-
From First Patch to Long-Term Contributor: Evaluating Onboarding Recommendations for OSS Newcomers
Authors:
Asif Kamal Turzo,
Sayma Sultana,
Amiangshu Bosu
Abstract:
Attracting and retaining a steady stream of new contributors is crucial to ensuring the long-term survival of open-source software (OSS) projects. However, there are two key research gaps regarding recommendations for onboarding new contributors to OSS projects. First, most of the existing recommendations are based on a limited number of projects, which raises concerns about their generalizability…
▽ More
Attracting and retaining a steady stream of new contributors is crucial to ensuring the long-term survival of open-source software (OSS) projects. However, there are two key research gaps regarding recommendations for onboarding new contributors to OSS projects. First, most of the existing recommendations are based on a limited number of projects, which raises concerns about their generalizability. If a recommendation yields conflicting results in a different context, it could hinder a newcomer's onboarding process rather than help them. Second, it's unclear whether these recommendations also apply to experienced contributors. If certain recommendations are specific to newcomers, continuing to follow them after their initial contributions are accepted could hinder their chances of becoming long-term contributors. To address these gaps, we conducted a two-stage mixed-method study. In the first stage, we conducted a Systematic Literature Review (SLR) and identified 15 task-related actionable recommendations that newcomers to OSS projects can follow to improve their odds of successful onboarding. In the second stage, we conduct a large-scale empirical study of five Gerrit-based projects and 1,155 OSS projects from GitHub to assess whether those recommendations assist newcomers' successful onboarding. Our results suggest that four recommendations positively correlate with newcomers' first patch acceptance in most contexts. Four recommendations are context-dependent, and four indicate significant negative associations for most projects. Our results also found three newcomer-specific recommendations, which OSS joiners should abandon at non-newcomer status to increase their odds of becoming long-term contributors.
△ Less
Submitted 4 July, 2024;
originally announced July 2024.
-
Assessing the Influence of Toxic and Gender Discriminatory Communication on Perceptible Diversity in OSS Projects
Authors:
Sayma Sultana,
Gias Uddin,
Amiangshu Bosu
Abstract:
The presence of toxic and gender-identity derogatory language in open-source software (OSS) communities has recently become a focal point for researchers. Such comments not only lead to frustration and disengagement among developers but may also influence their leave from the OSS projects. Despite ample evidence suggesting that diverse teams enhance productivity, the existence of toxic or gender i…
▽ More
The presence of toxic and gender-identity derogatory language in open-source software (OSS) communities has recently become a focal point for researchers. Such comments not only lead to frustration and disengagement among developers but may also influence their leave from the OSS projects. Despite ample evidence suggesting that diverse teams enhance productivity, the existence of toxic or gender identity discriminatory communications poses a significant threat to the participation of individuals from marginalized groups and, as such, may act as a barrier to fostering diversity and inclusion in OSS projects. However, there is a notable lack of research dedicated to exploring the association between gender-based toxic and derogatory language with a perceptible diversity of open-source software teams. Consequently, this study aims to investigate how such content influences the gender, ethnicity, and tenure diversity of open-source software development teams. To achieve this, we extract data from active GitHub projects, assess various project characteristics, and identify instances of toxic and gender-discriminatory language within issue/pull request comments. Using these attributes, we construct a regression model to explore how they associate with the perceptible diversity of those projects.
△ Less
Submitted 14 March, 2024; v1 submitted 12 March, 2024;
originally announced March 2024.
-
Using Gray Literature to Influence Software Engineering Curricula
Authors:
James D Kiper,
Simon Sultana,
Brent Auernheimer,
Gursimran Singh Walia
Abstract:
Software engineering (SE) evolves rapidly, with changing technology and industry expectations. The curriculum review bodies (e.g., ACM and IEEE-CS working groups) respond well but can have refresh cycles measured in years. For Computer Science and SE educators to be agile, predictive, and adapt to changing technology trends, judicious use of gray literature (GL) can be helpful. Other fields have f…
▽ More
Software engineering (SE) evolves rapidly, with changing technology and industry expectations. The curriculum review bodies (e.g., ACM and IEEE-CS working groups) respond well but can have refresh cycles measured in years. For Computer Science and SE educators to be agile, predictive, and adapt to changing technology trends, judicious use of gray literature (GL) can be helpful. Other fields have found GL useful in bridging academic research and industry needs. GL can be extended to SE to aid faculty preparing students for industry.
We address two questions: first, given the velocity of technical change, do current curricular guidelines accurately reflect industry practice and need for our graduates? Second, how can we track current and emerging trends to capture relevant competencies? We argue a study of the scholarly literature will have a limited impact on our understanding of current and emerging trends and curriculum designers would do well to utilize GL. We close with recommendations for SE educators.
△ Less
Submitted 27 December, 2023;
originally announced December 2023.
-
Automated Identification of Sexual Orientation and Gender Identity Discriminatory Texts from Issue Comments
Authors:
Sayma Sultana,
Jaydeb Sarker,
Farzana Israt,
Rajshakhar Paul,
Amiangshu Bosu
Abstract:
In an industry dominated by straight men, many developers representing other gender identities and sexual orientations often encounter hateful or discriminatory messages. Such communications pose barriers to participation for women and LGBTQ+ persons. Due to sheer volume, manual inspection of all communications for discriminatory communication is infeasible for a large-scale Free Open-Source Softw…
▽ More
In an industry dominated by straight men, many developers representing other gender identities and sexual orientations often encounter hateful or discriminatory messages. Such communications pose barriers to participation for women and LGBTQ+ persons. Due to sheer volume, manual inspection of all communications for discriminatory communication is infeasible for a large-scale Free Open-Source Software (FLOSS) community. To address this challenge, this study aims to develop an automated mechanism to identify Sexual orientation and Gender identity Discriminatory (SGID) texts from software developers' communications. On this goal, we trained and evaluated SGID4SE ( Sexual orientation and Gender Identity Discriminatory text identification for (4) Software Engineering texts) as a supervised learning-based SGID detection tool. SGID4SE incorporates six preprocessing steps and ten state-of-the-art algorithms. SGID4SE implements six different strategies to improve the performance of the minority class. We empirically evaluated each strategy and identified an optimum configuration for each algorithm. In our ten-fold cross-validation-based evaluations, a BERT-based model boosts the best performance with 85.9% precision, 80.0% recall, and 82.9% F1-Score for the SGID class. This model achieves 95.7% accuracy and 80.4% Matthews Correlation Coefficient. Our dataset and tool establish a foundation for further research in this direction.
