-
Shock Wave Formation in Radiative Plasmas
Authors:
F. Garcia-Rubio,
V. Tranchant,
E. C. Hansen,
R. Tabassum,
A. Reyes,
H. U. Rahman,
P. Ney,
E. Ruskov,
P. Tzeferacos
Abstract:
The temporal evolution of weak shocks in radiative media is theoretically investigated in this work. The structure of radiative shocks has traditionally been studied in a stationary framework. Their systematic classification is complex because layers of optically thin and thick regions alternate to form a radiatively-driven precursor and a temperature-relaxation layer, between which the hydrodynam…
▽ More
The temporal evolution of weak shocks in radiative media is theoretically investigated in this work. The structure of radiative shocks has traditionally been studied in a stationary framework. Their systematic classification is complex because layers of optically thin and thick regions alternate to form a radiatively-driven precursor and a temperature-relaxation layer, between which the hydrodynamic shock is embedded. In this work, we analyze the formation of weak shocks when two radiative plasmas with different pressures are put in contact. Applying a reductive perturbative method yields a Burgers-type equation that governs the temporal evolution of the perturbed variables including the radiation field. The conditions upon which optically thin and thick solutions exist have been derived and expressed as a function of the shock strength and Boltzmann number. Below a certain Boltzmann number threshold, weak shocks always become optically thick asymptotically in time, while thin solutions appear as transitory structures. The existence of an optically thin regime is related to the presence of an overdense layer in the compressed material. Scaling laws for the characteristic formation time and shock width are provided for each regime. The theoretical analysis is supported by FLASH simulations, and a comprehensive test-case has been designed to benchmark radiative hydrodynamic codes.
△ Less
Submitted 29 May, 2024;
originally announced May 2024.
-
Ulam's method for computing stationary densities of invariant measures for piecewise convex maps with countably infinite number of branches
Authors:
Md Shafiqul Islam,
Paweł Góra,
A H M Mahbubur Rahman
Abstract:
Let $τ: I=[0, 1]\to [0, 1]$ be a piecewise convex map with countably infinite number of branches. In \cite{GIR}, the existence of absolutely continuous invariant measure (ACIM) $μ$ for $τ$ and the exactness of the system $(τ, μ)$ has been proven. In this paper, we develop an Ulam method for approximation of $f^*$, the density of ACIM $μ$. We construct a sequence $\{τ_n\}_{n=1}^\infty$ of maps…
▽ More
Let $τ: I=[0, 1]\to [0, 1]$ be a piecewise convex map with countably infinite number of branches. In \cite{GIR}, the existence of absolutely continuous invariant measure (ACIM) $μ$ for $τ$ and the exactness of the system $(τ, μ)$ has been proven. In this paper, we develop an Ulam method for approximation of $f^*$, the density of ACIM $μ$. We construct a sequence $\{τ_n\}_{n=1}^\infty$ of maps $τ_n: I\to I$ s. t. $τ_n$ has a finite number of branches and the sequence $τ_n$ converges to $τ$ almost uniformly. Using supremum norms and Lasota-Yorke type inequalities, we prove the existence of ACIMs $μ_n$ for $τ_n$ with the densities $f_n$. For a fixed $n$, we apply Ulam's method with $k$ subintervals to $τ_n$ and compute approximations $f_{n,k}$ of $f_n$. We prove that $f_{n,k}\to f^*$ as $n\to \infty, k\to \infty,$ both a.e. and in $L^1$. We provide examples of piecewise convex maps $τ$ with countably infinite number of branches, their approximations $τ_n$ with finite number of branches and for increasing values of parameter $k$ show the errors $\|f^*-f_{n,k}\|_1$.
△ Less
Submitted 4 May, 2024;
originally announced May 2024.
-
A Survey on Error-Bounded Lossy Compression for Scientific Datasets
Authors:
Sheng Di,
**yang Liu,
Kai Zhao,
Xin Liang,
Robert Underwood,
Zhaorui Zhang,
Milan Shah,
Yafan Huang,
Jiajun Huang,
Xiaodong Yu,
Congrong Ren,
Hanqi Guo,
Grant Wilkins,
Dingwen Tao,
Jiannan Tian,
Sian **,
Zizhe Jian,
Daoce Wang,
MD Hasanur Rahman,
Boyuan Zhang,
Jon C. Calhoun,
Guanpeng Li,
Kazutomo Yoshii,
Khalid Ayed Alharthi,
Franck Cappello
Abstract:
Error-bounded lossy compression has been effective in significantly reducing the data storage/transfer burden while preserving the reconstructed data fidelity very well. Many error-bounded lossy compressors have been developed for a wide range of parallel and distributed use cases for years. These lossy compressors are designed with distinct compression models and design principles, such that each…
▽ More
Error-bounded lossy compression has been effective in significantly reducing the data storage/transfer burden while preserving the reconstructed data fidelity very well. Many error-bounded lossy compressors have been developed for a wide range of parallel and distributed use cases for years. These lossy compressors are designed with distinct compression models and design principles, such that each of them features particular pros and cons. In this paper we provide a comprehensive survey of emerging error-bounded lossy compression techniques for different use cases each involving big data to process. The key contribution is fourfold. (1) We summarize an insightful taxonomy of lossy compression into 6 classic compression models. (2) We provide a comprehensive survey of 10+ commonly used compression components/modules used in error-bounded lossy compressors. (3) We provide a comprehensive survey of 10+ state-of-the-art error-bounded lossy compressors as well as how they combine the various compression modules in their designs. (4) We provide a comprehensive survey of the lossy compression for 10+ modern scientific applications and use-cases. We believe this survey is useful to multiple communities including scientific applications, high-performance computing, lossy compression, and big data.
△ Less
Submitted 3 April, 2024;
originally announced April 2024.
-
How is Testing Related to Single Statement Bugs?
Authors:
Habibur Rahman,
Saqib Ameen
Abstract:
In this study, we analyzed the correlation between unit test coverage and the occurrence of Single Statement Bugs (SSBs) in open-source Java projects. We analyzed data from the top 100 Maven-based projects on GitHub, which includes 7824 SSBs. Our preliminary findings suggest a weak to moderate correlation, indicating that increased test coverage is somewhat reduce the occurrence of SSBs. However,…
▽ More
In this study, we analyzed the correlation between unit test coverage and the occurrence of Single Statement Bugs (SSBs) in open-source Java projects. We analyzed data from the top 100 Maven-based projects on GitHub, which includes 7824 SSBs. Our preliminary findings suggest a weak to moderate correlation, indicating that increased test coverage is somewhat reduce the occurrence of SSBs. However, this relationship is not very strong, emphasizing the need for better tests. Our study contributes to the ongoing discussion on enhancing software quality and provides a basis for future research into effective testing practices aimed at mitigating SSBs.
△ Less
Submitted 26 March, 2024;
originally announced March 2024.
-
LeMo-NADe: Multi-Parameter Neural Architecture Discovery with LLMs
Authors:
Md Hafizur Rahman,
Prabuddha Chakraborty
Abstract:
Building efficient neural network architectures can be a time-consuming task requiring extensive expert knowledge. This task becomes particularly challenging for edge devices because one has to consider parameters such as power consumption during inferencing, model size, inferencing speed, and CO2 emissions. In this article, we introduce a novel framework designed to automatically discover new neu…
▽ More
Building efficient neural network architectures can be a time-consuming task requiring extensive expert knowledge. This task becomes particularly challenging for edge devices because one has to consider parameters such as power consumption during inferencing, model size, inferencing speed, and CO2 emissions. In this article, we introduce a novel framework designed to automatically discover new neural network architectures based on user-defined parameters, an expert system, and an LLM trained on a large amount of open-domain knowledge. The introduced framework (LeMo-NADe) is tailored to be used by non-AI experts, does not require a predetermined neural architecture search space, and considers a large set of edge device-specific parameters. We implement and validate this proposed neural architecture discovery framework using CIFAR-10, CIFAR-100, and ImageNet16-120 datasets while using GPT-4 Turbo and Gemini as the LLM component. We observe that the proposed framework can rapidly (within hours) discover intricate neural network models that perform extremely well across a diverse set of application settings defined by the user.
△ Less
Submitted 28 February, 2024;
originally announced February 2024.
-
Predictive Health Analysis in Industry 5.0: A Scientometric and Systematic Review of Motion Capture in Construction
Authors:
Md Hadisur Rahman,
Md Rabiul Hasan,
Nahian Ismail Chowdhury,
Md Asif Bin Syed,
Mst Ummul Farah
Abstract:
In an era of rapid technological advancement, the rise of Industry 4.0 has prompted industries to pursue innovative improvements in their processes. As we advance towards Industry 5.0, which focuses more on collaboration between humans and intelligent systems, there is a growing requirement for better sensing technologies for healthcare and safety purposes. Consequently, Motion Capture (MoCap) sys…
▽ More
In an era of rapid technological advancement, the rise of Industry 4.0 has prompted industries to pursue innovative improvements in their processes. As we advance towards Industry 5.0, which focuses more on collaboration between humans and intelligent systems, there is a growing requirement for better sensing technologies for healthcare and safety purposes. Consequently, Motion Capture (MoCap) systems have emerged as critical enablers in this technological evolution by providing unmatched precision and versatility in various workplaces, including construction. As the construction workplace requires physically demanding tasks, leading to work-related musculoskeletal disorders (WMSDs) and health issues, the study explores the increasing relevance of MoCap systems within the concept of Industry 4.0 and 5.0. Despite the growing significance, there needs to be more comprehensive research, a scientometric review that quantitatively assesses the role of MoCap systems in construction. Our study combines bibliometric, scientometric, and systematic review approaches to address this gap, analyzing articles sourced from the Scopus database. A total of 52 papers were carefully selected from a pool of 962 papers for a quantitative study using a scientometric approach and a qualitative, indepth examination. Results showed that MoCap systems are employed to improve worker health and safety and reduce occupational hazards.The in-depth study also finds the most tested construction tasks are masonry, lifting, training, and climbing, with a clear preference for markerless systems.
△ Less
Submitted 22 January, 2024;
originally announced February 2024.
