertain arrival rates under the distributionally robust settings. We first study the problem with the classical moment ambiguity set, where the support, mean, and mean-absolute deviation of the underlying distribution are known. Next, we extend the model to the data-driven setting, where decision makers only have access to a finite set of samples. We develop three optimal joining threshold strategies from the perspective of an individual customer, a social optimizer, and a revenue maximizer, such that their respective worst-case expected benefit rates are maximized. Finally, we compare our findings with Naor's original results and the traditional sample average approximation scheme.
△ Less
Submitted 7 April, 2022;
originally announced April 2022.
-
SapientML: Synthesizing Machine Learning Pipelines by Learning from Human-Written Solutions
Authors:
Ripon K. Saha,
Akira Ura,
Sonal Mahajan,
Chenguang Zhu,
Linyi Li,
Yang Hu,
Hiroaki Yoshida,
Sarfraz Khurshid,
Mukul R. Prasad
Abstract:
Automatic machine learning, or AutoML, holds the promise of truly democratizing the use of machine learning (ML), by substantially automating the work of data scientists. However, the huge combinatorial search space of candidate pipelines means that current AutoML techniques, generate sub-optimal pipelines, or none at all, especially on large, complex datasets. In this work we propose an AutoML te…
▽ More
Automatic machine learning, or AutoML, holds the promise of truly democratizing the use of machine learning (ML), by substantially automating the work of data scientists. However, the huge combinatorial search space of candidate pipelines means that current AutoML techniques, generate sub-optimal pipelines, or none at all, especially on large, complex datasets. In this work we propose an AutoML technique SapientML, that can learn from a corpus of existing datasets and their human-written pipelines, and efficiently generate a high-quality pipeline for a predictive task on a new dataset. To combat the search space explosion of AutoML, SapientML employs a novel divide-and-conquer strategy realized as a three-stage program synthesis approach, that reasons on successively smaller search spaces. The first stage uses a machine-learned model to predict a set of plausible ML components to constitute a pipeline. In the second stage, this is then refined into a small pool of viable concrete pipelines using syntactic constraints derived from the corpus and the machine-learned model. Dynamically evaluating these few pipelines, in the third stage, provides the best solution. We instantiate SapientML as part of a fully automated tool-chain that creates a cleaned, labeled learning corpus by mining Kaggle, learns from it, and uses the learned models to then synthesize pipelines for new predictive tasks. We have created a training corpus of 1094 pipelines spanning 170 datasets, and evaluated SapientML on a set of 41 benchmark datasets, including 10 new, large, real-world datasets from Kaggle, and against 3 state-of-the-art AutoML tools and 2 baselines. Our evaluation shows that SapientML produces the best or comparable accuracy on 27 of the benchmarks while the second best tool fails to even produce a pipeline on 9 of the instances.
△ Less
Submitted 19 April, 2022; v1 submitted 18 February, 2022;
originally announced February 2022.
-
Providing Real-time Assistance for Repairing Runtime Exceptions using Stack Overflow Posts
Authors:
Sonal Mahajan,
Mukul R. Prasad
Abstract:
Runtime Exceptions (REs) are an important class of bugs that occur frequently during code development. Traditional Automatic Program Repair (APR) tools are of limited use in this "in-development" use case, since they require a test-suite to be available as a patching oracle. Thus, developers typically tend to manually resolve their in-development REs, often by referring to technical forums, such a…
▽ More
Runtime Exceptions (REs) are an important class of bugs that occur frequently during code development. Traditional Automatic Program Repair (APR) tools are of limited use in this "in-development" use case, since they require a test-suite to be available as a patching oracle. Thus, developers typically tend to manually resolve their in-development REs, often by referring to technical forums, such as Stack Overflow (SO). To automate this manual process we extend our previous work, MAESTRO, to provide real-time assistance to developers for repairing Java REs by recommending a relevant patch-suggesting SO post and synthesizing a repair patch from this post to fix the RE in the developer's code. MAESTRO exploits a library of Runtime Exception Patterns (REPs) semi-automatically mined from SO posts, through a relatively inexpensive, one-time, incremental process. An REP is an abstracted sequence of statements that triggers a given RE. REPs are used to index SO posts, retrieve a post most relevant to the RE instance exhibited by a developer's code and then mediate the process of extracting a concrete repair from the SO post, abstracting out post-specific details, and concretizing the repair to the developer's buggy code. We evaluate MAESTRO on a published RE benchmark comprised of 78 instances. MAESTRO is able to generate a correct repair patch at the top position in 27% of the cases, within the top-3 in 40% of the cases and overall return a useful artifact in 81% of the cases. Further, the use of REPs proves instrumental to all aspects of MAESTRO's performance, from ranking and searching of SO posts to synthesizing patches from a given post. In particular, 45% of correct patches generated by MAESTRO could not be produced by a baseline technique not using REPs, even when provided with MAESTRO's SO-post ranking. MAESTRO is also fast, needing around 1 second, on average, to generate its output.
△ Less
Submitted 9 February, 2022;
originally announced February 2022.
-
Elixir: Effective object-oriented program repair
Authors:
Ripon K. Saha,
Yingjun Lyu,
Hiroaki Yoshida,
Mukul R. Prasad
Abstract:
This work is motivated by the pervasive use of method invocations in object-oriented (OO) programs, and indeed their prevalence in patches of OO-program bugs. We propose a generate-and-validate repair technique, called ELIXIR designed to be able to generate such patches. ELIXIR aggressively uses method calls, on par with local variables, fields, or constants, to construct more expressive repair-ex…
▽ More
This work is motivated by the pervasive use of method invocations in object-oriented (OO) programs, and indeed their prevalence in patches of OO-program bugs. We propose a generate-and-validate repair technique, called ELIXIR designed to be able to generate such patches. ELIXIR aggressively uses method calls, on par with local variables, fields, or constants, to construct more expressive repair-expressions, that go into synthesizing patches. The ensuing enlargement of the repair space, on account of the wider use of method calls, is effectively tackled by using a machine-learnt model to rank concrete repairs. The machine-learnt model relies on four features derived from the program context, i.e., the code surrounding the potential repair location, and the bug report. We implement ELIXIR and evaluate it on two datasets, the popular Defects4J dataset and a new dataset Bugs.jar created by us, and against 2 baseline versions of our technique, and 5 other techniques representing the state of the art in program repair. Our evaluation shows that ELIXIR is able to increase the number of correctly repaired bugs in Defects4J by 85% (from 14 to 26) and by 57% in Bugs.jar (from 14 to 22), while also significantly out-performing other state-of-the-art repair techniques including ACS, HD-Repair, NOPOL, PAR, and jGenProg.