△ Less
Submitted 14 November, 2023;
originally announced November 2023.
-
Blockchain-Enabled Federated Learning Approach for Vehicular Networks
Authors:
Shirin Sultana,
Jahin Hossain,
Maruf Billah,
Hasibul Hossain Shajeeb,
Saifur Rahman,
Keyvan Ansari,
Khondokar Fida Hasan
Abstract:
Data from interconnected vehicles may contain sensitive information such as location, driving behavior, personal identifiers, etc. Without adequate safeguards, sharing this data jeopardizes data privacy and system security. The current centralized data-sharing paradigm in these systems raises particular concerns about data privacy. Recognizing these challenges, the shift towards decentralized inte…
▽ More
Data from interconnected vehicles may contain sensitive information such as location, driving behavior, personal identifiers, etc. Without adequate safeguards, sharing this data jeopardizes data privacy and system security. The current centralized data-sharing paradigm in these systems raises particular concerns about data privacy. Recognizing these challenges, the shift towards decentralized interactions in technology, as echoed by the principles of Industry 5.0, becomes paramount. This work is closely aligned with these principles, emphasizing decentralized, human-centric, and secure technological interactions in an interconnected vehicular ecosystem. To embody this, we propose a practical approach that merges two emerging technologies: Federated Learning (FL) and Blockchain. The integration of these technologies enables the creation of a decentralized vehicular network. In this setting, vehicles can learn from each other without compromising privacy while also ensuring data integrity and accountability. Initial experiments show that compared to conventional decentralized federated learning techniques, our proposed approach significantly enhances the performance and security of vehicular networks. The system's accuracy stands at 91.92\%. While this may appear to be low in comparison to state-of-the-art federated learning models, our work is noteworthy because, unlike others, it was achieved in a malicious vehicle setting. Despite the challenging environment, our method maintains high accuracy, making it a competent solution for preserving data privacy in vehicular networks.
△ Less
Submitted 10 November, 2023;
originally announced November 2023.
-
Detection and Segmentation of Cosmic Objects Based on Adaptive Thresholding and Back Propagation Neural Network
Authors:
Samia Sultana,
Shyla Afroge
Abstract:
Astronomical images provide information about the great variety of cosmic objects in the Universe. Due to the large volumes of data, the presence of innumerable bright point sources as well as noise within the frame and the spatial gap between objects and satellite cameras, it is a challenging task to classify and detect the celestial objects. We propose an Adaptive Thresholding Method (ATM) based…
▽ More
Astronomical images provide information about the great variety of cosmic objects in the Universe. Due to the large volumes of data, the presence of innumerable bright point sources as well as noise within the frame and the spatial gap between objects and satellite cameras, it is a challenging task to classify and detect the celestial objects. We propose an Adaptive Thresholding Method (ATM) based segmentation and Back Propagation Neural Network (BPNN) based cosmic object detection including a well-structured series of pre-processing steps designed to enhance segmentation and detection.
△ Less
Submitted 2 August, 2023;
originally announced August 2023.
-
Unbiased Pain Assessment through Wearables and EHR Data: Multi-attribute Fairness Loss-based CNN Approach
Authors:
Sharmin Sultana,
Md Mahmudur Rahman,
Atqiya Munawara Mahi,
Shao-Hsien Liu,
Mohammad Arif Ul Alam
Abstract:
The combination of diverse health data (IoT, EHR, and clinical surveys) and scalable-adaptable Artificial Intelligence (AI), has enabled the discovery of physical, behavioral, and psycho-social indicators of pain status. Despite the hype and promise to fundamentally alter the healthcare system with technological advancements, much AI adoption in clinical pain evaluation has been hampered by the he…
▽ More
The combination of diverse health data (IoT, EHR, and clinical surveys) and scalable-adaptable Artificial Intelligence (AI), has enabled the discovery of physical, behavioral, and psycho-social indicators of pain status. Despite the hype and promise to fundamentally alter the healthcare system with technological advancements, much AI adoption in clinical pain evaluation has been hampered by the heterogeneity of the problem itself and other challenges, such as personalization and fairness. Studies have revealed that many AI (i.e., machine learning or deep learning) models display biases and discriminate against specific population segments (such as those based on gender or ethnicity), which breeds skepticism among medical professionals about AI adaptability. In this paper, we propose a Multi-attribute Fairness Loss (MAFL) based CNN model that aims to account for any sensitive attributes included in the data and fairly predict patients' pain status while attempting to minimize the discrepancies between privileged and unprivileged groups. In order to determine whether the trade-off between accuracy and fairness can be satisfied, we compare the proposed model with well-known existing mitigation procedures, and studies reveal that the implemented model performs favorably in contrast to state-of-the-art methods. Utilizing NIH All-Of-US data, where a cohort of 868 distinct individuals with wearables and EHR data gathered over 1500 days has been taken into consideration to analyze our suggested fair pain assessment system.
△ Less
Submitted 3 July, 2023;
originally announced July 2023.
