-
xNose: A Test Smell Detector for C#
Authors:
Partha P. Paul,
Md Tonoy Akanda,
M. Raihan Ullah,
Dipto Mondal,
Nazia S. Chowdhury,
Fazle M. Tawsif
Abstract:
Test smells, similar to code smells, can negatively impact both the test code and the production code being tested. Despite extensive research on test smells in languages like Java, Scala, and Python, automated tools for detecting test smells in C# are lacking. This paper aims to bridge this gap by extending the study of test smells to C#, and develo** a tool (xNose) to identify test smells in t…
▽ More
Test smells, similar to code smells, can negatively impact both the test code and the production code being tested. Despite extensive research on test smells in languages like Java, Scala, and Python, automated tools for detecting test smells in C# are lacking. This paper aims to bridge this gap by extending the study of test smells to C#, and develo** a tool (xNose) to identify test smells in this language and analyze their distribution across projects. We identified 16 test smells from prior studies that were language-independent and had equivalent features in C# and evaluated xNose, achieving a precision score of 96.97% and a recall score of 96.03%. In addition, we conducted an empirical study to determine the prevalence of test smells in xUnit-based C# projects. This analysis sheds light on the frequency and distribution of test smells, deepening our understanding of their impact on C# projects and test suites. The development of xNose and our analysis of test smells in C# code aim to assist developers in maintaining code quality by addressing potential issues early in the development process.
△ Less
Submitted 7 May, 2024;
originally announced May 2024.
-
Exploring Bi-Manual Teleportation in Virtual Reality
Authors:
Siddhanth Raja Sindhupathiraja,
A K M Amanat Ullah,
William Delamare,
Khalad Hasan
Abstract:
Teleportation, a widely-used locomotion technique in Virtual Reality (VR), allows instantaneous movement within VR environments. Enhanced hand tracking in modern VR headsets has popularized hands-only teleportation methods, which eliminate the need for physical controllers. However, these techniques have not fully explored the potential of bi-manual input, where each hand plays a distinct role in…
▽ More
Teleportation, a widely-used locomotion technique in Virtual Reality (VR), allows instantaneous movement within VR environments. Enhanced hand tracking in modern VR headsets has popularized hands-only teleportation methods, which eliminate the need for physical controllers. However, these techniques have not fully explored the potential of bi-manual input, where each hand plays a distinct role in teleportation: one controls the teleportation point and the other confirms selections. Additionally, the influence of users' posture, whether sitting or standing, on these techniques remains unexplored. Furthermore, previous teleportation evaluations lacked assessments based on established human motor models such as Fitts' Law. To address these gaps, we conducted a user study (N=20) to evaluate bi-manual pointing performance in VR teleportation tasks, considering both sitting and standing postures. We proposed a variation of the Fitts' Law model to accurately assess users' teleportation performance. We designed and evaluated various bi-manual teleportation techniques, comparing them to uni-manual and dwell-based techniques. Results showed that bi-manual techniques, particularly when the dominant hand is used for pointing and the non-dominant hand for selection, enable faster teleportation compared to other methods. Furthermore, bi-manual and dwell techniques proved significantly more accurate than uni-manual teleportation. Moreover, our proposed Fitts' Law variation more accurately predicted users' teleportation performance compared to existing models. Finally, we developed a set of guidelines for designers to enhance VR teleportation experiences and optimize user interactions.
△ Less
Submitted 20 April, 2024;
originally announced April 2024.
-
Can we predict QPP? An approach based on multivariate outliers
Authors:
Adrian-Gabriel Chifu,
Sébastien Déjean,
Moncef Garouani,
Josiane Mothe,
Diégo Ortiz,
Md Zia Ullah
Abstract:
Query performance prediction (QPP) aims to forecast the effectiveness of a search engine across a range of queries and documents. While state-of-the-art predictors offer a certain level of precision, their accuracy is not flawless. Prior research has recognized the challenges inherent in QPP but often lacks a thorough qualitative analysis. In this paper, we delve into QPP by examining the factors…
▽ More
Query performance prediction (QPP) aims to forecast the effectiveness of a search engine across a range of queries and documents. While state-of-the-art predictors offer a certain level of precision, their accuracy is not flawless. Prior research has recognized the challenges inherent in QPP but often lacks a thorough qualitative analysis. In this paper, we delve into QPP by examining the factors that influence the predictability of query performance accuracy. We propose the working hypothesis that while some queries are readily predictable, others present significant challenges. By focusing on outliers, we aim to identify the queries that are particularly challenging to predict. To this end, we employ multivariate outlier detection method. Our results demonstrate the effectiveness of this approach in identifying queries on which QPP do not perform well, yielding less reliable predictions. Moreover, we provide evidence that excluding these hard-to-predict queries from the analysis significantly enhances the overall accuracy of QPP.
△ Less
Submitted 7 February, 2024;
originally announced February 2024.
-
Deep Learning for Multi-Label Learning: A Comprehensive Survey
Authors:
Adane Nega Tarekegn,
Mohib Ullah,
Faouzi Alaya Cheikh
Abstract:
Multi-label learning is a rapidly growing research area that aims to predict multiple labels from a single input data point. In the era of big data, tasks involving multi-label classification (MLC) or ranking present significant and intricate challenges, capturing considerable attention in diverse domains. Inherent difficulties in MLC include dealing with high-dimensional data, addressing label co…
▽ More
Multi-label learning is a rapidly growing research area that aims to predict multiple labels from a single input data point. In the era of big data, tasks involving multi-label classification (MLC) or ranking present significant and intricate challenges, capturing considerable attention in diverse domains. Inherent difficulties in MLC include dealing with high-dimensional data, addressing label correlations, and handling partial labels, for which conventional methods prove ineffective. Recent years have witnessed a notable increase in adopting deep learning (DL) techniques to address these challenges more effectively in MLC. Notably, there is a burgeoning effort to harness the robust learning capabilities of DL for improved modelling of label dependencies and other challenges in MLC. However, it is noteworthy that comprehensive studies specifically dedicated to DL for multi-label learning are limited. Thus, this survey aims to thoroughly review recent progress in DL for multi-label learning, along with a summary of open research problems in MLC. The review consolidates existing research efforts in DL for MLC,including deep neural networks, transformers, autoencoders, and convolutional and recurrent architectures. Finally, the study presents a comparative analysis of the existing methods to provide insightful observations and stimulate future research directions in this domain.
△ Less
Submitted 25 June, 2024; v1 submitted 29 January, 2024;
originally announced January 2024.
-
Design & Implementation of Automatic Machine Condition Monitoring and Maintenance System in Limited Resource Situations
Authors:
Abu Hanif Md. Ripon,
Muhammad Ahsan Ullah,
Arindam Kumar Paul,
Md. Mortaza Morshed
Abstract:
In the era of the fourth industrial revolution, it is essential to automate fault detection and diagnosis of machineries so that a warning system can be developed that will help to take an appropriate action before any catastrophic damage. Some machines health monitoring systems are used globally but they are expensive and need trained personnel to operate and analyse. Predictive maintenance and o…
▽ More
In the era of the fourth industrial revolution, it is essential to automate fault detection and diagnosis of machineries so that a warning system can be developed that will help to take an appropriate action before any catastrophic damage. Some machines health monitoring systems are used globally but they are expensive and need trained personnel to operate and analyse. Predictive maintenance and occupational health and safety culture are not available due to inadequate infrastructure, lack of skilled manpower, financial crisis, and others in develo** countries. Starting from develo** a cost-effective DAS for collecting fault data in this study, the effect of limited data and resources has been investigated while automating the process. To solve this problem, A feature engineering and data reduction method has been developed combining the concepts from wavelets, differential calculus, and signal processing. Finally, for automating the whole process, all the necessary theoretical and practical considerations to develop a predictive model have been proposed. The DAS successfully collected the required data from the machine that is 89% accurate compared to the professional manual monitoring system. SVM and NN were proposed for the prediction purpose because of their high predicting accuracy greater than 95% during training and 100% during testing the new samples. In this study, the combination of the simple algorithm with a rule-based system instead of a data-intensive system turned out to be hybridization by validating with collected data. The outcome of this research can be instantly applied to small and medium-sized industries for finding other issues and develo** accordingly. As one of the foundational studies in automatic FDD, the findings and procedure of this study can lead others to extend, generalize, or add other dimensions to FDD automation.
△ Less
Submitted 22 January, 2024;
originally announced January 2024.
-
Performance Analysis of 6G Multiuser Massive MIMO-OFDM THz Wireless Systems with Hybrid Beamforming under Intercarrier Interference
Authors:
Md Saheed Ullah,
Zulqarnain Bin Ashraf,
Sudipta Chandra Sarker
Abstract:
6G networks are expected to provide more diverse capabilities than their predecessors and are likely to support applications beyond current mobile applications, such as virtual and augmented reality (VR/AR), AI, and the Internet of Things (IoT). In contrast to typical multiple-input multiple-output (MIMO) systems, THz MIMO precoding cannot be conducted totally at baseband using digital precoders d…
▽ More
6G networks are expected to provide more diverse capabilities than their predecessors and are likely to support applications beyond current mobile applications, such as virtual and augmented reality (VR/AR), AI, and the Internet of Things (IoT). In contrast to typical multiple-input multiple-output (MIMO) systems, THz MIMO precoding cannot be conducted totally at baseband using digital precoders due to the restricted number of signal mixers and analog-to-digital converters that can be supported due to their cost and power consumption. In this thesis, we analyzed the performance of multiuser massive MIMO-OFDM THz wireless systems with hybrid beamforming. Carrier frequency offset (CFO) is one of the most well-known disturbances for OFDM. For practicality, we accounted for CFO, which results in Intercarrier Interference. Incorporating the combined impact of molecular absorption, high sparsity, and multi-path fading, we analyzed a three-dimensional wideband THz channel and the carrier frequency offset in multi-carrier systems. With this model, we first presented a two-stage wideband hybrid beamforming technique comprising Riemannian manifolds optimization for analog beamforming and then a zero-forcing (ZF) approach for digital beamforming. We adjusted the objective function to reduce complexity, and instead of maximizing the bit rate, we determined parameters by minimizing interference. Numerical results demonstrate the significance of considering ICI for practical implementation for the THz system. We demonstrated how our change in problem formulation minimizes latency without compromising results. We also evaluated spectral efficiency by varying the number of RF chains and antennas. The spectral efficiency grows as the number of RF chains and antennas increases, but the spectral efficiency of antennas declines when the number of users increases.
