-
A preprocessing-based planning framework for utilizing contacts in high-precision insertion tasks
Authors:
Muhammad Suhail Saleem,
Rishi Veerapaneni,
Maxim Likhachev
Abstract:
In manipulation tasks like plug insertion or assembly that have low tolerance to errors in pose estimation (errors of the order of 2mm can cause task failure), the utilization of touch/contact modality can aid in accurately localizing the object of interest. Motivated by this, in this work we model high-precision insertion tasks as planning problems under pose uncertainty, where we effectively uti…
▽ More
In manipulation tasks like plug insertion or assembly that have low tolerance to errors in pose estimation (errors of the order of 2mm can cause task failure), the utilization of touch/contact modality can aid in accurately localizing the object of interest. Motivated by this, in this work we model high-precision insertion tasks as planning problems under pose uncertainty, where we effectively utilize the occurrence of contacts (or the lack thereof) as observations to reduce uncertainty and reliably complete the task. We present a preprocessing-based planning framework for high-precision insertion in repetitive and time-critical settings, where the set of initial pose distributions (identified by a perception system) is finite. The finite set allows us to enumerate the possible planning problems that can be encountered online and preprocess a database of policies. Due to the computational complexity of constructing this database, we propose a general experience-based POMDP solver, E-RTDP-Bel, that uses the solutions of similar planning problems as experience to speed up planning queries and use it to efficiently construct the database. We show that the developed algorithm speeds up database creation by over a factor of 100, making the process computationally tractable. We demonstrate the effectiveness of the proposed framework in a real-world plug insertion task in the presence of port position uncertainty and a pipe assembly task in simulation in the presence of pipe pose uncertainty.
△ Less
Submitted 8 June, 2024;
originally announced June 2024.
-
On the solitary wave configurations of nonlinear Schrödinger equation under the effect of Lévy noise
Authors:
Hina Zulfiqar,
Shenglan Yuan,
Muhammad Shoaib Saleem
Abstract:
This study aims to examine the effect of Lévy noise on the solutions of the nonlinear Schrödinger equation. An improved diversity of stochastic solutions is instinctively located discretely on certain conditions by applying the generalized Kudryashov method. Moreover, the dynamical behaviors of these exact results of the nonlinear Schrödinger equation are interpreted in the context of the effect o…
▽ More
This study aims to examine the effect of Lévy noise on the solutions of the nonlinear Schrödinger equation. An improved diversity of stochastic solutions is instinctively located discretely on certain conditions by applying the generalized Kudryashov method. Moreover, the dynamical behaviors of these exact results of the nonlinear Schrödinger equation are interpreted in the context of the effect of Lévy noise. Even mathematical evaluations have been conducted and presented.
△ Less
Submitted 1 May, 2024;
originally announced May 2024.
-
Vaporization dynamics of a super-heated water-in-oil droplet: modeling and numerical solution
Authors:
Muhammad Saeed Saleem,
Michel Versluis,
Guillaume Lajoinie
Abstract:
The study of vapor bubble growth following droplet vaporization in a superheated liquid involves research areas such as hydrodynamics, heat transfer, mass transfer, and thermodynamics. The interplay between these multiscale aspects is strongly dependent on the geometry, the thermodynamic response, and the local physical properties of the system. To understand the role of each aspect of this comple…
▽ More
The study of vapor bubble growth following droplet vaporization in a superheated liquid involves research areas such as hydrodynamics, heat transfer, mass transfer, and thermodynamics. The interplay between these multiscale aspects is strongly dependent on the geometry, the thermodynamic response, and the local physical properties of the system. To understand the role of each aspect of this complex mechanism we model super-heated droplet vaporization by coupling the equation of motion for bubble growth with the thermodynamics of phase change and heat transfer through the convection-diffusion equation. The semi-analytical model is validated with the analytical description for vapor bubble growth dominated either by inertia (Rayleigh) or by thermal diffusion (Plesset-Zwick), depending on droplet radius and degree of superheat. The effect of a mismatch of the thermal properties between the host liquid and the droplet is shown to be relevant only for low superheating, above which an increase in thermal diffusivity leads to a reduction in the rate of vaporization. At medium to high superheating, the droplet vaporizes completely without relying on thermal diffusion. At the point of complete vaporization, the potential energy within the system drives the bubble overshoots, which vary based on the droplet size and degree of superheat.
△ Less
Submitted 26 April, 2024;
originally announced April 2024.
-
A Data Efficient Framework for Learning Local Heuristics
Authors:
Rishi Veerapaneni,
Jonathan Park,
Muhammad Suhail Saleem,
Maxim Likhachev
Abstract:
With the advent of machine learning, there have been several recent attempts to learn effective and generalizable heuristics. Local Heuristic A* (LoHA*) is one recent method that instead of learning the entire heuristic estimate, learns a "local" residual heuristic that estimates the cost to escape a region (Veerapaneni et al 2023). LoHA*, like other supervised learning methods, collects a dataset…
▽ More
With the advent of machine learning, there have been several recent attempts to learn effective and generalizable heuristics. Local Heuristic A* (LoHA*) is one recent method that instead of learning the entire heuristic estimate, learns a "local" residual heuristic that estimates the cost to escape a region (Veerapaneni et al 2023). LoHA*, like other supervised learning methods, collects a dataset of target values by querying an oracle on many planning problems (in this case, local planning problems). This data collection process can become slow as the size of the local region increases or if the domain requires expensive collision checks. Our main insight is that when an A* search solves a start-goal planning problem it inherently ends up solving multiple local planning problems. We exploit this observation to propose an efficient data collection framework that does <1/10th the amount of work (measured by expansions) to collect the same amount of data in comparison to baselines. This idea also enables us to run LoHA* in an online manner where we can iteratively collect data and improve our model while solving relevant start-goal tasks. We demonstrate the performance of our data collection and online framework on a 4D $(x, y, θ, v)$ navigation domain.
△ Less
Submitted 3 May, 2024; v1 submitted 10 April, 2024;
originally announced April 2024.
-
Preprocessing-based Kinodynamic Motion Planning Framework for Intercepting Projectiles using a Robot Manipulator
Authors:
Ramkumar Natarajan,
Hanlan Yang,
Qintong Xie,
Yash Oza,
Manash Pratim Das,
Fahad Islam,
Muhammad Suhail Saleem,
Howie Choset,
Maxim Likhachev
Abstract:
We are interested in studying sports with robots and starting with the problem of intercepting a projectile moving toward a robot manipulator equipped with a shield. To successfully perform this task, the robot needs to (i) detect the incoming projectile, (ii) predict the projectile's future motion, (iii) plan a minimum-time rapid trajectory that can evade obstacles and intercept the projectile, a…
▽ More
We are interested in studying sports with robots and starting with the problem of intercepting a projectile moving toward a robot manipulator equipped with a shield. To successfully perform this task, the robot needs to (i) detect the incoming projectile, (ii) predict the projectile's future motion, (iii) plan a minimum-time rapid trajectory that can evade obstacles and intercept the projectile, and (iv) execute the planned trajectory. These four steps must be performed under the manipulator's dynamic limits and extreme time constraints (<350ms in our setting) to successfully intercept the projectile. In addition, we want these trajectories to be smooth to reduce the robot's joint torques and the impulse on the platform on which it is mounted. To this end, we propose a kinodynamic motion planning framework that preprocesses smooth trajectories offline to allow real-time collision-free executions online. We present an end-to-end pipeline along with our planning framework, including perception, prediction, and execution modules. We evaluate our framework experimentally in simulation and show that it has a higher blocking success rate than the baselines. Further, we deploy our pipeline on a robotic system comprising an industrial arm (ABB IRB-1600) and an onboard stereo camera (ZED 2i), which achieves a 78% success rate in projectile interceptions.
