-
Quasilinear-time eccentricities computation, and more, on median graphs
Authors:
Pierre Bergé,
Guillaume Ducoffe,
Michel Habib
Abstract:
Computing the diameter, and more generally, all eccentricities of an undirected graph is an important problem in algorithmic graph theory and the challenge is to identify graph classes for which their computation can be achieved in subquadratic time. Using a new recursive scheme based on the structural properties of median graphs, we provide a quasilinear-time algorithm to determine all eccentrici…
▽ More
Computing the diameter, and more generally, all eccentricities of an undirected graph is an important problem in algorithmic graph theory and the challenge is to identify graph classes for which their computation can be achieved in subquadratic time. Using a new recursive scheme based on the structural properties of median graphs, we provide a quasilinear-time algorithm to determine all eccentricities for this well-known family of graphs. Our recursive technique manages specifically balanced and unbalanced parts of the $Θ$-class decomposition of median graphs. The exact running time of our algorithm is O(n log^4 n). This outcome not only answers a question asked by B{é}n{é}teau et al. (2020) but also greatly improves a recent result which presents a combinatorial algorithm running in time O(n^1.6408 log^{O(1)} n) for the same problem.Furthermore we also propose a distance oracle for median graphs with both polylogarithmic size and query time. Speaking formally, we provide a combinatorial algorithm which computes for any median graph G, in quasilinear time O(n log^4 n), vertex-labels of size O(log^3 n) such that any distance of G can be retrieved in time O(log^4 n) thanks to these labels.
△ Less
Submitted 14 October, 2024;
originally announced October 2024.
-
Machine Learning-enabled Traffic Steering in O-RAN: A Case Study on Hierarchical Learning Approach
Authors:
Md Arafat Habib,
Hao Zhou,
Pedro Enrique Iturria-Rivera,
Yigit Ozcan,
Medhat Elsayed,
Majid Bavand,
Raimundas Gaigalas,
Melike Erol-Kantarci
Abstract:
Traffic Steering is a crucial technology for wireless networks, and multiple efforts have been put into developing efficient Machine Learning (ML)-enabled traffic steering schemes for Open Radio Access Networks (O-RAN). Given the swift emergence of novel ML techniques, conducting a timely survey that comprehensively examines the ML-based traffic steering schemes in O-RAN is critical. In this artic…
▽ More
Traffic Steering is a crucial technology for wireless networks, and multiple efforts have been put into developing efficient Machine Learning (ML)-enabled traffic steering schemes for Open Radio Access Networks (O-RAN). Given the swift emergence of novel ML techniques, conducting a timely survey that comprehensively examines the ML-based traffic steering schemes in O-RAN is critical. In this article, we provide such a survey along with a case study of hierarchical learning-enabled traffic steering in O-RAN. In particular, we first introduce the background of traffic steering in O-RAN and overview relevant state-of-the-art ML techniques and their applications. Then, we analyze the compatibility of the hierarchical learning framework in O-RAN and further propose a Hierarchical Deep-Q-Learning (h-DQN) framework for traffic steering. Compared to existing works, which focus on single-layer architecture with standalone agents, h-DQN decomposes the traffic steering problem into a bi-level architecture with hierarchical intelligence. The meta-controller makes long-term and high-level policies, while the controller executes instant traffic steering actions under high-level policies. Finally, the case study shows that the hierarchical learning approach can provide significant performance improvements over the baseline algorithms.
△ Less
Submitted 30 September, 2024;
originally announced September 2024.
-
On the Prevalence, Evolution, and Impact of Code Smells in Simulation Modelling Software
Authors:
Riasat Mahbub,
Mohammad Masudur Rahman,
Muhammad Ahsanul Habib
Abstract:
Simulation modelling systems are routinely used to test or understand real-world scenarios in a controlled setting. They have found numerous applications in scientific research, engineering, and industrial operations. Due to their complex nature, the simulation systems could suffer from various code quality issues and technical debt. However, to date, there has not been any investigation into thei…
▽ More
Simulation modelling systems are routinely used to test or understand real-world scenarios in a controlled setting. They have found numerous applications in scientific research, engineering, and industrial operations. Due to their complex nature, the simulation systems could suffer from various code quality issues and technical debt. However, to date, there has not been any investigation into their code quality issues (e.g. code smells). In this paper, we conduct an empirical study investigating the prevalence, evolution, and impact of code smells in simulation software systems. First, we employ static analysis tools (e.g. Designite) to detect and quantify the prevalence of various code smells in 155 simulation and 327 traditional projects from Github. Our findings reveal that certain code smells (e.g. Long Statement, Magic Number) are more prevalent in simulation software systems than in traditional software systems. Second, we analyze the evolution of these code smells across multiple project versions and investigate their chances of survival. Our experiments show that some code smells such as Magic Number and Long Parameter List can survive a long time in simulation software systems. Finally, we examine any association between software bugs and code smells. Our experiments show that although Design and Architecture code smells are introduced simultaneously with bugs, there is no significant association between code smells and bugs in simulation systems.