-
ToxiSpanSE: An Explainable Toxicity Detection in Code Review Comments
Authors:
Jaydeb Saker,
Sayma Sultana,
Steven R. Wilson,
Amiangshu Bosu
Abstract:
Background: The existence of toxic conversations in open-source platforms can degrade relationships among software developers and may negatively impact software product quality. To help mitigate this, some initial work has been done to detect toxic comments in the Software Engineering (SE) domain. Aims: Since automatically classifying an entire text as toxic or non-toxic does not help human modera…
▽ More
Background: The existence of toxic conversations in open-source platforms can degrade relationships among software developers and may negatively impact software product quality. To help mitigate this, some initial work has been done to detect toxic comments in the Software Engineering (SE) domain. Aims: Since automatically classifying an entire text as toxic or non-toxic does not help human moderators to understand the specific reason(s) for toxicity, we worked to develop an explainable toxicity detector for the SE domain. Method: Our explainable toxicity detector can detect specific spans of toxic content from SE texts, which can help human moderators by automatically highlighting those spans. This toxic span detection model, ToxiSpanSE, is trained with the 19,651 code review (CR) comments with labeled toxic spans. Our annotators labeled the toxic spans within 3,757 toxic CR samples. We explored several types of models, including one lexicon-based approach and five different transformer-based encoders. Results: After an extensive evaluation of all models, we found that our fine-tuned RoBERTa model achieved the best score with 0.88 $F1$, 0.87 precision, and 0.93 recall for toxic class tokens, providing an explainable toxicity classifier for the SE domain. Conclusion: Since ToxiSpanSE is the first tool to detect toxic spans in the SE domain, this tool will pave a path to combat toxicity in the SE community.
△ Less
Submitted 7 July, 2023;
originally announced July 2023.
-
Josephson-type oscillations in spin-orbit coupled Bose-Einstein condensates with nonlinear optical lattices
Authors:
Sumaita Sultana,
Golam Ali Sekh
Abstract:
We consider spin-orbit coupled Bose Einstein Condensate in presence of linear and nonlinear optical lattices within the framework of quasi-one-dimensional Gross-Pitaevskii equation. The population imbalance between the states changes periodically with time and the oscillation amplitude depends sensitively on the initial phase. The optical lattice is found to change phase velocity of the oscillatio…
▽ More
We consider spin-orbit coupled Bose Einstein Condensate in presence of linear and nonlinear optical lattices within the framework of quasi-one-dimensional Gross-Pitaevskii equation. The population imbalance between the states changes periodically with time and the oscillation amplitude depends sensitively on the initial phase. The optical lattice is found to change phase velocity of the oscillation of population imbalance. This oscillation can also be arrested beyond critical values of parameters. We find that the optical lattice can efficiently be used to control the critical point.
△ Less
Submitted 11 October, 2023; v1 submitted 19 May, 2023;
originally announced May 2023.
-
HARDC : A novel ECG-based heartbeat classification method to detect arrhythmia using hierarchical attention based dual structured RNN with dilated CNN
Authors:
Md Shofiqul Islam,
Khondokar Fida Hasan,
Sunjida Sultana,
Shahadat Uddin,
Pietro Lio,
Julian M. W. Quinn,
Mohammad Ali Moni
Abstract:
In this paper have developed a novel hybrid hierarchical attention-based bidirectional recurrent neural network with dilated CNN (HARDC) method for arrhythmia classification. This solves problems that arise when traditional dilated convolutional neural network (CNN) models disregard the correlation between contexts and gradient dispersion. The proposed HARDC fully exploits the dilated CNN and bidi…
▽ More
In this paper have developed a novel hybrid hierarchical attention-based bidirectional recurrent neural network with dilated CNN (HARDC) method for arrhythmia classification. This solves problems that arise when traditional dilated convolutional neural network (CNN) models disregard the correlation between contexts and gradient dispersion. The proposed HARDC fully exploits the dilated CNN and bidirectional recurrent neural network unit (BiGRU-BiLSTM) architecture to generate fusion features. As a result of incorporating both local and global feature information and an attention mechanism, the model's performance for prediction is improved.By combining the fusion features with a dilated CNN and a hierarchical attention mechanism, the trained HARDC model showed significantly improved classification results and interpretability of feature extraction on the PhysioNet 2017 challenge dataset. Sequential Z-Score normalization, filtering, denoising, and segmentation are used to prepare the raw data for analysis. CGAN (Conditional Generative Adversarial Network) is then used to generate synthetic signals from the processed data. The experimental results demonstrate that the proposed HARDC model significantly outperforms other existing models, achieving an accuracy of 99.60\%, F1 score of 98.21\%, a precision of 97.66\%, and recall of 99.60\% using MIT-BIH generated ECG. In addition, this approach substantially reduces run time when using dilated CNN compared to normal convolution. Overall, this hybrid model demonstrates an innovative and cost-effective strategy for ECG signal compression and high-performance ECG recognition. Our results indicate that an automated and highly computed method to classify multiple types of arrhythmia signals holds considerable promise.
△ Less
Submitted 6 March, 2023;
originally announced March 2023.
-
EC-CFI: Control-Flow Integrity via Code Encryption Counteracting Fault Attacks
Authors:
Pascal Nasahl,
Salmin Sultana,
Hans Liljestrand,
Karanvir Grewal,
Michael LeMay,
David M. Durham,
David Schrammel,
Stefan Mangard
Abstract:
Fault attacks enable adversaries to manipulate the control-flow of security-critical applications. By inducing targeted faults into the CPU, the software's call graph can be escaped and the control-flow can be redirected to arbitrary functions inside the program. To protect the control-flow from these attacks, dedicated fault control-flow integrity (CFI) countermeasures are commonly deployed. Howe…
▽ More
Fault attacks enable adversaries to manipulate the control-flow of security-critical applications. By inducing targeted faults into the CPU, the software's call graph can be escaped and the control-flow can be redirected to arbitrary functions inside the program. To protect the control-flow from these attacks, dedicated fault control-flow integrity (CFI) countermeasures are commonly deployed. However, these schemes either have high detection latencies or require intrusive hardware changes. In this paper, we present EC-CFI, a software-based cryptographically enforced CFI scheme with no detection latency utilizing hardware features of recent Intel platforms. Our EC-CFI prototype is designed to prevent an adversary from esca** the program's call graph using faults by encrypting each function with a different key before execution. At runtime, the instrumented program dynamically derives the decryption key, ensuring that the code only can be successfully decrypted when the program follows the intended call graph. To enable this level of protection on Intel commodity systems, we introduce extended page table (EPT) aliasing allowing us to achieve function-granular encryption by combing Intel's TME-MK and virtualization technology. We open-source our custom LLVM-based toolchain automatically protecting arbitrary programs with EC-CFI. Furthermore, we evaluate our EPT aliasing approach with the SPEC CPU2017 and Embench-IoT benchmarks and discuss and evaluate potential TME-MK hardware changes minimizing runtime overheads.