△ Less
Submitted 22 January, 2024;
originally announced January 2024.
-
Self-supervised Contrastive Learning for 6G UM-MIMO THz Communications: Improving Robustness Under Imperfect CSI
Authors:
Rafid Umayer Murshed,
Md Saheed Ullah,
Mohammad Saquib,
Moe Z. Win
Abstract:
This paper investigates the potential of contrastive learning in 6G ultra-massive multiple-input multiple-output (UM-MIMO) communication systems, specifically focusing on hybrid beamforming under imperfect channel state information (CSI) conditions at THz. UM-MIMO systems are promising for future 6G wireless communication networks due to their high spectral efficiency and capacity. The accuracy of…
▽ More
This paper investigates the potential of contrastive learning in 6G ultra-massive multiple-input multiple-output (UM-MIMO) communication systems, specifically focusing on hybrid beamforming under imperfect channel state information (CSI) conditions at THz. UM-MIMO systems are promising for future 6G wireless communication networks due to their high spectral efficiency and capacity. The accuracy of CSI significantly influences the performance of UM-MIMO systems. However, acquiring perfect CSI is challenging due to various practical constraints such as channel estimation errors, feedback delays, and hardware imperfections. To address this issue, we propose a novel self-supervised contrastive learning-based approach for hybrid beamforming, which is robust against imperfect CSI. We demonstrate the power of contrastive learning to tackle the challenges posed by imperfect CSI and show that our proposed method results in improved system performance in terms of achievable rate compared to traditional methods.
△ Less
Submitted 20 January, 2024;
originally announced January 2024.
-
A Fast Effective Greedy Approach for MU-MIMO Beam Selection in mm-Wave and THz Communications
Authors:
Rafid Umayer Murshed,
Md Saheed Ullah,
Mohammad Saquib
Abstract:
This paper addresses the beam-selection challenges in Multi-User Multiple Input Multiple Output (MU-MIMO) beamforming for mm-wave and THz channels, focusing on the pivotal aspect of spectral efficiency (SE) and computational efficiency. We introduce a novel approach, the Greedy Interference-Optimized Singular Vector Beam-selection (G-IOSVB) algorithm, which offers a strategic balance between high…
▽ More
This paper addresses the beam-selection challenges in Multi-User Multiple Input Multiple Output (MU-MIMO) beamforming for mm-wave and THz channels, focusing on the pivotal aspect of spectral efficiency (SE) and computational efficiency. We introduce a novel approach, the Greedy Interference-Optimized Singular Vector Beam-selection (G-IOSVB) algorithm, which offers a strategic balance between high SE and low computational complexity. Our study embarks on a comparative analysis of G-IOSVB against the traditional IOSVB and the exhaustive Singular-Vector Beamspace Search (SVBS) algorithms. The findings reveal that while SVBS achieves the highest SE, it incurs significant computational costs, approximately 162 seconds per channel realization. In contrast, G-IOSVB aligns closely with IOSVB in SE performance yet is markedly more computationally efficient. Heatmaps vividly demonstrate this efficiency, highlighting G-IOSVB's reduced computation time without sacrificing SE. We also delve into the mathematical intricacies of G-IOSVB, demonstrating its theoretical and practical superiority through rigorous expressions and detailed algorithmic analysis. The numerical results illustrate that G-IOSVB stands out as an efficient, practical solution for MU-MIMO systems, making it a promising candidate for high-speed, high-efficiency wireless communication networks.
△ Less
Submitted 25 January, 2024; v1 submitted 20 January, 2024;
originally announced January 2024.
-
Beyond Traditional Beamforming: Singular Vector Projection Techniques for MU-MIMO Interference Management
Authors:
Md Saheed Ullah,
Rafid Umayer Murshed,
Md. Forkan Uddin
Abstract:
This paper introduces low-complexity beamforming algorithms for multi-user multiple-input multiple-output (MU-MIMO) systems to minimize inter-user interference and enhance spectral efficiency (SE). A Singular-Vector Beamspace Search (SVBS) algorithm is initially presented, wherein all the singular vectors are assessed to determine the most effective beamforming scheme. We then establish a mathemat…
▽ More
This paper introduces low-complexity beamforming algorithms for multi-user multiple-input multiple-output (MU-MIMO) systems to minimize inter-user interference and enhance spectral efficiency (SE). A Singular-Vector Beamspace Search (SVBS) algorithm is initially presented, wherein all the singular vectors are assessed to determine the most effective beamforming scheme. We then establish a mathematical proof demonstrating that the total inter-user interference of a MU-MIMO beamforming system can be efficiently calculated from the mutual projections of orthonormal singular vectors. Capitalizing on this, we present an Interference-optimized Singular Vector Beamforming (IOSVB) algorithm for optimal singular vector selection. For further reducing the computational burden, we propose a Dimensionality-reduced IOSVB (DR-IOSVB) algorithm by integrating the principal component analysis (PCA). The numerical results demonstrate the superiority of the SVBS algorithm over the existing algorithms, with the IOSVB offering near-identical SE and the DR-IOSVB balancing the performance and computational efficiency. This work establishes a new benchmark for high-performance and low-complexity beamforming in MU-MIMO wireless communication systems.
△ Less
Submitted 7 November, 2023;
originally announced November 2023.
-
Energy Efficiency Optimization for Subterranean LoRaWAN Using A Reinforcement Learning Approach: A Direct-to-Satellite Scenario
Authors:
Kaiqiang Lin,
Muhammad Asad Ullah,
Hirley Alves,
Konstantin Mikhaylov,
Tong Hao
Abstract:
The integration of subterranean LoRaWAN and non-terrestrial networks (NTN) delivers substantial economic and societal benefits in remote agriculture and disaster rescue operations. The LoRa modulation leverages quasi-orthogonal spreading factors (SFs) to optimize data rates, airtime, coverage and energy consumption. However, it is still challenging to effectively assign SFs to end devices for mini…
▽ More
The integration of subterranean LoRaWAN and non-terrestrial networks (NTN) delivers substantial economic and societal benefits in remote agriculture and disaster rescue operations. The LoRa modulation leverages quasi-orthogonal spreading factors (SFs) to optimize data rates, airtime, coverage and energy consumption. However, it is still challenging to effectively assign SFs to end devices for minimizing co-SF interference in massive subterranean LoRaWAN NTN. To address this, we investigate a reinforcement learning (RL)-based SFs allocation scheme to optimize the system's energy efficiency (EE). To efficiently capture the device-to-environment interactions in dense networks, we proposed an SFs allocation technique using the multi-agent dueling double deep Q-network (MAD3QN) and the multi-agent advantage actor-critic (MAA2C) algorithms based on an analytical reward mechanism. Our proposed RL-based SFs allocation approach evinces better performance compared to four benchmarks in the extreme underground direct-to-satellite scenario. Remarkably, MAD3QN shows promising potentials in surpassing MAA2C in terms of convergence rate and EE.
△ Less
Submitted 3 November, 2023;
originally announced November 2023.
-
A Call to Arms: AI Should be Critical for Social Media Analysis of Conflict Zones
Authors:
Afia Abedin,
Abdul Bais,
Cody Buntain,
Laura Courchesne,
Brian McQuinn,
Matthew E. Taylor,
Muhib Ullah
Abstract:
The massive proliferation of social media data represents a transformative moment in conflict studies. This data can provide unique insights into the spread and use of weaponry, but the scale and types of data are problematic for traditional open-source intelligence. This paper presents preliminary, transdisciplinary work using computer vision to identify specific weapon systems and the insignias…
▽ More
The massive proliferation of social media data represents a transformative moment in conflict studies. This data can provide unique insights into the spread and use of weaponry, but the scale and types of data are problematic for traditional open-source intelligence. This paper presents preliminary, transdisciplinary work using computer vision to identify specific weapon systems and the insignias of the armed groups using them. There is potential to not only track how weapons are distributed through networks of armed units but also to track which types of weapons are being used by the different types of state and non-state military actors in Ukraine. Such a system could ultimately be used to understand conflicts in real-time, including where humanitarian and medical aid is most needed. We believe that using AI to help automate such processes should be a high-priority goal for our community, with near-term real-world payoffs.
△ Less
Submitted 1 November, 2023;
originally announced November 2023.