-
Taxonomy for Cybersecurity Threat Attributes and Countermeasures in Smart Manufacturing Systems
Authors:
Md Habibor Rahman,
Rocco Cassandro,
Thorsten Wuest,
Mohammed Shafae
Abstract:
An attack taxonomy offers a consistent and structured classification scheme to systematically understand, identify, and classify cybersecurity threat attributes. However, existing taxonomies only focus on a narrow range of attacks and limited threat attributes, lacking a comprehensive characterization of manufacturing cybersecurity threats. There is little to no focus on characterizing threat acto…
▽ More
An attack taxonomy offers a consistent and structured classification scheme to systematically understand, identify, and classify cybersecurity threat attributes. However, existing taxonomies only focus on a narrow range of attacks and limited threat attributes, lacking a comprehensive characterization of manufacturing cybersecurity threats. There is little to no focus on characterizing threat actors and their intent, specific system and machine behavioral deviations introduced by cyberattacks, system-level and operational implications of attacks, and potential countermeasures against those attacks. To close this pressing research gap, this work proposes a comprehensive attack taxonomy for a holistic understanding and characterization of cybersecurity threats in manufacturing systems. Specifically, it introduces taxonomical classifications for threat actors and their intent and potential alterations in system behavior due to threat events. The proposed taxonomy categorizes attack methods/vectors and targets/locations and incorporates operational and system-level attack impacts. This paper also presents a classification structure for countermeasures, provides examples of potential countermeasures, and explains how they fit into the proposed taxonomical classification. Finally, the implementation of the proposed taxonomy is illustrated using two realistic scenarios of attacks on typical smart manufacturing systems, as well as several real-world cyber-physical attack incidents and academic case studies. The developed manufacturing attack taxonomy offers a holistic view of the attack chain in manufacturing systems, starting from the attack launch to the possible damages and system behavior changes within the system. Furthermore, it guides the design and development of appropriate protective and detective countermeasures by leveraging the attack realization through observed system deviations.
△ Less
Submitted 29 December, 2023;
originally announced January 2024.
-
Feasibility and Performance of the Staged Z-Pinch: A One-dimensional Study with FLASH and MACH2
Authors:
Edward C. Hansen,
Fernando Garcia-Rubio,
Marissa B. P. Adams,
Milad Fatenejad,
Kasper Moczulski,
Paul Ney,
Hafiz U. Rahman,
Adam C. Reyes,
Emil Ruskov,
Victor Tranchant,
Petros Tzeferacos
Abstract:
Z-pinch platforms constitute a promising pathway to fusion energy research. Here, we present a one-dimensional numerical study of the staged Z-pinch (SZP) concept using the FLASH and MACH2 codes. We discuss the verification of the codes using two analytical benchmarks that include Z-pinch-relevant physics, building confidence on the codes' ability to model such experiments. Then, FLASH is used to…
▽ More
Z-pinch platforms constitute a promising pathway to fusion energy research. Here, we present a one-dimensional numerical study of the staged Z-pinch (SZP) concept using the FLASH and MACH2 codes. We discuss the verification of the codes using two analytical benchmarks that include Z-pinch-relevant physics, building confidence on the codes' ability to model such experiments. Then, FLASH is used to simulate two different SZP configurations: a xenon gas-puff liner (SZP1*) and a silver solid liner (SZP2). The SZP2 results are compared against previously published MACH2 results, and a new code-to-code comparison on SZP1* is presented. Using an ideal equation of state and analytical transport coefficients, FLASH yields a fuel convergence ratio (CR) of approximately 39 and a mass-averaged fuel ion temperature slightly below 1 keV for the SZP2 scheme, significantly lower than the full-physics MACH2 prediction. For the new SZP1* configuration, full-physics FLASH simulations furnish large and inherently unstable CRs (> 300), but achieve fuel ion temperatures of many keV. While MACH2 also predicts high temperatures, the fuel stagnates at a smaller CR. The integrated code-to-code comparison reveals how magnetic insulation, heat conduction, and radiation transport affect platform performance and the feasibility of the SZP concept.
△ Less
Submitted 3 April, 2024; v1 submitted 13 November, 2023;
originally announced November 2023.
-
Analysis of the User Perception of Chatbots in Education Using A Partial Least Squares Structural Equation Modeling Approach
Authors:
Md Rabiul Hasan,
Nahian Ismail Chowdhury,
Md Hadisur Rahman,
Md Asif Bin Syed,
JuHyeong Ryu
Abstract:
The integration of Artificial Intelligence (AI) into education is a recent development, with chatbots emerging as a noteworthy addition to this transformative landscape. As online learning platforms rapidly advance, students need to adapt swiftly to excel in this dynamic environment. Consequently, understanding the acceptance of chatbots, particularly those employing Large Language Model (LLM) suc…
▽ More
The integration of Artificial Intelligence (AI) into education is a recent development, with chatbots emerging as a noteworthy addition to this transformative landscape. As online learning platforms rapidly advance, students need to adapt swiftly to excel in this dynamic environment. Consequently, understanding the acceptance of chatbots, particularly those employing Large Language Model (LLM) such as Chat Generative Pretrained Transformer (ChatGPT), Google Bard, and other interactive AI technologies, is of paramount importance. However, existing research on chatbots in education has overlooked key behavior-related aspects, such as Optimism, Innovativeness, Discomfort, Insecurity, Transparency, Ethics, Interaction, Engagement, and Accuracy, creating a significant literature gap. To address this gap, this study employs Partial Least Squares Structural Equation Modeling (PLS-SEM) to investigate the determinant of chatbots adoption in education among students, considering the Technology Readiness Index (TRI) and Technology Acceptance Model (TAM). Utilizing a five-point Likert scale for data collection, we gathered a total of 185 responses, which were analyzed using R-Studio software. We established 12 hypotheses to achieve its objectives. The results showed that Optimism and Innovativeness are positively associated with Perceived Ease of Use (PEOU) and Perceived Usefulness (PU). Conversely, Discomfort and Insecurity negatively impact PEOU, with only Insecurity negatively affecting PU. These findings provide insights for future technology designers, elucidating critical user behavior factors influencing chatbots adoption and utilization in educational contexts.
△ Less
Submitted 6 November, 2023;
originally announced November 2023.
-
Accelerating Defect Predictions in Semiconductors Using Graph Neural Networks
Authors:
Md Habibur Rahman,
Prince Gollapalli,
Panayotis Manganaris,
Satyesh Kumar Yadav,
Ghanshyam Pilania,
Brian DeCost,
Kamal Choudhary,
Arun Mannodi-Kanakkithodi
Abstract:
Here, we develop a framework for the prediction and screening of native defects and functional impurities in a chemical space of Group IV, III-V, and II-VI zinc blende (ZB) semiconductors, powered by crystal Graph-based Neural Networks (GNNs) trained on high-throughput density functional theory (DFT) data. Using an innovative approach of sampling partially optimized defect configurations from DFT…
▽ More
Here, we develop a framework for the prediction and screening of native defects and functional impurities in a chemical space of Group IV, III-V, and II-VI zinc blende (ZB) semiconductors, powered by crystal Graph-based Neural Networks (GNNs) trained on high-throughput density functional theory (DFT) data. Using an innovative approach of sampling partially optimized defect configurations from DFT calculations, we generate one of the largest computational defect datasets to date, containing many types of vacancies, self-interstitials, anti-site substitutions, impurity interstitials and substitutions, as well as some defect complexes. We applied three types of established GNN techniques, namely Crystal Graph Convolutional Neural Network (CGCNN), Materials Graph Network (MEGNET), and Atomistic Line Graph Neural Network (ALIGNN), to rigorously train models for predicting defect formation energy (DFE) in multiple charge states and chemical potential conditions. We find that ALIGNN yields the best DFE predictions with root mean square errors around 0.3 eV, which represents a prediction accuracy of 98 % given the range of values within the dataset, improving significantly on the state-of-the-art. Models are tested for different defect types as well as for defect charge transition levels. We further show that GNN-based defective structure optimization can take us close to DFT-optimized geometries at a fraction of the cost of full DFT. DFT-GNN models enable prediction and screening across thousands of hypothetical defects based on both unoptimized and partially-optimized defective structures, hel** identify electronically active defects in technologically-important semiconductors.
△ Less
Submitted 13 September, 2023; v1 submitted 12 September, 2023;
originally announced September 2023.
-
Contrastive Self-Supervised Learning Based Approach for Patient Similarity: A Case Study on Atrial Fibrillation Detection from PPG Signal
Authors:
Subangkar Karmaker Shanto,
Shoumik Saha,
Atif Hasan Rahman,
Mohammad Mehedy Masud,
Mohammed Eunus Ali
Abstract:
In this paper, we propose a novel contrastive learning based deep learning framework for patient similarity search using physiological signals. We use a contrastive learning based approach to learn similar embeddings of patients with similar physiological signal data. We also introduce a number of neighbor selection algorithms to determine the patients with the highest similarity on the generated…
▽ More
In this paper, we propose a novel contrastive learning based deep learning framework for patient similarity search using physiological signals. We use a contrastive learning based approach to learn similar embeddings of patients with similar physiological signal data. We also introduce a number of neighbor selection algorithms to determine the patients with the highest similarity on the generated embeddings. To validate the effectiveness of our framework for measuring patient similarity, we select the detection of Atrial Fibrillation (AF) through photoplethysmography (PPG) signals obtained from smartwatch devices as our case study. We present extensive experimentation of our framework on a dataset of over 170 individuals and compare the performance of our framework with other baseline methods on this dataset.
△ Less
Submitted 22 July, 2023;
originally announced August 2023.
-
Machine Learning Approach on Multiclass Classification of Internet Firewall Log Files
Authors:
Md Habibur Rahman,
Taminul Islam,
Md Masum Rana,
Rehnuma Tasnim,
Tanzina Rahman Mona,
Md. Mamun Sakib
Abstract:
Firewalls are critical components in securing communication networks by screening all incoming (and occasionally exiting) data packets. Filtering is carried out by comparing incoming data packets to a set of rules designed to prevent malicious code from entering the network. To regulate the flow of data packets entering and leaving a network, an Internet firewall keeps a track of all activity. Whi…
▽ More
Firewalls are critical components in securing communication networks by screening all incoming (and occasionally exiting) data packets. Filtering is carried out by comparing incoming data packets to a set of rules designed to prevent malicious code from entering the network. To regulate the flow of data packets entering and leaving a network, an Internet firewall keeps a track of all activity. While the primary function of log files is to aid in troubleshooting and diagnostics, the information they contain is also very relevant to system audits and forensics. Firewalls primary function is to prevent malicious data packets from being sent. In order to better defend against cyberattacks and understand when and how malicious actions are influencing the internet, it is necessary to examine log files. As a result, the firewall decides whether to 'allow,' 'deny,' 'drop,' or 'reset-both' the incoming and outgoing packets. In this research, we apply various categorization algorithms to make sense of data logged by a firewall device. Harmonic mean F1 score, recall, and sensitivity measurement data with a 99% accuracy score in the random forest technique are used to compare the classifier's performance. To be sure, the proposed characteristics did significantly contribute to enhancing the firewall classification rate, as seen by the high accuracy rates generated by the other methods.
