-
AltGeoViz: Facilitating Accessible Geovisualization
Authors:
Chu Li,
Rock Yuren Pang,
Ather Sharif,
Arnavi Chheda-Kothary,
Jeffrey Heer,
Jon E. Froehlich
Abstract:
Geovisualizations are powerful tools for exploratory spatial analysis, enabling sighted users to discern patterns, trends, and relationships within geographic data. However, these visual tools have remained largely inaccessible to screen-reader users. We present AltGeoViz, a new system we designed to facilitate geovisualization exploration for these users. AltGeoViz dynamically generates alt-text…
▽ More
Geovisualizations are powerful tools for exploratory spatial analysis, enabling sighted users to discern patterns, trends, and relationships within geographic data. However, these visual tools have remained largely inaccessible to screen-reader users. We present AltGeoViz, a new system we designed to facilitate geovisualization exploration for these users. AltGeoViz dynamically generates alt-text descriptions based on the user's current map view, providing summaries of spatial patterns and descriptive statistics. In a study of five screen-reader users, we found that AltGeoViz enabled them to interact with geovisualizations in previously infeasible ways. Participants demonstrated a clear understanding of data summaries and their location context, and they could synthesize spatial understandings of their explorations. Moreover, we identified key areas for improvement, such as the addition of intuitive spatial navigation controls and comparative analysis features.
△ Less
Submitted 21 June, 2024; v1 submitted 19 June, 2024;
originally announced June 2024.
-
On Cryptographic Mechanisms for the Selective Disclosure of Verifiable Credentials
Authors:
Andrea Flamini,
Giada Sciarretta,
Mario Scuro,
Amir Sharif,
Alessandro Tomasi,
Silvio Ranise
Abstract:
Verifiable credentials are a digital analogue of physical credentials. Their authenticity and integrity are protected by means of cryptographic techniques, and they can be presented to verifiers to reveal attributes or even predicates about the attributes included in the credential. One way to preserve privacy during presentation consists in selectively disclosing the attributes in a credential. I…
▽ More
Verifiable credentials are a digital analogue of physical credentials. Their authenticity and integrity are protected by means of cryptographic techniques, and they can be presented to verifiers to reveal attributes or even predicates about the attributes included in the credential. One way to preserve privacy during presentation consists in selectively disclosing the attributes in a credential. In this paper we present the most widespread cryptographic mechanisms used to enable selective disclosure of attributes identifying two categories: the ones based on hiding commitments - e.g., mdl ISO/IEC 18013-5 - and the ones based on non-interactive zero-knowledge proofs - e.g., BBS signatures. We also include a description of the cryptographic primitives used to design such cryptographic mechanisms. We describe the design of the cryptographic mechanisms and compare them by performing an analysis on their standard maturity in terms of standardization, cryptographic agility and quantum safety, then we compare the features that they support with main focus on the unlinkability of presentations, the ability to create predicate proofs and support for threshold credential issuance. Finally we perform an experimental evaluation based on the Rust open source implementations that we have considered most relevant. In particular we evaluate the size of credentials and presentations built using different cryptographic mechanisms and the time needed to generate and verify them. We also highlight some trade-offs that must be considered in the instantiation of the cryptographic mechanisms.
△ Less
Submitted 16 January, 2024;
originally announced January 2024.