-
Exploring Users' Pointing Performance on Virtual and Physical Large Curved Displays
Authors:
A K M Amanat Ullah,
William Delamare,
Khalad Hasan
Abstract:
Large curved displays have emerged as a powerful platform for collaboration, data visualization, and entertainment. These displays provide highly immersive experiences, a wider field of view, and higher satisfaction levels. Yet, large curved displays are not commonly available due to their high costs. With the recent advancement of Head Mounted Displays (HMDs), large curved displays can be simulat…
▽ More
Large curved displays have emerged as a powerful platform for collaboration, data visualization, and entertainment. These displays provide highly immersive experiences, a wider field of view, and higher satisfaction levels. Yet, large curved displays are not commonly available due to their high costs. With the recent advancement of Head Mounted Displays (HMDs), large curved displays can be simulated in Virtual Reality (VR) with minimal cost and space requirements. However, to consider the virtual display as an alternative to the physical display, it is necessary to uncover user performance differences (e.g., pointing speed and accuracy) between these two platforms. In this paper, we explored users' pointing performance on both physical and virtual large curved displays. Specifically, with two studies, we investigate users' performance between the two platforms for standard pointing factors such as target width, target amplitude as well as users' position relative to the screen. Results from user studies reveal no significant difference in pointing performance between the two platforms when users are located at the same position relative to the screen. In addition, we observe users' pointing performance improves when they are located at the center of a semi-circular display compared to off-centered positions. We conclude by outlining design implications for pointing on large curved virtual displays. These findings show that large curved virtual displays are a viable alternative to physical displays for pointing tasks.
△ Less
Submitted 10 October, 2023;
originally announced October 2023.
-
Exploring Users Pointing Performance on Large Displays with Different Curvatures in Virtual Reality
Authors:
A K M Amanat Ullah,
William Delamare,
Khalad Hasan
Abstract:
Large curved displays inside Virtual Reality environments are becoming popular for visualizing high-resolution content during analytical tasks, gaming or entertainment. Prior research showed that such displays provide a wide field of view and offer users a high level of immersion. However, little is known about users' performance (e.g., pointing speed and accuracy) on them. We explore users' point…
▽ More
Large curved displays inside Virtual Reality environments are becoming popular for visualizing high-resolution content during analytical tasks, gaming or entertainment. Prior research showed that such displays provide a wide field of view and offer users a high level of immersion. However, little is known about users' performance (e.g., pointing speed and accuracy) on them. We explore users' pointing performance on large virtual curved displays. We investigate standard pointing factors (e.g., target width and amplitude) in combination with relevant curve-related factors, namely display curvature and both linear and angular measures. Our results show that the less curved the display, the higher the performance, i.e., faster movement time. This result holds for pointing tasks controlled via their visual properties (linear widths and amplitudes) or their motor properties (angular widths and amplitudes). Additionally, display curvatures significantly affect the error rate for both linear and angular conditions. Furthermore, we observe that curved displays perform better or similar to flat displays based on throughput analysis. Finally, we discuss our results and provide suggestions regarding pointing tasks on large curved displays in VR.
△ Less
Submitted 10 October, 2023;
originally announced October 2023.
-
AutoML Systems For Medical Imaging
Authors:
Tasmia Tahmida Jidney,
Angona Biswas,
MD Abdullah Al Nasim,
Ismail Hossain,
Md Jahangir Alam,
Sajedul Talukder,
Mofazzal Hossain,
Dr. Md Azim Ullah
Abstract:
The integration of machine learning in medical image analysis can greatly enhance the quality of healthcare provided by physicians. The combination of human expertise and computerized systems can result in improved diagnostic accuracy. An automated machine learning approach simplifies the creation of custom image recognition models by utilizing neural architecture search and transfer learning tech…
▽ More
The integration of machine learning in medical image analysis can greatly enhance the quality of healthcare provided by physicians. The combination of human expertise and computerized systems can result in improved diagnostic accuracy. An automated machine learning approach simplifies the creation of custom image recognition models by utilizing neural architecture search and transfer learning techniques. Medical imaging techniques are used to non-invasively create images of internal organs and body parts for diagnostic and procedural purposes. This article aims to highlight the potential applications, strategies, and techniques of AutoML in medical imaging through theoretical and empirical evidence.
△ Less
Submitted 17 June, 2023; v1 submitted 7 June, 2023;
originally announced June 2023.
-
Active Learning on Medical Image
Authors:
Angona Biswas,
MD Abdullah Al Nasim,
Md Shahin Ali,
Ismail Hossain,
Dr. Md Azim Ullah,
Sajedul Talukder
Abstract:
The development of medical science greatly depends on the increased utilization of machine learning algorithms. By incorporating machine learning, the medical imaging field can significantly improve in terms of the speed and accuracy of the diagnostic process. Computed tomography (CT), magnetic resonance imaging (MRI), X-ray imaging, ultrasound imaging, and positron emission tomography (PET) are t…
▽ More
The development of medical science greatly depends on the increased utilization of machine learning algorithms. By incorporating machine learning, the medical imaging field can significantly improve in terms of the speed and accuracy of the diagnostic process. Computed tomography (CT), magnetic resonance imaging (MRI), X-ray imaging, ultrasound imaging, and positron emission tomography (PET) are the most commonly used types of imaging data in the diagnosis process, and machine learning can aid in detecting diseases at an early stage. However, training machine learning models with limited annotated medical image data poses a challenge. The majority of medical image datasets have limited data, which can impede the pattern-learning process of machine-learning algorithms. Additionally, the lack of labeled data is another critical issue for machine learning. In this context, active learning techniques can be employed to address the challenge of limited annotated medical image data. Active learning involves iteratively selecting the most informative samples from a large pool of unlabeled data for annotation by experts. By actively selecting the most relevant and informative samples, active learning reduces the reliance on large amounts of labeled data and maximizes the model's learning capacity with minimal human labeling effort. By incorporating active learning into the training process, medical imaging machine learning models can make more efficient use of the available labeled data, improving their accuracy and performance. This approach allows medical professionals to focus their efforts on annotating the most critical cases, while the machine learning model actively learns from these annotated samples to improve its diagnostic capabilities.
△ Less
Submitted 7 June, 2023; v1 submitted 2 June, 2023;
originally announced June 2023.
-
Introduction of Medical Imaging Modalities
Authors:
S. K. M Shadekul Islam,
MD Abdullah Al Nasim,
Ismail Hossain,
Dr. Md Azim Ullah,
Dr. Kishor Datta Gupta,
Md Monjur Hossain Bhuiyan
Abstract:
The diagnosis and treatment of various diseases had been expedited with the help of medical imaging. Different medical imaging modalities, including X-ray, Computed Tomography (CT), Magnetic Resonance Imaging (MRI), Nuclear Imaging, Ultrasound, Electrical Impedance Tomography (EIT), and Emerging Technologies for in vivo imaging modalities is presented in this chapter, in addition to these modaliti…
▽ More
The diagnosis and treatment of various diseases had been expedited with the help of medical imaging. Different medical imaging modalities, including X-ray, Computed Tomography (CT), Magnetic Resonance Imaging (MRI), Nuclear Imaging, Ultrasound, Electrical Impedance Tomography (EIT), and Emerging Technologies for in vivo imaging modalities is presented in this chapter, in addition to these modalities, some advanced techniques such as contrast-enhanced MRI, MR approaches for osteoarthritis, Cardiovascular Imaging, and Medical Imaging data mining and search. Despite its important role and potential effectiveness as a diagnostic tool, reading and interpreting medical images by radiologists is often tedious and difficult due to the large heterogeneity of diseases and the limitation of image quality or resolution. Besides the introduction and discussion of the basic principles, typical clinical applications, advantages, and limitations of each modality used in current clinical practice, this chapter also highlights the importance of emerging technologies in medical imaging and the role of data mining and search aiming to support translational clinical research, improve patient care, and increase the efficiency of the healthcare system.
△ Less
Submitted 7 June, 2023; v1 submitted 1 June, 2023;
originally announced June 2023.
-
Selective Query Processing: a Risk-Sensitive Selection of System Configurations
Authors:
Josiane Mothe,
Md Zia Ullah
Abstract:
In information retrieval systems, search parameters are optimized to ensure high effectiveness based on a set of past searches and these optimized parameters are then used as the system configuration for all subsequent queries. A better approach, however, would be to adapt the parameters to fit the query at hand. Selective query expansion is one such an approach, in which the system decides automa…
▽ More
In information retrieval systems, search parameters are optimized to ensure high effectiveness based on a set of past searches and these optimized parameters are then used as the system configuration for all subsequent queries. A better approach, however, would be to adapt the parameters to fit the query at hand. Selective query expansion is one such an approach, in which the system decides automatically whether or not to expand the query, resulting in two possible system configurations. This approach was extended recently to include many other parameters, leading to many possible system configurations where the system automatically selects the best configuration on a per-query basis. To determine the ideal configurations to use on a per-query basis in real-world systems we developed a method in which a restricted number of possible configurations is pre-selected and then used in a meta-search engine that decides the best search configuration on a per query basis. We define a risk-sensitive approach for configuration pre-selection that considers the risk-reward trade-off between the number of configurations kept, and system effectiveness. For final configuration selection, the decision is based on query feature similarities. We find that a relatively small number of configurations (20) selected by our risk-sensitive model is sufficient to increase effectiveness by about 15% according(P@10, nDCG@10) when compared to traditional grid search using a single configuration and by about 20% when compared to learning to rank documents. Our risk-sensitive approach works for both diversity- and ad hoc-oriented searches. Moreover, the similarity-based selection method outperforms the more sophisticated approaches. Thus, we demonstrate the feasibility of develo** per-query information retrieval systems, which will guide future research in this direction.
△ Less
Submitted 17 May, 2023;
originally announced May 2023.
