-
Can we predict QPP? An approach based on multivariate outliers
Authors:
Adrian-Gabriel Chifu,
Sébastien Déjean,
Moncef Garouani,
Josiane Mothe,
Diégo Ortiz,
Md Zia Ullah
Abstract:
Query performance prediction (QPP) aims to forecast the effectiveness of a search engine across a range of queries and documents. While state-of-the-art predictors offer a certain level of precision, their accuracy is not flawless. Prior research has recognized the challenges inherent in QPP but often lacks a thorough qualitative analysis. In this paper, we delve into QPP by examining the factors…
▽ More
Query performance prediction (QPP) aims to forecast the effectiveness of a search engine across a range of queries and documents. While state-of-the-art predictors offer a certain level of precision, their accuracy is not flawless. Prior research has recognized the challenges inherent in QPP but often lacks a thorough qualitative analysis. In this paper, we delve into QPP by examining the factors that influence the predictability of query performance accuracy. We propose the working hypothesis that while some queries are readily predictable, others present significant challenges. By focusing on outliers, we aim to identify the queries that are particularly challenging to predict. To this end, we employ multivariate outlier detection method. Our results demonstrate the effectiveness of this approach in identifying queries on which QPP do not perform well, yielding less reliable predictions. Moreover, we provide evidence that excluding these hard-to-predict queries from the analysis significantly enhances the overall accuracy of QPP.
△ Less
Submitted 7 February, 2024;
originally announced February 2024.
-
The Telehealth Chain: a protocol for secure and transparent telemedicine transactions on the blockchain
Authors:
Syed Sarosh Mahdi,
Zaib Ullah,
Gopi Battineni,
Muneer Gohar Babar,
Umer Daood
Abstract:
Blockchain technology provides a secure and decentralized platform for storing and transferring sensitive medical data, which can be utilized to enable remote medical consultations. This paper proposes a theoretical framework for creating a blockchain-based digital entity to facilitate telemedicine services. The proposed framework utilizes blockchain technology to provide a secure and reliable pla…
▽ More
Blockchain technology provides a secure and decentralized platform for storing and transferring sensitive medical data, which can be utilized to enable remote medical consultations. This paper proposes a theoretical framework for creating a blockchain-based digital entity to facilitate telemedicine services. The proposed framework utilizes blockchain technology to provide a secure and reliable platform for medical practitioners to remotely interact with patient transactions. The blockchain will serve as a one-stop digital service to secure patient data, ensure privacy, and facilitate payments. The proposed framework leverages the existing Hyperledger Fabric platform to build a secure blockchain-assisted telemedicine platform.
△ Less
Submitted 28 October, 2023;
originally announced October 2023.
-
Selective Query Processing: a Risk-Sensitive Selection of System Configurations
Authors:
Josiane Mothe,
Md Zia Ullah
Abstract:
In information retrieval systems, search parameters are optimized to ensure high effectiveness based on a set of past searches and these optimized parameters are then used as the system configuration for all subsequent queries. A better approach, however, would be to adapt the parameters to fit the query at hand. Selective query expansion is one such an approach, in which the system decides automa…
▽ More
In information retrieval systems, search parameters are optimized to ensure high effectiveness based on a set of past searches and these optimized parameters are then used as the system configuration for all subsequent queries. A better approach, however, would be to adapt the parameters to fit the query at hand. Selective query expansion is one such an approach, in which the system decides automatically whether or not to expand the query, resulting in two possible system configurations. This approach was extended recently to include many other parameters, leading to many possible system configurations where the system automatically selects the best configuration on a per-query basis. To determine the ideal configurations to use on a per-query basis in real-world systems we developed a method in which a restricted number of possible configurations is pre-selected and then used in a meta-search engine that decides the best search configuration on a per query basis. We define a risk-sensitive approach for configuration pre-selection that considers the risk-reward trade-off between the number of configurations kept, and system effectiveness. For final configuration selection, the decision is based on query feature similarities. We find that a relatively small number of configurations (20) selected by our risk-sensitive model is sufficient to increase effectiveness by about 15% according(P@10, nDCG@10) when compared to traditional grid search using a single configuration and by about 20% when compared to learning to rank documents. Our risk-sensitive approach works for both diversity- and ad hoc-oriented searches. Moreover, the similarity-based selection method outperforms the more sophisticated approaches. Thus, we demonstrate the feasibility of develo** per-query information retrieval systems, which will guide future research in this direction.