-
ReMAV: Reward Modeling of Autonomous Vehicles for Finding Likely Failure Events
Authors:
Aizaz Sharif,
Dusica Marijan
Abstract:
Autonomous vehicles are advanced driving systems that are well known to be vulnerable to various adversarial attacks, compromising vehicle safety and posing a risk to other road users. Rather than actively training complex adversaries by interacting with the environment, there is a need to first intelligently find and reduce the search space to only those states where autonomous vehicles are found…
▽ More
Autonomous vehicles are advanced driving systems that are well known to be vulnerable to various adversarial attacks, compromising vehicle safety and posing a risk to other road users. Rather than actively training complex adversaries by interacting with the environment, there is a need to first intelligently find and reduce the search space to only those states where autonomous vehicles are found to be less confident. In this paper, we propose a black-box testing framework ReMAV that uses offline trajectories first to analyze the existing behavior of autonomous vehicles and determine appropriate thresholds to find the probability of failure events. To this end, we introduce a three-step methodology which i) uses offline state action pairs of any autonomous vehicle under test, ii) builds an abstract behavior representation using our designed reward modeling technique to analyze states with uncertain driving decisions, and iii) uses a disturbance model for minimal perturbation attacks where the driving decisions are less confident. Our reward modeling technique helps in creating a behavior representation that allows us to highlight regions of likely uncertain behavior even when the standard autonomous vehicle performs well. We perform our experiments in a high-fidelity urban driving environment using three different driving scenarios containing single- and multi-agent interactions. Our experiment shows an increase in 35, 23, 48, and 50% in the occurrences of vehicle collision, road object collision, pedestrian collision, and offroad steering events, respectively by the autonomous vehicle under test, demonstrating a significant increase in failure events. We compare ReMAV with two baselines and show that ReMAV demonstrates significantly better effectiveness in generating failure events compared to the baselines in all evaluation metrics.
△ Less
Submitted 30 December, 2023; v1 submitted 28 August, 2023;
originally announced August 2023.
-
On the numerical radius of weighted shifts on $\ell^{2}$ as a norm on $\ell^{\infty}$ and connections to Banach limits
Authors:
Akram Sharif
Abstract:
We investigate the numerical radius of weighted shifts on $\ell^{2}$ as a norm on $\ell^{\infty}$. Along the way, we prove that the largest value a Banach limit can attain on the sequence of absolute values of a bounded sequences is larger or equal to the spectral radius and smaller or equal to the numerical radius of the corresponding weighted shift. Further, we compare the operator norms on…
▽ More
We investigate the numerical radius of weighted shifts on $\ell^{2}$ as a norm on $\ell^{\infty}$. Along the way, we prove that the largest value a Banach limit can attain on the sequence of absolute values of a bounded sequences is larger or equal to the spectral radius and smaller or equal to the numerical radius of the corresponding weighted shift. Further, we compare the operator norms on $\ell^{\infty}$ with respect to the uniform norm and the numerical radius of weighted shifts as a norm. We show that they generally differ, but for multiplication operators and weighted shifts on $\ell^{\infty}$, they are both equal to the uniform norm of the corresponding weight. Moreover, we prove that all complex-valued Banach limits satisfy the norm inequality with respect to the numerical radius of weighted shifts and provide an application of our results to the theory of Banach limits.
△ Less
Submitted 3 August, 2023; v1 submitted 1 March, 2023;
originally announced March 2023.
-
AIM 2022 Challenge on Instagram Filter Removal: Methods and Results
Authors:
Furkan Kınlı,
Sami Menteş,
Barış Özcan,
Furkan Kıraç,
Radu Timofte,
Yi Zuo,
Zitao Wang,
Xiaowen Zhang,
Yu Zhu,
Chenghua Li,
Cong Leng,
Jian Cheng,
Shuai Liu,
Chaoyu Feng,
Furui Bai,
Xiaotao Wang,
Lei Lei,
Tianzhi Ma,
Zihan Gao,
Wenxin He,
Woon-Ha Yeo,
Wang-Taek Oh,
Young-Il Kim,
Han-Cheol Ryu,
Gang He
, et al. (8 additional authors not shown)
Abstract:
This paper introduces the methods and the results of AIM 2022 challenge on Instagram Filter Removal. Social media filters transform the images by consecutive non-linear operations, and the feature maps of the original content may be interpolated into a different domain. This reduces the overall performance of the recent deep learning strategies. The main goal of this challenge is to produce realis…
▽ More
This paper introduces the methods and the results of AIM 2022 challenge on Instagram Filter Removal. Social media filters transform the images by consecutive non-linear operations, and the feature maps of the original content may be interpolated into a different domain. This reduces the overall performance of the recent deep learning strategies. The main goal of this challenge is to produce realistic and visually plausible images where the impact of the filters applied is mitigated while preserving the content. The proposed solutions are ranked in terms of the PSNR value with respect to the original images. There are two prior studies on this task as the baseline, and a total of 9 teams have competed in the final phase of the challenge. The comparison of qualitative results of the proposed solutions and the benchmark for the challenge are presented in this report.