△ Less
Submitted 16 March, 2024; v1 submitted 15 January, 2024;
originally announced January 2024.
-
Lipoarabinomannan-based Tuberculosis Diagnosis using a Fiber Cavity Ring Down Biosensor
Authors:
Ubaid Ullah,
Seerat Saleem,
Muddassar Farooq,
Basit Yameen,
M. Imran Cheema
Abstract:
Despite existing for millennia, tuberculosis (TB) remains a persistent global health challenge. A significant obstacle in controlling TB spread is the need for a rapid, portable, sensitive, and accurate diagnostic test. Currently, sputum culture stands as a benchmark test for TB diagnosis. Although highly reliable, it necessitates advanced laboratory facilities and involves considerable testing ti…
▽ More
Despite existing for millennia, tuberculosis (TB) remains a persistent global health challenge. A significant obstacle in controlling TB spread is the need for a rapid, portable, sensitive, and accurate diagnostic test. Currently, sputum culture stands as a benchmark test for TB diagnosis. Although highly reliable, it necessitates advanced laboratory facilities and involves considerable testing time. In this context, we present a rapid, portable, and cost-effective optical fiber sensor designed to measure lipoarabinomannan (LAM), a TB biomarker found in patients' urine samples. Our sensing approach is based on the applications of phase shift-cavity ringdown spectroscopy (PS-CRDS) to an optical fiber cavity created by two fiber Bragg gratings. A tapered fiber is spliced inside the optical cavity to serve as the sensing head. We functionalize the tapered fiber surface with anti-LAM antigen CS-35 through a unique chemistry, creating a strong affinity for LAM molecules. We measure the phase difference between the cavity transmission and the reference modulating signal at the cavity output. The measured phase is directly proportional to the injected LAM concentrations in aqueous solutions over the sensing head. Our demonstrated sensor provides a detection limit of 10 pg/mL and a sensitivity of 2.6$^\circ$/ng/mL. This sensor holds promise for numerous applications in the healthcare sector, particularly in low-resource settings.
△ Less
Submitted 29 December, 2023;
originally announced January 2024.
-
Improving Code Reviewer Recommendation: Accuracy, Latency, Workload, and Bystanders
Authors:
Peter C. Rigby,
Seth Rogers,
Sadruddin Saleem,
Parth Suresh,
Daniel Suskin,
Patrick Riggs,
Chandra Maddila,
Nachiappan Nagappan
Abstract:
Code review ensures that a peer engineer manually examines the code before it is integrated and released into production. At Meta, we develop a wide range of software at scale, from social networking to software development infrastructure, such as calendar and meeting tools to continuous integration. We are constantly improving our code review system, and in this work we describe a series of exper…
▽ More
Code review ensures that a peer engineer manually examines the code before it is integrated and released into production. At Meta, we develop a wide range of software at scale, from social networking to software development infrastructure, such as calendar and meeting tools to continuous integration. We are constantly improving our code review system, and in this work we describe a series of experiments that were conducted across 10's of thousands of engineers and 100's of thousands of reviews.
We build upon the recommender that has been in production since 2018, RevRecV1. We found that reviewers were being assigned based on prior authorship of files. We reviewed the literature for successful features and experimented with them with RevRecV2 in production. The most important feature in our new model was the familiarity of the author and reviewer, we saw an overall improvement in accuracy of 14 percentage points.
Prior research has shown that reviewer workload is skewed. To balance workload, we divide the reviewer score from RevRecV2 by each candidate reviewers workload. We experimented with multiple types of workload to develop RevRecWL. We find that reranking candidate reviewers by workload often leads to a reviewers with lower workload being selected by authors.
The bystander effect can occur when a team of reviewers is assigned the review. We mitigate the bystander effect by randomly assigning one of the recommended reviewers. Having an individual who is responsible for the review, reduces the time take for reviews by -11%.
△ Less
Submitted 28 December, 2023;
originally announced December 2023.
-
Seamless: Multilingual Expressive and Streaming Speech Translation
Authors:
Seamless Communication,
Loïc Barrault,
Yu-An Chung,
Mariano Coria Meglioli,
David Dale,
Ning Dong,
Mark Duppenthaler,
Paul-Ambroise Duquenne,
Brian Ellis,
Hady Elsahar,
Justin Haaheim,
John Hoffman,
Min-Jae Hwang,
Hirofumi Inaguma,
Christopher Klaiber,
Ilia Kulikov,
Pengwei Li,
Daniel Licht,
Jean Maillard,
Ruslan Mavlyutov,
Alice Rakotoarison,
Kaushik Ram Sadagopan,
Abinesh Ramakrishnan,
Tuan Tran,
Guillaume Wenzek
, et al. (40 additional authors not shown)
Abstract:
Large-scale automatic speech translation systems today lack key features that help machine-mediated communication feel seamless when compared to human-to-human dialogue. In this work, we introduce a family of models that enable end-to-end expressive and multilingual translations in a streaming fashion. First, we contribute an improved version of the massively multilingual and multimodal SeamlessM4…
▽ More
Large-scale automatic speech translation systems today lack key features that help machine-mediated communication feel seamless when compared to human-to-human dialogue. In this work, we introduce a family of models that enable end-to-end expressive and multilingual translations in a streaming fashion. First, we contribute an improved version of the massively multilingual and multimodal SeamlessM4T model-SeamlessM4T v2. This newer model, incorporating an updated UnitY2 framework, was trained on more low-resource language data. SeamlessM4T v2 provides the foundation on which our next two models are initiated. SeamlessExpressive enables translation that preserves vocal styles and prosody. Compared to previous efforts in expressive speech research, our work addresses certain underexplored aspects of prosody, such as speech rate and pauses, while also preserving the style of one's voice. As for SeamlessStreaming, our model leverages the Efficient Monotonic Multihead Attention mechanism to generate low-latency target translations without waiting for complete source utterances. As the first of its kind, SeamlessStreaming enables simultaneous speech-to-speech/text translation for multiple source and target languages. To ensure that our models can be used safely and responsibly, we implemented the first known red-teaming effort for multimodal machine translation, a system for the detection and mitigation of added toxicity, a systematic evaluation of gender bias, and an inaudible localized watermarking mechanism designed to dampen the impact of deepfakes. Consequently, we bring major components from SeamlessExpressive and SeamlessStreaming together to form Seamless, the first publicly available system that unlocks expressive cross-lingual communication in real-time. The contributions to this work are publicly released and accessible at https://github.com/facebookresearch/seamless_communication
△ Less
Submitted 8 December, 2023;
originally announced December 2023.