△ Less
Submitted 17 May, 2023;
originally announced May 2023.
-
Ensemble CNNs for Breast Tumor Classification
Authors:
Muhammad Umar Farooq,
Zahid Ullah,
Jeonghwan Gwak
Abstract:
To improve the recognition ability of computer-aided breast mass classification among mammographic images, in this work we explore the state-of-the-art classification networks to develop an ensemble mechanism. First, the regions of interest (ROIs) are obtained from the original dataset, and then three models, i.e., XceptionNet, DenseNet, and EfficientNet, are trained individually. After training,…
▽ More
To improve the recognition ability of computer-aided breast mass classification among mammographic images, in this work we explore the state-of-the-art classification networks to develop an ensemble mechanism. First, the regions of interest (ROIs) are obtained from the original dataset, and then three models, i.e., XceptionNet, DenseNet, and EfficientNet, are trained individually. After training, we ensemble the mechanism by summing the probabilities outputted from each network which enhances the performance up to 5%. The scheme has been validated on a public dataset and we achieved accuracy, precision, and recall 88%, 85%, and 76% respectively.
△ Less
Submitted 11 April, 2023;
originally announced April 2023.
-
Effectiveness and Efficiency Trade-off in Selective Query Processing
Authors:
Josiane Mothe,
Md Zia Ullah
Abstract:
Query processing in search engines can be optimized for use for all queries. For this, system component parameters such as the weighting function or the automatic query expansion model can be optimized or learned from past queries. However, it may be more interesting to optimize the processing thread on a query-by-query basis by adjusting the component parameters; this is what selective query proc…
▽ More
Query processing in search engines can be optimized for use for all queries. For this, system component parameters such as the weighting function or the automatic query expansion model can be optimized or learned from past queries. However, it may be more interesting to optimize the processing thread on a query-by-query basis by adjusting the component parameters; this is what selective query processing does. Selective query processing uses one of the candidate processing threads chosen at query time. The choice is based on query features. In this paper, we examine selective query processing in different settings, both in terms of effectiveness and efficiency; this includes selective query expansion and other forms of selective query processing (e.g., when the term weighting function varies or when the expansion model varies). We found that the best trade-off between effectiveness and efficiency is obtained when using the best trained processing thread and its query expansion counter part. This seems to be also the most natural for a real-word engine since the two threads use the same core engine (e.g., same term weighting function).
△ Less
Submitted 22 February, 2023;
originally announced February 2023.
-
Light Communication for Controlling Industrial Robots
Authors:
Fadi Al-Turjman,
Diletta Cacciagrano,
Leonardo Mostarda,
Mattia Paccamiccio,
Zaib Ullah
Abstract:
Optical Wireless Communication (OWC) is regarded as an auspicious communication approach that can outperform the existing wireless technology. It utilizes LED lights, whose subtle variation in radiant intensity generate a binary data stream. This is perceived by a photodiode, that converts it to electric signals for further interpretation. This article aims at exploring the use of this emerging te…
▽ More
Optical Wireless Communication (OWC) is regarded as an auspicious communication approach that can outperform the existing wireless technology. It utilizes LED lights, whose subtle variation in radiant intensity generate a binary data stream. This is perceived by a photodiode, that converts it to electric signals for further interpretation. This article aims at exploring the use of this emerging technology in order to control wirelessly industrial robots, overcoming the need for wires, especially in environments where radio waves are not working due to environmental factors or not allowed for safety reasons. We performed experiments to ensure the suitability and efficiency of OWC based technology for the aforementioned scope and "in vitro" tests in various Line-of-Sight (LoS) and Non-Line-of-Sight (NLoS) configurations to observe the system throughput and reliability. The technology performance in the "clear LoS" and in the presence of a transparent barrier, were also analyzed.
△ Less
Submitted 7 May, 2022;
originally announced May 2022.