△ Less
Submitted 24 March, 2023; v1 submitted 31 January, 2023;
originally announced January 2023.
-
Vision-Based Robust Lane Detection and Tracking under Different Challenging Environmental Conditions
Authors:
Samia Sultana,
Boshir Ahmed,
Manoranjan Paul,
Muhammad Rafiqul Islam,
Shamim Ahmad
Abstract:
Lane marking detection is fundamental for both advanced driving assistance systems. However, detecting lane is highly challenging when the visibility of a road lane marking is low due to real-life challenging environment and adverse weather. Most of the lane detection methods suffer from four types of challenges: (i) light effects i.e., shadow, glare of light, reflection etc.; (ii) Obscured visibi…
▽ More
Lane marking detection is fundamental for both advanced driving assistance systems. However, detecting lane is highly challenging when the visibility of a road lane marking is low due to real-life challenging environment and adverse weather. Most of the lane detection methods suffer from four types of challenges: (i) light effects i.e., shadow, glare of light, reflection etc.; (ii) Obscured visibility of eroded, blurred, colored and cracked lane caused by natural disasters and adverse weather; (iii) lane marking occlusion by different objects from surroundings (wiper, vehicles etc.); and (iv) presence of confusing lane like lines inside the lane view e.g., guardrails, pavement marking, road divider etc. Here, we propose a robust lane detection and tracking method with three key technologies. First, we introduce a comprehensive intensity threshold range (CITR) to improve the performance of the canny operator in detecting low intensity lane edges. Second, we propose a two-step lane verification technique, the angle based geometric constraint (AGC) and length-based geometric constraint (LGC) followed by Hough Transform, to verify the characteristics of lane marking and to prevent incorrect lane detection. Finally, we propose a novel lane tracking technique, by defining a range of horizontal lane position (RHLP) along the x axis which will be updating with respect to the lane position of previous frame. It can keep track of the lane position when either left or right or both lane markings are partially and fully invisible. To evaluate the performance of the proposed method we used the DSDLDE [1] and SLD [2] dataset with 1080x1920 and 480x720 resolutions at 24 and 25 frames/sec respectively. Experimental results show that the average detection rate is 97.55%, and the average processing time is 22.33 msec/frame, which outperform the state of-the-art method.
△ Less
Submitted 14 June, 2023; v1 submitted 18 October, 2022;
originally announced October 2022.
-
Code Reviews in Open Source Projects : How Do Gender Biases Affect Participation and Outcomes?
Authors:
Sayma Sultana,
Asif Kamal Turzo,
Amiangshu Bosu
Abstract:
Context: Contemporary software development organizations lack diversity and the ratios of women in Free and open-source software (FOSS) communities are even lower than the industry average. Although the results of recent studies hint the existence of biases against women, it is unclear to what extent such biases influence the outcomes of various software development tasks.
Aim: We aim to identif…
▽ More
Context: Contemporary software development organizations lack diversity and the ratios of women in Free and open-source software (FOSS) communities are even lower than the industry average. Although the results of recent studies hint the existence of biases against women, it is unclear to what extent such biases influence the outcomes of various software development tasks.
Aim: We aim to identify whether the outcomes of or participation in code reviews (or pull requests) are influenced by the gender of a developer..
Approach: With this goal, this study includes a total 1010 FOSS projects. We developed six regression models for each of the 14 dataset (i.e., 10 Gerrit based and four Github) to identify if code acceptance, review intervals, and code review participation differ based on the gender and gender neutral profile of a developer.
Key findings: Our results find significant gender biases during code acceptance among 13 out of the 14 datasets, with seven seven favoring men and the remaining six favoring women. We also found significant differences between men and women in terms of code review intervals, with women encountering longer delays in three cases and the opposite in seven. Our results indicate reviewer selection as one of the most gender biased aspects among most of the projects, with women having significantly lower code review participation among 11 out of the 14 cases. Since most of the review assignments are based on invitations, this result suggests possible affinity biases among the developers.
Conclusion: Though gender bias exists among many projects, direction and amplitude of bias varies based on project size, community and culture. Similar bias mitigation strategies may not work across all communities, as characteristics of biases and their underlying causes differ.
△ Less
Submitted 7 February, 2023; v1 submitted 30 September, 2022;
originally announced October 2022.
-
Mixture GAN For Modulation Classification Resiliency Against Adversarial Attacks
Authors:
Eyad Shtaiwi,
Ahmed El Ouadrhiri,
Majid Moradikia,
Salma Sultana,
Ahmed Abdelhadi,
Zhu Han
Abstract:
Automatic modulation classification (AMC) using the Deep Neural Network (DNN) approach outperforms the traditional classification techniques, even in the presence of challenging wireless channel environments. However, the adversarial attacks cause the loss of accuracy for the DNN-based AMC by injecting a well-designed perturbation to the wireless channels. In this paper, we propose a novel generat…
▽ More
Automatic modulation classification (AMC) using the Deep Neural Network (DNN) approach outperforms the traditional classification techniques, even in the presence of challenging wireless channel environments. However, the adversarial attacks cause the loss of accuracy for the DNN-based AMC by injecting a well-designed perturbation to the wireless channels. In this paper, we propose a novel generative adversarial network (GAN)-based countermeasure approach to safeguard the DNN-based AMC systems against adversarial attack examples. GAN-based aims to eliminate the adversarial attack examples before feeding to the DNN-based classifier. Specifically, we have shown the resiliency of our proposed defense GAN against the Fast-Gradient Sign method (FGSM) algorithm as one of the most potent kinds of attack algorithms to craft the perturbed signals. The existing defense-GAN has been designed for image classification and does not work in our case where the above-mentioned communication system is considered. Thus, our proposed countermeasure approach deploys GANs with a mixture of generators to overcome the mode collapsing problem in a typical GAN facing radio signal classification problem. Simulation results show the effectiveness of our proposed defense GAN so that it could enhance the accuracy of the DNN-based AMC under adversarial attacks to 81%, approximately.
△ Less
Submitted 29 May, 2022;
originally announced May 2022.
