-
A Deep Learning Approach to Detect Complete Safety Equipment For Construction Workers Based On YOLOv7
Authors:
Md. Shariful Islam,
SM Shaqib,
Shahriar Sultan Ramit,
Shahrun Akter Khushbu,
Mr. Abdus Sattar,
Dr. Sheak Rashed Haider Noori
Abstract:
In the construction sector, ensuring worker safety is of the utmost significance. In this study, a deep learning-based technique is presented for identifying safety gear worn by construction workers, such as helmets, goggles, jackets, gloves, and footwears. The recommended approach uses the YOLO v7 (You Only Look Once) object detection algorithm to precisely locate these safety items. The dataset…
▽ More
In the construction sector, ensuring worker safety is of the utmost significance. In this study, a deep learning-based technique is presented for identifying safety gear worn by construction workers, such as helmets, goggles, jackets, gloves, and footwears. The recommended approach uses the YOLO v7 (You Only Look Once) object detection algorithm to precisely locate these safety items. The dataset utilized in this work consists of labeled images split into training, testing and validation sets. Each image has bounding box labels that indicate where the safety equipment is located within the image. The model is trained to identify and categorize the safety equipment based on the labeled dataset through an iterative training approach. We used custom dataset to train this model. Our trained model performed admirably well, with good precision, recall, and F1-score for safety equipment recognition. Also, the model's evaluation produced encouraging results, with a [email protected] score of 87.7\%. The model performs effectively, making it possible to quickly identify safety equipment violations on building sites. A thorough evaluation of the outcomes reveals the model's advantages and points up potential areas for development. By offering an automatic and trustworthy method for safety equipment detection, this research makes a contribution to the fields of computer vision and workplace safety. The proposed deep learning-based approach will increase safety compliance and reduce the risk of accidents in the construction industry
△ Less
Submitted 13 June, 2024; v1 submitted 11 June, 2024;
originally announced June 2024.
-
Multi-Relational Graph Neural Network for Out-of-Domain Link Prediction
Authors:
Asma Sattar,
Georgios Deligiorgis,
Marco Trincavelli,
Davide Bacciu
Abstract:
Dynamic multi-relational graphs are an expressive relational representation for data enclosing entities and relations of different types, and where relationships are allowed to vary in time. Addressing predictive tasks over such data requires the ability to find structure embeddings that capture the diversity of the relationships involved, as well as their dynamic evolution. In this work, we estab…
▽ More
Dynamic multi-relational graphs are an expressive relational representation for data enclosing entities and relations of different types, and where relationships are allowed to vary in time. Addressing predictive tasks over such data requires the ability to find structure embeddings that capture the diversity of the relationships involved, as well as their dynamic evolution. In this work, we establish a novel class of challenging tasks for dynamic multi-relational graphs involving out-of-domain link prediction, where the relationship being predicted is not available in the input graph. We then introduce a novel Graph Neural Network model, named GOOD, designed specifically to tackle the out-of-domain generalization problem. GOOD introduces a novel design concept for multi-relation embedding aggregation, based on the idea that good representations are such when it is possible to disentangle the mixing proportions of the different relational embeddings that have produced it. We also propose five benchmarks based on two retail domains, where we show that GOOD can effectively generalize predictions out of known relationship types and achieve state-of-the-art results. Most importantly, we provide insights into problems where out-of-domain prediction might be preferred to an in-domain formulation, that is, where the relationship to be predicted has very few positive examples.
△ Less
Submitted 17 March, 2024;
originally announced March 2024.
-
Whitepaper on Reusable Hybrid and Multi-Cloud Analytics Service Framework
Authors:
Gregor von Laszewski,
Wo Chang,
Russell Reinsch,
Olivera Kotevska,
Ali Karimi,
Abdul Rahman Sattar,
Garry Mazzaferro,
Geoffrey C. Fox
Abstract:
Over the last several years, the computation landscape for conducting data analytics has completely changed. While in the past, a lot of the activities have been undertaken in isolation by companies, and research institutions, today's infrastructure constitutes a wealth of services offered by a variety of providers that offer opportunities for reuse, and interactions while leveraging service colla…
▽ More
Over the last several years, the computation landscape for conducting data analytics has completely changed. While in the past, a lot of the activities have been undertaken in isolation by companies, and research institutions, today's infrastructure constitutes a wealth of services offered by a variety of providers that offer opportunities for reuse, and interactions while leveraging service collaboration, and service cooperation.
This document focuses on expanding analytics services to develop a framework for reusable hybrid multi-service data analytics. It includes (a) a short technology review that explicitly targets the intersection of hybrid multi-provider analytics services, (b) a small motivation based on use cases we looked at, (c) enhancing the concepts of services to showcase how hybrid, as well as multi-provider services can be integrated and reused via the proposed framework, (d) address analytics service composition, and (e) integrate container technologies to achieve state-of-the-art analytics service deployment
△ Less
Submitted 25 October, 2023;
originally announced October 2023.
-
Solving Travelling Thief Problems using Coordination Based Methods
Authors:
Majid Namazi,
M. A. Hakim Newton,
Conrad Sanderson,
Abdul Sattar
Abstract:
A travelling thief problem (TTP) is a proxy to real-life problems such as postal collection. TTP comprises an entanglement of a travelling salesman problem (TSP) and a knapsack problem (KP) since items of KP are scattered over cities of TSP, and a thief has to visit cities to collect items. In TTP, city selection and item selection decisions need close coordination since the thief's travelling spe…
▽ More
A travelling thief problem (TTP) is a proxy to real-life problems such as postal collection. TTP comprises an entanglement of a travelling salesman problem (TSP) and a knapsack problem (KP) since items of KP are scattered over cities of TSP, and a thief has to visit cities to collect items. In TTP, city selection and item selection decisions need close coordination since the thief's travelling speed depends on the knapsack's weight and the order of visiting cities affects the order of item collection. Existing TTP solvers deal with city selection and item selection separately, kee** decisions for one type unchanged while dealing with the other type. This separation essentially means very poor coordination between two types of decision. In this paper, we first show that a simple local search based coordination approach does not work in TTP. Then, to address the aforementioned problems, we propose a human designed coordination heuristic that makes changes to collection plans during exploration of cyclic tours. We further propose another human designed coordination heuristic that explicitly exploits the cyclic tours in item selections during collection plan exploration. Lastly, we propose a machine learning based coordination heuristic that captures characteristics of the two human designed coordination heuristics. Our proposed coordination based approaches help our TTP solver significantly outperform existing state-of-the-art TTP solvers on a set of benchmark problems. Our solver is named Cooperation Coordination (CoCo) and its source code is available from https://github.com/majid75/CoCo
△ Less
Submitted 10 October, 2023;
originally announced October 2023.