△ Less
Submitted 20 December, 2021;
originally announced December 2021.
-
Dissipative quantum dynamics, phase transitions and non-Hermitian random matrices
Authors:
Mahaveer Prasad,
Hari Kumar Yadalam,
Camille Aron,
Manas Kulkarni
Abstract:
We explore the connections between dissipative quantum phase transitions and non-Hermitian random matrix theory. For this, we work in the framework of the dissipative Dicke model which is archetypal of symmetry-breaking phase transitions in open quantum systems. We establish that the Liouvillian describing the quantum dynamics exhibits distinct spectral features of integrable and chaotic character…
▽ More
We explore the connections between dissipative quantum phase transitions and non-Hermitian random matrix theory. For this, we work in the framework of the dissipative Dicke model which is archetypal of symmetry-breaking phase transitions in open quantum systems. We establish that the Liouvillian describing the quantum dynamics exhibits distinct spectral features of integrable and chaotic character on the two sides of the critical point. We follow the distribution of the spacings of the complex Liouvillian eigenvalues across the critical point. In the normal and superradiant phases, the distributions are $2D$ Poisson and that of the Ginibre Unitary random matrix ensemble, respectively. Our results are corroborated by computing a recently introduced complex-plane generalization of the consecutive level-spacing ratio distribution. Our approach can be readily adapted for classifying the nature of quantum dynamics across dissipative critical points in other open quantum systems.
△ Less
Submitted 10 December, 2021;
originally announced December 2021.
-
On the utility of power spectral techniques with feature selection techniques for effective mental task classification in noninvasive BCI
Authors:
Akshansh Gupta,
Ramesh Kumar Agrawal,
Jyoti Singh Kirar,
Javier Andreu-Perez,
Wei-** Ding,
Chin-Teng Lin,
Mukesh Prasad
Abstract:
In this paper classification of mental task-root Brain-Computer Interfaces (BCI) is being investigated, as those are a dominant area of investigations in BCI and are of utmost interest as these systems can be augmented life of people having severe disabilities. The BCI model's performance is primarily dependent on the size of the feature vector, which is obtained through multiple channels. In the…
▽ More
In this paper classification of mental task-root Brain-Computer Interfaces (BCI) is being investigated, as those are a dominant area of investigations in BCI and are of utmost interest as these systems can be augmented life of people having severe disabilities. The BCI model's performance is primarily dependent on the size of the feature vector, which is obtained through multiple channels. In the case of mental task classification, the availability of training samples to features are minimal. Very often, feature selection is used to increase the ratio for the mental task classification by getting rid of irrelevant and superfluous features. This paper proposes an approach to select relevant and non-redundant spectral features for the mental task classification. This can be done by using four very known multivariate feature selection methods viz, Bhattacharya's Distance, Ratio of Scatter Matrices, Linear Regression and Minimum Redundancy & Maximum Relevance. This work also deals with a comparative analysis of multivariate and univariate feature selection for mental task classification. After applying the above-stated method, the findings demonstrate substantial improvements in the performance of the learning model for mental task classification. Moreover, the efficacy of the proposed approach is endorsed by carrying out a robust ranking algorithm and Friedman's statistical test for finding the best combinations and comparing different combinations of power spectral density and feature selection methods.
△ Less
Submitted 15 November, 2021;
originally announced November 2021.
-
Q&A MAESTRO: Q&A Post Recommendation for Fixing Java Runtime Exceptions
Authors:
Yusuke Kimura,
Takumi Akazaki,
Shinji Kikuchi,
Sonal Mahajan,
Mukul R. Prasad
Abstract:
Programmers often use Q&A sites (e.g., Stack Overflow) to understand a root cause of program bugs. Runtime exceptions is one of such important class of bugs that is actively discussed on Stack Overflow. However, it may be difficult for beginner programmers to come up with appropriate keywords for search. Moreover, they need to switch their attentions between IDE and browser, and it is time-consumi…
▽ More
Programmers often use Q&A sites (e.g., Stack Overflow) to understand a root cause of program bugs. Runtime exceptions is one of such important class of bugs that is actively discussed on Stack Overflow. However, it may be difficult for beginner programmers to come up with appropriate keywords for search. Moreover, they need to switch their attentions between IDE and browser, and it is time-consuming. To overcome these difficulties, we proposed a method, ``Q&A MAESTRO'', to find suitable Q&A posts automatically for Java runtime exception by utilizing structure information of codes described in programming Q&A website. In this paper, we describe a usage scenario of IDE-plugin, the architecture and user interface of the implementation, and results of user studies. A video is available at https://youtu.be/4X24jJrMUVw. A demo software is available at https://github.com/FujitsuLaboratories/Q-A-MAESTRO.
△ Less
Submitted 23 August, 2021;
originally announced August 2021.
-
Stock Market Analysis with Text Data: A Review
Authors:
Kamaladdin Fataliyev,
Aneesh Chivukula,
Mukesh Prasad,
Wei Liu
Abstract:
Stock market movements are influenced by public and private information shared through news articles, company reports, and social media discussions. Analyzing these vast sources of data can give market participants an edge to make profit. However, the majority of the studies in the literature are based on traditional approaches that come short in analyzing unstructured, vast textual data. In this…
▽ More
Stock market movements are influenced by public and private information shared through news articles, company reports, and social media discussions. Analyzing these vast sources of data can give market participants an edge to make profit. However, the majority of the studies in the literature are based on traditional approaches that come short in analyzing unstructured, vast textual data. In this study, we provide a review on the immense amount of existing literature of text-based stock market analysis. We present input data types and cover main textual data sources and variations. Feature representation techniques are then presented. Then, we cover the analysis techniques and create a taxonomy of the main stock market forecast models. Importantly, we discuss representative work in each category of the taxonomy, analyzing their respective contributions. Finally, this paper shows the findings on unaddressed open problems and gives suggestions for future work. The aim of this study is to survey the main stock market analysis models, text representation techniques for financial market prediction, shortcomings of existing techniques, and propose promising directions for future research.
△ Less
Submitted 8 July, 2021; v1 submitted 23 June, 2021;
originally announced June 2021.