△ Less
Submitted 12 June, 2023;
originally announced June 2023.
-
BiofilmScanner: A Computational Intelligence Approach to Obtain Bacterial Cell Morphological Attributes from Biofilm Image
Authors:
Md Hafizur Rahman,
Md Ali Azam,
Md Abir Hossen,
Shankarachary Ragi,
Venkataramana Gadhamshetty
Abstract:
Desulfovibrio alaskensis G20 (DA-G20) is utilized as a model for sulfate-reducing bacteria (SRB) that are associated with corrosion issues caused by microorganisms. SRB-based biofilms are thought to be responsible for the billion-dollar-per-year bio-corrosion of metal infrastructure. Understanding the extraction of the bacterial cells' shape and size properties in the SRB-biofilm at different grow…
▽ More
Desulfovibrio alaskensis G20 (DA-G20) is utilized as a model for sulfate-reducing bacteria (SRB) that are associated with corrosion issues caused by microorganisms. SRB-based biofilms are thought to be responsible for the billion-dollar-per-year bio-corrosion of metal infrastructure. Understanding the extraction of the bacterial cells' shape and size properties in the SRB-biofilm at different growth stages will assist with the design of anti-corrosion techniques. However, numerous issues affect current approaches, including time-consuming geometric property extraction, low efficiency, and high error rates. This paper proposes BiofilScanner, a Yolact-based deep learning method integrated with invariant moments to address these problems. Our approach efficiently detects and segments bacterial cells in an SRB image while simultaneously invariant moments measure the geometric characteristics of the segmented cells with low errors. The numerical experiments of the proposed method demonstrate that the BiofilmScanner is 2.1x and 6.8x faster than our earlier Mask-RCNN and DLv3+ methods for detecting, segmenting, and measuring the geometric properties of the cell. Furthermore, the BiofilmScanner achieved an F1-score of 85.28% while Mask-RCNN and DLv3+ obtained F1-scores of 77.67% and 75.18%, respectively.
△ Less
Submitted 24 July, 2023; v1 submitted 19 February, 2023;
originally announced February 2023.
-
FineDeb: A Debiasing Framework for Language Models
Authors:
Akash Saravanan,
Dhruv Mullick,
Habibur Rahman,
Nidhi Hegde
Abstract:
As language models are increasingly included in human-facing machine learning tools, bias against demographic subgroups has gained attention. We propose FineDeb, a two-phase debiasing framework for language models that starts with contextual debiasing of embeddings learned by pretrained language models. The model is then fine-tuned on a language modeling objective. Our results show that FineDeb of…
▽ More
As language models are increasingly included in human-facing machine learning tools, bias against demographic subgroups has gained attention. We propose FineDeb, a two-phase debiasing framework for language models that starts with contextual debiasing of embeddings learned by pretrained language models. The model is then fine-tuned on a language modeling objective. Our results show that FineDeb offers stronger debiasing in comparison to other methods which often result in models as biased as the original language model. Our framework is generalizable for demographics with multiple classes, and we demonstrate its effectiveness through extensive experiments and comparisons with state of the art techniques. We release our code and data on GitHub.
△ Less
Submitted 5 February, 2023;
originally announced February 2023.
-
Graph-Theoretic Approach for Manufacturing Cybersecurity Risk Modeling and Assessment
Authors:
Md Habibor Rahman,
Erfan Yazdandoost Hamedani,
Young-Jun Son,
Mohammed Shafae
Abstract:
Identifying, analyzing, and evaluating cybersecurity risks are essential to assess the vulnerabilities of modern manufacturing infrastructures and to devise effective decision-making strategies to secure critical manufacturing against potential cyberattacks. In response, this work proposes a graph-theoretic approach for risk modeling and assessment to address the lack of quantitative cybersecurity…
▽ More
Identifying, analyzing, and evaluating cybersecurity risks are essential to assess the vulnerabilities of modern manufacturing infrastructures and to devise effective decision-making strategies to secure critical manufacturing against potential cyberattacks. In response, this work proposes a graph-theoretic approach for risk modeling and assessment to address the lack of quantitative cybersecurity risk assessment frameworks for smart manufacturing systems. In doing so, first, threat attributes are represented using an attack graphical model derived from manufacturing cyberattack taxonomies. Attack taxonomies offer consistent structures to categorize threat attributes, and the graphical approach helps model their interdependence. Second, the graphs are analyzed to explore how threat events can propagate through the manufacturing value chain and identify the manufacturing assets that threat actors can access and compromise during a threat event. Third, the proposed method identifies the attack path that maximizes the likelihood of success and minimizes the attack detection probability, and then computes the associated cybersecurity risk. Finally, the proposed risk modeling and assessment framework is demonstrated via an interconnected smart manufacturing system illustrative example. Using the proposed approach, practitioners can identify critical connections and manufacturing assets requiring prioritized security controls and develop and deploy appropriate defense measures accordingly.
△ Less
Submitted 4 October, 2023; v1 submitted 17 January, 2023;
originally announced January 2023.
-
Review, Meta-Taxonomy, and Use Cases of Cyberattack Taxonomies of Manufacturing Cybersecurity Threat Attributes and Countermeasures
Authors:
Md Habibor Rahman,
Thorsten Wuest,
Mohammed Shafae
Abstract:
A thorough and systematic understanding of different elements of cyberattacks is essential for develo** the necessary tools to prevent, detect, diagnose, and mitigate cyberattacks in manufacturing systems. In response, researchers have proposed several attack taxonomies as methods for recognizing and categorizing various cyberattack attributes. However, those taxonomies cover selected attack att…
▽ More
A thorough and systematic understanding of different elements of cyberattacks is essential for develo** the necessary tools to prevent, detect, diagnose, and mitigate cyberattacks in manufacturing systems. In response, researchers have proposed several attack taxonomies as methods for recognizing and categorizing various cyberattack attributes. However, those taxonomies cover selected attack attributes depending on the research focus, sometimes accompanied by inconsistent naming and definitions. These seemingly different taxonomies often overlap and can complement each other to create a comprehensive knowledge base of cyberattack attributes that is currently missing in the literature. Additionally, there is a missing link from creating structured knowledge by using a taxonomy to applying this structure for cybersecurity tools development and aiding practitioners in using it. To tackle these challenges, this article highlights how cyberattack taxonomies can be used to better understand and characterize manufacturing cybersecurity threats. It also reviews and analyzes current taxonomical classifications of manufacturing cybersecurity threat attributes and countermeasures, as well as the proliferation of the scope and coverage in existing taxonomies. As a result, these taxonomies are compiled into a more comprehensive and consistent meta-taxonomy for the smart manufacturing space. The resulting meta-taxonomy provides a holistic analysis of current taxonomies and integrates them into a unified structure. Based on this structure, this paper identifies gaps in current attack taxonomies and provides directions for future improvements. Finally, the paper introduces potential use cases for attack taxonomies in smart manufacturing systems for assessing security threats and their associated risks, devising risk mitigation strategies, and informing the application of cybersecurity frameworks.
△ Less
Submitted 21 March, 2023; v1 submitted 17 January, 2023;
originally announced January 2023.
-
UB3: Best Beam Identification in Millimeter Wave Systems via Pure Exploration Unimodal Bandits
Authors:
Debamita Ghosh,
Haseen Rahman,
Manjesh K. Hanawal,
Nikola Zlatanov
Abstract:
Millimeter wave (mmWave) communications have a broad spectrum and can support data rates in the order of gigabits per second, as envisioned in 5G systems. However, they cannot be used for long distances due to their sensitivity to attenuation loss. To enable their use in the 5G network, it requires that the transmission energy be focused in sharp pencil beams. As any misalignment between the trans…
▽ More
Millimeter wave (mmWave) communications have a broad spectrum and can support data rates in the order of gigabits per second, as envisioned in 5G systems. However, they cannot be used for long distances due to their sensitivity to attenuation loss. To enable their use in the 5G network, it requires that the transmission energy be focused in sharp pencil beams. As any misalignment between the transmitter and receiver beam pair can reduce the data rate significantly, it is important that they are aligned as much as possible. To find the best transmit-receive beam pair, recent beam alignment (BA) techniques examine the entire beam space, which might result in a large amount of BA latency. Recent works propose to adaptively select the beams such that the cumulative reward measured in terms of received signal strength or throughput is maximized. In this paper, we develop an algorithm that exploits the unimodal structure of the received signal strengths of the beams to identify the best beam in a finite time using pure exploration strategies. Strategies that identify the best beam in a fixed time slot are more suitable for wireless network protocol design than cumulative reward maximization strategies that continuously perform exploration and exploitation. Our algorithm is named Unimodal Bandit for Best Beam (UB3) and identifies the best beam with a high probability in a few rounds. We prove that the error exponent in the probability does not depend on the number of beams and show that this is indeed the case by establishing a lower bound for the unimodal bandits. We demonstrate that UB3 outperforms the state-of-the-art algorithms through extensive simulations. Moreover, our algorithm is simple to implement and has lower computational complexity.
△ Less
Submitted 26 December, 2022;
originally announced January 2023.