-
Highly Accurate and Reliable Wireless Network Slicing in 5th Generation Networks: A Hybrid Deep Learning Approach
Authors:
Sulaiman Khan,
Suleman Khan,
Yasir Ali,
Muhammad Khalid,
Zahid Ullah,
Shahid Mumtaz
Abstract:
In the current era, the next-generation networks like 5th generation (5G) and 6th generation (6G) networks require high security, low latency with a high reliable standards and capacity. In these networks, reconfigurable wireless network slicing is considered as one of the key elements for 5G and 6G networks. A reconfigurable slicing allows the operators to run various instances of the network usi…
▽ More
In the current era, the next-generation networks like 5th generation (5G) and 6th generation (6G) networks require high security, low latency with a high reliable standards and capacity. In these networks, reconfigurable wireless network slicing is considered as one of the key elements for 5G and 6G networks. A reconfigurable slicing allows the operators to run various instances of the network using a single infrastructure for a better quality of services (QoS). The QoS can be achieved by reconfiguring and optimizing these networks using Artificial intelligence and machine learning algorithms. To develop a smart decision-making mechanism for network management and restricting network slice failures, machine learning-enabled reconfigurable wireless network solutions are required. In this paper, we propose a hybrid deep learning model that consists of a convolution neural network (CNN) and long short term memory (LSTM). The CNN performs resource allocation, network reconfiguration, and slice selection while the LSTM is used for statistical information (load balancing, error rate etc.) regarding network slices. The applicability of the proposed model is validated by using multiple unknown devices, slice failure, and overloading conditions. The overall accuracy of 95.17% is achieved by the proposed model that reflects its applicability.
△ Less
Submitted 7 October, 2021;
originally announced November 2021.
-
Forward and Backward Feature Selection for Query Performance Prediction
Authors:
Sébastien Déjean,
Radu Tudor Ionescu,
Josiane Mothe,
Md Zia Ullah
Abstract:
The goal of query performance prediction (QPP) is to automatically estimate the effectiveness of a search result for any given query, without relevance judgements. Post-retrieval features have been shown to be more effective for this task while being more expensive to compute than pre-retrieval features. Combining multiple post-retrieval features is even more effective, but state-of-the-art QPP me…
▽ More
The goal of query performance prediction (QPP) is to automatically estimate the effectiveness of a search result for any given query, without relevance judgements. Post-retrieval features have been shown to be more effective for this task while being more expensive to compute than pre-retrieval features. Combining multiple post-retrieval features is even more effective, but state-of-the-art QPP methods are impossible to interpret because of the black-box nature of the employed machine learning models. However, interpretation is useful for understanding the predictive model and providing more answers about its behavior. Moreover, combining many post-retrieval features is not applicable to real-world cases, since the query running time is of utter importance. In this paper, we investigate a new framework for feature selection in which the trained model explains well the prediction. We introduce a step-wise (forward and backward) model selection approach where different subsets of query features are used to fit different models from which the system selects the best one. We evaluate our approach on four TREC collections using standard QPP features. We also develop two QPP features to address the issue of query-drift in the query feedback setting. We found that: (1) our model based on a limited number of selected features is as good as more complex models for QPP and better than non-selective models; (2) our model is more efficient than complex models during inference time since it requires fewer features; (3) the predictive model is readable and understandable; and (4) one of our new QPP features is consistently selected across different collections, proving its usefulness.
△ Less
Submitted 4 December, 2019;
originally announced December 2019.
-
An Intelligent Monitoring System of Vehicles on Highway Traffic
Authors:
Sulaiman Khan,
Hazrat Ali,
Zia Ullah,
Mohammad Farhad Bulbul
Abstract:
Vehicle speed monitoring and management of highways is the critical problem of the road in this modern age of growing technology and population. A poor management results in frequent traffic jam, traffic rules violation and fatal road accidents. Using traditional techniques of RADAR, LIDAR and LASAR to address this problem is time-consuming, expensive and tedious. This paper presents an efficient…
▽ More
Vehicle speed monitoring and management of highways is the critical problem of the road in this modern age of growing technology and population. A poor management results in frequent traffic jam, traffic rules violation and fatal road accidents. Using traditional techniques of RADAR, LIDAR and LASAR to address this problem is time-consuming, expensive and tedious. This paper presents an efficient framework to produce a simple, cost efficient and intelligent system for vehicle speed monitoring. The proposed method uses an HD (High Definition) camera mounted on the road side either on a pole or on a traffic signal for recording video frames. On the basis of these frames, a vehicle can be tracked by using radius growing method, and its speed can be calculated by calculating vehicle mask and its displacement in consecutive frames. The method uses pattern recognition, digital image processing and mathematical techniques for vehicle detection, tracking and speed calculation. The validity of the proposed model is proved by testing it on different highways.