-
SeamlessM4T: Massively Multilingual & Multimodal Machine Translation
Authors:
Seamless Communication,
Loïc Barrault,
Yu-An Chung,
Mariano Cora Meglioli,
David Dale,
Ning Dong,
Paul-Ambroise Duquenne,
Hady Elsahar,
Hongyu Gong,
Kevin Heffernan,
John Hoffman,
Christopher Klaiber,
Pengwei Li,
Daniel Licht,
Jean Maillard,
Alice Rakotoarison,
Kaushik Ram Sadagopan,
Guillaume Wenzek,
Ethan Ye,
Bapi Akula,
Peng-Jen Chen,
Naji El Hachem,
Brian Ellis,
Gabriel Mejia Gonzalez,
Justin Haaheim
, et al. (43 additional authors not shown)
Abstract:
What does it take to create the Babel Fish, a tool that can help individuals translate speech between any two languages? While recent breakthroughs in text-based models have pushed machine translation coverage beyond 200 languages, unified speech-to-speech translation models have yet to achieve similar strides. More specifically, conventional speech-to-speech translation systems rely on cascaded s…
▽ More
What does it take to create the Babel Fish, a tool that can help individuals translate speech between any two languages? While recent breakthroughs in text-based models have pushed machine translation coverage beyond 200 languages, unified speech-to-speech translation models have yet to achieve similar strides. More specifically, conventional speech-to-speech translation systems rely on cascaded systems that perform translation progressively, putting high-performing unified systems out of reach. To address these gaps, we introduce SeamlessM4T, a single model that supports speech-to-speech translation, speech-to-text translation, text-to-speech translation, text-to-text translation, and automatic speech recognition for up to 100 languages. To build this, we used 1 million hours of open speech audio data to learn self-supervised speech representations with w2v-BERT 2.0. Subsequently, we created a multimodal corpus of automatically aligned speech translations. Filtered and combined with human-labeled and pseudo-labeled data, we developed the first multilingual system capable of translating from and into English for both speech and text. On FLEURS, SeamlessM4T sets a new standard for translations into multiple target languages, achieving an improvement of 20% BLEU over the previous SOTA in direct speech-to-text translation. Compared to strong cascaded models, SeamlessM4T improves the quality of into-English translation by 1.3 BLEU points in speech-to-text and by 2.6 ASR-BLEU points in speech-to-speech. Tested for robustness, our system performs better against background noises and speaker variations in speech-to-text tasks compared to the current SOTA model. Critically, we evaluated SeamlessM4T on gender bias and added toxicity to assess translation safety. Finally, all contributions in this work are open-sourced and accessible at https://github.com/facebookresearch/seamless_communication
△ Less
Submitted 24 October, 2023; v1 submitted 22 August, 2023;
originally announced August 2023.
-
Learning Local Heuristics for Search-Based Navigation Planning
Authors:
Rishi Veerapaneni,
Muhammad Suhail Saleem,
Maxim Likhachev
Abstract:
Graph search planning algorithms for navigation typically rely heavily on heuristics to efficiently plan paths. As a result, while such approaches require no training phase and can directly plan long horizon paths, they often require careful hand designing of informative heuristic functions. Recent works have started bypassing hand designed heuristics by using machine learning to learn heuristic f…
▽ More
Graph search planning algorithms for navigation typically rely heavily on heuristics to efficiently plan paths. As a result, while such approaches require no training phase and can directly plan long horizon paths, they often require careful hand designing of informative heuristic functions. Recent works have started bypassing hand designed heuristics by using machine learning to learn heuristic functions that guide the search algorithm. While these methods can learn complex heuristic functions from raw input, they i) require a significant training phase and ii) do not generalize well to new maps and longer horizon paths. Our contribution is showing that instead of learning a global heuristic estimate, we can define and learn local heuristics which results in a significantly smaller learning problem and improves generalization. We show that using such local heuristics can reduce node expansions by 2-20x while maintaining bounded suboptimality, are easy to train, and generalize to new maps & long horizon plans.
△ Less
Submitted 16 March, 2023;
originally announced March 2023.
-
Slow manifolds for stochastic Koper models with stable Lévy noises
Authors:
Hina Zulfiqar,
Shenglan Yuan,
Muhammad Shoaib Saleem
Abstract:
The Koper model is a vector field in which the differential equations describe the electrochemical oscillations appearing in diffusion processes. This work focuses on the understanding of the slow dynamics of stochastic Koper model perturbed by stable Lévy noise. We establish the slow manifold for stochastic Koper model with stable Lévy noise and verify exponential tracking property. We also prese…
▽ More
The Koper model is a vector field in which the differential equations describe the electrochemical oscillations appearing in diffusion processes. This work focuses on the understanding of the slow dynamics of stochastic Koper model perturbed by stable Lévy noise. We establish the slow manifold for stochastic Koper model with stable Lévy noise and verify exponential tracking property. We also present a practical example to demonstrate the analytical results with numerical simulations.
△ Less
Submitted 7 December, 2022;
originally announced December 2022.
-
No Language Left Behind: Scaling Human-Centered Machine Translation
Authors:
NLLB Team,
Marta R. Costa-jussà,
James Cross,
Onur Çelebi,
Maha Elbayad,
Kenneth Heafield,
Kevin Heffernan,
Elahe Kalbassi,
Janice Lam,
Daniel Licht,
Jean Maillard,
Anna Sun,
Skyler Wang,
Guillaume Wenzek,
Al Youngblood,
Bapi Akula,
Loic Barrault,
Gabriel Mejia Gonzalez,
Prangthip Hansanti,
John Hoffman,
Semarley Jarrett,
Kaushik Ram Sadagopan,
Dirk Rowe,
Shannon Spruit,
Chau Tran
, et al. (14 additional authors not shown)
Abstract:
Driven by the goal of eradicating language barriers on a global scale, machine translation has solidified itself as a key focus of artificial intelligence research today. However, such efforts have coalesced around a small subset of languages, leaving behind the vast majority of mostly low-resource languages. What does it take to break the 200 language barrier while ensuring safe, high quality res…
▽ More
Driven by the goal of eradicating language barriers on a global scale, machine translation has solidified itself as a key focus of artificial intelligence research today. However, such efforts have coalesced around a small subset of languages, leaving behind the vast majority of mostly low-resource languages. What does it take to break the 200 language barrier while ensuring safe, high quality results, all while kee** ethical considerations in mind? In No Language Left Behind, we took on this challenge by first contextualizing the need for low-resource language translation support through exploratory interviews with native speakers. Then, we created datasets and models aimed at narrowing the performance gap between low and high-resource languages. More specifically, we developed a conditional compute model based on Sparsely Gated Mixture of Experts that is trained on data obtained with novel and effective data mining techniques tailored for low-resource languages. We propose multiple architectural and training improvements to counteract overfitting while training on thousands of tasks. Critically, we evaluated the performance of over 40,000 different translation directions using a human-translated benchmark, Flores-200, and combined human evaluation with a novel toxicity benchmark covering all languages in Flores-200 to assess translation safety. Our model achieves an improvement of 44% BLEU relative to the previous state-of-the-art, laying important groundwork towards realizing a universal translation system. Finally, we open source all contributions described in this work, accessible at https://github.com/facebookresearch/fairseq/tree/nllb.
△ Less
Submitted 25 August, 2022; v1 submitted 11 July, 2022;
originally announced July 2022.