-
Scalable Algorithmic Infrastructure for Computation of Social Crowding and Viral Disease Encounters -- mContain Case Study
Authors:
Md Azim Ullah
Abstract:
mContain was developed (and sparsely deployed) by MD2K center at University of Memphis in the early stages of COVID-19 pandemic to help reduce community transmission in Shelby County and Memphis metropolitan area. The application counts and displays the number of daily proximity encounters with other app users. To reduce the chances of entering crowded places, users can see the level of crowding a…
▽ More
mContain was developed (and sparsely deployed) by MD2K center at University of Memphis in the early stages of COVID-19 pandemic to help reduce community transmission in Shelby County and Memphis metropolitan area. The application counts and displays the number of daily proximity encounters with other app users. To reduce the chances of entering crowded places, users can see the level of crowding at busy places on a map. If a user and their COVID-19 test provider both agree to share the results of their test, the app can notify other users about possible exposures to COVID-19. The smartphone application collects location and Bluetooth data and sends it to cloud for near real time processing and decisions to be sent back for visualization and interface with the user. The backend algorithmic infrastructure responsible for real time crowd estimation and contact tracing from streaming batch data use open-source cloud analytics platform Cerebral-Cortex. This project concerns about presenting the authors contributions in the algorithmic development, design and implementation of mContain application as part of the entire collaborative project. We describe the mcontain algorithmic infrastructure and major computational challenges encountered when develo** and deploying this application for real-life usage. Details of the app can be found in https://mcontain.md2k.org/
△ Less
Submitted 17 May, 2023;
originally announced May 2023.
-
Effectiveness and Efficiency Trade-off in Selective Query Processing
Authors:
Josiane Mothe,
Md Zia Ullah
Abstract:
Query processing in search engines can be optimized for use for all queries. For this, system component parameters such as the weighting function or the automatic query expansion model can be optimized or learned from past queries. However, it may be more interesting to optimize the processing thread on a query-by-query basis by adjusting the component parameters; this is what selective query proc…
▽ More
Query processing in search engines can be optimized for use for all queries. For this, system component parameters such as the weighting function or the automatic query expansion model can be optimized or learned from past queries. However, it may be more interesting to optimize the processing thread on a query-by-query basis by adjusting the component parameters; this is what selective query processing does. Selective query processing uses one of the candidate processing threads chosen at query time. The choice is based on query features. In this paper, we examine selective query processing in different settings, both in terms of effectiveness and efficiency; this includes selective query expansion and other forms of selective query processing (e.g., when the term weighting function varies or when the expansion model varies). We found that the best trade-off between effectiveness and efficiency is obtained when using the best trained processing thread and its query expansion counter part. This seems to be also the most natural for a real-word engine since the two threads use the same core engine (e.g., same term weighting function).
△ Less
Submitted 22 February, 2023;
originally announced February 2023.
-
Impact of Combining Syntactic and Semantic Similarities on Patch Prioritization while using the Insertion Mutation Operators
Authors:
Mohammed Raihan Ullah,
Nazia Sultana Chowdhury,
Fazle Mohammed Tawsif
Abstract:
Patch prioritization ranks candidate patches based on their likelihood of being correct. The fixing ingredients that are more likely to be the fix for a bug, share a high contextual similarity. A recent study shows that combining both syntactic and semantic similarity for capturing the contextual similarity, can do better in prioritizing patches. In this study, we evaluate the impact of combining…
▽ More
Patch prioritization ranks candidate patches based on their likelihood of being correct. The fixing ingredients that are more likely to be the fix for a bug, share a high contextual similarity. A recent study shows that combining both syntactic and semantic similarity for capturing the contextual similarity, can do better in prioritizing patches. In this study, we evaluate the impact of combining the syntactic and semantic features on patch prioritization using the Insertion mutation operators. This study inspects the result of different combinations of syntactic and semantic features on patch prioritization. As a pilot study, the approach uses genealogical similarity to measure the semantic similarity and normalized longest common subsequence, normalized edit distance, cosine similarity, and Jaccard similarity index to capture the syntactic similarity. It also considers Anti-Pattern to filter out the incorrect plausible patches. The combination of both syntactic and semantic similarity can reduce the search space to a great extent. Also, the approach generates fixes for the bugs before the incorrect plausible one. We evaluate the techniques on the IntroClassJava benchmark using Insertion mutation operators and successfully generate fixes for 6 bugs before the incorrect plausible one. So, considering the previous study, the approach of combining syntactic and semantic similarity can able to solve a total number of 25 bugs from the benchmark, and to the best of our knowledge, it is the highest number of bugs solved than any other approach. The correctness of the generated fixes are further checked using the publicly available results of CapGen and thus for the generated fixes, the approach achieves a precision of 100%
△ Less
Submitted 7 February, 2023;
originally announced February 2023.
-
A CNN based Multifaceted Signal Processing Framework for Heart Rate Proctoring Using Millimeter Wave Radar Ballistocardiography
Authors:
Rafid Umayer Murshed,
Md. Abrar Istiak,
Md. Toufiqur Rahman,
Zulqarnain B Ashraf,
Md Saheed Ullah,
Mohammad Saquib
Abstract:
The recent pandemic has refocused the medical world's attention on the diagnostic techniques associated with cardiovascular disease. Heart rate provides a real-time snapshot of cardiovascular health. A more precise heart rate reading provides a better understanding of cardiac muscle activity. Although many existing diagnostic techniques are approaching the limits of perfection, there remains poten…
▽ More
The recent pandemic has refocused the medical world's attention on the diagnostic techniques associated with cardiovascular disease. Heart rate provides a real-time snapshot of cardiovascular health. A more precise heart rate reading provides a better understanding of cardiac muscle activity. Although many existing diagnostic techniques are approaching the limits of perfection, there remains potential for further development. In this paper, we propose MIBINET, a convolutional neural network for real-time proctoring of heart rate via inter-beat-interval (IBI) from millimeter wave (mm-wave) radar ballistocardiography signals. This network can be used in hospitals, homes, and passenger vehicles due to its lightweight and contactless properties. It employs classical signal processing prior to fitting the data into the network. Although MIBINET is primarily designed to work on mm-wave signals, it is found equally effective on signals of various modalities such as PCG, ECG, and PPG. Extensive experimental results and a thorough comparison with the current state-of-the-art on mm-wave signals demonstrate the viability and versatility of the proposed methodology.
Keywords: Cardiovascular disease, contactless measurement, heart rate, IBI, mm-wave radar, neural network
△ Less
Submitted 22 June, 2023; v1 submitted 14 November, 2022;
originally announced November 2022.
-
A Real-Time Wrong-Way Vehicle Detection Based on YOLO and Centroid Tracking
Authors:
Zillur Rahman,
Amit Mazumder Ami,
Muhammad Ahsan Ullah
Abstract:
Wrong-way driving is one of the main causes of road accidents and traffic jam all over the world. By detecting wrong-way vehicles, the number of accidents can be minimized and traffic jam can be reduced. With the increasing popularity of real-time traffic management systems and due to the availability of cheaper cameras, the surveillance video has become a big source of data. In this paper, we pro…
▽ More
Wrong-way driving is one of the main causes of road accidents and traffic jam all over the world. By detecting wrong-way vehicles, the number of accidents can be minimized and traffic jam can be reduced. With the increasing popularity of real-time traffic management systems and due to the availability of cheaper cameras, the surveillance video has become a big source of data. In this paper, we propose an automatic wrong-way vehicle detection system from on-road surveillance camera footage. Our system works in three stages: the detection of vehicles from the video frame by using the You Only Look Once (YOLO) algorithm, track each vehicle in a specified region of interest using centroid tracking algorithm and detect the wrong-way driving vehicles. YOLO is very accurate in object detection and the centroid tracking algorithm can track any moving object efficiently. Experiment with some traffic videos shows that our proposed system can detect and identify any wrong-way vehicle in different light and weather conditions. The system is very simple and easy to implement.
△ Less
Submitted 18 October, 2022;
originally announced October 2022.
-
Visible light backscattering with applications to the Internet of Things: State-of-the-art, challenges, and opportunities
Authors:
Muhammad Habib Ullah,
Giacinto Gelli,
Francesco Verde
Abstract:
Visible light backscatter (VLB) is an innovative optical transmission paradigm to enable ultra low-power passive communication and localization for the Internet of Things (IoT), by overcoming some of the limitations of conventional (i.e., active) visible light communication (VLC) as well as active/passive radio-frequency (RF) technologies. In this paper, we provide a comprehensive survey of recent…
▽ More
Visible light backscatter (VLB) is an innovative optical transmission paradigm to enable ultra low-power passive communication and localization for the Internet of Things (IoT), by overcoming some of the limitations of conventional (i.e., active) visible light communication (VLC) as well as active/passive radio-frequency (RF) technologies. In this paper, we provide a comprehensive survey of recent research activities in the VLB field. After describing the principles of operation and the main enabling technologies, we classify the existing VLB techniques according to several features, discussing their merits and limitations. Moreover, we introduce the potential applications of VLB techniques in several IoT domains. Finally, we present the main open challenges in this area and delineate a number of future research directions
△ Less
Submitted 17 October, 2022; v1 submitted 15 August, 2022;
originally announced August 2022.