△ Less
Submitted 17 October, 2022;
originally announced October 2022.
-
Modelling heat transfer in laser-soft matter interaction via chaotic Ikeda map
Authors:
Morteza A. Sharif,
M. Shahnazary,
M. Pourezzat
Abstract:
We develop a model for simulating the heat transfer phenomena within a biological soft material using the Ikeda chaotic map. Our approach is implemented by sampling the optical intensity via the Ikeda map to investigate the influence on the heat distribution over the tissue. Our method has many potential advantages including the possibility of investigating the nonlinear optical effects resulting…
▽ More
We develop a model for simulating the heat transfer phenomena within a biological soft material using the Ikeda chaotic map. Our approach is implemented by sampling the optical intensity via the Ikeda map to investigate the influence on the heat distribution over the tissue. Our method has many potential advantages including the possibility of investigating the nonlinear optical effects resulting from the intense beam-induced feedback mechanisms. This in turn, leads to the flexibility and dynamical controllability in comparison to the quasi-static Monte-Carlo method. The proposed approach is thus appropriate for the applications in the light beam-guided nanodrug injection and microsurgery.
△ Less
Submitted 14 January, 2022;
originally announced January 2022.
-
Evaluating the Robustness of Deep Reinforcement Learning for Autonomous Policies in a Multi-agent Urban Driving Environment
Authors:
Aizaz Sharif,
Dusica Marijan
Abstract:
Deep reinforcement learning is actively used for training autonomous car policies in a simulated driving environment. Due to the large availability of various reinforcement learning algorithms and the lack of their systematic comparison across different driving scenarios, we are unsure of which ones are more effective for training autonomous car software in single-agent as well as multi-agent driv…
▽ More
Deep reinforcement learning is actively used for training autonomous car policies in a simulated driving environment. Due to the large availability of various reinforcement learning algorithms and the lack of their systematic comparison across different driving scenarios, we are unsure of which ones are more effective for training autonomous car software in single-agent as well as multi-agent driving environments. A benchmarking framework for the comparison of deep reinforcement learning in a vision-based autonomous driving will open up the possibilities for training better autonomous car driving policies. To address these challenges, we provide an open and reusable benchmarking framework for systematic evaluation and comparative analysis of deep reinforcement learning algorithms for autonomous driving in a single- and multi-agent environment. Using the framework, we perform a comparative study of discrete and continuous action space deep reinforcement learning algorithms. We also propose a comprehensive multi-objective reward function designed for the evaluation of deep reinforcement learning-based autonomous driving agents. We run the experiments in a vision-only high-fidelity urban driving simulated environments. The results indicate that only some of the deep reinforcement learning algorithms perform consistently better across single and multi-agent scenarios when trained in various multi-agent-only environment settings. For example, A3C- and TD3-based autonomous cars perform comparatively better in terms of more robust actions and minimal driving errors in both single and multi-agent scenarios. We conclude that different deep reinforcement learning algorithms exhibit different driving and testing performance in different scenarios, which underlines the need for their systematic comparative analysis. The benchmarking framework proposed in this paper facilitates such a comparison.
△ Less
Submitted 23 March, 2023; v1 submitted 22 December, 2021;
originally announced December 2021.
-
Adversarial Deep Reinforcement Learning for Improving the Robustness of Multi-agent Autonomous Driving Policies
Authors:
Aizaz Sharif,
Dusica Marijan
Abstract:
Autonomous cars are well known for being vulnerable to adversarial attacks that can compromise the safety of the car and pose danger to other road users. To effectively defend against adversaries, it is required to not only test autonomous cars for finding driving errors but to improve the robustness of the cars to these errors. To this end, in this paper, we propose a two-step methodology for aut…
▽ More
Autonomous cars are well known for being vulnerable to adversarial attacks that can compromise the safety of the car and pose danger to other road users. To effectively defend against adversaries, it is required to not only test autonomous cars for finding driving errors but to improve the robustness of the cars to these errors. To this end, in this paper, we propose a two-step methodology for autonomous cars that consists of (i) finding failure states in autonomous cars by training the adversarial driving agent, and (ii) improving the robustness of autonomous cars by retraining them with effective adversarial inputs. Our methodology supports testing autonomous cars in a multi-agent environment, where we train and compare adversarial car policy on two custom reward functions to test the driving control decision of autonomous cars. We run experiments in a vision-based high-fidelity urban driving simulated environment. Our results show that adversarial testing can be used for finding erroneous autonomous driving behavior, followed by adversarial training for improving the robustness of deep reinforcement learning-based autonomous driving policies. We demonstrate that the autonomous cars retrained using the effective adversarial inputs noticeably increase the performance of their driving policies in terms of reduced collision and offroad steering errors.
