-
Improved flood map** for efficient policy design by fusion of Sentinel-1, Sentinel-2, and Landsat-9 imagery to identify population and infrastructure exposed to floods
Authors:
Usman Nazir,
Muhammad Ahmad Waseem,
Falak Sher Khan,
Rabia Saeed,
Syed Muhammad Hasan,
Momin Uppal,
Zubair Khalid
Abstract:
A reliable yet inexpensive tool for the estimation of flood water spread is conducive for efficient disaster management. The application of optical and SAR imagery in tandem provides a means of extended availability and enhanced reliability of flood map**. We propose a methodology to merge these two types of imagery into a common data space and demonstrate its use in the identification of affect…
▽ More
A reliable yet inexpensive tool for the estimation of flood water spread is conducive for efficient disaster management. The application of optical and SAR imagery in tandem provides a means of extended availability and enhanced reliability of flood map**. We propose a methodology to merge these two types of imagery into a common data space and demonstrate its use in the identification of affected populations and infrastructure for the 2022 floods in Pakistan. The merging of optical and SAR data provides us with improved observations in cloud-prone regions; that is then used to gain additional insights into flood map** applications. The use of open source datasets from WorldPop and OSM for population and roads respectively makes the exercise globally replicable. The integration of flood maps with spatial data on population and infrastructure facilitates informed policy design. We have shown that within the top five flood-affected districts in Sindh province, Pakistan, the affected population accounts for 31 %, while the length of affected roads measures 1410.25 km out of a total of 7537.96 km.
△ Less
Submitted 31 May, 2023;
originally announced June 2023.
-
Impact of magnetic fields on Population III star formation
Authors:
Cynthia R. Saad,
Volker Bromm,
Mounib El Eid
Abstract:
The theory of the formation of the first stars in the Universe, the so-called Population III (Pop III), has until now largely neglected the impact of magnetic fields. Complementing a series of recent studies of the magneto-hydrodynamic (MHD) aspects of Pop III star formation, we here carry out a suite of idealized numerical experiments where we ascertain how the fragmentation properties of primord…
▽ More
The theory of the formation of the first stars in the Universe, the so-called Population III (Pop III), has until now largely neglected the impact of magnetic fields. Complementing a series of recent studies of the magneto-hydrodynamic (MHD) aspects of Pop III star formation, we here carry out a suite of idealized numerical experiments where we ascertain how the fragmentation properties of primordial protostellar discs are modified if MHD effects are present. Specifically, starting from cosmological initial conditions, we focus on the central region in a select minihalo at redshift $z\sim$ 25, inserting a magnetic field at an intermediate evolutionary stage, normalized to a fraction of the equipartition value. To explore parameter space, we consider different field geometries, including uniform, radial, toroidal, and poloidal field configurations, with the toroidal configuration being the most realistic. The collapse of the gas is followed for $\sim$8 orders of magnitude in density after the field was inserted, until a maximum of $10^{15}{\rm \,cm}^{-3}$ is reached. We find that the magnetic field leads to a delay in the collapse of the gas. Moreover, the toroidal field has the strongest effect on the collapse as it inhibits the fragmentation of the emerging disc surrounding the central core and leads to the formation of a more massive core. The full understanding of the formation of Pop~III stars and their mass distribution thus needs to take into account the effect of magnetic fields. We further conclude that ideal MHD is only a first step in this endeavor, to be followed-up with a comprehensive treatment of dissipative effects, such as ambipolar diffusion and Ohmic dissipation.
△ Less
Submitted 31 August, 2022;
originally announced August 2022.