-
Deontic Meta-Rules
Authors:
Francesco Olivieri,
Guido Governatori,
Matteo Cristani,
Antonino Rotolo,
Abdul Sattar
Abstract:
The use of meta-rules in logic, i.e., rules whose content includes other rules, has recently gained attention in the setting of non-monotonic reasoning: a first logical formalisation and efficient algorithms to compute the (meta)-extensions of such theories were proposed in Olivieri et al (2021) This work extends such a logical framework by considering the deontic aspect. The resulting logic will…
▽ More
The use of meta-rules in logic, i.e., rules whose content includes other rules, has recently gained attention in the setting of non-monotonic reasoning: a first logical formalisation and efficient algorithms to compute the (meta)-extensions of such theories were proposed in Olivieri et al (2021) This work extends such a logical framework by considering the deontic aspect. The resulting logic will not just be able to model policies but also tackle well-known aspects that occur in numerous legal systems. The use of Defeasible Logic (DL) to model meta-rules in the application area we just alluded to has been investigated. Within this line of research, the study mentioned above was not focusing on the general computational properties of meta-rules.
This study fills this gap with two major contributions. First, we introduce and formalise two variants of Defeasible Deontic Logic with Meta-Rules to represent (1) defeasible meta-theories with deontic modalities, and (2) two different types of conflicts among rules: Simple Conflict Defeasible Deontic Logic, and Cautious Conflict Defeasible Deontic Logic. Second, we advance efficient algorithms to compute the extensions for both variants.
△ Less
Submitted 23 September, 2022;
originally announced September 2022.
-
CurFi: An automated tool to find the best regression analysis model using curve fitting
Authors:
Ayon Roy,
Tausif Al Zubayer,
Nafisa Tabassum,
Muhammad Nazrul Islam,
Md. Abdus Sattar
Abstract:
Regression analysis is a well known quantitative research method that primarily explores the relationship between one or more independent variables and a dependent variable. Conducting regression analysis manually on large datasets with multiple independent variables can be tedious. An automated system for regression analysis will be of great help for researchers as well as non-expert users. Thus,…
▽ More
Regression analysis is a well known quantitative research method that primarily explores the relationship between one or more independent variables and a dependent variable. Conducting regression analysis manually on large datasets with multiple independent variables can be tedious. An automated system for regression analysis will be of great help for researchers as well as non-expert users. Thus, the objective of this research is to design and develop an automated curve fitting system. As outcome, a curve fitting system named "CurFi" was developed that uses linear regression models to fit a curve to a dataset and to find out the best fit model. The system facilitates to upload a dataset, split the dataset into training set and test set, select relevant features and label from the dataset; and the system will return the best fit linear regression model after training is completed. The developed tool would be a great resource for the users having limited technical knowledge who will also be able to find the best fit regression model for a dataset using the developed "CurFi" system.
△ Less
Submitted 16 May, 2022;
originally announced May 2022.
-
D3PG: Dirichlet DDPG for Task Partitioning and Offloading with Constrained Hybrid Action Space in Mobile Edge Computing
Authors:
Laha Ale,
Scott A. King,
Ning Zhang,
Abdul Rahman Sattar,
Janahan Skandaraniyam
Abstract:
Mobile Edge Computing (MEC) has been regarded as a promising paradigm to reduce service latency for data processing in the Internet of Things, by provisioning computing resources at the network edge. In this work, we jointly optimize the task partitioning and computational power allocation for computation offloading in a dynamic environment with multiple IoT devices and multiple edge servers. We f…
▽ More
Mobile Edge Computing (MEC) has been regarded as a promising paradigm to reduce service latency for data processing in the Internet of Things, by provisioning computing resources at the network edge. In this work, we jointly optimize the task partitioning and computational power allocation for computation offloading in a dynamic environment with multiple IoT devices and multiple edge servers. We formulate the problem as a Markov decision process with constrained hybrid action space, which cannot be well handled by existing deep reinforcement learning (DRL) algorithms. Therefore, we develop a novel Deep Reinforcement Learning called Dirichlet Deep Deterministic Policy Gradient (D3PG), which is built on Deep Deterministic Policy Gradient (DDPG) to solve the problem. The developed model can learn to solve multi-objective optimization, including maximizing the number of tasks processed before expiration and minimizing the energy cost and service latency.} More importantly, D3PG can effectively deal with constrained distribution-continuous hybrid action space, where the distribution variables are for the task partitioning and offloading, while the continuous variables are for computational frequency control. Moreover, the D3PG can address many similar issues in MEC and general reinforcement learning problems. Extensive simulation results show that the proposed D3PG outperforms the state-of-art methods.
△ Less
Submitted 1 March, 2022; v1 submitted 17 December, 2021;
originally announced December 2021.
-
Hamiltonian analysis of the Schroedinger field coupled with dynamic non-relativistic gravity
Authors:
Pradip Mukherjee,
Abdus Sattar
Abstract:
Using the recently mooted Galilean gauge theory we have constructed the model for the Schroedinger field interacting wuth gravity which is also dynamical. The dynamics of gravity is dictated by the Newtonian action in the Newton-Cartan spacetime. The theory is highly constrained . An elaborate analysis of the constraints of the theory have been performed. The symmetries are explicitly verified and…
▽ More
Using the recently mooted Galilean gauge theory we have constructed the model for the Schroedinger field interacting wuth gravity which is also dynamical. The dynamics of gravity is dictated by the Newtonian action in the Newton-Cartan spacetime. The theory is highly constrained . An elaborate analysis of the constraints of the theory have been performed. The symmetries are explicitly verified and the uniqueness of the model has been established. To the best of our knowledge both the model and its constraints structure are unique in the literature
△ Less
Submitted 13 May, 2021;
originally announced May 2021.