-
Android Malware Detection using Feature Ranking of Permissions
Authors:
Muhammad Suleman Saleem,
Jelena Mišić,
Vojislav B. Mišić
Abstract:
We investigate the use of Android permissions as the vehicle to allow for quick and effective differentiation between benign and malware apps. To this end, we extract all Android permissions, eliminating those that have zero impact, and apply two feature ranking algorithms namely Chi-Square test and Fisher's Exact test to rank and additionally filter them, resulting in a comparatively small set of…
▽ More
We investigate the use of Android permissions as the vehicle to allow for quick and effective differentiation between benign and malware apps. To this end, we extract all Android permissions, eliminating those that have zero impact, and apply two feature ranking algorithms namely Chi-Square test and Fisher's Exact test to rank and additionally filter them, resulting in a comparatively small set of relevant permissions. Then we use Decision Tree, Support Vector Machine, and Random Forest Classifier algorithms to detect malware apps. Our analysis indicates that this approach can result in better accuracy and F-score value than other reported approaches. In particular, when random forest is used as the classifier with the combination of Fisher's Exact test, we achieve 99.34\% in accuracy and 92.17\% in F-score with the false positive rate of 0.56\% for the dataset in question, with results improving to 99.82\% in accuracy and 95.28\% in F-score with the false positive rate as low as 0.05\% when only malware from three most popular malware families are considered.
△ Less
Submitted 20 January, 2022;
originally announced January 2022.
-
Assessing Data Efficiency in Task-Oriented Semantic Parsing
Authors:
Shrey Desai,
Akshat Shrivastava,
Justin Rill,
Brian Moran,
Safiyyah Saleem,
Alexander Zotov,
Ahmed Aly
Abstract:
Data efficiency, despite being an attractive characteristic, is often challenging to measure and optimize for in task-oriented semantic parsing; unlike exact match, it can require both model- and domain-specific setups, which have, historically, varied widely across experiments. In our work, as a step towards providing a unified solution to data-efficiency-related questions, we introduce a four-st…
▽ More
Data efficiency, despite being an attractive characteristic, is often challenging to measure and optimize for in task-oriented semantic parsing; unlike exact match, it can require both model- and domain-specific setups, which have, historically, varied widely across experiments. In our work, as a step towards providing a unified solution to data-efficiency-related questions, we introduce a four-stage protocol which gives an approximate measure of how much in-domain, "target" data a parser requires to achieve a certain quality bar. Specifically, our protocol consists of (1) sampling target subsets of different cardinalities, (2) fine-tuning parsers on each subset, (3) obtaining a smooth curve relating target subset (%) vs. exact match (%), and (4) referencing the curve to mine ad-hoc (target subset, exact match) points. We apply our protocol in two real-world case studies -- model generalizability and intent complexity -- illustrating its flexibility and applicability to practitioners in task-oriented semantic parsing.
△ Less
Submitted 9 July, 2021;
originally announced July 2021.
-
Search-based Path Planning for a High Dimensional Manipulator in Cluttered Environments Using Optimization-based Primitives
Authors:
Muhammad Suhail Saleem,
Raghav Sood,
Sho Onodera,
Rohit Arora,
Hiroyuki Kanazawa,
Maxim Likhachev
Abstract:
In this work we tackle the path planning problem for a 21-dimensional snake robot-like manipulator, navigating a cluttered gas turbine for the purposes of inspection. Heuristic search based approaches are effective planning strategies for common manipulation domains. However, their performance on high dimensional systems is heavily reliant on the effectiveness of the action space and the heuristic…
▽ More
In this work we tackle the path planning problem for a 21-dimensional snake robot-like manipulator, navigating a cluttered gas turbine for the purposes of inspection. Heuristic search based approaches are effective planning strategies for common manipulation domains. However, their performance on high dimensional systems is heavily reliant on the effectiveness of the action space and the heuristics chosen. The complex nature of our system, reachability constraints, and highly cluttered turbine environment renders naive choices of action spaces and heuristics ineffective. To this extent we have developed i) a methodology for dynamically generating actions based on online optimization that help the robot navigate narrow spaces, ii) a technique for lazily generating these computationally expensive optimization actions to effectively utilize resources, and iii) heuristics that reason about the homotopy classes induced by the blades of the turbine in the robot workspace and a Multi-Heuristic framework which guides the search along the relevant classes. The impact of our contributions is presented through an experimental study in simulation, where the 21 DOF manipulator navigates towards regions of inspection within a turbine.
△ Less
Submitted 6 July, 2021;
originally announced July 2021.
-
DroidMorph: Are We Ready to Stop the Attack of Android Malware Clones?
Authors:
Shahid Alam,
M. Zain ul Abideen,
Shahzad Saleem
Abstract:
The number of Android malware variants (clones) are on the rise and, to stop this attack of clones we need to develop new methods and techniques for analysing and detecting them. As a first step, we need to study how these malware clones are generated. This will help us better anticipate and recognize these clones. In this paper we present a new tool named DroidMorph, that provides morphing of And…
▽ More
The number of Android malware variants (clones) are on the rise and, to stop this attack of clones we need to develop new methods and techniques for analysing and detecting them. As a first step, we need to study how these malware clones are generated. This will help us better anticipate and recognize these clones. In this paper we present a new tool named DroidMorph, that provides morphing of Android applications (APKs) at different level of abstractions, and can be used to create Android application (malware/benign) clones. As a case study we perform testing and evaluating resilience of current commercial anti-malware products against attack of the Android malware clones generated by DroidMorph. We found that 8 out of 17 leading commercial anti-malware programs were not able to detect any of the morphed APKs. We hope that DroidMorph will be used in future research, to improve Android malware clones analysis and detection, and help stop them.
△ Less
Submitted 16 June, 2021;
originally announced June 2021.
-
Manipulation Planning Among Movable Obstacles Using Physics-Based Adaptive Motion Primitives
Authors:
Dhruv Mauria Saxena,
Muhammad Suhail Saleem,
Maxim Likhachev
Abstract:
Robot manipulation in cluttered scenes often requires contact-rich interactions with objects. It can be more economical to interact via non-prehensile actions, for example, push through other objects to get to the desired grasp pose, instead of deliberate prehensile rearrangement of the scene. For each object in a scene, depending on its properties, the robot may or may not be allowed to make cont…
▽ More
Robot manipulation in cluttered scenes often requires contact-rich interactions with objects. It can be more economical to interact via non-prehensile actions, for example, push through other objects to get to the desired grasp pose, instead of deliberate prehensile rearrangement of the scene. For each object in a scene, depending on its properties, the robot may or may not be allowed to make contact with, tilt, or topple it. To ensure that these constraints are satisfied during non-prehensile interactions, a planner can query a physics-based simulator to evaluate the complex multi-body interactions caused by robot actions. Unfortunately, it is infeasible to query the simulator for thousands of actions that need to be evaluated in a typical planning problem as each simulation is time-consuming. In this work, we show that (i) manipulation tasks (specifically pick-and-place style tasks from a tabletop or a refrigerator) can often be solved by restricting robot-object interactions to adaptive motion primitives in a plan, (ii) these actions can be incorporated as subgoals within a multi-heuristic search framework, and (iii) limiting interactions to these actions can help reduce the time spent querying the simulator during planning by up to 40x in comparison to baseline algorithms. Our algorithm is evaluated in simulation and in the real-world on a PR2 robot using PyBullet as our physics-based simulator. Supplementary video: \url{https://youtu.be/ABQc7JbeJPM}.
△ Less
Submitted 23 March, 2023; v1 submitted 8 February, 2021;
originally announced February 2021.