-
Visualisation of sulphur on single fibre level for pul** industry
Authors:
Börje Norlin,
Siwen An,
Thomas Granfeldt,
David Krapohl,
Barry Lai,
Hafizur Rahman,
Faisal Zeeshan,
Per Engstrand
Abstract:
In the pulp and paper industry, about 5 Mt/y chemithermomechanical pulp (CTMP) are produced globally from softwood chips for production of carton board grades. For tailor making CTMP for this purpose, wood chips are impregnated with aqueous sodium sulphite for sulphonation of the wood lignin. When lignin is sulphonated, the defibration of wood into pulp becomes more selective, resulting in enhance…
▽ More
In the pulp and paper industry, about 5 Mt/y chemithermomechanical pulp (CTMP) are produced globally from softwood chips for production of carton board grades. For tailor making CTMP for this purpose, wood chips are impregnated with aqueous sodium sulphite for sulphonation of the wood lignin. When lignin is sulphonated, the defibration of wood into pulp becomes more selective, resulting in enhanced pulp properties. On a microscopic fibre scale, however, one could strongly assume that the sulphonation of the wood structure is very uneven due to its macroscale size of wood chips. If this is the case and the sulphonation could be done significantly more evenly, the CTMP process could be more efficient and produce pulp even better suited for carton boards. Therefore, the present study aimed to develop a technique based on X-ray fluorescence microscopy imaging (uXRF) for quantifying the sulphur distribution on CTMP wood fibres.
The feasibility of uXRF imaging for sulphur homogeneity measurements in wood fibres needs investigation. Clarification of which spatial and spectral resolution that allows visualization of sulphur impregnation into single wood fibres is needed. Measurements of single fibre imaging were carried out at the APS synchrotron facility. With a synchrotron beam using 1 um scanning step, images of elemental map** are acquired from CTMP samples diluted with non-sulphonated pulp under specified conditions. Since the measurements show significant differ-ences between sulphonated and non-sulphonated fibres, and a significant peak concentration in the shell of the sulphonated fibres, the proposed technique is found to be feasible. The required spatial resolution of the uXRF imaging for an on-site CTMP sulphur homogeneity measurement setup is about 15 um, and the homogeneity measured along the fibre shells is suggested to be used as the CTMP sulphonation measurement parameter.
△ Less
Submitted 21 December, 2022;
originally announced December 2022.
-
Monte Carlo Simulation of Lane-Emden Type Equations Arising in Astrophysics
Authors:
Samah H. El-Essawy,
Mohamed I. Nouh,
Ahmed A. Soliman,
Helal I. Abdel Rahman,
Gamal A. Abd-Elmougod
Abstract:
Monte Carlo (MC) method played an essential role in many areas of human activity and has found application in many branches of physical science. This paper proposes a computational technique based on MC algorithms to solve Lane-Emden (LE) type equations. We analyze four LE equations arising in astrophysics: the positive and negative indices of the polytropic gas spheres, the isothermal gas sphere,…
▽ More
Monte Carlo (MC) method played an essential role in many areas of human activity and has found application in many branches of physical science. This paper proposes a computational technique based on MC algorithms to solve Lane-Emden (LE) type equations. We analyze four LE equations arising in astrophysics: the positive and negative indices of the polytropic gas spheres, the isothermal gas sphere, and the white dwarf equation. We calculated eleven models (i.e., eleven LE equations) of the positive index polytropes, nine for the negative index polytrope, the isothermal gas sphere, and the white dwarf equation. Comparing the MC and numerical/analytical models gives good agreement for the four LE equations under study.
△ Less
Submitted 15 November, 2022;
originally announced November 2022.
-
Detecting Synthetic Speech Manipulation in Real Audio Recordings
Authors:
Md Hafizur Rahman,
Martin Graciarena,
Diego Castan,
Chris Cobo-Kroenke,
Mitchell McLaren,
Aaron Lawson
Abstract:
Recent advances in artificial speech and audio technologies have improved the abilities of deep-fake operators to falsify media and spread malicious misinformation. Anyone with limited coding skills can use freely available speech synthesis tools to create convincing simulations of influential speakers' voices with the malicious intent to distort the original message. With the latest technology, m…
▽ More
Recent advances in artificial speech and audio technologies have improved the abilities of deep-fake operators to falsify media and spread malicious misinformation. Anyone with limited coding skills can use freely available speech synthesis tools to create convincing simulations of influential speakers' voices with the malicious intent to distort the original message. With the latest technology, malicious operators do not have to generate an entire audio clip; instead, they can insert a partial manipulation or a segment of synthetic speech into a genuine audio recording to change the entire context and meaning of the original message. Detecting these insertions is especially challenging because partially manipulated audio can more easily avoid synthetic speech detectors than entirely fake messages can. This paper describes a potential partial synthetic speech detection system based on the x-ResNet architecture with a probabilistic linear discriminant analysis (PLDA) backend and interleaved aware score processing. Experimental results suggest that the PLDA backend results in a 25% average error reduction among partially synthesized datasets over a non-PLDA baseline.
△ Less
Submitted 15 September, 2022;
originally announced September 2022.
-
BSpell: A CNN-Blended BERT Based Bangla Spell Checker
Authors:
Chowdhury Rafeed Rahman,
MD. Hasibur Rahman,
Samiha Zakir,
Mohammad Rafsan,
Mohammed Eunus Ali
Abstract:
Bangla ty** is mostly performed using English keyboard and can be highly erroneous due to the presence of compound and similarly pronounced letters. Spelling correction of a misspelled word requires understanding of word ty** pattern as well as the context of the word usage. A specialized BERT model named BSpell has been proposed in this paper targeted towards word for word correction in sente…
▽ More
Bangla ty** is mostly performed using English keyboard and can be highly erroneous due to the presence of compound and similarly pronounced letters. Spelling correction of a misspelled word requires understanding of word ty** pattern as well as the context of the word usage. A specialized BERT model named BSpell has been proposed in this paper targeted towards word for word correction in sentence level. BSpell contains an end-to-end trainable CNN sub-model named SemanticNet along with specialized auxiliary loss. This allows BSpell to specialize in highly inflected Bangla vocabulary in the presence of spelling errors. Furthermore, a hybrid pretraining scheme has been proposed for BSpell that combines word level and character level masking. Comparison on two Bangla and one Hindi spelling correction dataset shows the superiority of our proposed approach. BSpell is available as a Bangla spell checking tool via GitHub: https://github.com/Hasiburshanto/Bangla-Spell-Checker
△ Less
Submitted 31 December, 2023; v1 submitted 20 August, 2022;
originally announced August 2022.
-
SystemMatch: optimizing preclinical drug models to human clinical outcomes via generative latent-space matching
Authors:
Scott Gigante,
Varsha G. Raghavan,
Amanda M. Robinson,
Robert A. Barton,
Adeeb H. Rahman,
Drausin F. Wulsin,
Jacques Banchereau,
Noam Solomon,
Luis F. Voloch,
Fabian J. Theis
Abstract:
Translating the relevance of preclinical models ($\textit{in vitro}$, animal models, or organoids) to their relevance in humans presents an important challenge during drug development. The rising abundance of single-cell genomic data from human tumors and tissue offers a new opportunity to optimize model systems by their similarity to targeted human cell types in disease. In this work, we introduc…
▽ More
Translating the relevance of preclinical models ($\textit{in vitro}$, animal models, or organoids) to their relevance in humans presents an important challenge during drug development. The rising abundance of single-cell genomic data from human tumors and tissue offers a new opportunity to optimize model systems by their similarity to targeted human cell types in disease. In this work, we introduce SystemMatch to assess the fit of preclinical model systems to an $\textit{in sapiens}$ target population and to recommend experimental changes to further optimize these systems. We demonstrate this through an application to develo** $\textit{in vitro}$ systems to model human tumor-derived suppressive macrophages. We show with held-out $\textit{in vivo}$ controls that our pipeline successfully ranks macrophage subpopulations by their biological similarity to the target population, and apply this analysis to rank a series of 18 $\textit{in vitro}$ macrophage systems perturbed with a variety of cytokine stimulations. We extend this analysis to predict the behavior of 66 $\textit{in silico}$ model systems generated using a perturbational autoencoder and apply a $k$-medoids approach to recommend a subset of these model systems for further experimental development in order to fully explore the space of possible perturbations. Through this use case, we demonstrate a novel approach to model system development to generate a system more similar to human biology.
△ Less
Submitted 14 May, 2022;
originally announced May 2022.
-
Singularity: Planet-Scale, Preemptive and Elastic Scheduling of AI Workloads
Authors:
Dharma Shukla,
Muthian Sivathanu,
Srinidhi Viswanatha,
Bhargav Gulavani,
Rimma Nehme,
Amey Agrawal,
Chen Chen,
Nipun Kwatra,
Ramachandran Ramjee,
Pankaj Sharma,
Atul Katiyar,
Vipul Modi,
Vaibhav Sharma,
Abhishek Singh,
Shreshth Singhal,
Kaustubh Welankar,
Lu Xun,
Ravi Anupindi,
Karthik Elangovan,
Hasibur Rahman,
Zhou Lin,
Rahul Seetharaman,
Cheng Xu,
Eddie Ailijiang,
Suresh Krishnappa
, et al. (1 additional authors not shown)
Abstract:
Lowering costs by driving high utilization across deep learning workloads is a crucial lever for cloud providers. We present Singularity, Microsoft's globally distributed scheduling service for highly-efficient and reliable execution of deep learning training and inference workloads. At the heart of Singularity is a novel, workload-aware scheduler that can transparently preempt and elastically sca…
▽ More
Lowering costs by driving high utilization across deep learning workloads is a crucial lever for cloud providers. We present Singularity, Microsoft's globally distributed scheduling service for highly-efficient and reliable execution of deep learning training and inference workloads. At the heart of Singularity is a novel, workload-aware scheduler that can transparently preempt and elastically scale deep learning workloads to drive high utilization without impacting their correctness or performance, across a global fleet of AI accelerators (e.g., GPUs, FPGAs).
All jobs in Singularity are preemptable, migratable, and dynamically resizable (elastic) by default: a live job can be dynamically and transparently (a) preempted and migrated to a different set of nodes, cluster, data center or a region and resumed exactly from the point where the execution was preempted, and (b) resized (i.e., elastically scaled-up/down) on a varying set of accelerators of a given type. Our mechanisms are transparent in that they do not require the user to make any changes to their code or require using any custom libraries that may limit flexibility. Additionally, our approach significantly improves the reliability of deep learning workloads. We show that the resulting efficiency and reliability gains with Singularity are achieved with negligible impact on the steady-state performance. Finally, our design approach is agnostic of DNN architectures and handles a variety of parallelism strategies (e.g., data/pipeline/model parallelism).
△ Less
Submitted 21 February, 2022; v1 submitted 15 February, 2022;
originally announced February 2022.