-
Surrogate Assisted Optimisation for Travelling Thief Problems
Authors:
Majid Namazi,
Conrad Sanderson,
M. A. Hakim Newton,
Abdul Sattar
Abstract:
The travelling thief problem (TTP) is a multi-component optimisation problem involving two interdependent NP-hard components: the travelling salesman problem (TSP) and the knapsack problem (KP). Recent state-of-the-art TTP solvers modify the underlying TSP and KP solutions in an iterative and interleaved fashion. The TSP solution (cyclic tour) is typically changed in a deterministic way, while cha…
▽ More
The travelling thief problem (TTP) is a multi-component optimisation problem involving two interdependent NP-hard components: the travelling salesman problem (TSP) and the knapsack problem (KP). Recent state-of-the-art TTP solvers modify the underlying TSP and KP solutions in an iterative and interleaved fashion. The TSP solution (cyclic tour) is typically changed in a deterministic way, while changes to the KP solution typically involve a random search, effectively resulting in a quasi-meandering exploration of the TTP solution space. Once a plateau is reached, the iterative search of the TTP solution space is restarted by using a new initial TSP tour. We propose to make the search more efficient through an adaptive surrogate model (based on a customised form of Support Vector Regression) that learns the characteristics of initial TSP tours that lead to good TTP solutions. The model is used to filter out non-promising initial TSP tours, in effect reducing the amount of time spent to find a good TTP solution. Experiments on a broad range of benchmark TTP instances indicate that the proposed approach filters out a considerable number of non-promising initial tours, at the cost of omitting only a small number of the best TTP solutions.
△ Less
Submitted 13 May, 2020;
originally announced May 2020.
-
A Bayesian Monte-Carlo Uncertainty Model for Assessment of Shear Stress Entropy
Authors:
Amin Kazemian-Kale-Kale,
Azadeh Gholami,
Mohammad Rezaie-Balf,
Amir Mosavi,
Ahmed A Sattar,
Bahram Gharabaghi,
Hossein Bonakdari
Abstract:
The entropy models have been recently adopted in many studies to evaluate the distribution of the shear stress in circular channels. However, the uncertainty in their predictions and their reliability remains an open question. We present a novel method to evaluate the uncertainty of four popular entropy models, including Shannon, Shannon-Power Low (PL), Tsallis, and Renyi, in shear stress estimati…
▽ More
The entropy models have been recently adopted in many studies to evaluate the distribution of the shear stress in circular channels. However, the uncertainty in their predictions and their reliability remains an open question. We present a novel method to evaluate the uncertainty of four popular entropy models, including Shannon, Shannon-Power Low (PL), Tsallis, and Renyi, in shear stress estimation in circular channels. The Bayesian Monte-Carlo (BMC) uncertainty method is simplified considering a 95% Confidence Bound (CB). We developed a new statistic index called as FREEopt-based OCB (FOCB) using the statistical indices Forecasting Range of Error Estimation (FREE) and the percentage of observed data in the CB (Nin), which integrates their combined effect. The Shannon and Shannon PL entropies had close values of the FOCB equal to 8.781 and 9.808, respectively, had the highest certainty in the calculation of shear stress values in circular channels followed by traditional uniform flow shear stress and Tsallis models with close values of 14.491 and 14.895, respectively. However, Renyi entropy with much higher values of FOCB equal to 57.726 has less certainty in the estimation of shear stress than other models. Using the presented results in this study, the amount of confidence in entropy methods in the calculation of shear stress to design and implement different types of open channels and their stability is determined.
△ Less
Submitted 10 January, 2020;
originally announced January 2020.
-
A Cooperative Coordination Solver for Travelling Thief Problems
Authors:
Majid Namazi,
Conrad Sanderson,
M. A. Hakim Newton,
Abdul Sattar
Abstract:
The travelling thief problem (TTP) is a representative of multi-component optimisation problems with interacting components. TTP combines the knapsack problem (KP) and the travelling salesman problem (TSP). A thief performs a cyclic tour through a set of cities, and pursuant to a collection plan, collects a subset of items into a rented knapsack with finite capacity. The aim is to maximise profit…
▽ More
The travelling thief problem (TTP) is a representative of multi-component optimisation problems with interacting components. TTP combines the knapsack problem (KP) and the travelling salesman problem (TSP). A thief performs a cyclic tour through a set of cities, and pursuant to a collection plan, collects a subset of items into a rented knapsack with finite capacity. The aim is to maximise profit while minimising renting cost. Existing TTP solvers typically solve the KP and TSP components in an interleaved manner: the solution of one component is kept fixed while the solution of the other component is modified. This suggests low coordination between solving the two components, possibly leading to low quality TTP solutions. The 2-OPT heuristic is often used for solving the TSP component, which reverses a segment in the tour. Within TTP, 2-OPT does not take into account the collection plan, which can result in a lower objective value. This in turn can result in the tour modification to be rejected by a solver. We propose an expanded form of 2-OPT to change the collection plan in coordination with tour modification. Items regarded as less profitable and collected in cities located earlier in the reversed segment are substituted by items that tend to be more profitable and not collected in cities located later in the reversed segment. The collection plan is further changed through a modified form of the hill-climbing bit-flip search, where changes in the collection state are only permitted for boundary items, which are defined as lowest profitable collected items or highest profitable uncollected items. This restriction reduces the time spent on the KP component, allowing more tours to be evaluated by the TSP component within a time budget. The proposed approaches form the basis of a new cooperative coordination solver, which is shown to outperform several state-of-the-art TTP solvers.
△ Less
Submitted 14 December, 2020; v1 submitted 8 November, 2019;
originally announced November 2019.
-
Toxicity Prediction by Multimodal Deep Learning
Authors:
Abdul Karim,
Jaspreet Singh,
Avinash Mishra,
Abdollah Dehzangi,
M. A. Hakim Newton,
Abdul Sattar
Abstract:
Prediction of toxicity levels of chemical compounds is an important issue in Quantitative Structure-Activity Relationship (QSAR) modeling. Although toxicity prediction has achieved significant progress in recent times through deep learning, prediction accuracy levels obtained by even very recent methods are not yet very high. We propose a multimodal deep learning method using multiple heterogeneou…
▽ More
Prediction of toxicity levels of chemical compounds is an important issue in Quantitative Structure-Activity Relationship (QSAR) modeling. Although toxicity prediction has achieved significant progress in recent times through deep learning, prediction accuracy levels obtained by even very recent methods are not yet very high. We propose a multimodal deep learning method using multiple heterogeneous neural network types and data representations. We represent chemical compounds by strings, images, and numerical features. We train fully connected, convolutional, and recurrent neural networks and their ensembles. Each data representation or neural network type has its own strengths and weaknesses. Our motivation is to obtain a collective performance that could go beyond individual performance of each data representation or each neural network type. On a standard toxicity benchmark, our proposed method obtains significantly better accuracy levels than that by the state-of-the-art toxicity prediction methods.