-
Anisotropic magnetotransport in LaAlO$_3$/SrTiO$_3$ nanostructures
Authors:
M. S. Prasad,
G. Schmidt
Abstract:
A number of recent studies indicate that the charge conduction of the LaAlO$_3$/SrTiO$_3$ interface at low temperature is confined to filaments which are linked to structural domain walls in the SrTiO$_3$ with drastic consequences for example for the temperature dependence of local transport properties. We demonstrate that as a consequences of this current carrying filaments on the nano-scale the…
▽ More
A number of recent studies indicate that the charge conduction of the LaAlO$_3$/SrTiO$_3$ interface at low temperature is confined to filaments which are linked to structural domain walls in the SrTiO$_3$ with drastic consequences for example for the temperature dependence of local transport properties. We demonstrate that as a consequences of this current carrying filaments on the nano-scale the magnetotransport properties of the interface are highly anisotropic. Our magnetoresistance measurements reveal that the magnetoresistance in different nanostructures ($<500nm$) is random in magnitude and sign, respectively. Warming up nanostructures above the structural phase transition temperature (105K) results in the significant change in MR. Even a sign change of the magnetoresistance is possible. The results suggest that domain walls that are differently oriented with respect to the surface exhibit different respective magnetoresistance and the total magnetoresistance is a result of a random domain wall pattern formed during the structural phase transition in the SrTiO$_3$ at cool down.
△ Less
Submitted 31 March, 2021;
originally announced March 2021.
-
Formation of tungsten carbide by focused ion beam process: A route to high magnetic field resilient patterned superconducting nanostructures
Authors:
Himadri Chakraborti,
Bhanu P Joshi,
Chanchal K. Barman,
Aditya K. Jain,
Buddhadeb Pal,
Bikash C. Barik,
Tanmay Maiti,
Rüdiger Schott,
M. J. N. V. Prasad,
S. Dhar,
Hridis K. Pal,
Aftab Alam,
K. Das Gupta
Abstract:
A scale for magnetic field resilience of a superconductor is set by the paramagnetic limit. Comparing the condensation energy of the Bardeen-Cooper-Schrieffer (BCS) singlet ground state with the paramagnetically polarised state suggests that for an applied field ${μ_0}H > 1.8~T_c$ (in SI), singlet pairing is not energetically favourable. Materials exceeding or approaching this limit are interestin…
▽ More
A scale for magnetic field resilience of a superconductor is set by the paramagnetic limit. Comparing the condensation energy of the Bardeen-Cooper-Schrieffer (BCS) singlet ground state with the paramagnetically polarised state suggests that for an applied field ${μ_0}H > 1.8~T_c$ (in SI), singlet pairing is not energetically favourable. Materials exceeding or approaching this limit are interesting from fundamental and technological perspectives. This may be a potential indicator of triplet superconductivity, Fulde-Ferrell-Larkin-Ovchinnikov (FFLO) pairing and other mechanisms involving topological aspects of surface states, and also allow Cooper pair injection at high magnetic fields. We have analysed the microscopic composition of such a material arising from an unexpected source. A microjet of an organo-metallic gas, $\rm {W[(CO)_6]}$ can be decomposed by gallium ion-beam, leaving behind a track of complex residue of gallium, tungsten and carbon with remarkable superconducting properties, like an upper critical field, $H_{c2} > 10~{\rm T} $, above its paramagnetic limit. We carried out Atomic probe tomography to establish the formation of nano-crystalline tungsten carbide (WC) in the tracks and the absence of free tungsten. Supporting calculations show for Ga distributed on the surface of WC, its s,p-orbitals enhance the density of states near the Fermi energy. The observed variation of $H_{c2}(T)$ does not show features typical of enhancement of critical field due to granularity. Our observations may be significant in the context of some recent theoretical calculation of the band structure of WC and experimental observation of superconductivity in WC-metal interface.
△ Less
Submitted 30 March, 2022; v1 submitted 17 March, 2021;
originally announced March 2021.
-
Mining Large-Scale Low-Resource Pronunciation Data From Wikipedia
Authors:
Tania Chakraborty,
Manasa Prasad,
Theresa Breiner,
Sandy Ritchie,
Daan van Esch
Abstract:
Pronunciation modeling is a key task for building speech technology in new languages, and while solid grapheme-to-phoneme (G2P) map** systems exist, language coverage can stand to be improved. The information needed to build G2P models for many more languages can easily be found on Wikipedia, but unfortunately, it is stored in disparate formats. We report on a system we built to mine a pronuncia…
▽ More
Pronunciation modeling is a key task for building speech technology in new languages, and while solid grapheme-to-phoneme (G2P) map** systems exist, language coverage can stand to be improved. The information needed to build G2P models for many more languages can easily be found on Wikipedia, but unfortunately, it is stored in disparate formats. We report on a system we built to mine a pronunciation data set in 819 languages from loosely structured tables within Wikipedia. The data includes phoneme inventories, and for 63 low-resource languages, also includes the grapheme-to-phoneme (G2P) map**. 54 of these languages do not have easily findable G2P map**s online otherwise. We turned the information from Wikipedia into a structured, machine-readable TSV format, and make the resulting data set publicly available so it can be improved further and used in a variety of applications involving low-resource languages.
△ Less
Submitted 27 January, 2021;
originally announced January 2021.
-
A Comprehensive Survey on Word Representation Models: From Classical to State-Of-The-Art Word Representation Language Models
Authors:
Usman Naseem,
Imran Razzak,
Shah Khalid Khan,
Mukesh Prasad
Abstract:
Word representation has always been an important research area in the history of natural language processing (NLP). Understanding such complex text data is imperative, given that it is rich in information and can be used widely across various applications. In this survey, we explore different word representation models and its power of expression, from the classical to modern-day state-of-the-art…
▽ More
Word representation has always been an important research area in the history of natural language processing (NLP). Understanding such complex text data is imperative, given that it is rich in information and can be used widely across various applications. In this survey, we explore different word representation models and its power of expression, from the classical to modern-day state-of-the-art word representation language models (LMS). We describe a variety of text representation methods, and model designs have blossomed in the context of NLP, including SOTA LMs. These models can transform large volumes of text into effective vector representations capturing the same semantic information. Further, such representations can be utilized by various machine learning (ML) algorithms for a variety of NLP related tasks. In the end, this survey briefly discusses the commonly used ML and DL based classifiers, evaluation metrics and the applications of these word embeddings in different NLP tasks.
△ Less
Submitted 28 October, 2020;
originally announced October 2020.