-
Bidirectional optical non-reciprocity in a multi-mode cavity optomechanical system
Authors:
Muhib Ullah,
Xihua Yang,
Li-Gang Wang
Abstract:
Optical non-reciprocity, a phenomenon that allows unidirectional flow of optical field is pivoted on the time reversal symmetry breaking. The symmetry breaking happens in the cavity optomechanical system (COS) due to non uniform radiation pressure as a result of light-matter interaction, and is crucial in building non-reciprocal optical devices. In our proposed COS, we study the non-reciprocal tra…
▽ More
Optical non-reciprocity, a phenomenon that allows unidirectional flow of optical field is pivoted on the time reversal symmetry breaking. The symmetry breaking happens in the cavity optomechanical system (COS) due to non uniform radiation pressure as a result of light-matter interaction, and is crucial in building non-reciprocal optical devices. In our proposed COS, we study the non-reciprocal transport of optical signals across two ports via three optical modes optomechanically coupled to the mechanical excitations of two nano-mechanical resonators (NMRs) under the influence of strong classical drive fields and weak probe fields. By tuning different system parameters, we discover the conversion of reciprocal to non-reciprocal signal transmission. We reveal perfect nonreciprocal transmission of output fields when the effective cavity detuning parameters are near resonant to the NMRs' frequencies. The unidirectional non-reciprocal signal transport is robust to the optomechanical coupling parameters at resonance conditions. Moreover, the cavities' photon loss rates play an inevitable role in the unidirectional flow of signal across the two ports. Bidirectional transmission can be fully controlled by the phase changes associated with the incoming probe and drive fields via two ports. Our scheme may provide a foundation for the compact non-reciprocal communication and quantum information processing, thus enabling new devices that route photons in unconventional ways such as all-optical diodes, optical transistors and optical switches.
△ Less
Submitted 12 April, 2023; v1 submitted 3 September, 2021;
originally announced September 2021.
-
Combining Machine Learning Classifiers for Stock Trading with Effective Feature Extraction
Authors:
A. K. M. Amanat Ullah,
Fahim Imtiaz,
Miftah Uddin Md Ihsan,
Md. Golam Rabiul Alam,
Mahbub Majumdar
Abstract:
The unpredictability and volatility of the stock market render it challenging to make a substantial profit using any generalised scheme. Many previous studies tried different techniques to build a machine learning model, which can make a significant profit in the US stock market by performing live trading. However, very few studies have focused on the importance of finding the best features for a…
▽ More
The unpredictability and volatility of the stock market render it challenging to make a substantial profit using any generalised scheme. Many previous studies tried different techniques to build a machine learning model, which can make a significant profit in the US stock market by performing live trading. However, very few studies have focused on the importance of finding the best features for a particular trading period. Our top approach used the performance to narrow down the features from a total of 148 to about 30. Furthermore, the top 25 features were dynamically selected before each time training our machine learning model. It uses ensemble learning with four classifiers: Gaussian Naive Bayes, Decision Tree, Logistic Regression with L1 regularization, and Stochastic Gradient Descent, to decide whether to go long or short on a particular stock. Our best model performed daily trade between July 2011 and January 2019, generating 54.35% profit. Finally, our work showcased that mixtures of weighted classifiers perform better than any individual predictor of making trading decisions in the stock market.
△ Less
Submitted 11 August, 2023; v1 submitted 27 July, 2021;
originally announced July 2021.
-
Self-Guided Quantum State Learning for Mixed States
Authors:
Ahmad Farooq,
Muhammad Asad Ullah,
Syahri Ramadhani,
Junaid ur Rehman,
Hyundong Shin
Abstract:
We provide an adaptive learning algorithm for tomography of general quantum states. Our proposal is based on the simultaneous perturbation stochastic approximation algorithm and is applicable on mixed qudit states. The salient features of our algorithm are efficient ($O \left( d^3 \right)$) post-processing in the dimension $d$ of the state, robustness against measurement and channel noise, and imp…
▽ More
We provide an adaptive learning algorithm for tomography of general quantum states. Our proposal is based on the simultaneous perturbation stochastic approximation algorithm and is applicable on mixed qudit states. The salient features of our algorithm are efficient ($O \left( d^3 \right)$) post-processing in the dimension $d$ of the state, robustness against measurement and channel noise, and improved infidelity performance as compared to the contemporary adaptive state learning algorithms. A higher resilience against measurement noise makes our algorithm suitable for noisy intermediate-scale quantum applications.
△ Less
Submitted 11 June, 2021;
originally announced June 2021.
-
Distributed Dynamic Pricing in Peer-to-Peer Transactive Energy Systems in Smart Grid
Authors:
Md Habib Ullah,
Anas Alseyat,
Jae-Do Park
Abstract:
The rapid growth of proactive consumers with distributed power generation and storage capacity, empowered by Internet of Things (IoT) devices, is transforming modern power markets into an independent, flexible, and distributed structure. In particular, the recent trend is peer-to-peer (P2P) transactive energy systems, wherein the traditional consumers became prosumers (producer+consumer) and can m…
▽ More
The rapid growth of proactive consumers with distributed power generation and storage capacity, empowered by Internet of Things (IoT) devices, is transforming modern power markets into an independent, flexible, and distributed structure. In particular, the recent trend is peer-to-peer (P2P) transactive energy systems, wherein the traditional consumers became prosumers (producer+consumer) and can maximize their energy utilization by sharing with neighbors without any conventional intermediary intervention in the transactions. However, the competitive dynamic energy pricing scheme is inevitable in such systems to make the optimal decision. It is very challenging when the prosumers have limited access to the fellow prosumer's system information (i.e., load profile, generation, and so on). This paper presents a privacy-preserving distributed dynamic pricing strategy for P2P transactive energy systems in the smart grid using Fast Alternating Direction Method of Multipliers (F-ADMM) algorithm. The result shows that the algorithm converges very fast and facilitates easy implementation. Moreover, a closed-form solution for a P2P transactive energy system was presented, which accelerate the overall computation time.
△ Less
Submitted 9 December, 2020;
originally announced December 2020.
-
Containing Future Epidemics with Trustworthy Federated Systems for Ubiquitous Warning and Response
Authors:
Dick Carrillo,
Lam Duc Nguyen,
Pedro H. J. Nardelli,
Evangelos Pournaras,
Plinio Morita,
Demóstenes Z. Rodríguez,
Merim Dzaferagic,
Harun Siljak,
Alexander Jung,
Laurent Hébert-Dufresne,
Irene Macaluso,
Mehar Ullah,
Gustavo Fraidenraich,
Petar Popovski
Abstract:
In this paper, we propose a global digital platform to avoid and combat epidemics by providing relevant real-time information to support selective lockdowns. It leverages the pervasiveness of wireless connectivity while being trustworthy and secure. The proposed system is conceptualized to be decentralized yet federated, based on ubiquitous public systems and active citizen participation. Its foun…
▽ More
In this paper, we propose a global digital platform to avoid and combat epidemics by providing relevant real-time information to support selective lockdowns. It leverages the pervasiveness of wireless connectivity while being trustworthy and secure. The proposed system is conceptualized to be decentralized yet federated, based on ubiquitous public systems and active citizen participation. Its foundations lie on the principle of informational self-determination. We argue that only in this way it can become a trustworthy and legitimate public good infrastructure for citizens by balancing the asymmetry of the different hierarchical levels within the federated organization while providing highly effective detection and guiding mitigation measures towards graceful lockdown of the society. To exemplify the proposed system, we choose the remote patient monitoring as use case. In which, the integration of distributed ledger technologies with narrowband IoT technology is evaluated considering different number of endorsed peers. An experimental proof of concept setup is used to evaluate the performance of this integration, in which the end-to-end latency is slightly increased when a new endorsed element is added. However, the system reliability, privacy, and interoperability are guaranteed. In this sense, we expect active participation of empowered citizens to supplement the more usual top-down management of epidemics.
△ Less
Submitted 25 March, 2021; v1 submitted 26 October, 2020;
originally announced October 2020.
-
Impact of higher-order effects on dissipative soliton in metamaterials
Authors:
A. K. Shafeeque Ali,
Malik Zaka Ullah,
M. Lakshmanan
Abstract:
We study the influence of higher-order effects such as third order dispersion (TOD), fourth order dispersion (FOD), quintic nonlinearity (QN), self steepening (SS) and second order nonlinear dispersion (SOND) on the dynamics of dissipative soliton (DS) in metamaterials. Considering each higher-order effect as a perturbation to the system and following Lagrangian variational method, we demonstrate…
▽ More
We study the influence of higher-order effects such as third order dispersion (TOD), fourth order dispersion (FOD), quintic nonlinearity (QN), self steepening (SS) and second order nonlinear dispersion (SOND) on the dynamics of dissipative soliton (DS) in metamaterials. Considering each higher-order effect as a perturbation to the system and following Lagrangian variational method, we demonstrate stable dynamics of DS as a result of the interplay between different higher-order effects. We also perform numerical analysis to confirm the analytical results.
△ Less
Submitted 17 July, 2020;
originally announced July 2020.
-
Kalman Filter Based Multiple Person Head Tracking
Authors:
Mohib Ullah,
Maqsood Mahmud,
Habib Ullah,
Kashif Ahmad,
Ali Shariq Imran,
Faouzi Alaya Cheikh
Abstract:
For multi-target tracking, target representation plays a crucial rule in performance. State-of-the-art approaches rely on the deep learning-based visual representation that gives an optimal performance at the cost of high computational complexity. In this paper, we come up with a simple yet effective target representation for human tracking. Our inspiration comes from the fact that the human body…
▽ More
For multi-target tracking, target representation plays a crucial rule in performance. State-of-the-art approaches rely on the deep learning-based visual representation that gives an optimal performance at the cost of high computational complexity. In this paper, we come up with a simple yet effective target representation for human tracking. Our inspiration comes from the fact that the human body goes through severe deformation and inter/intra occlusion over the passage of time. So, instead of tracking the whole body part, a relative rigid organ tracking is selected for tracking the human over an extended period of time. Hence, we followed the tracking-by-detection paradigm and generated the target hypothesis of only the spatial locations of heads in every frame. After the localization of head location, a Kalman filter with a constant velocity motion model is instantiated for each target that follows the temporal evolution of the targets in the scene. For associating the targets in the consecutive frames, combinatorial optimization is used that associates the corresponding targets in a greedy fashion. Qualitative results are evaluated on four challenging video surveillance dataset and promising results has been achieved.