△ Less
Submitted 21 February, 2023; v1 submitted 22 December, 2021;
originally announced December 2021.
-
SAGAN: Adversarial Spatial-asymmetric Attention for Noisy Nona-Bayer Reconstruction
Authors:
S M A Sharif,
Rizwan Ali Naqvi,
Mithun Biswas
Abstract:
Nona-Bayer colour filter array (CFA) pattern is considered one of the most viable alternatives to traditional Bayer patterns. Despite the substantial advantages, such non-Bayer CFA patterns are susceptible to produce visual artefacts while reconstructing RGB images from noisy sensor data. This study addresses the challenges of learning RGB image reconstruction from noisy Nona-Bayer CFA comprehensi…
▽ More
Nona-Bayer colour filter array (CFA) pattern is considered one of the most viable alternatives to traditional Bayer patterns. Despite the substantial advantages, such non-Bayer CFA patterns are susceptible to produce visual artefacts while reconstructing RGB images from noisy sensor data. This study addresses the challenges of learning RGB image reconstruction from noisy Nona-Bayer CFA comprehensively. We propose a novel spatial-asymmetric attention module to jointly learn bi-direction transformation and large-kernel global attention to reduce the visual artefacts. We combine our proposed module with adversarial learning to produce plausible images from Nona-Bayer CFA. The feasibility of the proposed method has been verified and compared with the state-of-the-art image reconstruction method. The experiments reveal that the proposed method can reconstruct RGB images from noisy Nona-Bayer CFA without producing any visually disturbing artefacts. Also, it can outperform the state-of-the-art image reconstruction method in both qualitative and quantitative comparison. Code available: https://github.com/sharif-apu/SAGAN_BMVC21.
△ Less
Submitted 18 October, 2021; v1 submitted 16 October, 2021;
originally announced October 2021.
-
DeepOrder: Deep Learning for Test Case Prioritization in Continuous Integration Testing
Authors:
Aizaz Sharif,
Dusica Marijan,
Marius Liaaen
Abstract:
Continuous integration testing is an important step in the modern software engineering life cycle. Test prioritization is a method that can improve the efficiency of continuous integration testing by selecting test cases that can detect faults in the early stage of each cycle. As continuous integration testing produces voluminous test execution data, test history is a commonly used artifact in tes…
▽ More
Continuous integration testing is an important step in the modern software engineering life cycle. Test prioritization is a method that can improve the efficiency of continuous integration testing by selecting test cases that can detect faults in the early stage of each cycle. As continuous integration testing produces voluminous test execution data, test history is a commonly used artifact in test prioritization. However, existing test prioritization techniques for continuous integration either cannot handle large test history or are optimized for using a limited number of historical test cycles. We show that such a limitation can decrease fault detection effectiveness of prioritized test suites.
This work introduces DeepOrder, a deep learning-based model that works on the basis of regression machine learning. DeepOrder ranks test cases based on the historical record of test executions from any number of previous test cycles. DeepOrder learns failed test cases based on multiple factors including the duration and execution status of test cases. We experimentally show that deep neural networks, as a simple regression model, can be efficiently used for test case prioritization in continuous integration testing. DeepOrder is evaluated with respect to time-effectiveness and fault detection effectiveness in comparison with an industry practice and the state of the art approaches. The results show that DeepOrder outperforms the industry practice and state-of-the-art test prioritization approaches in terms of these two metrics.