-
Laser Doppler holography of the anterior segment for blood flow imaging, eye tracking, and transparency assessment
Authors:
Léo Puyo,
Clémentine David,
Rana Saad,
Sami Saad,
Josselin Gautier,
José Alain Sahel,
Vincent Borderie,
Michel Paques,
Michael Atlan
Abstract:
Laser Doppler holography (LDH) is a full-field blood flow imaging technique able to reveal human retinal and choroidal blood flow with high temporal resolution. We here report on using LDH in the anterior segment of the eye without making changes to the instrument. Blood flow in the bulbar conjunctiva and episclera as well as in corneal neovascularization can be effectively imaged. We additionally…
▽ More
Laser Doppler holography (LDH) is a full-field blood flow imaging technique able to reveal human retinal and choroidal blood flow with high temporal resolution. We here report on using LDH in the anterior segment of the eye without making changes to the instrument. Blood flow in the bulbar conjunctiva and episclera as well as in corneal neovascularization can be effectively imaged. We additionally demonstrate simultaneous holographic imaging of the anterior and posterior segments by simply adapting the numerical propagation distance to the plane of interest. We used this feature to track the movements of the retina and pupil with high temporal resolution. Finally, we show that the light backscattered by the retina can be used for retro-illumination of the anterior segment. Hence digital holography can reveal opacities caused by absorption or diffusion in the cornea and eye lens.
△ Less
Submitted 22 July, 2021;
originally announced July 2021.
-
An Optimized Framework to Adopt Computer Laboratory Administrations for Operating System and Application Installations
Authors:
Miran Hama Rahim Saeed,
Bryar A. Hassan,
Shko M. Qader
Abstract:
Nowadays, in most of the fields, task automation is area of interest and research due to that manual execution of a task is error prone, time consuming, involving more human resources and focus concerning. In the area of Computer laboratory administration, the old fashioned administration cannot run with todays growth, where the Operating System (OS) and required applications are installed on all…
▽ More
Nowadays, in most of the fields, task automation is area of interest and research due to that manual execution of a task is error prone, time consuming, involving more human resources and focus concerning. In the area of Computer laboratory administration, the old fashioned administration cannot run with todays growth, where the Operating System (OS) and required applications are installed on all the machines one by one. Therefore, a framework for automating Lab administration in regards of Operating Systems and Application installations will be proposed in this research. Affordability, simplicity, usability are taken into major consideration. All the parts of the framework are implemented and illustrated in detail which promotes a great enhancement in the area of Computer Lab Administration.
△ Less
Submitted 5 May, 2021;
originally announced May 2021.
-
Benford's law: what does it say on adversarial images?
Authors:
João G. Zago,
Fabio L. Baldissera,
Eric A. Antonelo,
Rodrigo T. Saad
Abstract:
Convolutional neural networks (CNNs) are fragile to small perturbations in the input images. These networks are thus prone to malicious attacks that perturb the inputs to force a misclassification. Such slightly manipulated images aimed at deceiving the classifier are known as adversarial images. In this work, we investigate statistical differences between natural images and adversarial ones. More…
▽ More
Convolutional neural networks (CNNs) are fragile to small perturbations in the input images. These networks are thus prone to malicious attacks that perturb the inputs to force a misclassification. Such slightly manipulated images aimed at deceiving the classifier are known as adversarial images. In this work, we investigate statistical differences between natural images and adversarial ones. More precisely, we show that employing a proper image transformation and for a class of adversarial attacks, the distribution of the leading digit of the pixels in adversarial images deviates from Benford's law. The stronger the attack, the more distant the resulting distribution is from Benford's law. Our analysis provides a detailed investigation of this new approach that can serve as a basis for alternative adversarial example detection methods that do not need to modify the original CNN classifier neither work on the raw high-dimensional pixels as features to defend against attacks.
△ Less
Submitted 5 March, 2023; v1 submitted 8 February, 2021;
originally announced February 2021.
-
Design and study of a coronavirus-shaped metamaterial sensor stimulated by electromagnetic waves for rapid diagnosis of covid-19
Authors:
Yadgar I. Abdulkarim,
Halgurd N. Awl,
Fahmi F. Muhammadsharif,
Karzan R. Sidiq,
Salah Raza Saeed,
Muharrem Karaaslan,
Shengxiang Huang,
Heng Luo,
Lianwen Deng
Abstract:
We propose a new technique of utilizing metamaterials-based sensor for rapid diagnosis of covid-19 through electromagnetic-stimulated analysis of the blood drawn from the patient. The sensor was inspired by a coronavirus in plane-shaped design with presume that its circular structure might produce a broader interaction of the electromagnetic waves with the blood sample. The sensor was designed num…
▽ More
We propose a new technique of utilizing metamaterials-based sensor for rapid diagnosis of covid-19 through electromagnetic-stimulated analysis of the blood drawn from the patient. The sensor was inspired by a coronavirus in plane-shaped design with presume that its circular structure might produce a broader interaction of the electromagnetic waves with the blood sample. The sensor was designed numerically and tested experimentally by evaluating variations in the reflection coefficient (S11) and transmission coefficient (S21) of the waves at resonant frequency. Results of covid-19 relevant blood sample showed a pronounced shift in the main resonant frequency of about 740 MHz compared to that of the control blood sample. We believe that with the help of the proposed sensor a significant breakthrough can be achieved for rapid diagnosis of covid-19 within few seconds.