-
Recommending Stack Overflow Posts for Fixing Runtime Exceptions using Failure Scenario Matching
Authors:
Sonal Mahajan,
Negarsadat Abolhassani,
Mukul R. Prasad
Abstract:
Using online Q&A forums, such as Stack Overflow (SO), for guidance to resolve program bugs, among other development issues, is commonplace in modern software development practice. Runtime exceptions (RE) is one such important class of bugs that is actively discussed on SO. In this work we present a technique and prototype tool called MAESTRO that can automatically recommend an SO post that is most…
▽ More
Using online Q&A forums, such as Stack Overflow (SO), for guidance to resolve program bugs, among other development issues, is commonplace in modern software development practice. Runtime exceptions (RE) is one such important class of bugs that is actively discussed on SO. In this work we present a technique and prototype tool called MAESTRO that can automatically recommend an SO post that is most relevant to a given Java RE in a developer's code. MAESTRO compares the exception-generating program scenario in the developer's code with that discussed in an SO post and returns the post with the closest match. To extract and compare the exception scenario effectively, MAESTRO first uses the answer code snippets in a post to implicate a subset of lines in the post's question code snippet as responsible for the exception and then compares these lines with the developer's code in terms of their respective Abstract Program Graph (APG) representations. The APG is a simplified and abstracted derivative of an abstract syntax tree, proposed in this work, that allows an effective comparison of the functionality embodied in the high-level program structure, while discarding many of the low-level syntactic or semantic differences. We evaluate MAESTRO on a benchmark of 78 instances of Java REs extracted from the top 500 Java projects on GitHub and show that MAESTRO can return either a highly relevant or somewhat relevant SO post corresponding to the exception instance in 71% of the cases, compared to relevant posts returned in only 8% - 44% instances, by four competitor tools based on state-of-the-art techniques. We also conduct a user experience study of MAESTRO with 10 Java developers, where the participants judge MAESTRO reporting a highly relevant or somewhat relevant post in 80% of the instances. In some cases the post is judged to be even better than the one manually found by the participant.
△ Less
Submitted 21 September, 2020;
originally announced September 2020.
-
Computer and Network Security
Authors:
Jaydip Sen,
Sidra Mehtab,
Michael Ekonde Sone,
Veeramreddy Jyothsna,
Koneti Munivara Prasad,
Rajeev Singh,
Teek Parval Sharma,
Anton Noskov,
Ignacio Velasquez,
Angelica Caro,
Alfonco Rodriguez,
Tamer S. A. Fatayer,
Altaf O. Mulani,
Pradeep B. Mane,
Roshan Chitrakar,
Roshan Bhusal,
Prajwol Maharjan
Abstract:
In the era of Internet of Things and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis and storage of such humongous volume of data, several new challenges are faced in protecting privacy of sensitive data and securing systems by designing novel schemes for secure authentication, integrity protection, encryption and non-repudiation. Lightwei…
▽ More
In the era of Internet of Things and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis and storage of such humongous volume of data, several new challenges are faced in protecting privacy of sensitive data and securing systems by designing novel schemes for secure authentication, integrity protection, encryption and non-repudiation. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents some of the state-of-the-art research work in the field of cryptography and security in computing and communications. It is a valuable source of knowledge for researchers, engineers, practitioners, graduate and doctoral students who are working in the field of cryptography, network security and security and privacy issues in the Internet of Things (IoT), and machine learning application in security. It will also be useful for faculty members of graduate schools and universities.
△ Less
Submitted 31 July, 2020;
originally announced July 2020.
-
Optical Forces in Coupled Chiral Particles
Authors:
Kah Jen Wo,
Jie Peng,
Madhava Krishna Prasad,
Yuzhi Shi,
Jensen Li,
Shubo Wang
Abstract:
Structural chirality can induce counter-intuitive optical forces due to inherent symmetry properties. While optical forces on a single chiral particle in the Rayleigh regime have been well studied, optical forces in coupled chiral particles remain less explored. By using full-wave numerical simulations and analytical methods of source representation and coupled mode theory, we investigated the opt…
▽ More
Structural chirality can induce counter-intuitive optical forces due to inherent symmetry properties. While optical forces on a single chiral particle in the Rayleigh regime have been well studied, optical forces in coupled chiral particles remain less explored. By using full-wave numerical simulations and analytical methods of source representation and coupled mode theory, we investigated the optical forces induced by a plane wave on two chiral particles coupling with each other via the evanescent near fields. We found that the induced electric and magnetic dipoles of the chiral particles have complicated couplings that give rise to dark and bright modes. The interaction force between the particles can be either attractive or repulsive, and its magnitude can be significantly enhanced by the resonance modes. The attractive force is much stronger if two particles are of opposite handedness compared with the case of same handedness. The electric dipole force and the magnetic dipole force have the same sign for two particles with the same handedness, while they are of different signs for two particles with opposite handedness. The results can lead to a better understanding of chirality-induced optical forces with potential applications in optical manipulations and chiral light-matter interactions.
△ Less
Submitted 24 July, 2020;
originally announced July 2020.
-
Writing Across the World's Languages: Deep Internationalization for Gboard, the Google Keyboard
Authors:
Daan van Esch,
Elnaz Sarbar,
Tamar Lucassen,
Jeremy O'Brien,
Theresa Breiner,
Manasa Prasad,
Evan Crew,
Chieu Nguyen,
Françoise Beaufays
Abstract:
This technical report describes our deep internationalization program for Gboard, the Google Keyboard. Today, Gboard supports 900+ language varieties across 70+ writing systems, and this report describes how and why we have been adding support for hundreds of language varieties from around the globe. Many languages of the world are increasingly used in writing on an everyday basis, and we describe…
▽ More
This technical report describes our deep internationalization program for Gboard, the Google Keyboard. Today, Gboard supports 900+ language varieties across 70+ writing systems, and this report describes how and why we have been adding support for hundreds of language varieties from around the globe. Many languages of the world are increasingly used in writing on an everyday basis, and we describe the trends we see. We cover technological and logistical challenges in scaling up a language technology product like Gboard to hundreds of language varieties, and describe how we built systems and processes to operate at scale. Finally, we summarize the key take-aways from user studies we ran with speakers of hundreds of languages from around the world.
△ Less
Submitted 3 December, 2019;
originally announced December 2019.