△ Less
Submitted 14 October, 2021;
originally announced October 2021.
-
Beyond Joint Demosaicking and Denoising: An Image Processing Pipeline for a Pixel-bin Image Sensor
Authors:
SMA Sharif,
Rizwan Ali Naqvi,
Mithun Biswas
Abstract:
Pixel binning is considered one of the most prominent solutions to tackle the hardware limitation of smartphone cameras. Despite numerous advantages, such an image sensor has to appropriate an artefact-prone non-Bayer colour filter array (CFA) to enable the binning capability. Contrarily, performing essential image signal processing (ISP) tasks like demosaicking and denoising, explicitly with such…
▽ More
Pixel binning is considered one of the most prominent solutions to tackle the hardware limitation of smartphone cameras. Despite numerous advantages, such an image sensor has to appropriate an artefact-prone non-Bayer colour filter array (CFA) to enable the binning capability. Contrarily, performing essential image signal processing (ISP) tasks like demosaicking and denoising, explicitly with such CFA patterns, makes the reconstruction process notably complicated. In this paper, we tackle the challenges of joint demosaicing and denoising (JDD) on such an image sensor by introducing a novel learning-based method. The proposed method leverages the depth and spatial attention in a deep network. The proposed network is guided by a multi-term objective function, including two novel perceptual losses to produce visually plausible images. On top of that, we stretch the proposed image processing pipeline to comprehensively reconstruct and enhance the images captured with a smartphone camera, which uses pixel binning techniques. The experimental results illustrate that the proposed method can outperform the existing methods by a noticeable margin in qualitative and quantitative comparisons. Code available: https://github.com/sharif-apu/BJDD_CVPR21.
△ Less
Submitted 19 April, 2021;
originally announced April 2021.
-
A Two-stage Deep Network for High Dynamic Range Image Reconstruction
Authors:
SMA Sharif,
Rizwan Ali Naqvi,
Mithun Biswas,
Kim Sungjun
Abstract:
Map** a single exposure low dynamic range (LDR) image into a high dynamic range (HDR) is considered among the most strenuous image to image translation tasks due to exposure-related missing information. This study tackles the challenges of single-shot LDR to HDR map** by proposing a novel two-stage deep network. Notably, our proposed method aims to reconstruct an HDR image without knowing hard…
▽ More
Map** a single exposure low dynamic range (LDR) image into a high dynamic range (HDR) is considered among the most strenuous image to image translation tasks due to exposure-related missing information. This study tackles the challenges of single-shot LDR to HDR map** by proposing a novel two-stage deep network. Notably, our proposed method aims to reconstruct an HDR image without knowing hardware information, including camera response function (CRF) and exposure settings. Therefore, we aim to perform image enhancement task like denoising, exposure correction, etc., in the first stage. Additionally, the second stage of our deep network learns tone map** and bit-expansion from a convex set of data samples. The qualitative and quantitative comparisons demonstrate that the proposed method can outperform the existing LDR to HDR works with a marginal difference. Apart from that, we collected an LDR image dataset incorporating different camera systems. The evaluation with our collected real-world LDR images illustrates that the proposed method can reconstruct plausible HDR images without presenting any visual artefacts. Code available: https://github. com/sharif-apu/twostageHDR_NTIRE21.
△ Less
Submitted 19 April, 2021;
originally announced April 2021.
-
Temporal nonlinear dynamics of plasmon-solitons, a Duffing oscillator-based approach
Authors:
Morteza A. Sharif
Abstract:
This paper deals with the temporal nonlinear dynamics of plasmon-solitons in a plasmonic waveguide. Duffing equation is recognized as the temporal part of the nonlinear amplitude equation governing the plasmonic waveguide. It is shown that Duffing oscillator waveforms stand for the temporal nonlinear dynamics of plasmon-soliton waves. The exchange of Lorentz-type bright and dark solitons energies…
▽ More
This paper deals with the temporal nonlinear dynamics of plasmon-solitons in a plasmonic waveguide. Duffing equation is recognized as the temporal part of the nonlinear amplitude equation governing the plasmonic waveguide. It is shown that Duffing oscillator waveforms stand for the temporal nonlinear dynamics of plasmon-soliton waves. The exchange of Lorentz-type bright and dark solitons energies gives rise to a Fano resonance. It is thus shown that the interaction of solitons and the formation of plasmon-solitons is inherently nonlinear. It is accordingly indicated that the nonlinear modulation of the plasmon-solitons is achievable via tuning the nonlinearity of the plasmonic waveguide.