△ Less
Submitted 18 September, 2020;
originally announced September 2020.
-
Automated Design Space Exploration for optimised Deployment of DNN on Arm Cortex-A CPUs
Authors:
Miguel de Prado,
Andrew Mundy,
Rabia Saeed,
Maurizio Denna,
Nuria Pazos,
Luca Benini
Abstract:
The spread of deep learning on embedded devices has prompted the development of numerous methods to optimise the deployment of deep neural networks (DNN). Works have mainly focused on: i) efficient DNN architectures, ii) network optimisation techniques such as pruning and quantisation, iii) optimised algorithms to speed up the execution of the most computational intensive layers and, iv) dedicated…
▽ More
The spread of deep learning on embedded devices has prompted the development of numerous methods to optimise the deployment of deep neural networks (DNN). Works have mainly focused on: i) efficient DNN architectures, ii) network optimisation techniques such as pruning and quantisation, iii) optimised algorithms to speed up the execution of the most computational intensive layers and, iv) dedicated hardware to accelerate the data flow and computation. However, there is a lack of research on cross-level optimisation as the space of approaches becomes too large to test and obtain a globally optimised solution. Thus, leading to suboptimal deployment in terms of latency, accuracy, and memory. In this work, we first detail and analyse the methods to improve the deployment of DNNs across the different levels of software optimisation. Building on this knowledge, we present an automated exploration framework to ease the deployment of DNNs. The framework relies on a Reinforcement Learning search that, combined with a deep learning inference framework, automatically explores the design space and learns an optimised solution that speeds up the performance and reduces the memory on embedded CPU platforms. Thus, we present a set of results for state-of-the-art DNNs on a range of Arm Cortex-A CPU platforms achieving up to 4x improvement in performance and over 2x reduction in memory with negligible loss in accuracy with respect to the BLAS floating-point implementation.
△ Less
Submitted 15 December, 2020; v1 submitted 9 June, 2020;
originally announced June 2020.
-
Mice and Covert Channels
Authors:
Weeam Alshangiti,
Rafid Saad
Abstract:
Any secure network is only as secure as its weakest component. With overt channels tightly secured and attackers have started focusing on optical, audible, magnetic, and thermal covert channels to access sensitive systems. In this paper, we present a novel, reliable and bidirectional optical covert channel which uses optical mice. In this channel, the photocell in the mouse is used as a receiver w…
▽ More
Any secure network is only as secure as its weakest component. With overt channels tightly secured and attackers have started focusing on optical, audible, magnetic, and thermal covert channels to access sensitive systems. In this paper, we present a novel, reliable and bidirectional optical covert channel which uses optical mice. In this channel, the photocell in the mouse is used as a receiver while the LED is used as a transmitter. Our multiple experiments, which use mouse to mouse, mouse to camera and torch to mouse, show that the transmission rate can go as high as 10 bits per second. Additionally, we study the effects of infrared, distance and brightness on mouse input. We also show that infrared mice are susceptible to a similar kind of attack.
△ Less
Submitted 4 November, 2019;
originally announced November 2019.