-
A Geometry-Sensitive Approach for Photographic Style Classification
Authors:
Koustav Ghosal,
Mukta Prasad,
Aljosa Smolic
Abstract:
Photographs are characterized by different compositional attributes like the Rule of Thirds, depth of field, vanishing-lines etc. The presence or absence of one or more of these attributes contributes to the overall artistic value of an image. In this work, we analyze the ability of deep learning based methods to learn such photographic style attributes. We observe that although a standard CNN lea…
▽ More
Photographs are characterized by different compositional attributes like the Rule of Thirds, depth of field, vanishing-lines etc. The presence or absence of one or more of these attributes contributes to the overall artistic value of an image. In this work, we analyze the ability of deep learning based methods to learn such photographic style attributes. We observe that although a standard CNN learns the texture and appearance based features reasonably well, its understanding of global and geometric features is limited by two factors. First, the data-augmentation strategies (crop**, war**, etc.) distort the composition of a photograph and affect the performance. Secondly, the CNN features, in principle, are translation-invariant and appearance-dependent. But some geometric properties important for aesthetics, e.g. the Rule of Thirds (RoT), are position-dependent and appearance-invariant. Therefore, we propose a novel input representation which is geometry-sensitive, position-cognizant and appearance-invariant. We further introduce a two-column CNN architecture that performs better than the state-of-the-art (SoA) in photographic style classification. From our results, we observe that the proposed network learns both the geometric and appearance-based attributes better than the SoA.
△ Less
Submitted 3 September, 2019;
originally announced September 2019.
-
A Precise and Expressive Lattice-theoretical Framework for Efficient Network Verification
Authors:
Alex Horn,
Ali Kheradmand,
Mukul R. Prasad
Abstract:
Network verification promises to detect errors, such as black holes and forwarding loops, by logically analyzing the control or data plane. To do so efficiently, the state-of-the-art (e.g., Veriflow) partitions packet headers with identical forwarding behavior into the same packet equivalence class (PEC).
Recently, Yang and Lam showed how to construct the minimal set of PECs, called atomic predi…
▽ More
Network verification promises to detect errors, such as black holes and forwarding loops, by logically analyzing the control or data plane. To do so efficiently, the state-of-the-art (e.g., Veriflow) partitions packet headers with identical forwarding behavior into the same packet equivalence class (PEC).
Recently, Yang and Lam showed how to construct the minimal set of PECs, called atomic predicates. Their construction uses Binary Decision Diagrams (BDDs). However, BDDs have been shown to incur significant overhead per packet header bit, performing poorly when analyzing large-scale data centers. The overhead of atomic predicates prompted ddNF to devise a specialized data structure of Ternary Bit Vectors (TBV) instead.
However, TBVs are strictly less expressive than BDDs. Moreover, unlike atomic predicates, ddNF's set of PECs is not minimal. We show that ddNF's non-minimality is due to empty PECs. In addition, empty PECs are shown to trigger wrong analysis results. This reveals an inherent tension between precision, expressiveness and performance in formal network verification.
Our paper resolves this tension through a new lattice-theoretical PEC-construction algorithm, #PEC, that advances the field as follows: (i) #PEC can encode more kinds of forwarding rules (e.g., ip-tables) than ddNF and Veriflow, (ii) #PEC verifies a wider class of errors (e.g., shadowed rules) than ddNF, and (iii) on a broad range of real-world datasets, #PEC is 10X faster than atomic predicates. By achieving precision, expressiveness and performance, this paper answers a longstanding quest that has spanned three generations of formal network analysis techniques.
△ Less
Submitted 23 August, 2019;
originally announced August 2019.
-
Harnessing Evolution for Multi-Hunk Program Repair
Authors:
Seemanta Saha,
Ripon K. Saha,
Mukul R. Prasad
Abstract:
Despite significant advances in automatic program repair (APR)techniques over the past decade, practical deployment remains an elusive goal. One of the important challenges in this regard is the general inability of current APR techniques to produce patches that require edits in multiple locations, i.e., multi-hunk patches. In this work, we present a novel APR technique that generalizes single-hun…
▽ More
Despite significant advances in automatic program repair (APR)techniques over the past decade, practical deployment remains an elusive goal. One of the important challenges in this regard is the general inability of current APR techniques to produce patches that require edits in multiple locations, i.e., multi-hunk patches. In this work, we present a novel APR technique that generalizes single-hunk repair techniques to include an important class of multi-hunk bugs, namely bugs that may require applying a substantially similar patch at a number of locations. We term such sets of repair locations as evolutionary siblings - similar looking code, instantiated in similar contexts, that are expected to undergo similar changes. At the heart of our proposed method is an analysis to accurately identify a set of evolutionary siblings, for a given bug. This analysis leverages three distinct sources of information, namely the test-suite spectrum, a novel code similarity analysis, and the revision history of the project. The discovered siblings are then simultaneously repaired in a similar fashion. We instantiate this technique in a tool called Hercules and demonstrate that it is able to correctly fix 49 bugs in the Defects4J dataset, the highest of any individual APR technique to date. This includes 15 multi-hunk bugs and overall 13 bugs which have not been fixed by any other technique so far.
△ Less
Submitted 20 June, 2019;
originally announced June 2019.
-
Preference Neural Network
Authors:
Ayman Elgharabawy,
Mukesh Prasad,
Chin-Teng Lin
Abstract:
This paper proposes a preference neural network (PNN) to address the problem of indifference preferences orders with new activation function. PNN also solves the Multi-label ranking problem, where labels may have indifference preference orders or subgroups are equally ranked. PNN follows a multi-layer feedforward architecture with fully connected neurons. Each neuron contains a novel smooth stairs…
▽ More
This paper proposes a preference neural network (PNN) to address the problem of indifference preferences orders with new activation function. PNN also solves the Multi-label ranking problem, where labels may have indifference preference orders or subgroups are equally ranked. PNN follows a multi-layer feedforward architecture with fully connected neurons. Each neuron contains a novel smooth stairstep activation function based on the number of preference orders. PNN inputs represent data features and output neurons represent label indexes. The proposed PNN is evaluated using new preference mining dataset that contains repeated label values which have not experimented before. PNN outperforms five previously proposed methods for strict label ranking in terms of accurate results with high computational efficiency.
△ Less
Submitted 18 April, 2023; v1 submitted 4 April, 2019;
originally announced April 2019.