-
Propagation of Compressional Alfvén Waves in a Magnetized Pair Plasma Medium
Authors:
T. I. Rajib,
S. Sultana
Abstract:
The reductive perturbation approach was used to explore the nonlinear propagation of fast (compressive) and slow (rarefactive) electron-position (EP) magneto-acoustic (EPMA) modes in an EP plasma medium. The solitary wave solution of the Korteweg-de Vries (K-dV) equation is used to identify the basic properties of EP compressional Alfvén waves. It is shown that the fast (slow) EPMA mode is predict…
▽ More
The reductive perturbation approach was used to explore the nonlinear propagation of fast (compressive) and slow (rarefactive) electron-position (EP) magneto-acoustic (EPMA) modes in an EP plasma medium. The solitary wave solution of the Korteweg-de Vries (K-dV) equation is used to identify the basic properties of EP compressional Alfvén waves. It is shown that the fast (slow) EPMA mode is predicted to propagate as compressive (rarefactive) solitary waves. The basic features (i.e., speed, amplitude, and width) of the compressive (i.e., fast) EPMA waves are found to be completely different from those of rarefactive (i.e., slow) EPMA ones. It is also examined that hump (dip) shape solitary waves are found for fast (slow) mode. The significance of our findings is in understanding the nonlinear electromagnetic wave phenomena in laboratory plasma and space environments where EP plasma may exist.
△ Less
Submitted 20 May, 2022;
originally announced May 2022.
-
Are Code Review Processes Influenced by the Genders of the Participants?
Authors:
Sayma Sultana,
Amiangshu Bosu
Abstract:
Background: Contemporary software development organizations lack diversity and the ratios of women in Free and open-source software (FOSS) communities are even lower than the industry average. Although the results of recent studies hint the existence of biases against women, it is unclear to what extent such biases influence the outcomes of software development tasks.
Objective: This study aims…
▽ More
Background: Contemporary software development organizations lack diversity and the ratios of women in Free and open-source software (FOSS) communities are even lower than the industry average. Although the results of recent studies hint the existence of biases against women, it is unclear to what extent such biases influence the outcomes of software development tasks.
Objective: This study aims to conceptually replicate two recent studies investigating gender biases in FOSS communities \textit{ to identify whether the outcomes of or participation in code reviews (or pull requests) are influenced by the gender of a developer.} In particular, this study focuses on two outcome aspects (i.e., code acceptance, and review interval) and one participation aspect (i.e., code review participation) of code review processes.
Method: We will augment the dataset used in the original studies with code reviews /pull requests created during recent years. Using this dataset, we will train multivariate regression models to accurately model the influences of developers' genders on code acceptance, review intervals, and code review participation.
△ Less
Submitted 5 February, 2023; v1 submitted 17 August, 2021;
originally announced August 2021.
-
Identifying the Prevalence of Gender Biases among the Computing Organizations
Authors:
Sayma Sultana,
London Ariel Cavaletto,
Amiangshu Bosu
Abstract:
We have designed an online survey to understand the status quo of four dimensions of gender biases among the contemporary computing organizations. Our preliminary results found almost one-third of the respondents have reported first-hand experiences of encountering gender biases at their jobs.
We have designed an online survey to understand the status quo of four dimensions of gender biases among the contemporary computing organizations. Our preliminary results found almost one-third of the respondents have reported first-hand experiences of encountering gender biases at their jobs.
△ Less
Submitted 1 July, 2021;
originally announced July 2021.
-
Ion-acoustic shock waves in a magnetized plasma featuring super-thermal distribution
Authors:
N. M. Heera,
J. Akter,
N. K. Tamanna,
N. A. Chowdhury,
T. I. Rajib,
S. Sultana,
A. A. Mamun
Abstract:
A theoretical investigation has been made on the propagation of ion-acoustic (IA) shock waves (IASHWs) in a magnetized pair-ion plasma having inertial warm positive and negative ions, and inertialess super-thermal electrons and positrons. The well known Burgers' equation has been derived by employing the reductive perturbation method. The plasma model supports both positive and negative shock stru…
▽ More
A theoretical investigation has been made on the propagation of ion-acoustic (IA) shock waves (IASHWs) in a magnetized pair-ion plasma having inertial warm positive and negative ions, and inertialess super-thermal electrons and positrons. The well known Burgers' equation has been derived by employing the reductive perturbation method. The plasma model supports both positive and negative shock structures under consideration of super-thermal electrons and positrons. It is found that the oblique angle ($δ$) enhances the magnitude of the amplitude of both positive and negative shock profiles. It is also observed that the steepness of the shock profiles decreases with the kinematic viscosity of the ion, and the height of the shock profile increases (decreases) with the mass of the positive (negative) ion. The implications of the results have been briefly discussed for space and laboratory plasmas.
△ Less
Submitted 14 April, 2021;
originally announced April 2021.
-
Dust-ion-acoustic shock waves in magnetized plasma having super-thermal electrons
Authors:
T. Yeashna,
R. K. Shikha,
N. A. Chowdhury,
A. Mannan,
S. Sultana,
A. A. Mamun
Abstract:
The propagation of dust-ion-acoustic shock waves (DIASHWs) in a three-component magnetized plasma having inertialess super-thermal electrons, inertial warm positive ions and negative dust grains has been investigated. A Burgers' equation is derived by employing the reductive perturbation method. Under consideration of inertial warm positive ions and negative dust grains, both positive and negative…
▽ More
The propagation of dust-ion-acoustic shock waves (DIASHWs) in a three-component magnetized plasma having inertialess super-thermal electrons, inertial warm positive ions and negative dust grains has been investigated. A Burgers' equation is derived by employing the reductive perturbation method. Under consideration of inertial warm positive ions and negative dust grains, both positive and negative shock structures are numerically observed in the presence of super-thermal electrons. The effects of oblique angle ($δ$), spectral index ($κ$), kinematic viscosity ($η$), number density and charge state of the plasma species on the formation of the DIASHWs are examined. It is found that the positive and negative shock wave potentials increase with the oblique angle. It is also observed that the magnitude of the amplitude of positive and negative shock waves is not affected by the variation of the kinematic viscosity of plasma species but the steepness of the positive and negative shock waves decreases with kinematic viscosity of plasma species. The implications of our findings in space and laboratory plasmas are briefly discussed.