△ Less
Submitted 29 December, 2020; v1 submitted 5 November, 2020;
originally announced November 2020.
-
Spatio-temporal Modulation Instability of Surface Plasmon Polaritons in Graphene-dielectric Heterostructure
Authors:
Morteza A. Sharif
Abstract:
Using the Jacobi Elliptic Functions, an analytical solution is developed for the nonlinear amplitude equation of Surface Plasmon Polaritons (SPPs) in a graphene-dielectric waveguide. It is shown that the field localization of SPPs coupled with TM polarized terahertz light can be enhanced if the nonlinearity is increased. On the side, a numerical solution based on Split Step Beam Propagation Method…
▽ More
Using the Jacobi Elliptic Functions, an analytical solution is developed for the nonlinear amplitude equation of Surface Plasmon Polaritons (SPPs) in a graphene-dielectric waveguide. It is shown that the field localization of SPPs coupled with TM polarized terahertz light can be enhanced if the nonlinearity is increased. On the side, a numerical solution based on Split Step Beam Propagation Method (SSBPM) suggests that spatial Modulation Instabilty (MI) can be dominant. Accordingly, larger nonlinearity leads to the generation of discrete plasmon solitons rather than the diffracted profile resulted for the modest nonlinearity. Adding then the temporal variations to the nonlinear amplitude equation and solving numerically by predictor-corrector method, it is revealed that temporal MI appears as ultrashort pulse trains with multi-periodic behavior. Evoking the similarity with a laser cavity, the waveguide can be assumed as a spasing system-assuming the large nonlinearity regime-in which if the coupling depth is raised, the character of MI will be changed from the convective to absolute and the amplitude of SPPs will grow fast. The procedure can be even chaotic and unpredictable. This spasing system is suitable for applications of the electro-optical circuitry, optical amplification, optical communication and biomedical sensing through which the low power consumption and non-destructivity are of important traits.
△ Less
Submitted 12 September, 2020;
originally announced September 2020.
-
Opening the Software Engineering Toolbox for the Assessment of Trustworthy AI
Authors:
Mohit Kumar Ahuja,
Mohamed-Bachir Belaid,
Pierre Bernabé,
Mathieu Collet,
Arnaud Gotlieb,
Chhagan Lal,
Dusica Marijan,
Sagar Sen,
Aizaz Sharif,
Helge Spieker
Abstract:
Trustworthiness is a central requirement for the acceptance and success of human-centered artificial intelligence (AI). To deem an AI system as trustworthy, it is crucial to assess its behaviour and characteristics against a gold standard of Trustworthy AI, consisting of guidelines, requirements, or only expectations. While AI systems are highly complex, their implementations are still based on so…
▽ More
Trustworthiness is a central requirement for the acceptance and success of human-centered artificial intelligence (AI). To deem an AI system as trustworthy, it is crucial to assess its behaviour and characteristics against a gold standard of Trustworthy AI, consisting of guidelines, requirements, or only expectations. While AI systems are highly complex, their implementations are still based on software. The software engineering community has a long-established toolbox for the assessment of software systems, especially in the context of software testing. In this paper, we argue for the application of software engineering and testing practices for the assessment of trustworthy AI. We make the connection between the seven key requirements as defined by the European Commission's AI high-level expert group and established procedures from software engineering and raise questions for future work.
△ Less
Submitted 30 August, 2020; v1 submitted 14 July, 2020;
originally announced July 2020.