△ Less
Submitted 27 May, 2019;
originally announced May 2019.
-
KNN and ANN-based Recognition of Handwritten Pashto Letters using Zoning Features
Authors:
Sulaiman Khan,
Hazrat Ali,
Zahid Ullah,
Nasru Minallah,
Shahid Maqsood,
Abdul Hafeez
Abstract:
This paper presents a recognition system for handwritten Pashto letters. However, handwritten character recognition is a challenging task. These letters not only differ in shape and style but also vary among individuals. The recognition becomes further daunting due to the lack of standard datasets for inscribed Pashto letters. In this work, we have designed a database of moderate size, which encom…
▽ More
This paper presents a recognition system for handwritten Pashto letters. However, handwritten character recognition is a challenging task. These letters not only differ in shape and style but also vary among individuals. The recognition becomes further daunting due to the lack of standard datasets for inscribed Pashto letters. In this work, we have designed a database of moderate size, which encompasses a total of 4488 images, stemming from 102 distinguishing samples for each of the 44 letters in Pashto. The recognition framework uses zoning feature extractor followed by K-Nearest Neighbour (KNN) and Neural Network (NN) classifiers for classifying individual letter. Based on the evaluation of the proposed system, an overall classification accuracy of approximately 70.05% is achieved by using KNN while 72% is achieved by using NN.
△ Less
Submitted 8 June, 2019; v1 submitted 6 April, 2019;
originally announced April 2019.
-
Internet of Things Security, Device Authentication and Access Control: A Review
Authors:
Inayat Ali,
Sonia Sabir,
Zahid Ullah
Abstract:
The Internet of Things (IoT) is one of the emerging technologies that has grabbed the attention of researchers from academia and industry. The idea behind Internet of things is the interconnection of internet enabled things or devices to each other and to humans, to achieve some common goals. In near future IoT is expected to be seamlessly integrated into our environment and human will be wholly s…
▽ More
The Internet of Things (IoT) is one of the emerging technologies that has grabbed the attention of researchers from academia and industry. The idea behind Internet of things is the interconnection of internet enabled things or devices to each other and to humans, to achieve some common goals. In near future IoT is expected to be seamlessly integrated into our environment and human will be wholly solely dependent on this technology for comfort and easy life style. Any security compromise of the system will directly affect human life. Therefore security and privacy of this technology is foremost important issue to resolve. In this paper we present a thorough study of security problems in IoT and classify possible cyberattacks on each layer of IoT architecture. We also discuss challenges to traditional security solutions such as cryptographic solutions, authentication mechanisms and key management in IoT. Device authentication and access controls is an essential area of IoT security, which is not surveyed so far. We spent our efforts to bring the state of the art device authentication and access control techniques on a single paper.
△ Less
Submitted 20 April, 2022; v1 submitted 8 January, 2019;
originally announced January 2019.