-
Reducing the Mutual Outage Probability of Cooperative Non-Orthogonal Multiple Access
Authors:
Sana Riaz,
Fahd Ahmed Khan,
Sajid Saleem,
Qasim Zeeshan Ahmed
Abstract:
In this letter, a new power allocation scheme is proposed to improve the reliability of cooperative non-orthogonal multiple access (CO-NOMA). The strong user is allocated the maximum power, whereas the weak user is allocated the minimum power. This power allocation alters the decoding sequence along with the signal-to-interference plus noise ratio (SINR), at the users. The weak user benefits from…
▽ More
In this letter, a new power allocation scheme is proposed to improve the reliability of cooperative non-orthogonal multiple access (CO-NOMA). The strong user is allocated the maximum power, whereas the weak user is allocated the minimum power. This power allocation alters the decoding sequence along with the signal-to-interference plus noise ratio (SINR), at the users. The weak user benefits from receiving multiple copies of the signal whereas the strong user benefits from the higher power allocation. Numerical simulation results show that the proposed scheme has a lower mutual outage probability (MOP) and offers better reliability as compared to the conventional power allocation scheme for CONOMA. An exact closed-form expression of MOP is derived for the two-user CO-NOMA system and it is shown that each user achieves full diversity. The proposed allocation is able to achieve approximately 30% higher transmission rate at 15 dB as compared to conventional CO-NOMA in a practical non-power balanced scenario.
△ Less
Submitted 24 November, 2020; v1 submitted 28 October, 2020;
originally announced November 2020.
-
Detection of Aflatoxin M1 by Fiber Cavity Attenuated Phase Shift Spectroscopy
Authors:
M. Daniyal Ghauri,
Syed Zajif Hussain,
Ubaid Ullah,
Rana M. Armaghan Ayaz,
Rahman Shah Zaib Saleem,
Alper Kiraz,
M. Imran Cheema
Abstract:
Aflatoxin M1 (AFM1) is a carcinogenic compound commonly found in milk in excess of the WHO permissible limit, especially in develo** countries. Currently, state-of-the-art tests for detecting AFM1 in milk include chromatographic systems and enzyme-linked-immunosorbent assays. Although these tests provide fair accuracy and sensitivity however, they require trained laboratory personnel, expensive…
▽ More
Aflatoxin M1 (AFM1) is a carcinogenic compound commonly found in milk in excess of the WHO permissible limit, especially in develo** countries. Currently, state-of-the-art tests for detecting AFM1 in milk include chromatographic systems and enzyme-linked-immunosorbent assays. Although these tests provide fair accuracy and sensitivity however, they require trained laboratory personnel, expensive infrastructure, and many hours for producing final results. Optical sensors leveraging spectroscopy have a tremendous potential of providing an accurate, real time, and specialists-free AFM1 detector. Despite this, AFM1 sensing demonstrations using optical spectroscopy are still immature. Here, we demonstrate an optical sensor that employs the principle of cavity attenuated phase shift spectroscopy in optical fiber cavities for rapid AFM1 detection in aqueous solutions at 1550 nm. The sensor constitutes a cavity built by two fiber Bragg gratings. We splice a tapered fiber of $<$ 10 $μ$m waist inside the cavity as a sensing head. For ensuring specific binding of AFM1 in a solution, the tapered fiber is functionalized with DNA aptamers followed by validation of the conjugation via FTIR, TGA, and EDX analyses. We then detect AFM1 in a solution by measuring the phase shift between a sinusoidally modulated laser input and the sensor output at resonant frequencies of the cavity. Our results show that the sensor has the detection limit of 20 ng/L (20 ppt) which is well below both the US and the European safety regulations. We anticipate that the present work will lead towards a rapid and accurate AFM1 sensor, especially for low-resource settings.
△ Less
Submitted 1 September, 2020;
originally announced October 2020.
-
STBC-Aided Cooperative NOMA with Timing Offsets, Imperfect Successive Interference Cancellation, and Imperfect Channel State Information
Authors:
Muhammad Waseem Akhtar,
Syed Ali Hassan,
Sajid Saleem,
Haejoon Jung
Abstract:
The combination of non-orthogonal multiple access(NOMA) and cooperative communications can be a suitable solution for fifth generation (5G) and beyond 5G (B5G) wireless systems with massive connectivity, because it can provide higher spectral efficiency, lower energy consumption, and improved fairness compared to the non-cooperative NOMA. However,the receiver complexity in the conventional coopera…
▽ More
The combination of non-orthogonal multiple access(NOMA) and cooperative communications can be a suitable solution for fifth generation (5G) and beyond 5G (B5G) wireless systems with massive connectivity, because it can provide higher spectral efficiency, lower energy consumption, and improved fairness compared to the non-cooperative NOMA. However,the receiver complexity in the conventional cooperative NOMA increases with increasing number of users owing to successive interference cancellation (SIC) at each user. Space time block code-aided cooperative NOMA (STBC-CNOMA) offers less numbers of SIC as compared to that of conventional cooperative NOMA. In this paper, we evaluate the performance of STBC-CNOMA under practical challenges such as imperfect SIC, imperfect timing synchronization between distributed cooperating users, and imperfect channel state information (CSI). We derive closed-form expressions of the received signals in the presence of such realistic impairments and then use them to evaluate outage probability. Further, we provide intuitive insights into the impact of each impairment on the outage performance through asymptotic analysis at high transmit signal-to-noise ratio. We also compare the complexity of STBC-CNOMA with existing cooperative NOMA protocols for a given number of users. In addition, through analysis and simulation, we observe that the impact of the imperfect SIC on the outage performance of STBC-CNOMA is more significant compared to the other two imperfections. Therefore, considering the smaller number of SIC in STBC-CNOMA compared to the other cooperative NOMA protocols, STBC-CNOMA is an effective solution to achieve high reliability for the same SIC imperfection condition.
△ Less
Submitted 7 July, 2020;
originally announced July 2020.
-
Deep Learning of Protein Structural Classes: Any Evidence for an 'Urfold'?
Authors:
Menuka Jaiswal,
Saad Saleem,
Yonghyeon Kweon,
Eli J Draizen,
Stella Veretnik,
Cameron Mura,
Philip E. Bourne
Abstract:
Recent computational advances in the accurate prediction of protein three-dimensional (3D) structures from amino acid sequences now present a unique opportunity to decipher the interrelationships between proteins. This task entails--but is not equivalent to--a problem of 3D structure comparison and classification. Historically, protein domain classification has been a largely manual and subjective…
▽ More
Recent computational advances in the accurate prediction of protein three-dimensional (3D) structures from amino acid sequences now present a unique opportunity to decipher the interrelationships between proteins. This task entails--but is not equivalent to--a problem of 3D structure comparison and classification. Historically, protein domain classification has been a largely manual and subjective activity, relying upon various heuristics. Databases such as CATH represent significant steps towards a more systematic (and automatable) approach, yet there still remains much room for the development of more scalable and quantitative classification methods, grounded in machine learning. We suspect that re-examining these relationships via a Deep Learning (DL) approach may entail a large-scale restructuring of classification schemes, improved with respect to the interpretability of distant relationships between proteins. Here, we describe our training of DL models on protein domain structures (and their associated physicochemical properties) in order to evaluate classification properties at CATH's "homologous superfamily" (SF) level. To achieve this, we have devised and applied an extension of image-classification methods and image segmentation techniques, utilizing a convolutional autoencoder model architecture. Our DL architecture allows models to learn structural features that, in a sense, 'define' different homologous SFs. We evaluate and quantify pairwise 'distances' between SFs by building one model per SF and comparing the loss functions of the models. Hierarchical clustering on these distance matrices provides a new view of protein interrelationships--a view that extends beyond simple structural/geometric similarity, and towards the realm of structure/function properties.
△ Less
Submitted 17 May, 2020;
originally announced May 2020.