△ Less
Submitted 10 June, 2020;
originally announced June 2020.
-
Unpredictable basin boundaries in restricted six-body problem with square configuration
Authors:
Vinay Kumar,
M. Javed Idrisi,
M. Shahbaz Ullah
Abstract:
The present work deals with the recently introduced restricted six body-problem with square configuration. It is determined that the total number of libration points are twelve and twenty for the mass parameter $0< μ< 0.25$. The multivariate form of Newton-Raphson scheme is used to discuss the basin of attraction. Different aspects of the basin of attraction are investigated and explained in detai…
▽ More
The present work deals with the recently introduced restricted six body-problem with square configuration. It is determined that the total number of libration points are twelve and twenty for the mass parameter $0< μ< 0.25$. The multivariate form of Newton-Raphson scheme is used to discuss the basin of attraction. Different aspects of the basin of attraction are investigated and explained in detail. The complex combination of the different basins is found along the boundaries. The concept of basin entropy is used to unveil the nature of the boundaries. For $μ= 0.22$ and $0.23$, the basin of attraction is unpredictable throughout. It is observed that for all values of the mass parameter $μ$, the basin boundaries are highly unpredictable. Further, We have investigated the presence of Wada basin boundary in the basin of attraction.
△ Less
Submitted 11 May, 2020;
originally announced May 2020.
-
Three-layer Approach to Detect Anomalies in Industrial Environments based on Machine Learning
Authors:
Daniel Gutierrez-Rojas,
Mehar Ullah,
Ioannis T. Christou,
Gustavo Almeida,
Pedro H. J. Nardelli,
Dick Carrillo,
Jean M. Sant'Ana,
Hirley Alves,
Merim Dzaferagic,
Alessandro Chiumento,
Charalampos Kalalas
Abstract:
This paper introduces a general approach to design a tailored solution to detect rare events in different industrial applications based on Internet of Things (IoT) networks and machine learning algorithms. We propose a general framework based on three layers (physical, data and decision) that defines the possible designing options so that the rare events/anomalies can be detected ultra-reliably. T…
▽ More
This paper introduces a general approach to design a tailored solution to detect rare events in different industrial applications based on Internet of Things (IoT) networks and machine learning algorithms. We propose a general framework based on three layers (physical, data and decision) that defines the possible designing options so that the rare events/anomalies can be detected ultra-reliably. This general framework is then applied in a well-known benchmark scenario, namely Tennessee Eastman Process. We then analyze this benchmark under three threads related to data processes: acquisition, fusion and analytics. Our numerical results indicate that: (i) event-driven data acquisition can significantly decrease the number of samples while filtering measurement noise, (ii) mutual information data fusion method can significantly decrease the variable spaces and (iii) quantitative association rule mining method for data analytics is effective for the rare event detection, identification and diagnosis. These results indicates the benefits of an integrated solution that jointly considers the different levels of data processing following the proposed general three layer framework, including details of the communication network and computing platform to be employed.
△ Less
Submitted 20 April, 2020;
originally announced April 2020.
-
Twenty-one key factors to choose an IoT platform: Theoretical framework and its applications
Authors:
Mehar Ullah,
Pedro H. J. Nardelli,
Annika Wolff,
Kari Smolander
Abstract:
Internet of Things (IoT) refers to the interconnection of physical objects via the Internet. It utilises complex back-end systems which need different capabilities depending on the requirements of the system. IoT has already been used in various applications, such as agriculture, smart home, health, automobiles, and smart grids. There are many IoT platforms, each of them capable of providing speci…
▽ More
Internet of Things (IoT) refers to the interconnection of physical objects via the Internet. It utilises complex back-end systems which need different capabilities depending on the requirements of the system. IoT has already been used in various applications, such as agriculture, smart home, health, automobiles, and smart grids. There are many IoT platforms, each of them capable of providing specific services for such applications. Finding the best match between application and platform is, however, a hard task as it can difficult to understand the implications of small differences between platforms. This paper builds on previous work that has identified twenty-one important factors of an IoT platform, which were verified by Delphi method. We demonstrate here how these factors can be used to discriminate between five well known IoT platforms, which are arbitrarily chosen based on their market share. These results illustrate how the proposed approach provides an objective methodology that can be used to select the most suitable IoT platform for different business applications based on their particular requirements.
△ Less
Submitted 10 April, 2020;
originally announced April 2020.
-
Text-to-Image Generation with Attention Based Recurrent Neural Networks
Authors:
Tehseen Zia,
Shahan Arif,
Shakeeb Murtaza,
Mirza Ahsan Ullah
Abstract:
Conditional image modeling based on textual descriptions is a relatively new domain in unsupervised learning. Previous approaches use a latent variable model and generative adversarial networks. While the formers are approximated by using variational auto-encoders and rely on the intractable inference that can hamper their performance, the latter is unstable to train due to Nash equilibrium based…
▽ More
Conditional image modeling based on textual descriptions is a relatively new domain in unsupervised learning. Previous approaches use a latent variable model and generative adversarial networks. While the formers are approximated by using variational auto-encoders and rely on the intractable inference that can hamper their performance, the latter is unstable to train due to Nash equilibrium based objective function. We develop a tractable and stable caption-based image generation model. The model uses an attention-based encoder to learn word-to-pixel dependencies. A conditional autoregressive based decoder is used for learning pixel-to-pixel dependencies and generating images. Experimentations are performed on Microsoft COCO, and MNIST-with-captions datasets and performance is evaluated by using the Structural Similarity Index. Results show that the proposed model performs better than contemporary approaches and generate better quality images. Keywords: Generative image modeling, autoregressive image modeling, caption-based image generation, neural attention, recurrent neural networks.
△ Less
Submitted 18 January, 2020;
originally announced January 2020.
-
Forward and Backward Feature Selection for Query Performance Prediction
Authors:
Sébastien Déjean,
Radu Tudor Ionescu,
Josiane Mothe,
Md Zia Ullah
Abstract:
The goal of query performance prediction (QPP) is to automatically estimate the effectiveness of a search result for any given query, without relevance judgements. Post-retrieval features have been shown to be more effective for this task while being more expensive to compute than pre-retrieval features. Combining multiple post-retrieval features is even more effective, but state-of-the-art QPP me…
▽ More
The goal of query performance prediction (QPP) is to automatically estimate the effectiveness of a search result for any given query, without relevance judgements. Post-retrieval features have been shown to be more effective for this task while being more expensive to compute than pre-retrieval features. Combining multiple post-retrieval features is even more effective, but state-of-the-art QPP methods are impossible to interpret because of the black-box nature of the employed machine learning models. However, interpretation is useful for understanding the predictive model and providing more answers about its behavior. Moreover, combining many post-retrieval features is not applicable to real-world cases, since the query running time is of utter importance. In this paper, we investigate a new framework for feature selection in which the trained model explains well the prediction. We introduce a step-wise (forward and backward) model selection approach where different subsets of query features are used to fit different models from which the system selects the best one. We evaluate our approach on four TREC collections using standard QPP features. We also develop two QPP features to address the issue of query-drift in the query feedback setting. We found that: (1) our model based on a limited number of selected features is as good as more complex models for QPP and better than non-selective models; (2) our model is more efficient than complex models during inference time since it requires fewer features; (3) the predictive model is readable and understandable; and (4) one of our new QPP features is consistently selected across different collections, proving its usefulness.
△ Less
Submitted 4 December, 2019;
originally announced December 2019.
-
Multi-Modal Machine Learning for Flood Detection in News, Social Media and Satellite Sequences
Authors:
Kashif Ahmad,
Konstantin Pogorelov,
Mohib Ullah,
Michael Riegler,
Nicola Conci,
Johannes Langguth,
Ala Al-Fuqaha
Abstract:
In this paper we present our methods for the MediaEval 2019 Mul-timedia Satellite Task, which is aiming to extract complementaryinformation associated with adverse events from Social Media andsatellites. For the first challenge, we propose a framework jointly uti-lizing colour, object and scene-level information to predict whetherthe topic of an article containing an image is a flood event or not.…
▽ More
In this paper we present our methods for the MediaEval 2019 Mul-timedia Satellite Task, which is aiming to extract complementaryinformation associated with adverse events from Social Media andsatellites. For the first challenge, we propose a framework jointly uti-lizing colour, object and scene-level information to predict whetherthe topic of an article containing an image is a flood event or not.Visual features are combined using early and late fusion techniquesachieving an average F1-score of82.63,82.40,81.40and76.77. Forthe multi-modal flood level estimation, we rely on both visualand textual information achieving an average F1-score of58.48and46.03, respectively. Finally, for the flooding detection in time-based satellite image sequences we used a combination of classicalcomputer-vision and machine learning approaches achieving anaverage F1-score of58.82%
△ Less
Submitted 7 October, 2019;
originally announced October 2019.
-
A deep learning approach for analyzing the composition of chemometric data
Authors:
Muhammad Bilal,
Mohib Ullah
Abstract:
We propose novel deep learning based chemometric data analysis technique. We trained L2 regularized sparse autoencoder end-to-end for reducing the size of the feature vector to handle the classic problem of the curse of dimensionality in chemometric data analysis. We introduce a novel technique of automatic selection of nodes inside the hidden layer of an autoencoder through Pareto optimization. M…
▽ More
We propose novel deep learning based chemometric data analysis technique. We trained L2 regularized sparse autoencoder end-to-end for reducing the size of the feature vector to handle the classic problem of the curse of dimensionality in chemometric data analysis. We introduce a novel technique of automatic selection of nodes inside the hidden layer of an autoencoder through Pareto optimization. Moreover, Gaussian process regressor is applied on the reduced size feature vector for the regression. We evaluated our technique on orange juice and wine dataset and results are compared against 3 state-of-the-art methods. Quantitative results are shown on Normalized Mean Square Error (NMSE) and the results show considerable improvement in the state-of-the-art.