△ Less
Submitted 8 April, 2021;
originally announced April 2021.
-
Ion-acoustic shock waves in magnetized pair-ion plasma
Authors:
T. Yeashna,
R. K. Shikha,
N. A. Chowdhury,
A. Mannan,
S. Sultana,
A. A. Mamun
Abstract:
A theoretical investigation associated with obliquely propagating ion-acoustic shock waves (IASHWs) in a three-component magnetized plasma having inertialess non-extensive electrons, inertial warm positive and negative ions has been performed. A Burgers equation is derived by employing the reductive perturbation method. Our plasma model supports both positive and negative shock structures under th…
▽ More
A theoretical investigation associated with obliquely propagating ion-acoustic shock waves (IASHWs) in a three-component magnetized plasma having inertialess non-extensive electrons, inertial warm positive and negative ions has been performed. A Burgers equation is derived by employing the reductive perturbation method. Our plasma model supports both positive and negative shock structures under the consideration of non-extensive electrons. It is found that the positive and negative shock wave potentials increase with the oblique angle ($δ$) which arises due to the external magnetic field. It is also observed that the magnitude of the amplitude of positive and negative shock waves is not effected by the variation of the ion kinematic viscosity but the steepness of the positive and negative shock waves decreases with ion kinematic viscosity. The implications of our findings in space and laboratory plasmas are briefly discussed.
△ Less
Submitted 16 February, 2021;
originally announced February 2021.
-
Damped dust-ion-acoustic solitons in collisional magnetized nonthermal plasmas
Authors:
Md. Rakib Hassan,
S. Sultana
Abstract:
A multi-species magnetized collisional nonthermal plasma system containing inertial ion species, non-inertial electron species following nonthermal $κ-$ distribution, and immobile dust particles, is considered to examine the characteristics of the dissipative dust-ion-acoustic (DIA) soliton modes, \textbf{theoretically and parametrically}. The electrostatic solitary modes are found to be associate…
▽ More
A multi-species magnetized collisional nonthermal plasma system containing inertial ion species, non-inertial electron species following nonthermal $κ-$ distribution, and immobile dust particles, is considered to examine the characteristics of the dissipative dust-ion-acoustic (DIA) soliton modes, \textbf{theoretically and parametrically}. The electrostatic solitary modes are found to be associated with the low frequency dissipative dust-ion-acoustic solitary waves (DIASWs). The ion-neutral collision is taken into account, and the influence of ion-neutral collisional effects on the dynamics of dissipative DIASWs is investigated. It is reported that most of the plasma mediums in space and laboratory are far from thermal equilibrium, and the particles in such plasma systems are well fitted via the $κ-$nonthermal distribution than via the thermal Maxwellian distribution. The reductive perturbation approach is adopted to derive the damped KdV (dKdV) equation, and the solitary wave solution of the dKdV equation is derived via the tangent hyperbolic method to analyze the basic features (amplitude, width, speed, time evolution, etc.) of dissipative DIASWs. The propagation nature and also the basic features of dissipative DIASWs are seen to influence significantly due to the variation of the plasma configuration parameters and also due to the variation of the supethermality index $κ$ in the considered plasma system. The implication of the results of this study could be useful for better understanding the electrostatic localized disturbances, in the ion length and time scale, in space and experimental dusty plasmas, where the presence of excess energetic electrons and ion-neutral collisional dam** are accountable.
△ Less
Submitted 23 July, 2021; v1 submitted 8 January, 2021;
originally announced January 2021.
-
Arbitrary amplitude nucleus-acoustic solitary waves in thermally degenerate plasma systems
Authors:
A. Mannan,
S. Sultana,
A. A. Mamun
Abstract:
A rigorous theoretical investigation is made of arbitrary amplitude nucleus acoustic solitary waves (SWs) in a fully ionized multi-nucleus plasma system (consisting of thermally degenerate electron species and non-degenerate warm light as well as heavy nucleus species). The pseudo-potential approach, which is valid for the arbitrary amplitude SWs, is employed. The subsonic and supersonic nucleus-a…
▽ More
A rigorous theoretical investigation is made of arbitrary amplitude nucleus acoustic solitary waves (SWs) in a fully ionized multi-nucleus plasma system (consisting of thermally degenerate electron species and non-degenerate warm light as well as heavy nucleus species). The pseudo-potential approach, which is valid for the arbitrary amplitude SWs, is employed. The subsonic and supersonic nucleus-acoustic SWs (which are found to be compressive) along with their basic features are identified. The basic properties of these subsonic and supersonic nucleus-acoustic SWs are found to be significantly modified by the effects of non and ultra-relativistically degenerate electron species, dynamics of heavy nucleus species, number densities as well as adiabatic temperatures of light and heavy nucleus species, etc. It shown that the presence of heavy nucleus species with non-degenerate (isothermal) electron species supports the existence of subsonic nucleus-acoustic SWs, and that the effects of electron degeneracies and light and heavy nucleus temperatures reduce the possibility for the formation of these subsonic nucleus-acoustic SWs. The amplitude of the supersonic nucleus-acoustic SWs in the situation of non-relativistically degenerate electron species is much smaller than that of ultra-relativistically degenerate electron species, but is much larger than that of isothermal electron species. The rise of adiabatic temperature of light or heavy nucleus species causes to decrease (increase) the amplitude (width) of the subsonic and supersonic nucleus acoustic SWs. On the other hand, the increase in the number density of light or heavy nucleus species causes to increase (decrease) the amplitude (width) of the subsonic and supersonic nucleus acoustic SWs. The results of this investigation are found to be applicable in laboratory, space, and astrophysical plasma systems.
△ Less
Submitted 19 August, 2020;
originally announced August 2020.