-
Planning with Selective Physics-based Simulation for Manipulation Among Movable Objects
Authors:
Muhammad Suhail Saleem,
Maxim Likhachev
Abstract:
Use of physics-based simulation as a planning model enables a planner to reason and generate plans that involve non-trivial interactions with the world. For example, gras** a milk container out of a cluttered refrigerator may involve moving a robot manipulator in between other objects, pushing away the ones that are movable and avoiding interactions with certain fragile containers. A physics-bas…
▽ More
Use of physics-based simulation as a planning model enables a planner to reason and generate plans that involve non-trivial interactions with the world. For example, gras** a milk container out of a cluttered refrigerator may involve moving a robot manipulator in between other objects, pushing away the ones that are movable and avoiding interactions with certain fragile containers. A physics-based simulator allows a planner to reason about the effects of interactions with these objects and to generate a plan that grasps the milk container successfully. The use of physics-based simulation for planning however is underutilized. One of the reasons for it being that physics-based simulations are typically way too slow for being used within a planning loop that typically requires tens of thousands of actions to be evaluated within a matter of a second or two. In this work, we develop a planning algorithm that tries to address this challenge. In particular, it builds on the observation that only a small number of actions actually need to be simulated using physics, and the remaining set of actions, such as moving an arm around obstacles, can be evaluated using a much simpler internal planning model, e.g., a simple collision-checking model. Motivated by this, we develop an algorithm called Planning with Selective Physics-based Simulation that automatically discovers what should be simulated with physics and what can utilize an internal planning model for pick-and-place tasks.
△ Less
Submitted 14 March, 2020;
originally announced March 2020.
-
CRT Based Spectral Convolution in Binary Fields
Authors:
Muhammad Asad Khan,
Sajid Saleem,
Amir A Khan
Abstract:
In this paper, new results on convolution of spectral components in binary fields have been presented for combiatorial sequences. A novel method of convolution of DFT points through Chinese Remainder Theorem (CRT) is presented which has lower complexity as compared to known methods of spectral point computations. Exploring the inherent structures in cyclic nature of finite fields, certain fixed ma…
▽ More
In this paper, new results on convolution of spectral components in binary fields have been presented for combiatorial sequences. A novel method of convolution of DFT points through Chinese Remainder Theorem (CRT) is presented which has lower complexity as compared to known methods of spectral point computations. Exploring the inherent structures in cyclic nature of finite fields, certain fixed map**s between the spectral components from composite fields to their decomposed subfield components has been illustrated which are significant for analysis of combiner generators. Complexity estimations of our CRT based methodology of convolutions in binary fields proves that our proposed method is far efficient as comparised to to existing methods of DFT computations for convolving sequences in frequency domain.
△ Less
Submitted 26 November, 2019;
originally announced November 2019.
-
Propagation of Electromagnetic Waves in Neutron Star
Authors:
Sania Saleem,
Saeeda Sajjad,
Samina Masood
Abstract:
Propagation properties of electromagnetic (EM) waves in the dense medium of neutron star are studied. It is pointed out that EM waves develop a longitudinal component when they propagate in such a dense medium. Renormalization scheme of quantum electrodynamics (QED) is used to investigate the behavior of EM waves in transverse and longitudinal directions. Medium response to EM waves indicates that…
▽ More
Propagation properties of electromagnetic (EM) waves in the dense medium of neutron star are studied. It is pointed out that EM waves develop a longitudinal component when they propagate in such a dense medium. Renormalization scheme of quantum electrodynamics (QED) is used to investigate the behavior of EM waves in transverse and longitudinal directions. Medium response to EM waves indicates that the electromagnetic properties of the dense material are modified as a result of the interaction of EM waves with the matter. Using QED, expressions for the electromagnetic properties such as electric permittivity, magnetic permeability and the refractive index of dense matter are obtained. The results are applied to a particular star for illustration.
△ Less
Submitted 5 November, 2019;
originally announced November 2019.
-
Oxygen-Octahedral-Tilting-Driven Topological Hall Effect in Ultrathin SrRuO3 Films
Authors:
Youdi Gu,
Yi-Wen Wei,
Kun Xu,
Hongrui Zhang,
Fei Wang,
Fan Li,
Muhammad Shahrukh Saleem,
Cui-Zu Chang,
Jirong Sun,
Cheng Song,
Ji Feng,
Xiaoyan Zhong,
Wei Liu,
Zhidong Zhang,
**g Zhu,
Feng Pan
Abstract:
Topological spin textures as an emerging class of topological matter offer a medium for information storage and processing. The recently discovered topological Hall effect (THE) is considered as a fingerprint for electrically probing non-trivial spin-textures. But the origin of THE in oxides has remained elusive. Here we report an observation of the THE in ultrathin (unit cells. u.c.) 4d ferromagn…
▽ More
Topological spin textures as an emerging class of topological matter offer a medium for information storage and processing. The recently discovered topological Hall effect (THE) is considered as a fingerprint for electrically probing non-trivial spin-textures. But the origin of THE in oxides has remained elusive. Here we report an observation of the THE in ultrathin (unit cells. u.c.) 4d ferromagnetic SrRuO3 films grown on SrTiO3(001) substrates, which can be attributed to the chiral ordering of spin structure (i.e., skyrmion-like) in the single SrRuO3 layer without contacting 5d oxide SrIrO3 layer. It is revealed that the RuO6 octahedral tilting induced by local orthorhombic-to-tetragonal structural phase transition exists across the SrRuO3/SrTiO3 interface, which naturally breaks the inversion symmetry. Our theoretical calculations demonstrate that the Dzyaloshinskii-Moriya (DM) interaction arises owing to the broken inversion symmetry and strong spin-orbit interaction of 4d SrRuO3. This DM interaction can stabilize the Néel-type magnetic skyrmions, which in turn accounts for the observed THE in transport. The RuO6 octahedral tilting-induced DM interaction provides a pathway toward the electrical control of the topological spin textures and resultant THE, which is confirmed both experimentally and theoretically. Besides the fundamental significance, the understanding of THE in oxides and its electrical manipulation presented in this work could advance the low power cost topological electronic and spintronic applications.
△ Less
Submitted 22 November, 2018;
originally announced November 2018.
-
Strong orientation dependent spin-orbit torque in antiferromagnet Mn2Au
Authors:
X. F. Zhou,
J. Zhang,
F. Li,
X. Z. Chen,
G. Y. Shi,
Y. Z. Tan,
Y. D. Gu,
M. S. Saleem,
H. Q. Wu,
F. Pan,
C. Song
Abstract:
Antiferromagnets with zero net magnetic moment, strong anti-interference and ultrafast switching speed have potential competitiveness in high-density information storage. Body centered tetragonal antiferromagnet Mn2Au with opposite spin sub-lattices is a unique metallic material for Néel-order spin-orbit torque (SOT) switching. Here we investigate the SOT switching in quasi-epitaxial (103), (101)…
▽ More
Antiferromagnets with zero net magnetic moment, strong anti-interference and ultrafast switching speed have potential competitiveness in high-density information storage. Body centered tetragonal antiferromagnet Mn2Au with opposite spin sub-lattices is a unique metallic material for Néel-order spin-orbit torque (SOT) switching. Here we investigate the SOT switching in quasi-epitaxial (103), (101) and (204) Mn2Au films prepared by a simple magnetron sputtering method. We demonstrate current induced antiferromagnetic moment switching in all the prepared Mn2Au films by a short current pulse at room temperature, whereas different orientated films exhibit distinguished switching characters. A direction-independent reversible switching is attained in Mn2Au (103) films due to negligible magnetocrystalline anisotropy energy, while for Mn2Au (101) and (204) films, the switching is invertible with the current applied along the in-plane easy axis and its vertical axis, but becomes attenuated seriously during initially switching circles when the current is applied along hard axis, because of the existence of magnetocrystalline anisotropy energy. Besides the fundamental significance, the strong orientation dependent SOT switching, which was not realized irrespective of ferromagnet and antiferromagnet, provides versatility for spintronics.