-
Bonseyes AI Pipeline -- bringing AI to you. End-to-end integration of data, algorithms and deployment tools
Authors:
Miguel de Prado,
**g Su,
Rabia Saeed,
Lorenzo Keller,
Noelia Vallez,
Andrew Anderson,
David Gregg,
Luca Benini,
Tim Llewellynn,
Nabil Ouerhani,
Rozenn Dahyot and,
Nuria Pazos
Abstract:
Next generation of embedded Information and Communication Technology (ICT) systems are collaborative systems able to perform autonomous tasks. The remarkable expansion of the embedded ICT market, together with the rise and breakthroughs of Artificial Intelligence (AI), have put the focus on the Edge as it stands as one of the keys for the next technological revolution: the seamless integration of…
▽ More
Next generation of embedded Information and Communication Technology (ICT) systems are collaborative systems able to perform autonomous tasks. The remarkable expansion of the embedded ICT market, together with the rise and breakthroughs of Artificial Intelligence (AI), have put the focus on the Edge as it stands as one of the keys for the next technological revolution: the seamless integration of AI in our daily life. However, training and deployment of custom AI solutions on embedded devices require a fine-grained integration of data, algorithms, and tools to achieve high accuracy. Such integration requires a high level of expertise that becomes a real bottleneck for small and medium enterprises wanting to deploy AI solutions on the Edge which, ultimately, slows down the adoption of AI on daily-life applications. In this work, we present a modular AI pipeline as an integrating framework to bring data, algorithms, and deployment tools together. By removing the integration barriers and lowering the required expertise, we can interconnect the different stages of tools and provide a modular end-to-end development of AI products for embedded devices. Our AI pipeline consists of four modular main steps: i) data ingestion, ii) model training, iii) deployment optimization and, iv) the IoT hub integration. To show the effectiveness of our pipeline, we provide examples of different AI applications during each of the steps. Besides, we integrate our deployment framework, LPDNN, into the AI pipeline and present its lightweight architecture and deployment capabilities for embedded devices. Finally, we demonstrate the results of the AI pipeline by showing the deployment of several AI applications such as keyword spotting, image classification and object detection on a set of well-known embedded platforms, where LPDNN consistently outperforms all other popular deployment frameworks.
△ Less
Submitted 11 June, 2020; v1 submitted 15 January, 2019;
originally announced January 2019.
-
Not all Embeddings are created Equal: Extracting Entity-specific Substructures for RDF Graph Embedding
Authors:
Muhammad Rizwan Saeed,
Charalampos Chelmis,
Viktor K. Prasanna
Abstract:
Knowledge Graphs (KGs) are becoming essential to information systems that require access to structured data. Several approaches have been recently proposed, for obtaining vector representations of KGs suitable for Machine Learning tasks, based on identifying and extracting relevant graph substructures using uniform and biased random walks. However, such approaches lead to representations comprisin…
▽ More
Knowledge Graphs (KGs) are becoming essential to information systems that require access to structured data. Several approaches have been recently proposed, for obtaining vector representations of KGs suitable for Machine Learning tasks, based on identifying and extracting relevant graph substructures using uniform and biased random walks. However, such approaches lead to representations comprising mostly "popular", instead of "relevant", entities in the KG. In KGs, in which different types of entities often exist (such as in Linked Open Data), a given target entity may have its own distinct set of most "relevant" nodes and edges. We propose specificity as an accurate measure of identifying most relevant, entity-specific, nodes and edges. We develop a scalable method based on bidirectional random walks to compute specificity. Our experimental evaluation results show that specificity-based biased random walks extract more "meaningful" (in terms of size and relevance) RDF substructures compared to the state-of-the-art and, the graph embedding learned from the extracted substructures, outperform existing techniques in the task of entity recommendation in DBpedia.
△ Less
Submitted 14 April, 2018;
originally announced April 2018.