-
Electron-Acoustic Solitons in Magnetized Collisional Nonthermal Plasmas
Authors:
M. R. Hassan,
T. I. Rajib,
S. Sultana
Abstract:
The properties of obliquely propagating dissipative electron-acoustic solitary waves (OPdEASWs) have been investigated in a magnetized collisional superthermal plasma consisting of inertial cold electrons, inertialess hot electrons featuring kappa-distribution and static ions via the fluid dynamical approach. By using the reductive perturbation technique, a nonlinear Schamel equation that governs…
▽ More
The properties of obliquely propagating dissipative electron-acoustic solitary waves (OPdEASWs) have been investigated in a magnetized collisional superthermal plasma consisting of inertial cold electrons, inertialess hot electrons featuring kappa-distribution and static ions via the fluid dynamical approach. By using the reductive perturbation technique, a nonlinear Schamel equation that governs the nonlinear features of OPdEASWS is obtained. The solitary wave solution of the Schamel equation is used to examine the basic features of small, but finite amplitude OPdEASWs in such a magnetized collisional superthermal plasma. The basic features (width, amplitude, speed, etc.) of OPdEASWs are found to be modified by the different plasma configuration parameters, such as the superthermality index, obliquity angle, collisional parameter, trap** parameter, and external magnetic field. The nature of electrostatic disturbances, that may propagate in different realistic space and laboratory plasma systems (e.g., in Saturn ring), are briefly discussed.
△ Less
Submitted 2 June, 2020; v1 submitted 10 December, 2019;
originally announced December 2019.
-
Dust-ion-acoustic rogue waves in presence of non-extensive non-thermal electrons
Authors:
T. I. Rajib,
N. K. Tamanna,
N. A. Chowdhury,
A. Mannan,
S. Sultana,
A. A. Mamun
Abstract:
Dust-ion-acoustic (DIA) rogue waves (DIARWs) are investigated in a three components dusty plasma system containing inertialess electrons featuring non-thermal non-extensive distribution as well as inertial warm ions and negative dust grains. A nonlinear Schrödinger equation (NLSE), which governs the conditions of the modulational instability (MI) of DIA waves (DIAWs), is obtained by using the redu…
▽ More
Dust-ion-acoustic (DIA) rogue waves (DIARWs) are investigated in a three components dusty plasma system containing inertialess electrons featuring non-thermal non-extensive distribution as well as inertial warm ions and negative dust grains. A nonlinear Schrödinger equation (NLSE), which governs the conditions of the modulational instability (MI) of DIA waves (DIAWs), is obtained by using the reductive perturbation method. It has been observed from the numerical analysis of NLSE that the plasma system supports both modulationally stable domain in which dispersive and nonlinear coefficients of the NLSE have same sign and unstable domain in which dispersive and nonlinear coefficients of the NLSE have opposite sign, and also supports the DIARWs only in the unstable domain. It is also observed that the basic features (viz. stability of the DIAWs, MI, growth rate, amplitude, and width of the DIARWs, etc.) are significantly modified by the related plasma parameters (viz. dust charge state, number density of electron and ion, non-extensive parameter q, and non-thermal parameter $α$, etc.). The present study is useful for understanding the mechanism of the formation of DIARWs in the laboratory and space environments where inertialess mixed distributed electrons can exist with inertial ions and dust grains.
△ Less
Submitted 31 October, 2019;
originally announced November 2019.
-
Electrostatic dust-acoustic rogue waves in an electron depleted dusty plasma
Authors:
J. N. Sikta,
N. A. Chowdhury,
A. Mannan,
S. Sultana,
A. A. Mamun
Abstract:
The formation of the gigantic dust-acoustic rouge waves (DARWs) in an electron depleted unmagnetized opposite polarity dusty plasma system is theoretically observed for the first time. The nonlinear Schrödinger equation (derived by utilizing the reductive perturbation method) has been analytically as well as numerically analyzed to identify the basic features (viz., height, thickness, and modulati…
▽ More
The formation of the gigantic dust-acoustic rouge waves (DARWs) in an electron depleted unmagnetized opposite polarity dusty plasma system is theoretically observed for the first time. The nonlinear Schrödinger equation (derived by utilizing the reductive perturbation method) has been analytically as well as numerically analyzed to identify the basic features (viz., height, thickness, and modulational instability, etc.) of DARWs. The results obtained form this investigation should be useful in understanding the basic properties of these rouge waves which can predict to be formed in electron depleted unmagnetized opposite polarity dusty plasma systems like mesosphere, F-rings of Saturn, and cometary atmosphere, etc.
△ Less
Submitted 26 September, 2019;
originally announced September 2019.
-
HeNet: A Deep Learning Approach on Intel$^\circledR$ Processor Trace for Effective Exploit Detection
Authors:
Li Chen,
Salmin Sultana,
Ravi Sahita
Abstract:
This paper presents HeNet, a hierarchical ensemble neural network, applied to classify hardware-generated control flow traces for malware detection. Deep learning-based malware detection has so far focused on analyzing executable files and runtime API calls. Static code analysis approaches face challenges due to obfuscated code and adversarial perturbations. Behavioral data collected during execut…
▽ More
This paper presents HeNet, a hierarchical ensemble neural network, applied to classify hardware-generated control flow traces for malware detection. Deep learning-based malware detection has so far focused on analyzing executable files and runtime API calls. Static code analysis approaches face challenges due to obfuscated code and adversarial perturbations. Behavioral data collected during execution is more difficult to obfuscate but recent research has shown successful attacks against API call based malware classifiers. We investigate control flow based characterization of a program execution to build robust deep learning malware classifiers. HeNet consists of a low-level behavior model and a top-level ensemble model. The low-level model is a per-application behavior model, trained via transfer learning on a time-series of images generated from control flow trace of an execution. We use Intel$^\circledR$ Processor Trace enabled processor for low overhead execution tracing and design a lightweight image conversion and segmentation of the control flow trace. The top-level ensemble model aggregates the behavior classification of all the trace segments and detects an attack. The use of hardware trace adds portability to our system and the use of deep learning eliminates the manual effort of feature engineering. We evaluate HeNet against real-world exploitations of PDF readers. HeNet achieves 100\% accuracy and 0\% false positive on test set, and higher classification accuracy compared to classical machine learning algorithms.
△ Less
Submitted 8 January, 2018;
originally announced January 2018.