△ Less
Submitted 18 July, 2019;
originally announced July 2019.
-
Efficient Toxicity Prediction via Simple Features Using Shallow Neural Networks and Decision Trees
Authors:
Abdul Karim,
Avinash Mishra,
M A Hakim Newton,
Abdul Sattar
Abstract:
Toxicity prediction of chemical compounds is a grand challenge. Lately, it achieved significant progress in accuracy but using a huge set of features, implementing a complex blackbox technique such as a deep neural network, and exploiting enormous computational resources. In this paper, we strongly argue for the models and methods that are simple in machine learning characteristics, efficient in c…
▽ More
Toxicity prediction of chemical compounds is a grand challenge. Lately, it achieved significant progress in accuracy but using a huge set of features, implementing a complex blackbox technique such as a deep neural network, and exploiting enormous computational resources. In this paper, we strongly argue for the models and methods that are simple in machine learning characteristics, efficient in computing resource usage, and powerful to achieve very high accuracy levels. To demonstrate this, we develop a single task-based chemical toxicity prediction framework using only 2D features that are less compute intensive. We effectively use a decision tree to obtain an optimum number of features from a collection of thousands of them. We use a shallow neural network and jointly optimize it with decision tree taking both network parameters and input features into account. Our model needs only a minute on a single CPU for its training while existing methods using deep neural networks need about 10 min on NVidia Tesla K40 GPU. However, we obtain similar or better performance on several toxicity benchmark tasks. We also develop a cumulative feature ranking method which enables us to identify features that can help chemists perform prescreening of toxic compounds effectively.
△ Less
Submitted 26 January, 2019;
originally announced January 2019.
-
First-principles prediction of half-Heusler half-metals above room temperature
Authors:
Muhammad Atif Sattar,
S. Aftab Ahmad,
Fayyaz Hussain,
Claudio Cazorla
Abstract:
Half-metallicity (HM) offers great potential for engineering spintronic applications, yet only few magnetic materials present metallicity in just one spin channel. In addition, most HM systems become magnetically disordered at temperatures well below ambient conditions, which further hinders the development of spin-based electronic devices. Here, we use first-principles methods based on density fu…
▽ More
Half-metallicity (HM) offers great potential for engineering spintronic applications, yet only few magnetic materials present metallicity in just one spin channel. In addition, most HM systems become magnetically disordered at temperatures well below ambient conditions, which further hinders the development of spin-based electronic devices. Here, we use first-principles methods based on density functional theory (DFT) to investigate the electronic, magnetic, structural, mixing, and vibrational properties of $90$ $XYZ$ half-Heusler (HH) alloys ($X =$ Li, Na, K, Rb, Cs; $Y =$ V,Nb, Ta; $Z =$ Si, Ge, Sn, S, Se, Te). We disclose a total of $28$ new HH compounds that are ferromagnetic, vibrationally stable, and HM, with semiconductor band gaps in the range of $1$-$4$ eV and HM band gaps of $0.2$-$0.8$ eV. By performing Monte Carlo simulations of a spin Heisenberg model fitted to DFT energies, we estimate the Curie temperature, $T_{\rm C}$, of each HM compound. We find that $17$ HH HM remain magnetically ordered at and above room temperature, namely, $300 \le T_{\rm C} \le 450$ K, with total magnetic moments of $2$ and $4$ $μ_{\rm B}$. A further materials sieve based on zero-temperature mixing energies let us to conclude $5$ overall promising ferromagnetic HH HM at and above room temperature: NaVSi, RbVTe, CsVS, CsVSe, and RbNbTe. We also predict $2$ ferromagnetic materials that are semiconductor and magnetically ordered at ambient conditions: LiVSi and LiVGe.
△ Less
Submitted 12 December, 2018;
originally announced December 2018.
-
Constrained Hamiltonian analysis of a non relativistic Schrodinger field coupled with C-S gravity
Authors:
Pradip Mukherjee,
Abdus Sattar
Abstract:
We provide a constrained Hamiltonian analysis of a non relativistic Schrodinger field in 2+1 dimensions , coupled with Chern - Simons gravity. The coupling is achieved by the recently advanced Galilean gauge theory \cite{BMM1},\cite{ BMM2}, \cite{BM4}. The calculations are repeated with a truncated model to show that deviation from Galilean gauge theory makes the theory untenable. The issue of non…
▽ More
We provide a constrained Hamiltonian analysis of a non relativistic Schrodinger field in 2+1 dimensions , coupled with Chern - Simons gravity. The coupling is achieved by the recently advanced Galilean gauge theory \cite{BMM1},\cite{ BMM2}, \cite{BM4}. The calculations are repeated with a truncated model to show that deviation from Galilean gauge theory makes the theory untenable. The issue of nonrelativistic spatial diffeomorphism is discussed in this context.
△ Less
Submitted 1 January, 2019; v1 submitted 15 October, 2018;
originally announced October 2018.
-
Dropout with Tabu Strategy for Regularizing Deep Neural Networks
Authors:
Zongjie Ma,
Abdul Sattar,
Jun Zhou,
Qingliang Chen,
Kaile Su
Abstract:
Dropout has proven to be an effective technique for regularization and preventing the co-adaptation of neurons in deep neural networks (DNN). It randomly drops units with a probability $p$ during the training stage of DNN. Dropout also provides a way of approximately combining exponentially many different neural network architectures efficiently. In this work, we add a diversification strategy int…
▽ More
Dropout has proven to be an effective technique for regularization and preventing the co-adaptation of neurons in deep neural networks (DNN). It randomly drops units with a probability $p$ during the training stage of DNN. Dropout also provides a way of approximately combining exponentially many different neural network architectures efficiently. In this work, we add a diversification strategy into dropout, which aims at generating more different neural network architectures in a proper times of iterations. The dropped units in last forward propagation will be marked. Then the selected units for drop** in the current FP will be kept if they have been marked in the last forward propagation. We only mark the units from the last forward propagation. We call this new technique Tabu Dropout. Tabu Dropout has no extra parameters compared with the standard Dropout and also it is computationally cheap. The experiments conducted on MNIST, Fashion-MNIST datasets show that Tabu Dropout improves the performance of the standard dropout.