△ Less
Submitted 15 April, 2018;
originally announced April 2018.
-
Electric-field control of oxygen vacancy and magnetic phase transition in cobaltite/manganite bilayer
Authors:
B. Cui,
C. Song,
F. Li,
X. Y. Zhong,
Z. C. Wang,
P. Werner,
Y. D. Gu,
H. Q. Wu,
J. J. Peng,
M. S. Saleem,
S. S. P. Parkin,
F. Pan
Abstract:
Manipulation of oxygen vacancies (V_O) in single oxide layers by varying the electric field can result in significant modulation of the ground state. However, in many oxide multilayers with strong application potentials, e.g. ferroelectric tunnel junctions and solid-oxide fuel cells, understanding V_O behaviour in various layers under an applied electric field remains a challenge, owing to complex…
▽ More
Manipulation of oxygen vacancies (V_O) in single oxide layers by varying the electric field can result in significant modulation of the ground state. However, in many oxide multilayers with strong application potentials, e.g. ferroelectric tunnel junctions and solid-oxide fuel cells, understanding V_O behaviour in various layers under an applied electric field remains a challenge, owing to complex V_O transport between different layers. By swee** the external voltage, a reversible manipulation of V_O and a corresponding fixed magnetic phase transition sequence in cobaltite/manganite (SrCoO3-x/La0.45Sr0.55MnO3-y) heterostructures are reported. The magnetic phase transition sequence confirms that the priority of electric-field-induced V_O formation/annihilation in the complex bilayer system is mainly determined by the V_O formation energies and Gibbs free energy differences, which is supported by theoretical analysis. We not only realize a reversible manipulation of the magnetic phase transition in an oxide bilayer, but also provide insight into the electric field control of V_O engineering in heterostructures.
△ Less
Submitted 31 October, 2017;
originally announced December 2017.
-
Metal-insulator-metal transition in NdNiO3 films capped by CoFe2O4
Authors:
M. S. Saleem,
C. Song,
J. J. Peng,
B. Cui,
F. Li,
Y. D. Gu,
F. Pan
Abstract:
Metal-insulator transition features as a transformation, from a highly charge conductive state to another state where charge conductivity is greatly suppressed when decreasing the temperature. Here we demonstrate two consecutive transitions in NdNiO3 films with CoFe2O4 cap**, in which the metal-insulator transition occurs at 85 K, followed by an unprecedented insulator-metal transition below 40…
▽ More
Metal-insulator transition features as a transformation, from a highly charge conductive state to another state where charge conductivity is greatly suppressed when decreasing the temperature. Here we demonstrate two consecutive transitions in NdNiO3 films with CoFe2O4 cap**, in which the metal-insulator transition occurs at 85 K, followed by an unprecedented insulator-metal transition below 40 K. The emerging insulator-metal transition associated with a weak antiferromagnetic behavior is observed in 20 unit cell-thick NdNiO3 with more than 5 unit cell CoFe2O4 cap**. Differently, the NdNiO3 films with thinner CoFe2O4 cap** only exhibit metal-insulator transition at 85 K, accompanied by a strong antiferromagnetic state below 40 K. Charge transfer from Co to Ni, instead of from Fe to Ni, formulates the ferromagnetic interaction between Ni-Ni and Ni-Co atoms, thus suppressing the antiferromagnetic feature and producing metallic conductive behavior. Furthermore, a phase diagram for the metal-insulator-metal transition in this system is drawn.
△ Less
Submitted 6 February, 2017;
originally announced February 2017.
-
Information Centric Networking based Handover Support for QoS Maintenance in Cooperative Heterogeneous Wireless Networks
Authors:
Muhammad Shoaib Saleem,
Eric Renault,
Djamal Zeghlache
Abstract:
Network of Information (NetInf) is a term coined for networks which unlike contemporary network are not node centric. As the name indicates, information supersedes nodes in the network. In this report, we propose an architecture of mobile node for NetInf. We call it NetInf Mobile Node. It is an extension of the basic node architecture proposed for NetInf. It is compatible to NetInf and TCP/IP base…
▽ More
Network of Information (NetInf) is a term coined for networks which unlike contemporary network are not node centric. As the name indicates, information supersedes nodes in the network. In this report, we propose an architecture of mobile node for NetInf. We call it NetInf Mobile Node. It is an extension of the basic node architecture proposed for NetInf. It is compatible to NetInf and TCP/IP based networks. The Virtual Node Layer modules in the architecture provide support for managing mobility, power consumption of the node as well data relaying/storing services. In- ner/Outer Locator Construction Routers (I/O LCTR) are two functions introduced in NetInf mobile nodes to operate between NetInf and non- NetInf sites. The basic purpose of NetInf mobile node is to maintain the QoS during mobility events. The handoff/handover are critical situations during mobility where chances of QoS degradation of an ongoing session are high. This report presents one such scenario in which QoS of an appli- cation is maintained during a handoff situations in heterogeneous wireless network environment through our proposed algorithm.
△ Less
Submitted 16 August, 2011;
originally announced August 2011.
-
Laser cooling of a trapped particle with increased Rabi frequencies
Authors:
Tony Blake,
Andreas Kurcz,
Norah S. Saleem,
Almut Beige
Abstract:
This paper analyses the cooling of a single particle in a harmonic trap with red-detuned laser light with fewer approximations than previously done in the literature. We avoid the adiabatic elimination of the excited atomic state but are still interested in Lamb-Dicke parameters $η\ll 1$. Our results show that the Rabi frequency of the cooling laser can be chosen higher than previously assumed, th…
▽ More
This paper analyses the cooling of a single particle in a harmonic trap with red-detuned laser light with fewer approximations than previously done in the literature. We avoid the adiabatic elimination of the excited atomic state but are still interested in Lamb-Dicke parameters $η\ll 1$. Our results show that the Rabi frequency of the cooling laser can be chosen higher than previously assumed, thereby increasing the effective cooling rate but {\em not} affecting the final outcome of the cooling process. Since laser cooling is already a well established experimental technique, the main aim of this paper is to present a model which can be extended to more complex scenarios, like cavity-mediated laser cooling.
△ Less
Submitted 14 October, 2011; v1 submitted 2 March, 2011;
originally announced March 2011.
-
A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Network
Authors:
Shahnaz Saleem,
Sana Ullah,
Kyung Sup Kwak
Abstract:
A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) informatio…
▽ More
A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN.
△ Less
Submitted 3 February, 2011;
originally announced February 2011.
-
NetInf Mobile Node Architecture and Mobility Management based on LISP Mobile Node
Authors:
Muhammad Shoaib Saleem,
Éric Renault,
Djamal Zeghlache
Abstract:
In this paper, we propose an architecture for Network of Information mobile node (NetInf MN). It bears characteristics and features of basic NetInf node architecture with features introduced in the LISP MN architecture. We also introduce a virtual node layer for mobility management in the Network of Information. Therefore, by adopting this architecture no major changes in the contemporary network…
▽ More
In this paper, we propose an architecture for Network of Information mobile node (NetInf MN). It bears characteristics and features of basic NetInf node architecture with features introduced in the LISP MN architecture. We also introduce a virtual node layer for mobility management in the Network of Information. Therefore, by adopting this architecture no major changes in the contemporary network topologies is required. Thus, making our approach more practical.