-
Direction of Arrival Estimation for Nanoscale Sensor Networks
Authors:
Shree M. Prasad,
Trilochan Panigrahi,
Mahbub Hassan
Abstract:
Nanoscale wireless sensor networks (NWSNs) could be within reach soon using graphene-based antennas, which resonate in 0.1-10 terahertz band. To conserve the limited energy available at nanoscale, it is expected that NWSNs will communicate using extremely short pulses on the order of femtoseconds. Accurate estimation of direction of arrival (DOA) for such terahertz pulses will help realize many us…
▽ More
Nanoscale wireless sensor networks (NWSNs) could be within reach soon using graphene-based antennas, which resonate in 0.1-10 terahertz band. To conserve the limited energy available at nanoscale, it is expected that NWSNs will communicate using extremely short pulses on the order of femtoseconds. Accurate estimation of direction of arrival (DOA) for such terahertz pulses will help realize many useful applications for NWSNs. In this paper, using the well-known MUltiple SIgnal Classification (MUSIC) algorithm, we study DOA estimation for NWSNs for different energy levels, distances, pulse shapes, and frequencies. Our analyses reveal that the best DOA estimation is achieved with the first order Gaussian pulses, which emit their peak energy at 6 THz. Based on Monte Carlo simulations, we demonstrate that MUSIC algorithm is capable of estimating DOA with root mean square error less than one degree from a distance of around 6 meter for pulse energy as little as 1 atto Joule.
△ Less
Submitted 12 July, 2018;
originally announced July 2018.
-
Tensor Decomposition for EEG Signal Retrieval
Authors:
Zehong Cao,
Mukesh Prasad,
M. Tanveer,
Chin-Teng Lin
Abstract:
Prior studies have proposed methods to recover multi-channel electroencephalography (EEG) signal ensembles from their partially sampled entries. These methods depend on spatial scenarios, yet few approaches aiming to a temporal reconstruction with lower loss. The goal of this study is to retrieve the temporal EEG signals independently which was overlooked in data pre-processing. We considered EEG…
▽ More
Prior studies have proposed methods to recover multi-channel electroencephalography (EEG) signal ensembles from their partially sampled entries. These methods depend on spatial scenarios, yet few approaches aiming to a temporal reconstruction with lower loss. The goal of this study is to retrieve the temporal EEG signals independently which was overlooked in data pre-processing. We considered EEG signals are im**ing on tensor-based approach, named nonlinear Canonical Polyadic Decomposition (CPD). In this study, we collected EEG signals during a resting-state task. Then, we defined that the source signals are original EEG signals and the generated tensor is perturbed by Gaussian noise with a signal-to-noise ratio of 0 dB. The sources are separated using a basic non-negative CPD and the relative errors on the estimates of the factor matrices. Comparing the similarities between the source signals and their recovered versions, the results showed significantly high correlation over 95%. Our findings reveal the possibility of recoverable temporal signals in EEG applications.
△ Less
Submitted 29 June, 2019; v1 submitted 4 July, 2018;
originally announced July 2018.
-
Leakage Processes in Damaged Shale: In Situ Measurements of Permeability, CO$_2$-Sorption Behavior and Acoustic Properties
Authors:
J. William Carey,
Ronny Pini,
Manika Prasad,
Luke P. Frash,
Sanyog Kumar
Abstract:
Caprock integrity is one of the chief concerns in the successful development of a CO$_2$ storage site. In this chapter, we provide an overview of the permeability of fractured shale, the potential for mitigation of CO$_2$ leakage by sorption to shale, and the detection by acoustic methods of CO$_2$ infiltration into shale. Although significant concerns have been raised about the potential for indu…
▽ More
Caprock integrity is one of the chief concerns in the successful development of a CO$_2$ storage site. In this chapter, we provide an overview of the permeability of fractured shale, the potential for mitigation of CO$_2$ leakage by sorption to shale, and the detection by acoustic methods of CO$_2$ infiltration into shale. Although significant concerns have been raised about the potential for induced seismicity to damage caprock, relatively little is known about the permeability of the damaged shale. We present a summary of recent experimental work that shows profound differences in permeability of up to three orders of magnitude between brittle and ductile fracture permeability. In the ductile regime, it is possible that shale caprock could accommodate deformation without a significant loss of CO$_2$ from the storage reservoir. In cases where CO$_2$ does migrate through damaged shale caprock, CO$_2$ sorption onto shale mineralogy may have a mitigating impact. Measured total storage capacities range from 1 to 45 kg-CO$_2$/tonne-shale. Once CO$_2$ is in the caprock, changes in the acoustic properties of CO$_2$-saturated shale that are predicted by Gassmann fluid substitution calculations show a significant reduction of the bulk modulus of CO$_2$-saturated shale.
△ Less
Submitted 8 November, 2017;
originally announced November 2017.
-
Improved Conic Reformulations for K-means Clustering
Authors:
Madhushini Narayana Prasad,
Grani A. Hanasusanto
Abstract:
In this paper, we show that the popular K-means clustering problem can equivalently be reformulated as a conic program of polynomial size. The arising convex optimization problem is NP-hard, but amenable to a tractable semidefinite programming (SDP) relaxation that is tighter than the current SDP relaxation schemes in the literature. In contrast to the existing schemes, our proposed SDP formulatio…
▽ More
In this paper, we show that the popular K-means clustering problem can equivalently be reformulated as a conic program of polynomial size. The arising convex optimization problem is NP-hard, but amenable to a tractable semidefinite programming (SDP) relaxation that is tighter than the current SDP relaxation schemes in the literature. In contrast to the existing schemes, our proposed SDP formulation gives rise to solutions that can be leveraged to identify the clusters. We devise a new approximation algorithm for K-means clustering that utilizes the improved formulation and empirically illustrate its superiority over the state-of-the-art solution schemes.
△ Less
Submitted 20 July, 2018; v1 submitted 21 June, 2017;
originally announced June 2017.
-
Delta-net: Real-time Network Verification Using Atoms
Authors:
Alex Horn,
Ali Kheradmand,
Mukul R. Prasad
Abstract:
Real-time network verification promises to automatically detect violations of network-wide reachability invariants on the data plane. To be useful in practice, these violations need to be detected in the order of milliseconds, without raising false alarms. To date, most real-time data plane checkers address this problem by exploiting at least one of the following two observations: (i) only small p…
▽ More
Real-time network verification promises to automatically detect violations of network-wide reachability invariants on the data plane. To be useful in practice, these violations need to be detected in the order of milliseconds, without raising false alarms. To date, most real-time data plane checkers address this problem by exploiting at least one of the following two observations: (i) only small parts of the network tend to be affected by typical changes to the data plane, and (ii) many different packets tend to share the same forwarding behaviour in the entire network. This paper shows how to effectively exploit a third characteristic of the problem, namely: similarity among forwarding behaviour of packets through parts of the network, rather than its entirety. We propose the first provably amortized quasi-linear algorithm to do so. We implement our algorithm in a new real-time data plane checker, Delta-net. Our experiments with SDN-IP, a globally deployed ONOS software-defined networking application, and several hundred million IP prefix rules generated using topologies and BGP updates from real-world deployed networks, show that Delta-net checks a rule insertion or removal in approximately 40 microseconds on average, a more than 10X improvement over the state-of-the-art. We also show that Delta-net eliminates an inherent bottleneck in the state-of-the-art that restricts its use in answering Datalog-style "what if" queries.