△ Less
Submitted 29 August, 2018;
originally announced August 2018.
-
Machine Learning Interpretability: A Science rather than a tool
Authors:
Abdul Karim,
Avinash Mishra,
MA Hakim Newton,
Abdul Sattar
Abstract:
The term "interpretability" is oftenly used by machine learning researchers each with their own intuitive understanding of it. There is no universal well agreed upon definition of interpretability in machine learning. As any type of science discipline is mainly driven by the set of formulated questions rather than by different tools in that discipline, e.g. astrophysics is the discipline that lear…
▽ More
The term "interpretability" is oftenly used by machine learning researchers each with their own intuitive understanding of it. There is no universal well agreed upon definition of interpretability in machine learning. As any type of science discipline is mainly driven by the set of formulated questions rather than by different tools in that discipline, e.g. astrophysics is the discipline that learns the composition of stars, not as the discipline that use the spectroscopes. Similarly, we propose that machine learning interpretability should be a discipline that answers specific questions related to interpretability. These questions can be of statistical, causal and counterfactual nature. Therefore, there is a need to look into the interpretability problem of machine learning in the context of questions that need to be addressed rather than different tools. We discuss about a hypothetical interpretability framework driven by a question based scientific approach rather than some specific machine learning model. Using a question based notion of interpretability, we can step towards understanding the science of machine learning rather than its engineering. This notion will also help us understanding any specific problem more in depth rather than relying solely on machine learning methods.
△ Less
Submitted 25 July, 2018; v1 submitted 17 July, 2018;
originally announced July 2018.
-
Diversified Late Acceptance Search
Authors:
Majid Namazi,
Conrad Sanderson,
M. A. Hakim Newton,
M. M. A. Polash,
Abdul Sattar
Abstract:
The well-known Late Acceptance Hill Climbing (LAHC) search aims to overcome the main downside of traditional Hill Climbing (HC) search, which is often quickly trapped in a local optimum due to strictly accepting only non-worsening moves within each iteration. In contrast, LAHC also accepts worsening moves, by kee** a circular array of fitness values of previously visited solutions and comparing…
▽ More
The well-known Late Acceptance Hill Climbing (LAHC) search aims to overcome the main downside of traditional Hill Climbing (HC) search, which is often quickly trapped in a local optimum due to strictly accepting only non-worsening moves within each iteration. In contrast, LAHC also accepts worsening moves, by kee** a circular array of fitness values of previously visited solutions and comparing the fitness values of candidate solutions against the least recent element in the array. While this straightforward strategy has proven effective, there are nevertheless situations where LAHC can unfortunately behave in a similar manner to HC. For example, when a new local optimum is found, often the same fitness value is stored many times in the array. To address this shortcoming, we propose new acceptance and replacement strategies to take into account worsening, improving, and sideways movement scenarios with the aim to improve the diversity of values in the array. Compared to LAHC, the proposed Diversified Late Acceptance Search approach is shown to lead to better quality solutions that are obtained with a lower number of iterations on benchmark Travelling Salesman Problems and Quadratic Assignment Problems.
△ Less
Submitted 9 December, 2018; v1 submitted 25 June, 2018;
originally announced June 2018.
-
A Software Reuse Approach and Its Effect On Software Quality, An Empirical Study for The Software Industry
Authors:
Ahmed Mateen,
Samina Kausar,
Ahsan Raza Sattar
Abstract:
Software reusability has become much interesting because of increased quality and reduce cost. A good process of software reuse leads to enhance the reliability, productivity, quality and the reduction of time and cost. Current reuse techniques focuses on the reuse of software artifact which grounded on anticipated functionality whereas, the non-functional (quality) aspect are also important. So,…
▽ More
Software reusability has become much interesting because of increased quality and reduce cost. A good process of software reuse leads to enhance the reliability, productivity, quality and the reduction of time and cost. Current reuse techniques focuses on the reuse of software artifact which grounded on anticipated functionality whereas, the non-functional (quality) aspect are also important. So, Software reusability used here to expand quality and productivity of software. It improves overall quality of software in minimum energy and time. Main objective of this study was to present a reuse approach that discovered that how software reuse improves the quality in Software Industry. The V&V technique used for this purpose which is part of software quality management process, it checks the quality and correctness during the software life cycle. A survey study conducted as QUESTIONAIR to find the impact of reuse approach on quality attributes which are requirement specification and design specification. Other quality enhancement techniques like ad hoc, CBSE, MBSE, Product line, COTS reuse checked on existing software industry. Results analyzed with the help of MATLAB tool as it provides effective data management, wide range of options, better output organization, to check weather quality enhancement technique is affected due to reusability and how quality will improve.
△ Less
Submitted 31 January, 2017;
originally announced February 2017.
-
Guided macro-mutation in a graded energy based genetic algorithm for protein structure prediction
Authors:
Mahmood A. Rashid,
Sumaiya Iqbal,
Firas Khatib,
Md Tamjidul Hoque,
Abdul Sattar
Abstract:
Protein structure prediction is considered as one of the most challenging and computationally intractable combinatorial problem. Thus, the efficient modeling of convoluted search space, the clever use of energy functions, and more importantly, the use of effective sampling algorithms become crucial to address this problem. For protein structure modeling, an off-lattice model provides limited scope…
▽ More
Protein structure prediction is considered as one of the most challenging and computationally intractable combinatorial problem. Thus, the efficient modeling of convoluted search space, the clever use of energy functions, and more importantly, the use of effective sampling algorithms become crucial to address this problem. For protein structure modeling, an off-lattice model provides limited scopes to exercise and evaluate the algorithmic developments due to its astronomically large set of data-points. In contrast, an on-lattice model widens the scopes and permits studying the relatively larger proteins because of its finite set of data-points. In this work, we took the full advantage of an on-lattice model by using a face-centered-cube lattice that has the highest packing density with the maximum degree of freedom. We proposed a graded energy-strategically mixes the Miyazawa-Jernigan (MJ) energy with the hydrophobic-polar (HP) energy-based genetic algorithm (GA) for conformational search. In our application, we introduced a 2x2 HP energy guided macro-mutation operator within the GA to explore the best possible local changes exhaustively. Conversely, the 20x20 MJ energy model-the ultimate objective function of our GA that needs to be minimized-considers the impacts amongst the 20 different amino acids and allow searching the globally acceptable conformations. On a set of benchmark proteins, our proposed approach outperformed state-of-the-art approaches in terms of the free energy levels and the root-mean-square deviations.