-
Role of Carrier Mobility and Band Alignment Engineering on the Efficiency of Colloidal Quantum Dot Solar Cells
Authors:
Roha Saad,
Nauman Z. Butt
Abstract:
We investigate physics based design of colloidal quantum dot (CQD) solar cells using self-consistent computational modeling. The significance of band alignment engineering and optimized carrier mobility are quantitatively explored as a function of sub bandgap defect densities (N_t) in the bulk CQD. For $N_t \leq 10^{15} cm^{-3}$, band alignment engineering near the interface of CQD and the metal c…
▽ More
We investigate physics based design of colloidal quantum dot (CQD) solar cells using self-consistent computational modeling. The significance of band alignment engineering and optimized carrier mobility are quantitatively explored as a function of sub bandgap defect densities (N_t) in the bulk CQD. For $N_t \leq 10^{15} cm^{-3}$, band alignment engineering near the interface of CQD and the metal contact could significantly improve open circuit voltage by suppressing the forward bias dark current. This effect could enhance cell efficiency up to ~37% for thinner $(< 1 μm)$ CQD layers. For thicker $(> 1 μm)$ CQD layer, the effect of band engineering is diminished as the forward bias dark current becomes diffusion-limited and less dependent on the interfacial band offsets. An optimal carrier mobility in CQD lies in the range ~ 10^{-2} cm^2/Vs - 10^0 cm^2/Vs and shows variation as a function of CQD layer thickness and the interfacial band offset. For $N_t \approx 10^{14} cm^{-3}$, an optimally designed cell could provide ~20% efficiency under AM1.5G solar spectrum without employing advanced structural optimizations such as the nanostructured electrodes. These physical insights contribute to a better understanding of quantum dot solar cell design, allowing a step further towards a highly efficient and a low cost solar cell technology.
△ Less
Submitted 10 February, 2016;
originally announced February 2016.
-
A Geometric Approach to the Landauer-Büttiker Formula
Authors:
R. Ben Sâad,
C. -A. Pillet
Abstract:
We consider an ideal Fermi gas confined to a geometric structure consisting of a central region -- the sample -- connected to several infinitely extended ends -- the reservoirs. Under physically reasonable assumptions on the propagation properties of the one-particle dynamics within these reservoirs, we show that the state of the Fermi gas relaxes to a steady state. We compute the expected value o…
▽ More
We consider an ideal Fermi gas confined to a geometric structure consisting of a central region -- the sample -- connected to several infinitely extended ends -- the reservoirs. Under physically reasonable assumptions on the propagation properties of the one-particle dynamics within these reservoirs, we show that the state of the Fermi gas relaxes to a steady state. We compute the expected value of various current observables in this steady state and express the result in terms of scattering data, thus obtaining a geometric version of the celebrated Landauer-Büttiker formula.
△ Less
Submitted 6 February, 2014;
originally announced February 2014.
-
An Experiment on Parallel Model Checking of a CTL Fragment
Authors:
Rodrigo Tacla Saad,
Silvano Dal Zilio,
Bernard Berthomieu
Abstract:
We propose a parallel algorithm for local, on the fly, model checking of a fragment of CTL that is well-suited for modern, multi-core architectures. This model-checking algorithm takes bene t from a parallel state space construction algorithm, which we described in a previous work, and shares the same basic set of principles: there are no assumptions on the models that can be analyzed; no restrict…
▽ More
We propose a parallel algorithm for local, on the fly, model checking of a fragment of CTL that is well-suited for modern, multi-core architectures. This model-checking algorithm takes bene t from a parallel state space construction algorithm, which we described in a previous work, and shares the same basic set of principles: there are no assumptions on the models that can be analyzed; no restrictions on the way states are distributed; and no restrictions on the way work is shared among processors. We evaluate the performance of diff erent versions of our algorithm and compare our results with those obtained using other parallel model checking tools. One of the most novel contributions of this work is to study a space-e fficient variant for CTL model-checking that does not require to store the whole transition graph but that operates on a reverse spanning tree.
△ Less
Submitted 31 January, 2013;
originally announced January 2013.