-
Single-frame label-free cell tomography at speed of more than 10,000 volumes per second
Authors:
Baoliang Ge,
Yan** He,
Mo Deng,
Md Habibur Rahman,
Yi** Wang,
Ziling Wu,
Chung Hong N. Wong,
Michael K. Chan,
Yi-** Ho,
Liting Duan,
Zahid Yaqoob,
Peter T. C. So,
George Barbastathis,
Renjie Zhou
Abstract:
Three-dimensional (3D) image cytometers may significantly improve the cell analysis accuracy to facilitate biological discoveries and clinical diagnosis, but their development is curbed by the low imaging throughput. Here we report SIngle-frame LAbel-free Cell Tomography (SILACT) with diffraction-limited resolution and unprecedented imaging speed of over 10,000 volumes/second. SILACT is built on a…
▽ More
Three-dimensional (3D) image cytometers may significantly improve the cell analysis accuracy to facilitate biological discoveries and clinical diagnosis, but their development is curbed by the low imaging throughput. Here we report SIngle-frame LAbel-free Cell Tomography (SILACT) with diffraction-limited resolution and unprecedented imaging speed of over 10,000 volumes/second. SILACT is built on a unique interferometric microscope with angle-multiplexing illumination and a pre-trained physics-incorporating Deep Neural Network for efficient 3D Refractive Index (RI) reconstruction, from which 3D morphological and biophysical parameters of cells are extracted. With microfluidics and a high-speed camera, SILACT is capable of imaging over 20,000 cells/second and distinguishing different cell species during rapid measurements of large cell quantities, as well as visualizing shear-induced 3D transient deformation of red blood cells on a sub-millisecond scale.
△ Less
Submitted 7 February, 2022;
originally announced February 2022.
-
Artificial Intelligence-driven Image Analysis of Bacterial Cells and Biofilms
Authors:
Shankarachary Ragi,
Md Hafizur Rahman,
Jamison Duckworth,
Kalimuthu Jawaharraj,
Parvathi Chundi,
Venkataramana Gadhamshetty
Abstract:
The current study explores an artificial intelligence framework for measuring the structural features from microscopy images of the bacterial biofilms. Desulfovibrio alaskensis G20 (DA-G20) grown on mild steel surfaces is used as a model for sulfate reducing bacteria that are implicated in microbiologically influenced corrosion problems. Our goal is to automate the process of extracting the geomet…
▽ More
The current study explores an artificial intelligence framework for measuring the structural features from microscopy images of the bacterial biofilms. Desulfovibrio alaskensis G20 (DA-G20) grown on mild steel surfaces is used as a model for sulfate reducing bacteria that are implicated in microbiologically influenced corrosion problems. Our goal is to automate the process of extracting the geometrical properties of the DA-G20 cells from the scanning electron microscopy (SEM) images, which is otherwise a laborious and costly process. These geometric properties are a biofilm phenotype that allow us to understand how the biofilm structurally adapts to the surface properties of the underlying metals, which can lead to better corrosion prevention solutions. We adapt two deep learning models: (a) a deep convolutional neural network (DCNN) model to achieve semantic segmentation of the cells, (d) a mask region-convolutional neural network (Mask R-CNN) model to achieve instance segmentation of the cells. These models are then integrated with moment invariants approach to measure the geometric characteristics of the segmented cells. Our numerical studies confirm that the Mask-RCNN and DCNN methods are 227x and 70x faster respectively, compared to the traditional method of manual identification and measurement of the cell geometric properties by the domain experts.
△ Less
Submitted 2 December, 2021;
originally announced December 2021.
-
Paradigm Shift in Language Modeling: Revisiting CNN for Modeling Sanskrit Originated Bengali and Hindi Language
Authors:
Chowdhury Rafeed Rahman,
MD. Hasibur Rahman,
Mohammad Rafsan,
Samiha Zakir,
Mohammed Eunus Ali,
Rafsanjani Muhammod
Abstract:
Though there has been a large body of recent works in language modeling (LM) for high resource languages such as English and Chinese, the area is still unexplored for low resource languages like Bengali and Hindi. We propose an end to end trainable memory efficient CNN architecture named CoCNN to handle specific characteristics such as high inflection, morphological richness, flexible word order a…
▽ More
Though there has been a large body of recent works in language modeling (LM) for high resource languages such as English and Chinese, the area is still unexplored for low resource languages like Bengali and Hindi. We propose an end to end trainable memory efficient CNN architecture named CoCNN to handle specific characteristics such as high inflection, morphological richness, flexible word order and phonetical spelling errors of Bengali and Hindi. In particular, we introduce two learnable convolutional sub-models at word and at sentence level that are end to end trainable. We show that state-of-the-art (SOTA) Transformer models including pretrained BERT do not necessarily yield the best performance for Bengali and Hindi. CoCNN outperforms pretrained BERT with 16X less parameters, and it achieves much better performance than SOTA LSTM models on multiple real-world datasets. This is the first study on the effectiveness of different architectures drawn from three deep learning paradigms - Convolution, Recurrent, and Transformer neural nets for modeling two widely used languages, Bengali and Hindi.
△ Less
Submitted 4 November, 2021; v1 submitted 25 October, 2021;
originally announced October 2021.
-
Jet Drift and Collective Flow in Heavy-Ion Collisions
Authors:
Logan Antiporda,
Joseph Bahder,
Hasan Rahman,
Matthew D. Sievert
Abstract:
We study the tomographic applications of a new phenomenon we dub "jet drift" -- the deflection of high-energy particles and jets toward the direction of a flowing medium -- to the quark-gluon plasma produced in heavy-ion collisions. While the physics of jet drift is quite general, for specificity we consider the case of photon-jet production at mid-rapidity. Beginning with the simplest possible mo…
▽ More
We study the tomographic applications of a new phenomenon we dub "jet drift" -- the deflection of high-energy particles and jets toward the direction of a flowing medium -- to the quark-gluon plasma produced in heavy-ion collisions. While the physics of jet drift is quite general, for specificity we consider the case of photon-jet production at mid-rapidity. Beginning with the simplest possible model, a large slab of uniformly flowing plasma, we systematically introduce the geometrical elements of a heavy-ion collision in a simple optical Glauber model. We find that the moving medium causes the jet to drift in the direction of the flow, bending its trajectory and leaving detailed signatures of the flow pattern in the distribution of $γ+ \: \mathrm{jet}$ acoplanarities. In the elliptical geometries produced in non-central collisions, this drift effect leads to a strong geometry coupling which persists despite the addition of event-by-event fluctuations in the jet production point, impact parameter, and acoplanarity. We propose a new observable to measure the jet drift effect through the correlation of $γ+ \: \mathrm{jet}$ acoplanarities with the elliptic flow of soft particles. Preliminary estimates suggest this correlation may be studied at sPHENIX and the LHC.
△ Less
Submitted 7 October, 2021;
originally announced October 2021.
-
Hybrid Ant Swarm-Based Data Clustering
Authors:
Md Ali Azam,
Abir Hossen,
Md Hafizur Rahman
Abstract:
Biologically inspired computing techniques are very effective and useful in many areas of research including data clustering. Ant clustering algorithm is a nature-inspired clustering technique which is extensively studied for over two decades. In this study, we extend the ant clustering algorithm (ACA) to a hybrid ant clustering algorithm (hACA). Specifically, we include a genetic algorithm in sta…
▽ More
Biologically inspired computing techniques are very effective and useful in many areas of research including data clustering. Ant clustering algorithm is a nature-inspired clustering technique which is extensively studied for over two decades. In this study, we extend the ant clustering algorithm (ACA) to a hybrid ant clustering algorithm (hACA). Specifically, we include a genetic algorithm in standard ACA to extend the hybrid algorithm for better performance. We also introduced novel pick up and drop off rules to speed up the clustering performance. We study the performance of the hACA algorithm and compare with standard ACA as a benchmark.
△ Less
Submitted 11 July, 2021;
originally announced July 2021.
-
Software Process Improvement Based on Defect Prevention Using Capability and Testing Model Integration in Extreme Programming
Authors:
Md. Habibur Rahman,
Ziaur Rahman,
Md. Al - Mustanjid,
Muhammad Shahin Uddin,
Mehedy Hasan Rafsan Jany
Abstract:
Nowadays, Software Process Improvement popularly known as SPI has been able to receive an immense concern in the continuous process to purify software quality. Several Agile methodologies previously have worked with Extreme programming (XP). Before improving the process, defect prevention (DP) is inevitable. In addition, DP largely depends on defect detection either found earlier in the design and…
▽ More
Nowadays, Software Process Improvement popularly known as SPI has been able to receive an immense concern in the continuous process to purify software quality. Several Agile methodologies previously have worked with Extreme programming (XP). Before improving the process, defect prevention (DP) is inevitable. In addition, DP largely depends on defect detection either found earlier in the design and implementation stages or held in the testing phases. However, testing maturity model integration (TMMI) has a crucial aspect in DP as well as process improvement of the software. In particular, when software gets validated by being tested and fixed the defects up, it achieves the maximum capability maturity model integration (CMMI) aiming the process improvement. Here, the article has proposed an improved defect detection and prevention model to enhance the software process following the approach of XP. Besides, as a unique contribution, we have united the capability and testing model integration to ensure better SPI.
△ Less
Submitted 11 July, 2021;
originally announced July 2021.
-
Some generalized geometric constants for discrete Morrey spaces
Authors:
Hairur Rahman,
Hendra Gunawan
Abstract:
In this paper, we calculate four geometric constants for discrete Morrey spaces. The constants are generalized von Neumann-Jordan constant, modified von Neumann-Jordan constant, von Neumann-Jordan type constant, and Zbäganu constant. The four constants measure uniformly nonsquareness of the above spaces. We obtain that the value of each of the four constants for the above spaces is two, which mean…
▽ More
In this paper, we calculate four geometric constants for discrete Morrey spaces. The constants are generalized von Neumann-Jordan constant, modified von Neumann-Jordan constant, von Neumann-Jordan type constant, and Zbäganu constant. The four constants measure uniformly nonsquareness of the above spaces. We obtain that the value of each of the four constants for the above spaces is two, which means that the spaces are NOT uniformly nonsquare.
△ Less
Submitted 27 April, 2021;
originally announced April 2021.