△ Less
Submitted 7 May, 2019;
originally announced May 2019.
-
Resilient Supplier Selection in Logistics 4.0 with Heterogeneous Information
Authors:
Md Mahmudul Hassan,
Dizuo Jiang,
A. M. M. Sharif Ullah,
Md. Noor-E-Alam
Abstract:
Supplier selection problem has gained extensive attention in the prior studies. However, research based on Fuzzy Multi-Attribute Decision Making (F-MADM) approach in ranking resilient suppliers in logistic 4 is still in its infancy. Traditional MADM approach fails to address the resilient supplier selection problem in logistic 4 primarily because of the large amount of data concerning some attribu…
▽ More
Supplier selection problem has gained extensive attention in the prior studies. However, research based on Fuzzy Multi-Attribute Decision Making (F-MADM) approach in ranking resilient suppliers in logistic 4 is still in its infancy. Traditional MADM approach fails to address the resilient supplier selection problem in logistic 4 primarily because of the large amount of data concerning some attributes that are quantitative, yet difficult to process while making decisions. Besides, some qualitative attributes prevalent in logistic 4 entail imprecise perceptual or judgmental decision relevant information, and are substantially different than those considered in traditional suppler selection problems. This study develops a Decision Support System (DSS) that will help the decision maker to incorporate and process such imprecise heterogeneous data in a unified framework to rank a set of resilient suppliers in the logistic 4 environment. The proposed framework induces a triangular fuzzy number from large-scale temporal data using probability-possibility consistency principle. Large number of non-temporal data presented graphically are computed by extracting granular information that are imprecise in nature. Fuzzy linguistic variables are used to map the qualitative attributes. Finally, fuzzy based TOPSIS method is adopted to generate the ranking score of alternative suppliers. These ranking scores are used as input in a Multi-Choice Goal Programming (MCGP) model to determine optimal order allocation for respective suppliers. Finally, a sensitivity analysis assesses how the Suppliers Cost versus Resilience Index (SCRI) changes when differential priorities are set for respective cost and resilience attributes.
△ Less
Submitted 13 July, 2019; v1 submitted 9 April, 2019;
originally announced April 2019.
-
A new approach for electronic heat conduction in molecular dynamics simulations
Authors:
Mohammad W. Ullah,
Mauricio Ponga
Abstract:
We present a new approach for the two-temperature molecular dynamics (MD) model for coupled simulations of electronic and phonon heat conduction in nanoscale systems. The proposed method uses a master equation to perform heat conduction of the electronic temperature eschewing the need to use a basis set to evaluate operators. This characteristic allows us to seamlessly couple the electronic heat c…
▽ More
We present a new approach for the two-temperature molecular dynamics (MD) model for coupled simulations of electronic and phonon heat conduction in nanoscale systems. The proposed method uses a master equation to perform heat conduction of the electronic temperature eschewing the need to use a basis set to evaluate operators. This characteristic allows us to seamlessly couple the electronic heat conduction model with molecular dynamics codes without the need to introduce an auxiliary mesh. We implemented the methodology in the Large-scale Atomic/Molecular Massively Parallel Simulator (LAMMPS) code and through multiple examples, we validated the methodology. We then study the effect of electron-phonon interaction in high energy irradiation simulations and the effect of laser pulse on metallic materials. We show that the model provides an atomic level description in complex geometries of energy transfer between phonons and electrons. Thus, the proposed approach provides an alternative way to the two-temperature molecular dynamics models. The parallel performance and some aspects of the implementation are presented.
△ Less
Submitted 7 April, 2019; v1 submitted 29 October, 2018;
originally announced October 2018.
-
Gender Differences in Undergraduate Physics Courses: A Comparative Study of Persistence
Authors:
Ashiqul Islam Dip,
Mohammad Tomal Hossain,
Md Forman Ullah,
Md Salah Uddin
Abstract:
We have investigated the difference in persistence between male and female students while taking undergraduatephysics courses. To quantify the persistence of a certain group of students, we have defined 'persistence index' as the inverseof the decrease rate of the number of that group of students while taking a specific course. We have collected the data fromthree consecutive workshops on various…
▽ More
We have investigated the difference in persistence between male and female students while taking undergraduatephysics courses. To quantify the persistence of a certain group of students, we have defined 'persistence index' as the inverseof the decrease rate of the number of that group of students while taking a specific course. We have collected the data fromthree consecutive workshops on various topics of physics. After plotting the number of participations against the number ofdays attended, we have calculated the decrease rates and persistence indices for both male and female student groups on eachworkshop and compared the persistence indices on a bar diagram. The comparative statistics show that the persistence indicesof female student groups are significantly higher than that of male student groups. This leads us to the conclusion that thefemale students are more persistent than male students while taking an undergraduate physics course.
△ Less
Submitted 20 January, 2017; v1 submitted 7 November, 2016;
originally announced November 2016.
-
Accounting for Randomness in Measurement and Sampling in Study of Cancer Cell Population Dynamics
Authors:
Siavash Ghavami,
Olaf Wolkenhauer,
Farshad Lahouti,
Mukhtar Ullah,
Michael Linnebacher
Abstract:
Studying the development of malignant tumours, it is important to know and predict the proportions of different cell types in tissue samples. Knowing the expected temporal evolution of the proportion of normal tissue cells, compared to stem-like and non-stem like cancer cells, gives an indication about the progression of the disease and indicates the expected response to interventions with drugs.…
▽ More
Studying the development of malignant tumours, it is important to know and predict the proportions of different cell types in tissue samples. Knowing the expected temporal evolution of the proportion of normal tissue cells, compared to stem-like and non-stem like cancer cells, gives an indication about the progression of the disease and indicates the expected response to interventions with drugs. Such processes have been modeled using Markov processes. An essential step for the simulation of such models is then the determination of state transition probabilities. We here consider the experimentally more realistic scenario in which the measurement of cell population sizes is noisy, leading to a particular hidden Markov model. In this context, randomness in measurement is related to noisy measurements, which are used for the estimation of the transition probability matrix. Randomness in sampling, on the other hand, is here related to the error in estimating the state probability from small cell populations. Using aggregated data of fluorescence-activated cell sorting (FACS) measurement, we develop a minimum mean square error estimator (MMSE) and maximum likelihood (ML) estimator and formulate two problems to find the minimum number of required samples and measurements to guarantee the accuracy of predicted population sizes using a transition probability matrix estimated from noisy data. We analyze the properties of two estimators for different noise distributions and prove an optimal solution for Gaussian distributions with the MMSE. Our numerical results show, that for noisy measurements the convergence mechanism of transition probabilities and steady states differ widely from the real values if one uses the standard deterministic approach in which measurements are assumed to be noise free.
△ Less
Submitted 9 January, 2014; v1 submitted 8 October, 2013;
originally announced October 2013.
-
A Survey of Home Energy Management Systems in Future Smart Grid Communications
Authors:
I. Khan,
N. Javaid,
M. N. Ullah,
A. Mahmood,
M. U. Farooq
Abstract:
In this paper we present a systematic review of various home energy management (HEM) schemes. Employment of home energy management programs will make the electricity consumption smarter and more efficient. Advantages of HEM include, increased savings for consumers as well as utilities, reduced peak to average ratio (PAR) and peak demand. Where there are numerous applications of smart grid technolo…
▽ More
In this paper we present a systematic review of various home energy management (HEM) schemes. Employment of home energy management programs will make the electricity consumption smarter and more efficient. Advantages of HEM include, increased savings for consumers as well as utilities, reduced peak to average ratio (PAR) and peak demand. Where there are numerous applications of smart grid technologies, home energy management is probably the most important one to be addressed. Utilities across the globe have taken various steps for efficient consumption of electricity. New pricing schemes like, Real Time Pricing (RTP), Time of Use (ToU), Inclining Block Rates (IBR), Critical Peak Pricing (CPP) etc, have been proposed for smart grid. Distributed Energy Resources (DER) (local generation) and/or home appliances coordination along with different tariff schemes lead towards efficient consumption of electricity. This work also discusses a HEM systems general architecture and various challenges in implementation of this architecture in smart grid.
△ Less
Submitted 26 July, 2013;
originally announced July 2013.
-
A Survey of Different Residential Energy Consumption Controlling Techniques for Autonomous DSM in Future Smart Grid Communications
Authors:
M. N. Ullah,
A. Mahmood,
S. Razzaq,
M. Ilahi,
R. D. Khan,
N. Javaid
Abstract:
In this work, we present a survey of residential load controlling techniques to implement demand side management in future smart grid. Power generation sector facing important challenges both in quality and quantity to meet the increasing requirements of consumers. Energy efficiency, reliability, economics and integration of new energy resources are important issues to enhance the stability of pow…
▽ More
In this work, we present a survey of residential load controlling techniques to implement demand side management in future smart grid. Power generation sector facing important challenges both in quality and quantity to meet the increasing requirements of consumers. Energy efficiency, reliability, economics and integration of new energy resources are important issues to enhance the stability of power system infrastructure. Optimal energy consumption scheduling minimizes the energy consumption cost and reduce the peak-to-average ratio (PAR) as well as peak load demand in peak hours. In this work, we discuss different energy consumption scheduling schemes that schedule the household appliances in real-time to achieve minimum energy consumption cost and reduce peak load curve in peak hours to shape the peak load demand.
△ Less
Submitted 5 June, 2013;
originally announced June 2013.