△ Less
Submitted 23 February, 2017;
originally announced February 2017.
-
Graph Directed Coalescence Hidden Variable Fractal Interpolation Functions
Authors:
Md. Nasim Akhtar,
M. Guru Prem Prasad
Abstract:
Fractal interpolation function (FIF) is a special type of continuous function which interpolates certain data set and the attractor of the Iterated function system (IFS) corresponding to the data set is the graph of the FIF. Coalescence Hidden-variable Fractal Interpolation Function (CHFIF) is both self-affine and non self-affine in nature depending on the free variables and constrained free varia…
▽ More
Fractal interpolation function (FIF) is a special type of continuous function which interpolates certain data set and the attractor of the Iterated function system (IFS) corresponding to the data set is the graph of the FIF. Coalescence Hidden-variable Fractal Interpolation Function (CHFIF) is both self-affine and non self-affine in nature depending on the free variables and constrained free variables for a generalized IFS. In this article graph directed iterated function system for a finite number of generalized data sets is considered and it is shown that the projections of the attractors on $\mathbb{R}^{2}$ is the graph of the CHFIFs interpolating the corresponding data sets.
△ Less
Submitted 7 September, 2015;
originally announced September 2015.
-
Sub-THz complex dielectric constants of smectite clay thin samples with Na$^{+}$/Ca$^{++}$-ions
Authors:
Rezwanur Rahman,
Douglas K. McCarty,
Manika Prasad
Abstract:
We implement a technique to characterize the electromagnetic properties at frequencies 100 to 165 GHz (3 cm$^{-1}$ to 4.95 cm$^{-1}$) of oriented smectite samples using an open cavity resonator connected to a sub-millimeter wave VNA (Vector Network Analyzer). We measured dielectric constants perpendicular to the bedding plane on oriented Na$^{+}$ and Ca$^{++}$-ion stabilized smectite samples depos…
▽ More
We implement a technique to characterize the electromagnetic properties at frequencies 100 to 165 GHz (3 cm$^{-1}$ to 4.95 cm$^{-1}$) of oriented smectite samples using an open cavity resonator connected to a sub-millimeter wave VNA (Vector Network Analyzer). We measured dielectric constants perpendicular to the bedding plane on oriented Na$^{+}$ and Ca$^{++}$-ion stabilized smectite samples deposited on a glass slide at ambient laboratory conditions (room temperature and room light). The clay layer is much thinner ($\sim$ 30 $μ$m) than the glass substrate ($\sim$ 2.18 mm). The real part of dielectric constant, $ε_{re}$, is essentially constant over this frequency range but is larger in Na$^{+}$- than in Ca$^{++}$-ion infused clay. The total electrical conductivity (associated with the imaginary part of dielectric constant, $ε_{im}$) of both samples increases monotonically at lower frequencies ($<$ 110 GHz), but shows rapid increase for Na$^{+}$ ions in the regime $>$ 110 GHz. The dispersion of the samples display a dependence on the ionic strength in the clay interlayers, i.e., $ζ$-potential in the Stern layers.
△ Less
Submitted 28 July, 2015;
originally announced July 2015.
-
Complex dielectric properties of organic-rich mudrocks as functions of maturity
Authors:
Rezwanur Rahman,
John A. Scales,
Manika Prasad
Abstract:
Complex dielectric variations can address neatly the maturity of organic-rich mudrocks. We, therefore, apply an open hemispherical cavity resonator to measure complex dielectric permitivitties of five thin sections of oil (bakken) shales (with different maturity) of $\sim$ 30 $μ$m thickness on glass-substrates around 2.15 mm thick in 100 - 165 GHz. The real part of complex dielectric permittivity…
▽ More
Complex dielectric variations can address neatly the maturity of organic-rich mudrocks. We, therefore, apply an open hemispherical cavity resonator to measure complex dielectric permitivitties of five thin sections of oil (bakken) shales (with different maturity) of $\sim$ 30 $μ$m thickness on glass-substrates around 2.15 mm thick in 100 - 165 GHz. The real part of complex dielectric permittivity ($ε_{re}$) are constant but show significant differences in magnitude based on maturity: (1) lowest, $\sim$ 1.9, for immature or early maturation stage, (2) higher than the immature one, $\sim$ 3.0 (also bundled up together), for three oil-matured stages, and (3) highest, $\sim$ 4.9, for late or overmatured stage. The conductivity ($σ_{re}$) from imaginary part of the complex dielectric constant ($ε_{im}$) emphasizes two important features of conductivity of oil shales: (1) frequency dispersion, and (2) maturity-dependence. We obtain increases of $σ_{re}$ with maturity and frequency.
△ Less
Submitted 27 July, 2015;
originally announced July 2015.
-
Sub-THz complex dielectric constants of montmorillionite clay thin samples with Na$^{+}$/Ca$^{++}$-ions
Authors:
Rezwanur Rahman,
Douglas K. McCarty,
Manika Prasad,
John A. Scales
Abstract:
We implement a technique to characterize electromagnetic properties at frequencies 100 to 165 GHz (3 cm$^{-1}$ to 4.95 cm$^{-1}$) of oriented montmorillionite samples using an open cavity resonator connected to a sub-millimeter wave VNA (Vector Network Analyzer). We measured dielectric constants perpendicular to the bedding plane on oriented Na$^{+}$ and Ca$^{++}$-ion stabilized montmorillionite s…
▽ More
We implement a technique to characterize electromagnetic properties at frequencies 100 to 165 GHz (3 cm$^{-1}$ to 4.95 cm$^{-1}$) of oriented montmorillionite samples using an open cavity resonator connected to a sub-millimeter wave VNA (Vector Network Analyzer). We measured dielectric constants perpendicular to the bedding plane on oriented Na$^{+}$ and Ca$^{++}$-ion stabilized montmorillionite samples deposited on a glass slide at ambient laboratory conditions (room temperature and room light). The clay layer is much thinner ($\sim$ 30 $μ$m) than the glass substrate ($\sim$ 2.18 mm). The real part of dielectric constant,$ε_{re}$, is essentially constant over this frequency range but is larger in Na$^{+}$- than in Ca$^{++}$-ioned clay. The total electrical conductivity (associated with the imaginary part of dielectric constant, $ε_{im}$) of both samples increases monotonically at lower frequencies ($<$ 110 GHz), but shows rapid increase for Na$^{+}$ ions in the regime $>$ 110 GHz. The dispersion of the samples display a dependence on the ionic strength in the clay interlayers, i.e., $ζ$-potential in the Stern layers.