-
Three-dimensional nonlinear micro/meso-mechanical response of the fibre-reinforced polymer composites
Authors:
Zahur Ullah,
Lukasz Kaczmarczyk,
Chris J. Pearce
Abstract:
A three-dimensional multi-scale computational homogenisation framework is developed for the prediction of nonlinear micro/meso-mechanical response of the fibre-reinforced polymer (FRP) composites. Two dominant damage mechanisms, i.e. matrix elasto-plastic response and fibre-matrix decohesion are considered and modelled using a non-associative pressure dependent paraboloidal yield criterion and coh…
▽ More
A three-dimensional multi-scale computational homogenisation framework is developed for the prediction of nonlinear micro/meso-mechanical response of the fibre-reinforced polymer (FRP) composites. Two dominant damage mechanisms, i.e. matrix elasto-plastic response and fibre-matrix decohesion are considered and modelled using a non-associative pressure dependent paraboloidal yield criterion and cohesive interface elements respectively. A linear-elastic transversely isotropic material model is used to model yarns/fibres within the representative volume element (RVE). A unified approach is used to impose the RVE boundary conditions, which allows convenient switching between linear displacement, uniform traction and periodic boundary conditions. The computational model is implemented within the framework of the hierarchic finite element, which permits the use of arbitrary orders of approximation. Furthermore, the computational framework is designed to take advantage of distributed memory high-performance computing. The accuracy and performance of the computational framework are demonstrated with a variety of numerical examples, including unidirectional FRP composite, a composite comprising a multi-fibre and multi-layer RVE, with randomly generated fibres, and a single layered plain weave textile composite. Results are validated against the reference experimental/numerical results from the literature. The computational framework is also used to study the effect of matrix and fibre-matrix interfaces properties on the homogenised stress-strain responses.
△ Less
Submitted 14 October, 2016;
originally announced October 2016.
-
Multi-scale computational homogenisation to predict the long-term durability of composite structures
Authors:
Zahur Ullah,
Lukasz Kaczmarczyk,
Sotirios Grammatikos,
Mark Evernden,
Chris Pearce
Abstract:
A coupled hygro-thermo-mechanical computational model is proposed for fibre reinforced polymers, formulated within the framework of Computational Homogenisation (CH). At each macrostructure Gauss point, constitutive matrices for thermal, moisture transport and mechanical responses are calculated from CH of the underlying representative volume element (RVE). A degradation model, developed from expe…
▽ More
A coupled hygro-thermo-mechanical computational model is proposed for fibre reinforced polymers, formulated within the framework of Computational Homogenisation (CH). At each macrostructure Gauss point, constitutive matrices for thermal, moisture transport and mechanical responses are calculated from CH of the underlying representative volume element (RVE). A degradation model, developed from experimental data relating evolution of mechanical properties over time for a given exposure temperature and moisture concentration is also developed and incorporated in the proposed computational model. A unified approach is used to impose the RVE boundary conditions, which allows convenient switching between linear Dirichlet, uniform Neumann and periodic boundary conditions. A plain weave textile composite RVE consisting of yarns embedded in a matrix is considered in this case. Matrix and yarns are considered as isotropic and transversely isotropic materials respectively. Furthermore, the computational framework utilises hierarchic basis functions and designed to take advantage of distributed memory high-performance computing.
△ Less
Submitted 13 October, 2016; v1 submitted 11 October, 2016;
originally announced October 2016.
-
Energy consistent framework for continuously evolving 3D crack propagation
Authors:
Lukasz Kaczmarczyk,
Zahur Ullah,
Chris J. Pearce
Abstract:
This paper presents a formulation for brittle fracture in 3D elastic solids within the context of configurational mechanics. The local form of the first law of thermodynamics provides a condition for equilibrium of the crack front. The direction of the crack propagation is shown to be given by the direction of the configurational forces on the crack front that maximise the local dissipation. The e…
▽ More
This paper presents a formulation for brittle fracture in 3D elastic solids within the context of configurational mechanics. The local form of the first law of thermodynamics provides a condition for equilibrium of the crack front. The direction of the crack propagation is shown to be given by the direction of the configurational forces on the crack front that maximise the local dissipation. The evolving crack front is continuously resolved by the finite element mesh, without the need for face splitting or the use of enrichment techniques. A monolithic solution strategy is adopted, solving simultaneously for both the material displacements (i.e. crack extension) and the spatial displacements, is adopted. In order to trace the dissipative loading path, an arc-length procedure is developed that controls the incremental crack area growth. In order to maintain mesh quality, smoothing of the mesh is undertaken as a continuous process, together with face flip**, node merging and edge splitting where necessary. Hierarchical basis functions of arbitrary polynomial order are adopted to increase the order of approximation without the need to change the finite element mesh. Performance of the formulation is demonstrated by means of three representative numerical simulations, demonstrating both accuracy and robustness.
△ Less
Submitted 30 September, 2016;
originally announced October 2016.