-
Mitigation of Human RF Exposure in Wearable Communications
Authors:
Yakub Ahmed Sharif,
Seungmo Kim
Abstract:
A major concern regarding wearable communications is human biological safety under exposure to radio frequency (RF) radiation generated by wearable devices. The biggest challenge in the implementation of wearable devices is to reduce the usage of energy to minimize the harmful impacts of exposure to RF on human health. Power management is one of the key energy-saving strategies used in wearable ne…
▽ More
A major concern regarding wearable communications is human biological safety under exposure to radio frequency (RF) radiation generated by wearable devices. The biggest challenge in the implementation of wearable devices is to reduce the usage of energy to minimize the harmful impacts of exposure to RF on human health. Power management is one of the key energy-saving strategies used in wearable networks. Signals enter the receiver (Rx) from a transmitter (Tx) through the human body in the form of electromagnetic field (EMF) radiation produced during the transmission of the packet. It may have a negative effect on human health as a result of specific absorption rate (SAR). SAR is the amount of radio frequency energy consumed by human tissue in mass units. The higher the body's absorption rate, the more radio frequency radiation. Therefore, SAR can be reduced by distributing the power over a greater mass or tissue volume equivalently larger. The Institute of Electrical and Electronics Engineers (IEEE) 802.15.6-supported multi-hop topology is particularly useful for low-power embedded devices that can reduce consumption of energy by communicating to the receiver (Rx) through nearby transmitted devices. In this paper, we suggest a relaying mechanism to minimize the transmitted power and, as a consequence, the power density (PD), a measure of SAR.
△ Less
Submitted 25 May, 2020;
originally announced May 2020.
-
EdgeNet: A novel approach for Arabic numeral classification
Authors:
S. M. A. Sharif,
Ghulam Mujtaba,
S. M. Nadim Uddin
Abstract:
Despite the importance of handwritten numeral classification, a robust and effective method for a widely used language like Arabic is still due. This study focuses to overcome two major limitations of existing works: data diversity and effective learning method. Hence, the existing Arabic numeral datasets have been merged into a single dataset and augmented to introduce data diversity. Moreover, a…
▽ More
Despite the importance of handwritten numeral classification, a robust and effective method for a widely used language like Arabic is still due. This study focuses to overcome two major limitations of existing works: data diversity and effective learning method. Hence, the existing Arabic numeral datasets have been merged into a single dataset and augmented to introduce data diversity. Moreover, a novel deep model has been proposed to exploit diverse data samples of unified dataset. The proposed deep model utilizes the low-level edge features by propagating them through residual connection. To make a fair comparison with the proposed model, the existing works have been studied under the unified dataset. The comparison experiments illustrate that the unified dataset accelerates the performance of the existing works. Moreover, the proposed model outperforms the existing state-of-the-art Arabic handwritten numeral classification methods and obtain an accuracy of 99.59% in the validation phase. Apart from that, different state-of-the-art classification models have studied with the same dataset to reveal their feasibility for the Arabic numeral classification. Code available at http://github.com/sharif-apu/EdgeNet.
△ Less
Submitted 30 July, 2019;
originally announced August 2019.
-
Transwarp Conduit: Interoperable Blockchain Application Framework
Authors:
Shidokht Hejazi-Sepehr,
Ross Kitsis,
Ali Sharif
Abstract:
Transwarp-Conduit (TWC) is a protocol for message transfers between two smart-contract enabled blockchains. Furthermore, we specify an application framework (leveraging the TWC protocol) that enables developers to define arbitrarily complex cross-blockchain applications, simply by deploying framework-compliant smart contracts and hosting a TWC node (daemon process).The TWC protocol is implementabl…
▽ More
Transwarp-Conduit (TWC) is a protocol for message transfers between two smart-contract enabled blockchains. Furthermore, we specify an application framework (leveraging the TWC protocol) that enables developers to define arbitrarily complex cross-blockchain applications, simply by deploying framework-compliant smart contracts and hosting a TWC node (daemon process).The TWC protocol is implementable without additional effort on part of the base blockchain protocol.
△ Less
Submitted 7 June, 2019;
originally announced June 2019.