-
A correction note on "New iterative schemes for nonlinear equations"
Authors:
Laila M Assas,
Fayyaz Ahmad,
Malik Zaka Ullah
Abstract:
In Noor (2007)[Muhammad Aslam Noor, New iterative schemes for nonlinear equations, Appl. Math. Comput. 187 (2007) 937-943], proposed an algorithm namely \textbf{Algorithm 2.4} and established a proof to show cubic convergence. The presented proof is wrong. In this article, we show that \textbf{Algorithm 2.4} is not cubically convergent.
In Noor (2007)[Muhammad Aslam Noor, New iterative schemes for nonlinear equations, Appl. Math. Comput. 187 (2007) 937-943], proposed an algorithm namely \textbf{Algorithm 2.4} and established a proof to show cubic convergence. The presented proof is wrong. In this article, we show that \textbf{Algorithm 2.4} is not cubically convergent.
△ Less
Submitted 9 April, 2013; v1 submitted 7 March, 2013;
originally announced March 2013.
-
A correction note on "Three-step iterative methods for nonlinear equations" and generalization of method
Authors:
Laila M Assas,
Fayyaz Ahmad,
Malik Zaka Ullah
Abstract:
In the paper [Muhammad Aslam Noor, Khalida Inayat Noor, Three-step iterative methods for nonlinear equations, Applied Mathematics and Computation, 183 (2006), pp. 322-327 ], Authors presented an algorithm (\textbf{Algorithm 2.3}) and stated a theorem (\textbf{Theorem 2.3}) to prove the cubic order of convergence but the given proof does not show cubic order of convergence. Actually, the mathemat…
▽ More
In the paper [Muhammad Aslam Noor, Khalida Inayat Noor, Three-step iterative methods for nonlinear equations, Applied Mathematics and Computation, 183 (2006), pp. 322-327 ], Authors presented an algorithm (\textbf{Algorithm 2.3}) and stated a theorem (\textbf{Theorem 2.3}) to prove the cubic order of convergence but the given proof does not show cubic order of convergence. Actually, the mathematical derivation steps to develop the \textbf{Algorithm 2.3} are wrong. In this note, we present the correct mathematical developments and finally provide computational order of convergence in the favor of our claim and provide the generalization of the method.
△ Less
Submitted 9 April, 2013; v1 submitted 2 March, 2013;
originally announced March 2013.
-
Eighth-order Derivative-Free Family of Iterative Methods for Nonlinear Equations
Authors:
Laila M Assas,
Fayyaz Ahmad,
Malik Zaka Ullah
Abstract:
In this note, we present an eighth-order derivative-free family of iterative methods for nonlinear equations. The proposed family shows optimal eight-order of convergence in the sense of the Kung and Traub conjecture \cite{5} and is based on the Steffensen derivative approximation used in the Newton-method. As a final step, having in mind computational purposes, a derivative-free polynomial base…
▽ More
In this note, we present an eighth-order derivative-free family of iterative methods for nonlinear equations. The proposed family shows optimal eight-order of convergence in the sense of the Kung and Traub conjecture \cite{5} and is based on the Steffensen derivative approximation used in the Newton-method. As a final step, having in mind computational purposes, a derivative-free polynomial base interpolation is used in order to get optimal order of convergence with only four functional evaluations. Numerical esperiments and few issues are discussed at the end of this note.
△ Less
Submitted 2 February, 2013;
originally announced February 2013.
-
Controlling and securing a Digital Home using Multiple Sensor Based Perception system Integrated with Mobile and Voice technology
Authors:
Avishek Ahmed,
Tanvir Ahmed,
Md. Samawat Ullah,
Md. Manirul Islam
Abstract:
Fully controlled digital home had always been considered as a luxury of rich people because of excessive cost to install the system. It is now within the reach of mass people with lots of inexpensive cool features. In this paper we have designed and developed a very low cost, efficient and reliable Digital home system. Fully Controlled Digital Home is no more a Luxury. Our proposed system made it…
▽ More
Fully controlled digital home had always been considered as a luxury of rich people because of excessive cost to install the system. It is now within the reach of mass people with lots of inexpensive cool features. In this paper we have designed and developed a very low cost, efficient and reliable Digital home system. Fully Controlled Digital Home is no more a Luxury. Our proposed system made it affordable. We built a low-cost feature-rich Digital Home System (DHS). Digital Home System is combination of automated services i.e. Electronic Device Controller, IR Security System, Web Desktop, Remote Video Surveillance System and Virtual Mobile by which we can control our home by avoiding old manual processes e.g. our physical presence at home is optional. The System provides some of the modern luxury & security features to us. Now we can control Light, fan, AC or any electronic devices by voice command, Blue-tooth, GPRS or Website. To control the system remotely, GPRS connectivity is added. We can also monitor our home from remote area by using Remote Video Surveillance System. This enables live video into mobile device of the digital home. Moreover, we can also access our PC and do the necessary tasks from any internet enabled computer in the world by using Web Desktop which is specially built for this purpose. Furthermore, access of unauthorized person in the home will be notified by SMS & store the image of the person and also generate a voice alarm. So that ensures the security of our valuable things. Also we can identify and monitor the location of our valuable assets e.g. precious metals remotely. Finally, Virtual mobile application is a Universal mobile Driver by which we can exactly perform some same task e.g. Remote call, Phone book access, SMS read-write of our mobile device from our new invented computer's virtual mobile.
△ Less
Submitted 24 September, 2012;
originally announced September 2012.
-
Identifying Design Requirements for Wireless Routing Link Metrics
Authors:
Nadeem Javaid,
Muti Ullah,
Karim Djouani
Abstract:
In this paper, we identify and analyze the requirements to design a new routing link metric for wireless multihop networks. Considering these requirements, when a link metric is proposed, then both the design and implementation of the link metric with a routing protocol become easy. Secondly, the underlying network issues can easily be tackled. Thirdly, an appreciable performance of the network is…
▽ More
In this paper, we identify and analyze the requirements to design a new routing link metric for wireless multihop networks. Considering these requirements, when a link metric is proposed, then both the design and implementation of the link metric with a routing protocol become easy. Secondly, the underlying network issues can easily be tackled. Thirdly, an appreciable performance of the network is guaranteed. Along with the existing implementation of three link metrics Expected Transmission Count (ETX), Minimum Delay (MD), and Minimum Loss (ML), we implement inverse ETX; invETX with Optimized Link State Routing (OLSR) using NS-2.34. The simulation results show that how the computational burden of a metric degrades the performance of the respective protocol and how a metric has to trade-off between different performance parameters.
△ Less
Submitted 18 August, 2011;
originally announced August 2011.
-
FPGA Implementation of LS Code Generator for CDM Based MIMO Channel Sounder
Authors:
M. Habib Ullah,
Md. Niamul Bari,
A. Unggul Priantoro
Abstract:
MIMO (Multi Input Multi Output) wireless communication system is an innovative solution to improve the bandwidth efficiency by exploiting multipath-richness of the propagation environment. The degree of multipath-richness of the channel will determine the capacity gain attainable by MIMO deployment. Therefore, it is very important to have accurate knowledge of the propagation environment/radio c…
▽ More
MIMO (Multi Input Multi Output) wireless communication system is an innovative solution to improve the bandwidth efficiency by exploiting multipath-richness of the propagation environment. The degree of multipath-richness of the channel will determine the capacity gain attainable by MIMO deployment. Therefore, it is very important to have accurate knowledge of the propagation environment/radio channel before MIMO implement. The radio channel behavior can be estimated by channel measurement or channel sounding. CDM (Code Division multiplexing) is one of the channel sounding techniques that allow accurate measurement at the cost of hardware complexity. CDM based channel sounder, requires code with excellent autocorrelation and cross-correlation properties which generally difficult to achieve simultaneously. Theoretical analysis and computer simulation result demonstrated that, having excellent correlation propertied Loosely Synchronous (LS) code sequence perform efficiently. Finally, the an efficient LS code generator as a data source for transmitter implemented in Xilinx FPGA that can be integrated into CDM based 2x2 MIMO complete channel sounder.
△ Less
Submitted 21 February, 2010;
originally announced February 2010.
-
Investigating the two-moment characterisation of subcellular biochemical networks
Authors:
Mukhtar Ullah,
Olaf Wolkenhauer
Abstract:
While ordinary differential equations (ODEs) form the conceptual framework for modelling many cellular processes, specific situations demand stochastic models to capture the influence of noise. The most common formulation of stochastic models for biochemical networks is the chemical master equation (CME). While stochastic simulations are a practical way to realise the CME, analytical approximati…
▽ More
While ordinary differential equations (ODEs) form the conceptual framework for modelling many cellular processes, specific situations demand stochastic models to capture the influence of noise. The most common formulation of stochastic models for biochemical networks is the chemical master equation (CME). While stochastic simulations are a practical way to realise the CME, analytical approximations offer more insight into the influence of noise. Towards that end, the two-moment approximation (2MA) is a promising addition to the established analytical approaches including the chemical Langevin equation (CLE) and the related linear noise approximation (LNA). The 2MA approach directly tracks the mean and (co)variance which are coupled in general. This coupling is not obvious in CME and CLE and ignored by LNA and conventional ODE models. We extend previous derivations of 2MA by allowing a) non-elementary reactions and b) relative concentrations. Often, several elementary reactions are approximated by a single step. Furthermore, practical situations often require the use relative concentrations. We investigate the applicability of the 2MA approach to the well established fission yeast cell cycle model. Our analytical model reproduces the clustering of cycle times observed in experiments. This is explained through multiple resettings of MPF, caused by the coupling between mean and (co)variance, near the G2/M transition.
△ Less
Submitted 2 April, 2009; v1 submitted 4 September, 2008;
originally announced September 2008.