-
Gated Ensemble of Spatio-temporal Mixture of Experts for Multi-task Learning in Ride-hailing System
Authors:
M. H. Rahman,
S. M. Rifaat,
S. N. Sadeek,
M. Abrar,
D. Wang
Abstract:
Designing spatio-temporal forecasting models separately in a task-wise and city-wise manner poses a burden for the expanding transportation network companies. Therefore, a multi-task learning architecture is proposed in this study by develo** gated ensemble of spatio-temporal mixture of experts network (GESME-Net) with convolutional recurrent neural network (CRNN), convolutional neural network (…
▽ More
Designing spatio-temporal forecasting models separately in a task-wise and city-wise manner poses a burden for the expanding transportation network companies. Therefore, a multi-task learning architecture is proposed in this study by develo** gated ensemble of spatio-temporal mixture of experts network (GESME-Net) with convolutional recurrent neural network (CRNN), convolutional neural network (CNN), and recurrent neural network (RNN) for simultaneously forecasting spatio-temporal tasks in a city as well as across different cities. Furthermore, a task adaptation layer is integrated with the architecture for learning joint representation in multi-task learning and revealing the contribution of the input features utilized in prediction. The proposed architecture is tested with data from Didi Chuxing for: (i) simultaneously forecasting demand and supply-demand gap in Bei**g, and (ii) simultaneously forecasting demand across Chengdu and Xian. In both scenarios, models from our proposed architecture outperformed the single-task and multi-task deep learning benchmarks and ensemble-based machine learning algorithms.
△ Less
Submitted 30 November, 2023; v1 submitted 30 December, 2020;
originally announced December 2020.
-
Software, Attacker and Asset-centric Approach for Improving Security in System Development Process
Authors:
Abdul Hadi bin Abdul Rahman,
Abdullah Nazir,
Kim Tae Hyun,
Tan Horng Yarng,
Fatima-tuz-Zahra
Abstract:
Secure development process is a procedure taken by developers to ensure the programs developed are following the general security standards and will always be up to date so that the outcomes are well secured and obedient. As a software developer, it is very crucial to implement and develop a highly secured and reliable program for clients and users. In this current digital world where everything i…
▽ More
Secure development process is a procedure taken by developers to ensure the programs developed are following the general security standards and will always be up to date so that the outcomes are well secured and obedient. As a software developer, it is very crucial to implement and develop a highly secured and reliable program for clients and users. In this current digital world where everything is advancing faster than we can ever think of, most of the old security policies can no longer be implemented alone. The consequences and impacts that could be brought upon a company are really huge if the software applications are not secured according to the modern trend. Therefore, in this paper research is done to asses the security integration in software development process. The concept and the purpose of this research is to provide insight about the current issues and challenges faced by most of the software developers in terms of secure software development. With a better and clearer explanation of these issues, challenges, and methodologies adopted to overcome them are discussed which can potentially provide a better and higher level of security along with better software programmers and client relationship. To comply with future demands and threats, security concerns need to be involved in all phases while develo** a software system. Therefore, an effort is made to investigate and contribute to this domain through this paper.
△ Less
Submitted 20 December, 2020;
originally announced December 2020.
-
Using Spatio-temporal Deep Learning for Forecasting Demand and Supply-demand Gap in Ride-hailing System with Anonymised Spatial Adjacency Information
Authors:
M. H. Rahman,
S. M. Rifaat
Abstract:
To reduce passenger waiting time and driver search friction, ride-hailing companies need to accurately forecast spatio-temporal demand and supply-demand gap. However, due to spatio-temporal dependencies pertaining to demand and supply-demand gap in a ride-hailing system, making accurate forecasts for both demand and supply-demand gap is a difficult task. Furthermore, due to confidentiality and pri…
▽ More
To reduce passenger waiting time and driver search friction, ride-hailing companies need to accurately forecast spatio-temporal demand and supply-demand gap. However, due to spatio-temporal dependencies pertaining to demand and supply-demand gap in a ride-hailing system, making accurate forecasts for both demand and supply-demand gap is a difficult task. Furthermore, due to confidentiality and privacy issues, ride-hailing data are sometimes released to the researchers by removing spatial adjacency information of the zones, which hinders the detection of spatio-temporal dependencies. To that end, a novel spatio-temporal deep learning architecture is proposed in this paper for forecasting demand and supply-demand gap in a ride-hailing system with anonymized spatial adjacency information, which integrates feature importance layer with a spatio-temporal deep learning architecture containing one-dimensional convolutional neural network (CNN) and zone-distributed independently recurrent neural network (IndRNN). The developed architecture is tested with real-world datasets of Didi Chuxing, which shows that our models based on the proposed architecture can outperform conventional time-series models (e.g., ARIMA) and machine learning models (e.g., gradient boosting machine, distributed random forest, generalized linear model, artificial neural network). Additionally, the feature importance layer provides an interpretation of the model by revealing the contribution of the input features utilized in prediction.
△ Less
Submitted 30 November, 2021; v1 submitted 16 December, 2020;
originally announced December 2020.
-
Predictive process mining by network of classifiers and clusterers: the PEDF model
Authors:
Amir Mohammad Esmaieeli Sikaroudi,
Md Habibor Rahman
Abstract:
In this research, a model is proposed to learn from event log and predict future events of a system. The proposed PEDF model learns based on events' sequences, durations, and extra features. The PEDF model is built by a network made of standard clusterers and classifiers, and it has high flexibility to update the model iteratively. The model requires to extract two sets of data from log files i.e.…
▽ More
In this research, a model is proposed to learn from event log and predict future events of a system. The proposed PEDF model learns based on events' sequences, durations, and extra features. The PEDF model is built by a network made of standard clusterers and classifiers, and it has high flexibility to update the model iteratively. The model requires to extract two sets of data from log files i.e., transition differences, and cumulative features. The model has one layer of memory which means that each transition is dependent on both the current event and the previous event. To evaluate the performance of the proposed model, it is compared to the Recurrent Neural Network and Sequential Prediction models, and it outperforms them. Since there is missing performance measure for event log prediction models, three measures are proposed.
△ Less
Submitted 22 November, 2020;
originally announced November 2020.
-
Understanding Mechanical Properties and Failure Mechanism of Germanium-Silicon Alloy at Nanoscale
Authors:
Md. Habibur Rahman,
Emdadul Haque Chowdhury,
Md Mahbubul Islam
Abstract:
We used molecular dynamics (MD) simulations to investigate the mechanical properties of cubic zinc blende (ZB) Si0.5Ge0.5 alloy nanowire (NW). Tersoff potential is employed to elucidate the effect of nanowire size, crystal orientations, and temperature on the material properties. We found that the reduction in the cross-sectional area results in lower ultimate tensile strength and Youngs modulus o…
▽ More
We used molecular dynamics (MD) simulations to investigate the mechanical properties of cubic zinc blende (ZB) Si0.5Ge0.5 alloy nanowire (NW). Tersoff potential is employed to elucidate the effect of nanowire size, crystal orientations, and temperature on the material properties. We found that the reduction in the cross-sectional area results in lower ultimate tensile strength and Youngs modulus of this alloy which can be attributed to the increased surface to volume ratio. The [111] oriented Si0.5Ge0.5 NW exhibits the highest fracture strength compared to other crystal orientations but [110] orientation possesses the highest fracture toughness. The effect of temperature depicts an inverse relationship with the ultimate tensile strength and Youngs modulus. The increased temperature facilitates the failure of the material, thus degrades the materials strength. Our study reveals that the vacancy defects introduced via removal of either Si or Ge atoms exhibit similar behavior, and with the increase in vacancy concentration, both ultimate tensile strength and Youngs modulus reduces linearly. We further illustrate the failure characteristics of Si0.5Ge0.5 NW at two extremely low and high temperatures. The intrinsic failure characteristics of Si0.5Ge0.5 alloy is found to be insensitive to the temperature. Interestingly, at both temperatures, with the increasing strain, the cross-section of Si0.5Ge0.5 eventually resembles a neck as typically observed in ductile materials, although the NW failure is brittle in nature. Overall, this work offers a new perspective on understanding material properties and failure characteristics of ZB Si0.5Ge0.5 NW that will be a guide for designing Si-Ge based nanodevices.
△ Less
Submitted 27 April, 2020;
originally announced April 2020.
-
Structuring Communities for Sharing Human Digital Memories in a Social P2P Network
Authors:
Haseeb Ur Rahman,
Madjid Merabti,
David Llewellyn-Jones,
Sud Sudirman,
Anwar Ghani
Abstract:
A community is sub-network inside P2P networks that partition the network into groups of similar peers to improve performance by reducing network traffic and high search query success rate. Large communities are common in online social networks than traditional file-sharing P2P networks because many people capture huge amounts of data through their lives. This increases the number of hosts bearing…
▽ More
A community is sub-network inside P2P networks that partition the network into groups of similar peers to improve performance by reducing network traffic and high search query success rate. Large communities are common in online social networks than traditional file-sharing P2P networks because many people capture huge amounts of data through their lives. This increases the number of hosts bearing similar data in the network and hence increases the size of communities. This article presents a Memory Thread-based Communities for our entity-based social P2P network that partition the network into groups of peers sharing data belonging to an entity - person, place, object or interest, having its own digital memory or be a part another memory. These connected peers having further similarities by organizing the network using linear orderings. A Memory-Thread is the collection of digital memories having a common reference key and organized according to some form of correlation. The simulation results show an increase in network performance for the proposed scheme along with a decrease in network overhead and higher query success rate compared to other similar schemes. The network maintains its performance even while the network traffic and size increase.
△ Less
Submitted 17 April, 2020;
originally announced April 2020.