△ Less
Submitted 7 March, 2016;
originally announced July 2016.
-
A New Approach for Revising Logic Programs
Authors:
Zhiqiang Zhuang,
James Delgrande,
Abhaya Nayak,
Abdul Sattar
Abstract:
Belief revision has been studied mainly with respect to background logics that are monotonic in character. In this paper we study belief revision when the underlying logic is non-monotonic instead--an inherently interesting problem that is under explored. In particular, we will focus on the revision of a body of beliefs that is represented as a logic program under the answer set semantics, while t…
▽ More
Belief revision has been studied mainly with respect to background logics that are monotonic in character. In this paper we study belief revision when the underlying logic is non-monotonic instead--an inherently interesting problem that is under explored. In particular, we will focus on the revision of a body of beliefs that is represented as a logic program under the answer set semantics, while the new information is also similarly represented as a logic program. Our approach is driven by the observation that unlike in a monotonic setting where, when necessary, consistency in a revised body of beliefs is maintained by jettisoning some old beliefs, in a non-monotonic setting consistency can be restored by adding new beliefs as well. We will define a syntactic revision function and subsequently provide representation theorem for characterising it.
△ Less
Submitted 31 March, 2016;
originally announced March 2016.
-
Protein preliminaries and structure prediction fundamentals for computer scientists
Authors:
Mahmood A. Rashid,
Firas Khatib,
Abdul Sattar
Abstract:
Protein structure prediction is a challenging and unsolved problem in computer science. Proteins are the sequence of amino acids connected together by single peptide bond. The combinations of the twenty primary amino acids are the constituents of all proteins. In-vitro laboratory methods used in this problem are very time-consuming, cost-intensive, and failure-prone. Thus, alternative computationa…
▽ More
Protein structure prediction is a challenging and unsolved problem in computer science. Proteins are the sequence of amino acids connected together by single peptide bond. The combinations of the twenty primary amino acids are the constituents of all proteins. In-vitro laboratory methods used in this problem are very time-consuming, cost-intensive, and failure-prone. Thus, alternative computational methods come into play. The protein structure prediction problem is to find the three-dimensional native structure of a protein, from its amino acid sequence. The native structure of a protein has the minimum free energy possible and arguably determines the function of the protein. In this study, we present the preliminaries of proteins and their structures, protein structure prediction problem, and protein models. We also give a brief overview on experimental and computational methods used in protein structure prediction. This study will provide a fundamental knowledge to the computer scientists who are intending to pursue their future research on protein structure prediction problem.
△ Less
Submitted 9 October, 2015;
originally announced October 2015.
-
Exploiting Reduction Rules and Data Structures: Local Search for Minimum Vertex Cover in Massive Graphs
Authors:
Yi Fan,
Chengqian Li,
Zongjie Ma,
LjiLjana Brankovic,
Vladimir Estivill-Castro,
Abdul Sattar
Abstract:
The Minimum Vertex Cover (MinVC) problem is a well-known NP-hard problem. Recently there has been great interest in solving this problem on real-world massive graphs. For such graphs, local search is a promising approach to finding optimal or near-optimal solutions. In this paper we propose a local search algorithm that exploits reduction rules and data structures to solve the MinVC problem in suc…
▽ More
The Minimum Vertex Cover (MinVC) problem is a well-known NP-hard problem. Recently there has been great interest in solving this problem on real-world massive graphs. For such graphs, local search is a promising approach to finding optimal or near-optimal solutions. In this paper we propose a local search algorithm that exploits reduction rules and data structures to solve the MinVC problem in such graphs. Experimental results on a wide range of real-word massive graphs show that our algorithm finds better covers than state-of-the-art local search algorithms for MinVC. Also we present interesting results about the complexities of some well-known heuristics.
△ Less
Submitted 19 September, 2015;
originally announced September 2015.
-
Study of the effect of semi-infinite crystalline electrodes on transmission of gold atomic wires using DFT
Authors:
Abdul Sattar,
Raja Junaid Amjad,
Sumaira Yasmeen,
Hafsa Javed,
Hamid Latif,
Hasan Mahmood,
Azmat Iqbal,
Arslan Usman,
Majid Niaz Akhtar,
Salman Naeem Khan,
M. R. Dousti
Abstract:
First principle calculations of the conductance of gold wires containing 3-8 atoms each with 2.39 Å bond length were performed using density functional theory. Three different configuration of wire/electrodes were used. For zigzag wire with semi-infinite crystalline electrodes, even-odd oscillation is observed which is consistent with the previously reported results. A lower conductance was observ…
▽ More
First principle calculations of the conductance of gold wires containing 3-8 atoms each with 2.39 Å bond length were performed using density functional theory. Three different configuration of wire/electrodes were used. For zigzag wire with semi-infinite crystalline electrodes, even-odd oscillation is observed which is consistent with the previously reported results. A lower conductance was observed for the chain in semi-infinite crystalline electrodes compared to the chains suspended in wire-like electrode. The calculated transmission spectrum for the straight and zig-zag wires suspended between semi-infinite crystalline electrodes showed suppression of transmission channels due to electron scattering occurring at the electrode-wire interface.
△ Less
Submitted 29 July, 2015;
originally announced July 2015.
-
Quantized Conductance and Switching in Percolating Nanoparticle Films
Authors:
Abdul Sattar,
Shawn Fostner,
Simon A. Brown
Abstract:
We demonstrate switching behavior and quantized conductance at room temperature in percolating films of nanoparticles. Our experiments and complementary simulations show that switching and quantization result from formation of atomic scale wires in gaps between particles. These effects occur only when tunnel gaps are present in the film, close to the percolation threshold.
We demonstrate switching behavior and quantized conductance at room temperature in percolating films of nanoparticles. Our experiments and complementary simulations show that switching and quantization result from formation of atomic scale wires in gaps between particles. These effects occur only when tunnel gaps are present in the film, close to the percolation threshold.