△ Less
Submitted 13 February, 2015;
originally announced February 2015.
-
Quality Assessment of Pixel-Level ImageFusion Using Fuzzy Logic
Authors:
Srinivasa Rao Dammavalam,
Seetha Maddala,
M. H. M. Krishna Prasad
Abstract:
Image fusion is to reduce uncertainty and minimize redundancy in the output while maximizing relevant information from two or more images of a scene into a single composite image that is more informative and is more suitable for visual perception or processing tasks like medical imaging, remote sensing, concealed weapon detection, weather forecasting, biometrics etc. Image fusion combines register…
▽ More
Image fusion is to reduce uncertainty and minimize redundancy in the output while maximizing relevant information from two or more images of a scene into a single composite image that is more informative and is more suitable for visual perception or processing tasks like medical imaging, remote sensing, concealed weapon detection, weather forecasting, biometrics etc. Image fusion combines registered images to produce a high quality fused image with spatial and spectral information. The fused image with more information will improve the performance of image analysis algorithms used in different applications. In this paper, we proposed a fuzzy logic method to fuse images from different sensors, in order to enhance the quality and compared proposed method with two other methods i.e. image fusion using wavelet transform and weighted average discrete wavelet transform based image fusion using genetic algorithm (here onwards abbreviated as GA) along with quality evaluation parameters image quality index (IQI), mutual information measure (MIM), root mean square error (RMSE), peak signal to noise ratio (PSNR), fusion factor (FF), fusion symmetry (FS) and fusion index (FI) and entropy. The results obtained from proposed fuzzy based image fusion approach improves quality of fused image as compared to earlier reported methods, wavelet transform based image fusion and weighted average discrete wavelet transform based image fusion using genetic algorithm.
△ Less
Submitted 5 November, 2013;
originally announced November 2013.
-
Software Reuse in Cardiology Related Medical Database Using K-Means Clustering Technique
Authors:
M. Bhanu Sridhar,
Y. Srinivas,
M. H. M. Krishna Prasad
Abstract:
Software technology based on reuse is identified as a process of designing software for the reuse purpose. The software reuse is a process in which the existing software is used to build new software. A metric is a quantitative indicator of an attribute of an item or thing. Reusability is the likelihood for a segment of source code that can be used again to add new functionalities with slight or n…
▽ More
Software technology based on reuse is identified as a process of designing software for the reuse purpose. The software reuse is a process in which the existing software is used to build new software. A metric is a quantitative indicator of an attribute of an item or thing. Reusability is the likelihood for a segment of source code that can be used again to add new functionalities with slight or no modification. A lot of research has been projected using reusability in reducing code, domain, requirements, design etc., but very little work is reported using software reuse in medical domain. An attempt is made to bridge the gap in this direction, using the concepts of clustering and classifying the data based on the distance measures. In this paper cardiologic database is considered for study. The developed model will be useful for Doctors or Paramedics to find out the patients level in the cardiologic disease, deduce the medicines required in seconds and propose them to the patient. In order to measure the reusability K means clustering algorithm is used.
△ Less
Submitted 5 November, 2013;
originally announced November 2013.
-
A qoi based energy efficient clustering for dense wireless sensor network
Authors:
Manju Prasad,
Andhe Dharani
Abstract:
In a wireless sensor network Quality of Information (QoI), Energy Efficiency, Redundant data avoidance, congestion control are the important metrics that affect the performance of wireless sensor network. As many approaches were proposed to increase the performance of a wireless sensor network among them clustering is one of the efficient approaches in sensor network. Many clustering algorithms co…
▽ More
In a wireless sensor network Quality of Information (QoI), Energy Efficiency, Redundant data avoidance, congestion control are the important metrics that affect the performance of wireless sensor network. As many approaches were proposed to increase the performance of a wireless sensor network among them clustering is one of the efficient approaches in sensor network. Many clustering algorithms concentrate mainly on power Optimization like FSCH, LEACH, and EELBCRP. There is necessity of the above metrics in wireless sensor network where nodes are densely deployed in a given network area. As the nodes are deployed densely there is maximum possibility of nodes appear in the sensing region of other nodes. So there exists an option that nodes have to send the information that is already reached the base station by its own cluster members or by members of other clusters. This mechanism will affect the QoI, Energy factor and congestion control of the wireless sensor networks. Even though clustering uses TDMA (Time Division Multiple Access) for avoiding congestion control for intra clustering data transmission, but it may fail in some critical situation. This paper proposed a energy efficient clustering which avoid data redundancy in a dense sensor network until the network becomes sparse and hence uses the TDMA efficiently during high density of the nodes.
△ Less
Submitted 21 May, 2013;
originally announced May 2013.
-
Comparison of Fuzzy and Neuro Fuzzy Image Fusion Techniques and its Applications
Authors:
D. Srinivasa Rao,
M. Seetha,
M. H. M. Krishna Prasad
Abstract:
Image fusion is the process of integrating multiple images of the same scene into a single fused image to reduce uncertainty and minimizing redundancy while extracting all the useful information from the source images. Image fusion process is required for different applications like medical imaging, remote sensing, medical imaging, machine vision, biometrics and military applications where quality…
▽ More
Image fusion is the process of integrating multiple images of the same scene into a single fused image to reduce uncertainty and minimizing redundancy while extracting all the useful information from the source images. Image fusion process is required for different applications like medical imaging, remote sensing, medical imaging, machine vision, biometrics and military applications where quality and critical information is required. In this paper, image fusion using fuzzy and neuro fuzzy logic approaches utilized to fuse images from different sensors, in order to enhance visualization. The proposed work further explores comparison between fuzzy based image fusion and neuro fuzzy fusion technique along with quality evaluation indices for image fusion like image quality index, mutual information measure, fusion factor, fusion symmetry, fusion index, root mean square error, peak signal to noise ratio, entropy, correlation coefficient and spatial frequency. Experimental results obtained from fusion process prove that the use of the neuro fuzzy based image fusion approach shows better performance in first two test cases while in the third test case fuzzy based image fusion technique gives better results.
△ Less
Submitted 3 December, 2012;
originally announced December 2012.