-
Atomistic Investigation on the Mechanical Properties and Failure Behavior of Zinc Blende Cadmium Selenide (CdSe) Nanowire
Authors:
Emdadul Haque Chowdhury,
Md. Habibur Rahman,
Md Mahbubul Islam
Abstract:
The mechanical properties of Cadmium Selenide (CdSe) nanowire is an emerging issue due to its application in semiconductor and optoelectronics industries. In this paper, we conducted molecular dynamics (MD) simulations to investigate the temperature-dependent mechanical properties and failure behavior of Zinc-Blende (ZB) CdSe nanowire under uniaxial tensile deformation. We employed Stillinger-Webe…
▽ More
The mechanical properties of Cadmium Selenide (CdSe) nanowire is an emerging issue due to its application in semiconductor and optoelectronics industries. In this paper, we conducted molecular dynamics (MD) simulations to investigate the temperature-dependent mechanical properties and failure behavior of Zinc-Blende (ZB) CdSe nanowire under uniaxial tensile deformation. We employed Stillinger-Weber (SW) potential to describe the inter-atomic interactions. The effect of variation of temperatures (100 K-600 K), sizes, and crystal orientation on the tensile response of the CdSe nanowires is investigated. Our simulation results suggest that both ultimate tensile strength and Youngs modulus of CdSe have an inverse relationship with temperature. From 100K to 600K, the ZB CdSe exhibits brittle type failure thus there is no brittle to ductile transition temperature found. Results also suggest that size has a significant effect on the mechanical properties of CdSe nanowire. It has been found that as the cross-sectional area increases both ultimate tensile stress and Youngs modulus increases as well. The [111] oriented ZB CdSe shows the largest ultimate tensile strength, Youngs modulus and fracture toughness whereas the values are lowest for [100] orientation. The [110] orientation shows the largest failure strain compared to other orientations. Finally, failure mechanisms of CdSe nanowire are also investigated at 100K and 600K. We noticed that at 100K temperature [100] oriented ZB CdSe fails along {111} cleavage plane however in the case of 600 K temperature, both {111} and {100} planes are activated and cause fracture of CdSe nanowire at lower strain value. This study can guide to design ZB CdSe based solar cell, optoelectronic and semiconductor devices by presenting a comprehensive understanding of the mechanical and fracture characteristics of this nanowire.
△ Less
Submitted 16 April, 2020;
originally announced April 2020.
-
Investigation on the Mechanical Properties of Functionally Graded Nickel and Aluminium Alloy by Molecular Dynamics Study
Authors:
Shailee Mitra,
Md. Habibur Rahman,
Mohammad Motalab,
Tawfiqur Rakib,
Pritom Bose
Abstract:
Functionally graded materials (FGMs), have drawn considerable attention of the worldwide researchers and scientific community because of its unique mechanical, thermal and electrical properties which may be exploited by varying the compositions gradually over volume. This makes FGM multifunctional material (properties changing continuously in a certain direction) for specific purpose without creat…
▽ More
Functionally graded materials (FGMs), have drawn considerable attention of the worldwide researchers and scientific community because of its unique mechanical, thermal and electrical properties which may be exploited by varying the compositions gradually over volume. This makes FGM multifunctional material (properties changing continuously in a certain direction) for specific purpose without creating any phase interface thus making it superior to its composite counterparts. In this paper, we applied Molecular Dynamics (MD) approach to investigate the mechanical properties of functional graded Ni-Al alloy with Ni coating by applying uniaxial tension. Nickel-Aluminum (Ni-Al) alloy has been used extensively in the industry due to its remarkable mechanical and thermal properties. Our aim is to find the difference in material behavior when we change the grading function (linear, elliptical and parabolic), temperature and crystallographic direction. We also observe distinct type of failure mechanism for different grading function at different temperature. Close observation reveals that elliptically graded Ni-Al alloy has high tensile strength at low temperature whereas at high temperature, the highest tensile strength is found for parabolic grading. Besides, at any temperature, the parabolically graded Ni-Al alloy shows superior elasticity than its elliptical and linear counterpart. Moreover, it is also observed that [111] crystallographic direction for this alloy demonstrates more resistivity towards failure than any other crystallographic direction. It is found that lattice disorder plays a significant role on the mechanical properties of Functionally Graded Materials (FGMs). This paper details a pathway to tune the mechanical properties like Young's Modulus, plasticity and yield strength at molecular level by varying the composition of materials along different grading functions.
△ Less
Submitted 12 April, 2020;
originally announced April 2020.
-
Generalized Von Neumann-Jordan Constant for Morrey Spaces and Small Morrey Spaces
Authors:
Hairur Rahman,
Hendra Gunawan
Abstract:
In this paper we calculate some geometric constants for Morrey spaces and small Morrey spaces, namely generalized Von Neumann-Jordan constant, modified Von Neumann-Jordan constants, and Zbáganu constant. All these constants measure the uniformly nonsquareness of the spaces. We obtain that their values are the same as the value of Von Neumann-Jordan constant for Morrey spaces and small Morrey space…
▽ More
In this paper we calculate some geometric constants for Morrey spaces and small Morrey spaces, namely generalized Von Neumann-Jordan constant, modified Von Neumann-Jordan constants, and Zbáganu constant. All these constants measure the uniformly nonsquareness of the spaces. We obtain that their values are the same as the value of Von Neumann-Jordan constant for Morrey spaces and small Morrey spaces.
△ Less
Submitted 4 April, 2020;
originally announced April 2020.
-
Synthetic Error Dataset Generation Mimicking Bengali Writing Pattern
Authors:
Md. Habibur Rahman Sifat,
Chowdhury Rafeed Rahman,
Mohammad Rafsan,
Md. Hasibur Rahman
Abstract:
While writing Bengali using English keyboard, users often make spelling mistakes. The accuracy of any Bengali spell checker or paragraph correction module largely depends on the kind of error dataset it is based on. Manual generation of such error dataset is a cumbersome process. In this research, We present an algorithm for automatic misspelled Bengali word generation from correct word through an…
▽ More
While writing Bengali using English keyboard, users often make spelling mistakes. The accuracy of any Bengali spell checker or paragraph correction module largely depends on the kind of error dataset it is based on. Manual generation of such error dataset is a cumbersome process. In this research, We present an algorithm for automatic misspelled Bengali word generation from correct word through analyzing Bengali writing pattern using QWERTY layout English keyboard. As part of our analysis, we have formed a list of most commonly used Bengali words, phonetically similar replaceable clusters, frequently mispressed replaceable clusters, frequently mispressed insertion prone clusters and some rules for Juktakkhar (constant letter clusters) handling while generating errors.
△ Less
Submitted 21 May, 2020; v1 submitted 6 March, 2020;
originally announced March 2020.
-
Probabilistic principal component and linear discriminant analysis of interaction of 1064 nm CW laser with ICP plasma: Anti-Stokes cooling due to analogue black hole
Authors:
M. F. Yilmaz,
H. U. Rahman,
F. Paletou,
F Yilmaz,
T. Malas,
B. Karlik
Abstract:
Pattern recognition and machine learning techniques are known to play an emerging role for studying underlying physics of light-matter interaction. While on the subject, photon condensation and Anti-Stokes cooling remain compelling phenomena of laser-underdense plasma interaction. In this work, the interaction of a 1064 nm continuum-wave laser with inductively-coupled plasma (ICP) of Mercury(Hg) h…
▽ More
Pattern recognition and machine learning techniques are known to play an emerging role for studying underlying physics of light-matter interaction. While on the subject, photon condensation and Anti-Stokes cooling remain compelling phenomena of laser-underdense plasma interaction. In this work, the interaction of a 1064 nm continuum-wave laser with inductively-coupled plasma (ICP) of Mercury(Hg) has been studied by probabilistic pattern recognition over observed time resolved spectral data.3D vector fields obtained by the probabilistic pattern recognition over spectral database proficiently illuminates the analogue black hole (ABH) and its sonic horizon in which homoclinic orbit Whistler waves are exited. Vector spectra show the collective behavior of condensation and anti-Stokes cooling is due to the electronic transitions of Hg1 trapped by the phonon sink of ABH of laser. Modeling of subsonic phonon vector spectrum obtained by the probabilistic linear discriminant analysis(PLDA) estimates the 0.70 nanoKelvin of temperature of the sink region of ABH.
△ Less
Submitted 2 December, 2020; v1 submitted 19 February, 2020;
originally announced February 2020.
-
A Hybrid Approach Towards Two Stage Bengali Question Classification Utilizing Smart Data Balancing Technique
Authors:
Md. Hasibur Rahman,
Chowdhury Rafeed Rahman,
Ruhul Amin,
Md. Habibur Rahman Sifat,
Afra Anika
Abstract:
Question classification (QC) is the primary step of the Question Answering (QA) system. Question Classification (QC) system classifies the questions in particular classes so that Question Answering (QA) System can provide correct answers for the questions. Our system categorizes the factoid type questions asked in natural language after extracting features of the questions. We present a two stage…
▽ More
Question classification (QC) is the primary step of the Question Answering (QA) system. Question Classification (QC) system classifies the questions in particular classes so that Question Answering (QA) System can provide correct answers for the questions. Our system categorizes the factoid type questions asked in natural language after extracting features of the questions. We present a two stage QC system for Bengali. It utilizes one dimensional convolutional neural network for classifying questions into coarse classes in the first stage. Word2vec representation of existing words of the question corpus have been constructed and used for assisting 1D CNN. A smart data balancing technique has been employed for giving data hungry convolutional neural network the advantage of a greater number of effective samples to learn from. For each coarse class, a separate Stochastic Gradient Descent (SGD) based classifier has been used in order to differentiate among the finer classes within that coarse class. TF-IDF representation of each word has been used as feature for the SGD classifiers implemented as part of second stage classification. Experiments show the effectiveness of our proposed method for Bengali question classification.
△ Less
Submitted 2 March, 2020; v1 submitted 29 November, 2019;
originally announced December 2019.
-
The staged Z-pinch as a potential high-gain fusion energy source: Rebuttal to I. R. Lindemuth et al
Authors:
E. Ruskov,
P. Ney,
H. U. Rahman
Abstract:
Magneto-Inertial Fusion Technology Inc. has been working on a Z-pinch concept where a high atomic number liner is compressing a fusion fuel (deuterium-deuterium, or deuterium-tritium) target. The viability of this so called Staged Z-pinch (SZP) concept as a potential high-gain fusion energy source has been questioned in a recent publication by Lindemuth et al [1]. The authors attempted to reproduc…
▽ More
Magneto-Inertial Fusion Technology Inc. has been working on a Z-pinch concept where a high atomic number liner is compressing a fusion fuel (deuterium-deuterium, or deuterium-tritium) target. The viability of this so called Staged Z-pinch (SZP) concept as a potential high-gain fusion energy source has been questioned in a recent publication by Lindemuth et al [1]. The authors attempted to reproduce previously published MACH2 simulation results [2-4] for Z-machine parameters using three different MHD codes: Hydra, Raven and MHRDR. Their conclusion was that "there is no conceivable modification of the parameters that would lead to high-gain fusion conditions using these other codes". Although they used well established MHD codes to check the SZP concept, and correct input current profiles, we show that their Lagrangian formalism was likely not treating the vacuum/liner boundary properly. Proper modeling using Lagrangian, Eulerian or Adaptive Lagrangian-Eulerian (ALE) formalism indeed confirms that fusion energy production > 1 MJ can be expected without alpha heating, and significantly higher if alpha heating is included. It is shown that magnetosonic shocks play an important role in preheating the target plasma and in piling liner mass at the liner/target interface, which substantially increases the ram pressure just before the pinch stagnation time.