△ Less
Submitted 16 August, 2011; v1 submitted 30 September, 2010;
originally announced September 2010.
-
A Study of Medium Access Control Protocols for Wireless Body Area Networks
Authors:
Sana Ullah,
Bin Shen,
S. M. Riazul Islam,
Pervez Khan,
Shahnaz Saleem,
Kyung Sup Kwak
Abstract:
The seamless integration of low-power, miniaturised, invasive/non-invasive lightweight sensor nodes have contributed to the development of a proactive and unobtrusive Wireless Body Area Network (WBAN). A WBAN provides long-term health monitoring of a patient without any constraint on his/her normal dailylife activities. This monitoring requires low-power operation of invasive/non-invasive sensor n…
▽ More
The seamless integration of low-power, miniaturised, invasive/non-invasive lightweight sensor nodes have contributed to the development of a proactive and unobtrusive Wireless Body Area Network (WBAN). A WBAN provides long-term health monitoring of a patient without any constraint on his/her normal dailylife activities. This monitoring requires low-power operation of invasive/non-invasive sensor nodes. In other words, a power-efficient Medium Access Control (MAC) protocol is required to satisfy the stringent WBAN requirements including low-power consumption. In this paper, we first outline the WBAN requirements that are important for the design of a low-power MAC protocol. Then we study low-power MAC protocols proposed/investigated for WBAN with emphasis on their strengths and weaknesses. We also review different power-efficient mechanisms for WBAN. In addition, useful suggestions are given to help the MAC designers to develop a low-power MAC protocol that will satisfy the stringent WBAN requirements.
△ Less
Submitted 31 July, 2010; v1 submitted 22 April, 2010;
originally announced April 2010.
-
A RFID-based Campus Context-Aware Notification System
Authors:
Nazleeni S. Haron,
Nur S. Saleem,
Mohd H. Hasan,
Mazeyanti M. Ariffin,
Izzatdin A. Aziz
Abstract:
This paper presents the design and development of a context-aware notification system for university students using RFID technology. This system is leveraging on the student's matrix card as the RFID tag (sensor), RFID reader and server as the processors and screen monitor at the various locations in the campus as the actuator of the output. This system aims to deliver urgent notifications to the…
▽ More
This paper presents the design and development of a context-aware notification system for university students using RFID technology. This system is leveraging on the student's matrix card as the RFID tag (sensor), RFID reader and server as the processors and screen monitor at the various locations in the campus as the actuator of the output. This system aims to deliver urgent notifications to the intended students immediately at their respective locations. In addition, the system is also able to display personalized information based on the students' preferences and current location when accessing the system. The background of the study, the design approaches for this system and the preliminary evaluation of the prototype are presented in this paper. The evaluation results have indicated that the the proposed system is useful and easy to use.
△ Less
Submitted 22 March, 2010;
originally announced March 2010.
-
A Review of Wireless Body Area Networks for Medical Applications
Authors:
Sana Ullah,
Pervez Khan,
Niamat Ullah,
Shahnaz Saleem,
Henry Higgins,
Kyung Sup Kwak
Abstract:
Recent advances in Micro-Electro-Mechanical Systems (MEMS) technology, integrated circuits, and wireless communication have allowed the realization of Wireless Body Area Networks (WBANs). WBANs promise unobtrusive ambulatory health monitoring for a long period of time and provide real-time updates of the patient's status to the physician. They are widely used for ubiquitous healthcare, entertainme…
▽ More
Recent advances in Micro-Electro-Mechanical Systems (MEMS) technology, integrated circuits, and wireless communication have allowed the realization of Wireless Body Area Networks (WBANs). WBANs promise unobtrusive ambulatory health monitoring for a long period of time and provide real-time updates of the patient's status to the physician. They are widely used for ubiquitous healthcare, entertainment, and military applications. This paper reviews the key aspects of WBANs for numerous applications. We present a WBAN infrastructure that provides solutions to on-demand, emergency, and normal traffic. We further discuss in-body antenna design and low-power MAC protocol for WBAN. In addition, we briefly outline some of the WBAN applications with examples. Our discussion realizes a need for new power-efficient solutions towards in-body and on-body sensor networks.
△ Less
Submitted 3 August, 2010; v1 submitted 6 January, 2010;
originally announced January 2010.
-
Formation of the intermediate baryon systems in hadron-nuclear and nuclear-nuclear interactions
Authors:
M. K. Suleymanov,
E. U. Khan,
A Kravchakova,
Mahnaz Q. Haseeb,
S. M. Saleem,
Y. H. Huseynaliyev,
S Vokal,
A. S. Vodopianov,
O. B. Abdinov
Abstract:
The centrality experiments indicate regime change and saturation in the behavior of some characteristics of the secondary particles emitted in hadron-nuclear and nuclear-nuclear interactions at high energies. The phenomenon has a critical character. The simple models do not explain the effect. We suppose that the responsible mechanism to explain the phenomenon could be the formation and decay of…
▽ More
The centrality experiments indicate regime change and saturation in the behavior of some characteristics of the secondary particles emitted in hadron-nuclear and nuclear-nuclear interactions at high energies. The phenomenon has a critical character. The simple models do not explain the effect. We suppose that the responsible mechanism to explain the phenomenon could be the formation and decay of the intermediate baryon systems. Such systems could be formed as a result of nucleon percolation in compressed baryonic matter. Formation of big percolation cluster may change the properties of the medium, e.g., it could lead to the changing its transparency. This could be used to get a signal of the intermediate baryonic system formation. We consider two signals to identify the formation of the intermediate baryon systems: the critical changing of transparency of the strongly interacting matter and the enhancement of light nuclei production with increase in centrality.
△ Less
Submitted 16 December, 2007;
originally announced December 2007.
-
Multiplicity and angular distribution of particles emitted in relativistic nuclear-nuclear interactions
Authors:
M. K. Suleymanov,
E. U. Khan,
A. Kravchakova,
Mahnaz Q. Haseeb,
S. M. Saleem,
Y. H. Huseynaliyev,
S. Vokal,
A. S. Vodopianov,
O. B. Abdinov
Abstract:
We discuss the experimental results on the behavior of the average multiplicities and angular distributions of slow particles emitted in hadron-nuclear and nuclear-nuclear interactions at relativistic energies as a function of the centrality of collisions. It is observed that by increasing the mass of the projectiles the angular distributions of slow particles change and the structure which was…
▽ More
We discuss the experimental results on the behavior of the average multiplicities and angular distributions of slow particles emitted in hadron-nuclear and nuclear-nuclear interactions at relativistic energies as a function of the centrality of collisions. It is observed that by increasing the mass of the projectiles the angular distributions of slow particles change and the structure which was demonstrated in the case of pi-mesons, protons and light nuclear projectiles, almost disappears. During the interaction of the heavier projectile with nuclear target, the number of secondary interactions as well as number of nucleon-nucleon elastic scattering and re-scattering events increases. We suggest to restore this information using the heavy ion generators taking into account the multiplicity distributions. Because our investigations show that the formation of the percolation cluster sufficiently influences the behaviour of the average multiplicity of the slow particles emitted in these interactions.
△ Less
Submitted 1 December, 2007;
originally announced December 2007.