-
Modeling of Lead Halide Perovskites for Photovoltaic Applications
Authors:
Radi A. Jishi,
Oliver B. Ta,
Adel A. Sharif
Abstract:
We report first-principles calculations, using the full potential linear augmented plane wave method, on six lead halide semiconductors, namely, CH3NH3PbI3, CH3NH3PbBr3, CsPbX3 (X=Cl, Br, I), and RbPbI3. Exchange is modeled using the modified Becke-Johnson potential. With an appropriate choice of the parameter that defines this potential, an excellent agreement is obtained between calculated and e…
▽ More
We report first-principles calculations, using the full potential linear augmented plane wave method, on six lead halide semiconductors, namely, CH3NH3PbI3, CH3NH3PbBr3, CsPbX3 (X=Cl, Br, I), and RbPbI3. Exchange is modeled using the modified Becke-Johnson potential. With an appropriate choice of the parameter that defines this potential, an excellent agreement is obtained between calculated and experimental band gaps of the six compounds. We comment on the possibility that the cubic phase of CsPbI3, under hydrostatic pressure, could be a topological insulator.
△ Less
Submitted 21 May, 2014; v1 submitted 7 May, 2014;
originally announced May 2014.
-
Monitoring and Controlling Power using Zigbee Communications
Authors:
N. Javaid,
A. Sharif,
A. Mahmood,
S. Ahmed,
U. Qasim,
Z. A. Khan
Abstract:
Smart grid is a modified form of electrical grid where generation, transmission, distribution and customers are not only connected electrically but also through strong communication network with each other as well as with market, operation and service provider. For achieving good communication link among them, it is very necessary to find suitable protocol. In this paper, we discuss different hard…
▽ More
Smart grid is a modified form of electrical grid where generation, transmission, distribution and customers are not only connected electrically but also through strong communication network with each other as well as with market, operation and service provider. For achieving good communication link among them, it is very necessary to find suitable protocol. In this paper, we discuss different hardware techniques for power monitoring, power management and remote power controlling at home and transmission side and also discuss the suitability of Zigbee for required communication link. Zigbee has major role in monitoring and direct load controlling for efficient power utilization. It covers enough area needed for communication and it works on low data rate of 20Kbps to 250Kbps with minimum power consumption. This paper describes the user friendly control home appliances, power on/off through the internet, PDA using Graphical User Interface (GUI) and through GSM cellular mobile phone.
△ Less
Submitted 11 August, 2012;
originally announced August 2012.
-
Wavelet transform modulus maxima based fractal correlation analysis
Authors:
D. C. Lin,
A. Sharif
Abstract:
The wavelet transform modulus maxima (WTMM) used in the singularity analysis of one fractal function is extended to study the fractal correlation of two multifractal functions. The technique is developed in the framework of joint partition function analysis (JPFA) proposed by Meneveau et al. [1] and is shown to be equally effective. In addition, we show that another leading approach developed fo…
▽ More
The wavelet transform modulus maxima (WTMM) used in the singularity analysis of one fractal function is extended to study the fractal correlation of two multifractal functions. The technique is developed in the framework of joint partition function analysis (JPFA) proposed by Meneveau et al. [1] and is shown to be equally effective. In addition, we show that another leading approach developed for the same purpose, namely, relative multifractal analysis, can be considered as a special case of JPFA at a particular parameter setting.
△ Less
Submitted 28 September, 2007;
originally announced September 2007.
-
Scaling of the Background Brain Dynamics and Alpha Rhythm
Authors:
Der Chyan Lin,
Asif Sharif,
Hon Kwan
Abstract:
The scaling property of the brain dynamics is studied based on the zero-crossing of the local electroencephalographic (EEG) recording taken from healthy young adults in eyes closed and eyes open. Evidence of coupling between the EEG fractal dynamics and the $α$ rhythm is presented. An organization principle that governs this coupling relationship is proposed. In the $α$ dominant brain state, a p…
▽ More
The scaling property of the brain dynamics is studied based on the zero-crossing of the local electroencephalographic (EEG) recording taken from healthy young adults in eyes closed and eyes open. Evidence of coupling between the EEG fractal dynamics and the $α$ rhythm is presented. An organization principle that governs this coupling relationship is proposed. In the $α$ dominant brain state, a possible interpretation using the self-organized criticality similar to the punctuated equilibrium is discussed.
△ Less
Submitted 26 May, 2005; v1 submitted 4 October, 2004;
originally announced October 2004.