△ Less
Submitted 20 November, 2019;
originally announced November 2019.
-
A Comprehensive Comparison of Machine Learning Based Methods Used in Bengali Question Classification
Authors:
Afra Anika,
Md. Hasibur Rahman,
Salekul Islam,
Abu Shafin Mohammad Mahdee Jameel,
Chowdhury Rafeed Rahman
Abstract:
QA classification system maps questions asked by humans to an appropriate answer category. A sound question classification (QC) system model is the pre-requisite of a sound QA system. This work demonstrates phases of assembling a QA type classification model. We present a comprehensive comparison (performance and computational complexity) among some machine learning based approaches used in QC for…
▽ More
QA classification system maps questions asked by humans to an appropriate answer category. A sound question classification (QC) system model is the pre-requisite of a sound QA system. This work demonstrates phases of assembling a QA type classification model. We present a comprehensive comparison (performance and computational complexity) among some machine learning based approaches used in QC for Bengali language.
△ Less
Submitted 19 November, 2019; v1 submitted 8 November, 2019;
originally announced November 2019.
-
Performance Evaluation of VDI Environment
Authors:
Hafiz ur Rahman,
Farag Azzedin,
Ahmad Shawahna,
Faisal Sajjad,
Alyahya Saleh Abdulrahman
Abstract:
Virtualization technology is widely used for sharing the abilities of computer systems by splitting the resources among various virtual PCs. In traditional computer systems, the utilization of hardware is not maximized and the resources are not fully consumed. By using the virtualization technology, the maximum utilization of computer system hardware is possible. Today, many organizations especial…
▽ More
Virtualization technology is widely used for sharing the abilities of computer systems by splitting the resources among various virtual PCs. In traditional computer systems, the utilization of hardware is not maximized and the resources are not fully consumed. By using the virtualization technology, the maximum utilization of computer system hardware is possible. Today, many organizations especially educational institutes are adopting virtualization technology to minimize the costs and increase the flexibility, responsiveness, and efficiency. In this paper, we built a virtual educational lab in which we successfully implemented Virtual Desktop Infrastructure (VDI) and created more than 30 virtual desktops. The virtual desktops are created on the Citrix XenServer hypervisor using the Citrix XenDesktop. Finally, we used benchmarking software tool called Login VSI in order to measure the performance of the virtual desktop infrastructure and the XenServer hypervisor. The results have shown that the system performs well with 30 virtual desktops without reaching the saturation point.
△ Less
Submitted 1 November, 2019;
originally announced November 2019.
-
Minus HELLO: HELLO Devoid Protocols for Energy Preservation in Mobile Ad Hoc Networks
Authors:
Anuradha Banerjee,
Abu Sufian,
Paramartha Dutta,
M M Hafizur Rahman
Abstract:
In mobile ad-hoc networks, nodes have to transmit HELLO or Route Maintenance messages at regular intervals, and all nodes residing within its radio range, reply with an acknowledgment message informing their node identifier, current location, and radio-range. Regular transmitting these messages consume a significant amount of battery power in nodes, especially when the set of down-link neighbors d…
▽ More
In mobile ad-hoc networks, nodes have to transmit HELLO or Route Maintenance messages at regular intervals, and all nodes residing within its radio range, reply with an acknowledgment message informing their node identifier, current location, and radio-range. Regular transmitting these messages consume a significant amount of battery power in nodes, especially when the set of down-link neighbors does not change over time and the radio-range of the sender node is large. The present article focuses on this aspect and tries to eliminate the number of HELLO messages in existing state-of-art protocols. Also, it shortens radio-ranges of nodes whenever possible. Simulation results show that the average lifetime of nodes greatly increases in proposed Minus HELLO devoid routing protocols along with a great increase in network throughput. Also, the required number of route re-discovery reduces.
△ Less
Submitted 8 September, 2020; v1 submitted 25 October, 2019;
originally announced October 2019.
-
Dust-acoustic rogue waves in an electron-positron-ion-dust plasma medium
Authors:
M. H. Rahman,
N. A. Chowdhury,
A. Mannan,
A. A. Mamun
Abstract:
A precise theoretical investigation has been made on dust-acoustic (DA) waves (DAWs) in a four components dusty plasma medium having inertial warm adiabatic dust grains and inertialess $q$-distributed electrons as well as isothermal ions and positrons. The nonlinear and dispersive parameters of the nonlinear Schrödinger equation (NLSE), which develops by using reductive perturbations technique, ha…
▽ More
A precise theoretical investigation has been made on dust-acoustic (DA) waves (DAWs) in a four components dusty plasma medium having inertial warm adiabatic dust grains and inertialess $q$-distributed electrons as well as isothermal ions and positrons. The nonlinear and dispersive parameters of the nonlinear Schrödinger equation (NLSE), which develops by using reductive perturbations technique, have been used to recognize the stable and unstable parametric regions of the DAWs as well as associated DA rogue waves (DARWs) in the unstable parametric regime of the DAWs. The effects of the light positrons and massive dust grains in determining the amplitude and width of the DARWs associated with DAWs are examined. The findings of our present investigation may be useful for understanding different nonlinear electrostatic phenomena in both space and laboratory plasmas.
△ Less
Submitted 6 October, 2019;
originally announced October 2019.
-
Sink Mobility To Ensure Coverage in Multi-Partitioned Wireless Sensor Network
Authors:
Hasina Rahman,
Zeenat Rehena,
Nandini Mukherjee
Abstract:
Recent works on WSNs show that use of mobile sink can prolong network lifetime. This paper demonstrates the advantages of the mobile sink in WSNs for increasing their lifetime than static sink. A novel sink mobility with coverage algorithm has been proposed here. During the movement of the sinks in the network, they sojourn at different points in the network and collect data over there. The direct…
▽ More
Recent works on WSNs show that use of mobile sink can prolong network lifetime. This paper demonstrates the advantages of the mobile sink in WSNs for increasing their lifetime than static sink. A novel sink mobility with coverage algorithm has been proposed here. During the movement of the sinks in the network, they sojourn at different points in the network and collect data over there. The direction of the movement of the sinks is determined by the algorithm and sinks are mobile inside the network. This algorithm can also be used for multiple sinks partitioned network. Simulations has been carried out for both mobile and static sinks to determine the average energy consumption of the network. At the same time, it also determines the network lifetime in terms of number of rounds neighbor nodes of sink is alive and first node die of the network. Our experiments show that mobile sinks outperform static sink in all scenarios. Furthermore, the proposed algorithm results in a good balancing of energy depletion among the sensor nodes.
△ Less
Submitted 12 June, 2019;
originally announced June 2019.
-
BDNet: Bengali Handwritten Numeral Digit Recognition based on Densely connected Convolutional Neural Networks
Authors:
A. Sufian,
Anirudha Ghosh,
Avijit Naskar,
Farhana Sultana,
Jaya Sil,
M M Hafizur Rahman
Abstract:
Images of handwritten digits are different from natural images as the orientation of a digit, as well as similarity of features of different digits, makes confusion. On the other hand, deep convolutional neural networks are achieving huge success in computer vision problems, especially in image classification. BDNet is a densely connected deep convolutional neural network model used to classify (r…
▽ More
Images of handwritten digits are different from natural images as the orientation of a digit, as well as similarity of features of different digits, makes confusion. On the other hand, deep convolutional neural networks are achieving huge success in computer vision problems, especially in image classification. BDNet is a densely connected deep convolutional neural network model used to classify (recognize) Bengali handwritten numeral digits. It is end-to-end trained using ISI Bengali handwritten numeral dataset. During training, untraditional data preprocessing and augmentation techniques are used so that the trained model works on a different dataset. The model has achieved the test accuracy of 99.775%(baseline was 99.40%) on the test dataset of ISI Bengali handwritten numerals. So, the BDNet model gives 62.5% error reduction compared to previous state-of-the-art models. Here we have also created a dataset of 1000 images of Bengali handwritten numerals to test the trained model, and it giving promising results. Codes, trained model and our own dataset are available at: {https://github.com/Sufianlab/BDNet}.
△ Less
Submitted 12 March, 2020; v1 submitted 9 June, 2019;
originally announced June 2019.
-
A Comparative Analysis of the Cyber Security Strategy of Bangladesh
Authors:
Kaushik Sarker,
Hasibur Rahman,
Khandaker Farzana Rahman,
Md. Shohel Arman,
Saikat Biswas,
Touhid Bhuiyan
Abstract:
Technology is an endless evolving expression in modern era, which increased security concerns and pushed us to create cyber environment. A National Cyber Security Strategy (NCSS) of a country reflects the state of that country's cyber strength which represents the aim and vision of the cyber security of a country. Formerly, researchers have worked on NCSS by comparing NCSS between different nation…
▽ More
Technology is an endless evolving expression in modern era, which increased security concerns and pushed us to create cyber environment. A National Cyber Security Strategy (NCSS) of a country reflects the state of that country's cyber strength which represents the aim and vision of the cyber security of a country. Formerly, researchers have worked on NCSS by comparing NCSS between different nations for international collaboration and harmonization and some researchers worked on policy framework for their respective governments. However very insignificant attempts had been made to assess the strategic strength of NCSS of Bangladesh by performing cross comparisons on NCSS of different Nations. Therefore, the motive of this research is to evaluate the robustness of the existing cyber security strategy of Bangladesh in comparison with some of the most technologically advanced countries in Asian continent and others like USA, Japan, Singapore, Malaysia and India in order to keep the NCSS of Bangladesh up-to-date.
△ Less
Submitted 1 May, 2019;
originally announced May 2019.