-
Specific heat in different magnetic phases of RNi2B2C (R= Gd, Ho, Er): theory and experiment
Authors:
M. ElMassalami R. M. Saeed,
C. M. Chaves,
H. Takeya,
M. Doerr,
H. Michor,
M. Rotter
Abstract:
The borocarbides RNi2B2C (R=Gd, Ho, Er) exhibit a large variety of magnetic states and as a consequence rich phase diagrams. We have analyzed the nature of these states by specific heat investigations. The data were measured down to 0.5 K and up to 80 kOe. The overall evolution of each Cm(T,H) curve is observed to reflect faithfully the features of the corresponding H-T phase diagram. Within the…
▽ More
The borocarbides RNi2B2C (R=Gd, Ho, Er) exhibit a large variety of magnetic states and as a consequence rich phase diagrams. We have analyzed the nature of these states by specific heat investigations. The data were measured down to 0.5 K and up to 80 kOe. The overall evolution of each Cm(T,H) curve is observed to reflect faithfully the features of the corresponding H-T phase diagram. Within the lower ranges of temperature and fields, the calculations based on linearized field-dependent spin-wave theory are found to reproduce satisfactorily the measured Cm(T,H) curves: accordingly, within these ranges, the thermodynamical properties of these compounds can be rationalized in terms of only two parameters: the spin-wave energy gap and the stiffness coefficient. For the intermediate fields ranges (H1<H<Hsat) wherein successive field-induced metamagnetic modes are stabilized, the evolution of Cm(T,H) is discussed in terms of the Maxwell relation (dCm/dH)T=T(d^2M/dT^2)H. For the particular case of GdNi2B2C wherein the anisotropy is dictated by the classical dipole interaction, Cm(T,H) across the whole ordered state is numerically evaluated within the model of Jensen and Rotter [PRB 77 (2008) 134408].
△ Less
Submitted 26 December, 2008;
originally announced December 2008.
-
On the ferromagnetic structure of the intermetallic borocarbide TbCo2B2C
Authors:
M. ElMassalami,
R. Moreno,
R. M. Saeed,
F. A. B. Chaves,
C. M. Chaves,
H. Takeya,
B. Ouladdiaf,
M. Amara
Abstract:
Based on magnetization, specific heat, magnetostriction, and neutron diffraction studies on single-crystal TbCo2B2C, it is found out that the paramagnetic properties, down to liquid nitrogen temperatures, are well described by a Curie-Weiss behavior of the Tb+3 moments. Furthermore, below Tc= 6.3 K, the Tb-sublattice undergoes a ferromagnetic (FM) phase transition with the easy axis being along…
▽ More
Based on magnetization, specific heat, magnetostriction, and neutron diffraction studies on single-crystal TbCo2B2C, it is found out that the paramagnetic properties, down to liquid nitrogen temperatures, are well described by a Curie-Weiss behavior of the Tb+3 moments. Furthermore, below Tc= 6.3 K, the Tb-sublattice undergoes a ferromagnetic (FM) phase transition with the easy axis being along the (100) direction and, concomitantly, the unit cell undergoes a tetragonal-to-orthorhhombic distortion. For fields up to 90 kOe, no field-induced splitting of the Co 3d orbitals was observed; as such the internal field must be well below the critical value needed to polarize the Co 3d subsystem. The manifestation of a FM state in TbCo2B2C is unique among all other isomorphous borocarbides, in particular TbNi2B2C (Tn=15 K, incommensurate modulated magnetic state) even though the Tb-ions in both isomorphs have almost the same crystalline electric field properties. The difference in the magnetic modes of these Tb-based isomorphs is attributed to a difference in their exchange couplings caused by a variation in their lattice parameters and in the position of their Fermi levels.
△ Less
Submitted 22 December, 2008;
originally announced December 2008.
-
Use and usability in a digital library search system
Authors:
Robert K. France,
Lucy Terry Nowell,
Edward A. Fox,
Rani A. Saad,
Jianxin Zhao
Abstract:
Digital libraries must reach out to users from all walks of life, serving information needs at all levels. To do this, they must attain high standards of usability over an extremely broad audience. This paper details the evolution of one important digital library component as it has grown in functionality and usefulness over several years of use by a live, unrestricted community. Central to its…
▽ More
Digital libraries must reach out to users from all walks of life, serving information needs at all levels. To do this, they must attain high standards of usability over an extremely broad audience. This paper details the evolution of one important digital library component as it has grown in functionality and usefulness over several years of use by a live, unrestricted community. Central to its evolution have been user studies, analysis of use patterns, and formative usability evaluation. We extrapolate that all three components are necessary in the production of successful digital library systems.
△ Less
Submitted 8 February, 1999;
originally announced February 1999.