△ Less
Submitted 28 July, 2015;
originally announced July 2015.
-
NuMVC: An Efficient Local Search Algorithm for Minimum Vertex Cover
Authors:
Shaowei Cai,
Kaile Su,
Chuan Luo,
Abdul Sattar
Abstract:
The Minimum Vertex Cover (MVC) problem is a prominent NP-hard combinatorial optimization problem of great importance in both theory and application. Local search has proved successful for this problem. However, there are two main drawbacks in state-of-the-art MVC local search algorithms. First, they select a pair of vertices to exchange simultaneously, which is time-consuming. Secondly, although u…
▽ More
The Minimum Vertex Cover (MVC) problem is a prominent NP-hard combinatorial optimization problem of great importance in both theory and application. Local search has proved successful for this problem. However, there are two main drawbacks in state-of-the-art MVC local search algorithms. First, they select a pair of vertices to exchange simultaneously, which is time-consuming. Secondly, although using edge weighting techniques to diversify the search, these algorithms lack mechanisms for decreasing the weights. To address these issues, we propose two new strategies: two-stage exchange and edge weighting with forgetting. The two-stage exchange strategy selects two vertices to exchange separately and performs the exchange in two stages. The strategy of edge weighting with forgetting not only increases weights of uncovered edges, but also decreases some weights for each edge periodically. These two strategies are used in designing a new MVC local search algorithm, which is referred to as NuMVC.
We conduct extensive experimental studies on the standard benchmarks, namely DIMACS and BHOSLIB. The experiment comparing NuMVC with state-of-the-art heuristic algorithms show that NuMVC is at least competitive with the nearest competitor namely PLS on the DIMACS benchmark, and clearly dominates all competitors on the BHOSLIB benchmark. Also, experimental results indicate that NuMVC finds an optimal solution much faster than the current best exact algorithm for Maximum Clique on random instances as well as some structured ones. Moreover, we study the effectiveness of the two strategies and the run-time behaviour through experimental analysis.
△ Less
Submitted 3 February, 2014;
originally announced February 2014.
-
Detecting Requirements Defects Utilizing A Mathematical Framework for Behavior Engineering
Authors:
Kushal Ahmed,
Toby Myers,
Lian Wen,
Abdul Sattar
Abstract:
Behavior Engineering (BE) provides a rigorous way to derive a formal specification of a software system from the requirements written in natural language. Its graphical specification language, Behavior Tree (BT), has been used with success in industry to systematically translate large, complex, and often erroneous requirements into an integrated model of the software system. BE's process, the Beha…
▽ More
Behavior Engineering (BE) provides a rigorous way to derive a formal specification of a software system from the requirements written in natural language. Its graphical specification language, Behavior Tree (BT), has been used with success in industry to systematically translate large, complex, and often erroneous requirements into an integrated model of the software system. BE's process, the Behavior Modeling Process (BMP), allows requirements to be translated into individual requirement BTs one at a time, which are then integrated to form a holistic view of the system. The integrated BT then goes through a series of modifications to construct a specification BT, which is used for validation and verification. The BMP also addresses different types of defects in the requirements throughout its process. However, BT itself is a graphical modeling notation, and the types of integration relations, how they correspond to particular issues, how they should be integrated and how to get formal specification have not been clearly defined. As a result, the BMP is informal, and provides guidelines to perform all these tasks on an ad-hoc basis. In this paper, we first introduce a mathematical framework which defines the graphical form of BTs which we use to define the integration relationships of BTs and to formalize the integration strategy of the BMP. We then formulate semi-automated requirements defects detection techniques by utilizing this underlying mathematical framework, which may be extended to formalize the BMP, develop change management framework for it, build techniques for round-trip engineering and so on.
△ Less
Submitted 21 January, 2014;
originally announced January 2014.
-
Variable Forgetting in Reasoning about Knowledge
Authors:
Kaile Su,
Abdul Sattar,
Guanfeng Lv,
Yan Zhang
Abstract:
In this paper, we investigate knowledge reasoning within a simple framework called knowledge structure. We use variable forgetting as a basic operation for one agent to reason about its own or other agents\ knowledge. In our framework, two notions namely agents\ observable variables and the weakest sufficient condition play important roles in knowledge reasoning. Given a background knowledge base…
▽ More
In this paper, we investigate knowledge reasoning within a simple framework called knowledge structure. We use variable forgetting as a basic operation for one agent to reason about its own or other agents\ knowledge. In our framework, two notions namely agents\ observable variables and the weakest sufficient condition play important roles in knowledge reasoning. Given a background knowledge base and a set of observable variables for each agent, we show that the notion of an agent knowing a formula can be defined as a weakest sufficient condition of the formula under background knowledge base. Moreover, we show how to capture the notion of common knowledge by using a generalized notion of weakest sufficient condition. Also, we show that public announcement operator can be conveniently dealt with via our notion of knowledge structure. Further, we explore the computational complexity of the problem whether an epistemic formula is realized in a knowledge structure. In the general case, this problem is PSPACE-hard; however, for some interesting subcases, it can be reduced to co-NP. Finally, we discuss possible applications of our framework in some interesting domains such as the automated analysis of the well-known muddy children puzzle and the verification of the revised Needham-Schroeder protocol. We believe that there are many scenarios where the natural presentation of the available information about knowledge is under the form of a knowledge structure. What makes it valuable compared with the corresponding multi-agent S5 Kripke structure is that it can be much more succinct.
△ Less
Submitted 15 January, 2014;
originally announced January 2014.
-
Association Rules Mining Based Clinical Observations
Authors:
Mahmood A. Rashid,
Md Tamjidul Hoque,
Abdul Sattar
Abstract:
Healthcare institutes enrich the repository of patients' disease related information in an increasing manner which could have been more useful by carrying out relational analysis. Data mining algorithms are proven to be quite useful in exploring useful correlations from larger data repositories. In this paper we have implemented Association Rules mining based a novel idea for finding co-occurrence…
▽ More
Healthcare institutes enrich the repository of patients' disease related information in an increasing manner which could have been more useful by carrying out relational analysis. Data mining algorithms are proven to be quite useful in exploring useful correlations from larger data repositories. In this paper we have implemented Association Rules mining based a novel idea for finding co-occurrences of diseases carried by a patient using the healthcare repository. We have developed a system-prototype for Clinical State Correlation Prediction (CSCP) which extracts data from patients' healthcare database, transforms the OLTP data into a Data Warehouse by generating association rules. The CSCP system helps reveal relations among the diseases. The CSCP system predicts the correlation(s) among primary disease (the disease for which the patient visits the doctor) and secondary disease/s (which is/are other associated disease/s carried by the same patient having the primary disease).