-
Bar 1-Visibility Drawings of 1-Planar Graphs
Authors:
Shaheena Sultana,
Md. Saidur Rahman,
Arpita Roy,
Suraiya Tairin
Abstract:
A bar 1-visibility drawing of a graph $G$ is a drawing of $G$ where each vertex is drawn as a horizontal line segment called a bar, each edge is drawn as a vertical line segment where the vertical line segment representing an edge must connect the horizontal line segments representing the end vertices and a vertical line segment corresponding to an edge intersects at most one bar which is not an e…
▽ More
A bar 1-visibility drawing of a graph $G$ is a drawing of $G$ where each vertex is drawn as a horizontal line segment called a bar, each edge is drawn as a vertical line segment where the vertical line segment representing an edge must connect the horizontal line segments representing the end vertices and a vertical line segment corresponding to an edge intersects at most one bar which is not an end point of the edge. A graph $G$ is bar 1-visible if $G$ has a bar 1-visibility drawing. A graph $G$ is 1-planar if $G$ has a drawing in a 2-dimensional plane such that an edge crosses at most one other edge. In this paper we give linear-time algorithms to find bar 1-visibility drawings of diagonal grid graphs and maximal outer 1-planar graphs. We also show that recursive quadrangle 1-planar graphs and pseudo double wheel 1-planar graphs are bar 1-visible graphs.
△ Less
Submitted 20 February, 2013;
originally announced February 2013.
-
Oblique propagation of arbitrary amplitude electron acoustic solitary waves in magnetized kappa-distributed plasmas
Authors:
S. Sultana,
I. Kourakis,
M. A. Hellberg
Abstract:
The linear and nonlinear properties of large amplitude electron-acoustic waves are investigated in a magnetized plasma comprising two distinct electron populations (hot and cold) and immobile ions. The hot electrons are assumed to be in a non-Maxwellian state, characterized by an excess of superthermal particles, here modelled by a kappa-type long-tailed distribution function. Waves are assumed to…
▽ More
The linear and nonlinear properties of large amplitude electron-acoustic waves are investigated in a magnetized plasma comprising two distinct electron populations (hot and cold) and immobile ions. The hot electrons are assumed to be in a non-Maxwellian state, characterized by an excess of superthermal particles, here modelled by a kappa-type long-tailed distribution function. Waves are assumed to propagate obliquely to the ambient magnetic field. Two types of electrostatic modes are shown to exist in the linear regime, and their properties are briefly analyzed. A nonlinear pseudopotential type analysis reveals the existence of large amplitude electrostatic solitary waves and allows for an investigation of their propagation characteristics and existence domain, in terms of the soliton speed (Mach number). The effects of the key plasma configuration parameters, namely, the superthermality index and the cold electron density, on the soliton characteristics and existence domain, are studied. The role of obliqueness and magnetic field are discussed.
△ Less
Submitted 29 June, 2012;
originally announced July 2012.
-
Electrostatic shock dynamics in superthermal plasmas
Authors:
S. Sultana,
G. Sarri,
I. Kourakis
Abstract:
The propagation of ion acoustic shocks in nonthermal plasmas is investigated, both analytically and numerically. An unmagnetized collisionless electron-ion plasma is considered, featuring a superthermal (non-Maxwellian) electron distribution, which is modeled by a $κ$- (kappa) distribution function. Adopting a multiscale approach, it is shown that the dynamics of low-amplitude shocks is modeled by…
▽ More
The propagation of ion acoustic shocks in nonthermal plasmas is investigated, both analytically and numerically. An unmagnetized collisionless electron-ion plasma is considered, featuring a superthermal (non-Maxwellian) electron distribution, which is modeled by a $κ$- (kappa) distribution function. Adopting a multiscale approach, it is shown that the dynamics of low-amplitude shocks is modeled by a hybrid Korteweg-de Vries -- Burgers (KdVB) equation, in which the nonlinear and dispersion coefficients are functions of the $κ$ parameter, while the dissipative coefficient is a linear function of the ion viscosity. All relevant shock parameters are shown to depend on $κ$: higher deviations from a pure Maxwellian behavior induce shocks which are narrower, faster and of larger amplitude. The stability profile of the kink-shaped solutions of the KdVB equation against external perturbations is investigated and the spatial profile of the shocks is found to depend upon and the role of the interplay between dispersion and dissipation is elucidated.
△ Less
Submitted 29 December, 2011;
originally announced December 2011.
-
Note on the single-shock solutions of the Korteweg-de Vries-Burgers equation
Authors:
Ioannis Kourakis,
Sharmin Sultana,
Frank Verheest
Abstract:
The well-known shock solutions of the Korteweg-de Vries-Burgers equation are revisited, together with their limitations in the context of plasma (astro)physical applications. Although available in the literature for a long time, it seems to have been forgotten in recent papers that such shocks are monotonic and unique, for a given plasma configuration, and cannot show oscillatory or bell-shaped fe…
▽ More
The well-known shock solutions of the Korteweg-de Vries-Burgers equation are revisited, together with their limitations in the context of plasma (astro)physical applications. Although available in the literature for a long time, it seems to have been forgotten in recent papers that such shocks are monotonic and unique, for a given plasma configuration, and cannot show oscillatory or bell-shaped features. This uniqueness is contrasted to solitary wave solutions of the two parent equations (Korteweg-de Vries and Burgers), which form a family of curves parameterized by the excess velocity over the linear phase speed.
△ Less
Submitted 6 December, 2011;
originally announced December 2011.
-
Effect of superthermality on nonlinear electrostatic modes in plasmas
Authors:
S. Sultana,
A. Danehkar,
N. S. Saini,
M. A. Hellberg,
I. Kourakis
Abstract:
The nonlinear propagation of electron-acoustic solitary structures is investigated in a plasma containing kappa-distributed (superthermal) electrons. Different types of localized structures are shown to exist. The occurrence of modulational instability is investigated.
The nonlinear propagation of electron-acoustic solitary structures is investigated in a plasma containing kappa-distributed (superthermal) electrons. Different types of localized structures are shown to exist. The occurrence of modulational instability is investigated.
△ Less
Submitted 14 August, 2011;
originally announced August 2011.