△ Less
Submitted 11 January, 2014;
originally announced January 2014.
-
Mixing Energy Models in Genetic Algorithms for On-Lattice Protein Structure Prediction
Authors:
Mahmood A. Rashid,
M. A. Hakim Newton,
Md. Tamjidul Hoque,
Abdul Sattar
Abstract:
Protein structure prediction (PSP) is computationally a very challenging problem. The challenge largely comes from the fact that the energy function that needs to be minimised in order to obtain the native structure of a given protein is not clearly known. A high resolution 20x20 energy model could better capture the behaviour of the actual energy function than a low resolution energy model such a…
▽ More
Protein structure prediction (PSP) is computationally a very challenging problem. The challenge largely comes from the fact that the energy function that needs to be minimised in order to obtain the native structure of a given protein is not clearly known. A high resolution 20x20 energy model could better capture the behaviour of the actual energy function than a low resolution energy model such as hydrophobic polar. However, the fine grained details of the high resolution interaction energy matrix are often not very informative for guiding the search. In contrast, a low resolution energy model could effectively bias the search towards certain promising directions. In this paper, we develop a genetic algorithm that mainly uses a high resolution energy model for protein structure evaluation but uses a low resolution HP energy model in focussing the search towards exploring structures that have hydrophobic cores. We experimentally show that this mixing of energy models leads to significant lower energy structures compared to the state-of-the-art results.
△ Less
Submitted 15 November, 2013;
originally announced November 2013.
-
A Hybrid Local Search for Simplified Protein Structure Prediction
Authors:
Swakkhar Shatabda,
M. A. Hakim Newton,
Duc Nghia Pham,
Abdul Sattar
Abstract:
Protein structure prediction based on Hydrophobic-Polar energy model essentially becomes searching for a conformation having a compact hydrophobic core at the center. The hydrophobic core minimizes the interaction energy between the amino acids of the given protein. Local search algorithms can quickly find very good conformations by moving repeatedly from the current solution to its "best" neighbo…
▽ More
Protein structure prediction based on Hydrophobic-Polar energy model essentially becomes searching for a conformation having a compact hydrophobic core at the center. The hydrophobic core minimizes the interaction energy between the amino acids of the given protein. Local search algorithms can quickly find very good conformations by moving repeatedly from the current solution to its "best" neighbor. However, once such a compact hydrophobic core is found, the search stagnates and spends enormous effort in quest of an alternative core. In this paper, we attempt to restructure segments of a conformation with such compact core. We select one large segment or a number of small segments and apply exhaustive local search. We also apply a mix of heuristics so that one heuristic can help escape local minima of another. We evaluated our algorithm by using Face Centered Cubic (FCC) Lattice on a set of standard benchmark proteins and obtain significantly better results than that of the state-of-the-art methods.
△ Less
Submitted 31 October, 2013;
originally announced October 2013.
-
Aptamer-based Impedimetric Sensor for Bacterial Ty**
Authors:
Mahmoud Labib,
Anna S. Zamay,
Olga S. Kolovskaya,
Irina T. Reshetneva,
Galina S. Zamay,
Richard J. Kibbee,
Syed A. Sattar,
Tatiana N. Zamay,
Maxim V. Berezovski
Abstract:
The development of an aptamer-based impedimetric sensor for ty** of bacteria (AIST-B) is presented. Highly specific DNA aptamers to Salmonella enteritidis were selected via Cell-SELEX technique. Twelve rounds of selection were performed; each comprises a positive selection step against S. enteritidis and a negative selection step against a mixture of related pathogens, including Salmonella typhi…
▽ More
The development of an aptamer-based impedimetric sensor for ty** of bacteria (AIST-B) is presented. Highly specific DNA aptamers to Salmonella enteritidis were selected via Cell-SELEX technique. Twelve rounds of selection were performed; each comprises a positive selection step against S. enteritidis and a negative selection step against a mixture of related pathogens, including Salmonella typhimurium, Escherichia coli, Staphylococcus aureus, Pseudomonas aeruginosa, and Citrobacter freundii to ensure the species-specificity of the selected aptamers. After sequencing of the pool showing the highest binding affinity to S. enteritidis, a DNA aptamer sequence of high affinity to the bacteria was integrated into an impedimetric sensor via self-assembly onto a gold nanoparticles-modified screen-printed carbon electrode (GNPs-SPCE). Remarkably, this aptasensor is highly selective and can successfully detect S. enteritidis down to 600 CFU 1/mL (equivalent to 18 CFU in 30 \muL assay volume) in 10 minutes and distinguish it from other salmonella species, including S. typhimurium and S. choleraesuis. This report is envisaged to open a new venue for the aptamer-based ty** of a variety of microorganisms using a rapid, economic, label-free electrochemical platform.
△ Less
Submitted 22 August, 2012; v1 submitted 2 August, 2012;
originally announced August 2012.
-
Cryptanalysis of a more efficient and secure dynamic id-based remote user authentication scheme
Authors:
Mohammed Aijaz Ahmed,
D. Rajya Lakshmi,
Sayed Abdul Sattar
Abstract:
In 2004, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme which has many advantage such as no verifier table, user freedom to choose and change password and so on. However the subsequent papers have shown that this scheme is completely insecure and vulnerable to many attacks. Since then many schemes with improvements to Das et al's scheme has been proposed but e…
▽ More
In 2004, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme which has many advantage such as no verifier table, user freedom to choose and change password and so on. However the subsequent papers have shown that this scheme is completely insecure and vulnerable to many attacks. Since then many schemes with improvements to Das et al's scheme has been proposed but each has its pros and cons. Recently Yan-yan Wang et al. have proposed a scheme to overcome security weaknesses of Das et al.'s scheme. However this scheme too is vulnerable to various security attacks such as password guessing attack, masquerading attack, denial of service attack.
△ Less
Submitted 5 April, 2010;
originally announced April 2010.