△ Less
Submitted 5 September, 2024;
originally announced September 2024.
-
From Predictive Importance to Causality: Which Machine Learning Model Reflects Reality?
Authors:
Muhammad Arbab Arshad,
Pallavi Kandanur,
Saurabh Sonawani,
Laiba Batool,
Muhammad Umar Habib
Abstract:
This study analyzes the Ames Housing Dataset using CatBoost and LightGBM models to explore feature importance and causal relationships in housing price prediction. We examine the correlation between SHAP values and EconML predictions, achieving high accuracy in price forecasting. Our analysis reveals a moderate Spearman rank correlation of 0.48 between SHAP-based feature importance and causally si…
▽ More
This study analyzes the Ames Housing Dataset using CatBoost and LightGBM models to explore feature importance and causal relationships in housing price prediction. We examine the correlation between SHAP values and EconML predictions, achieving high accuracy in price forecasting. Our analysis reveals a moderate Spearman rank correlation of 0.48 between SHAP-based feature importance and causally significant features, highlighting the complexity of aligning predictive modeling with causal understanding in housing market analysis. Through extensive causal analysis, including heterogeneity exploration and policy tree interpretation, we provide insights into how specific features like porches impact housing prices across various scenarios. This work underscores the need for integrated approaches that combine predictive power with causal insights in real estate valuation, offering valuable guidance for stakeholders in the industry.
△ Less
Submitted 24 September, 2024; v1 submitted 1 September, 2024;
originally announced September 2024.
-
Real-Time Hand Gesture Recognition: Integrating Skeleton-Based Data Fusion and Multi-Stream CNN
Authors:
Oluwaleke Yusuf,
Maki Habib,
Mohamed Moustafa
Abstract:
Hand Gesture Recognition (HGR) enables intuitive human-computer interactions in various real-world contexts. However, existing frameworks often struggle to meet the real-time requirements essential for practical HGR applications. This study introduces a robust, skeleton-based framework for dynamic HGR that simplifies the recognition of dynamic hand gestures into a static image classification task,…
▽ More
Hand Gesture Recognition (HGR) enables intuitive human-computer interactions in various real-world contexts. However, existing frameworks often struggle to meet the real-time requirements essential for practical HGR applications. This study introduces a robust, skeleton-based framework for dynamic HGR that simplifies the recognition of dynamic hand gestures into a static image classification task, effectively reducing both hardware and computational demands. Our framework utilizes a data-level fusion technique to encode 3D skeleton data from dynamic gestures into static RGB spatiotemporal images. It incorporates a specialized end-to-end Ensemble Tuner (e2eET) Multi-Stream CNN architecture that optimizes the semantic connections between data representations while minimizing computational needs. Tested across five benchmark datasets (SHREC'17, DHG-14/28, FPHA, LMDHG, and CNR), the framework showed competitive performance with the state-of-the-art. Its capability to support real-time HGR applications was also demonstrated through deployment on standard consumer PC hardware, showcasing low latency and minimal resource usage in real-world settings. The successful deployment of this framework underscores its potential to enhance real-time applications in fields such as virtual/augmented reality, ambient intelligence, and assistive technologies, providing a scalable and efficient solution for dynamic gesture recognition.
△ Less
Submitted 6 October, 2024; v1 submitted 21 June, 2024;
originally announced June 2024.
-
LLM-Based Intent Processing and Network Optimization Using Attention-Based Hierarchical Reinforcement Learning
Authors:
Md Arafat Habib,
Pedro Enrique Iturria Rivera,
Yigit Ozcan,
Medhat Elsayed,
Majid Bavand,
Raimundus Gaigalas,
Melike Erol-Kantarci
Abstract:
Intent-based network automation is a promising tool to enable easier network management however certain challenges need to be effectively addressed. These are: 1) processing intents, i.e., identification of logic and necessary parameters to fulfill an intent, 2) validating an intent to align it with current network status, and 3) satisfying intents via network optimizing functions like xApps and r…
▽ More
Intent-based network automation is a promising tool to enable easier network management however certain challenges need to be effectively addressed. These are: 1) processing intents, i.e., identification of logic and necessary parameters to fulfill an intent, 2) validating an intent to align it with current network status, and 3) satisfying intents via network optimizing functions like xApps and rApps in O-RAN. This paper addresses these points via a three-fold strategy to introduce intent-based automation for O-RAN. First, intents are processed via a lightweight Large Language Model (LLM). Secondly, once an intent is processed, it is validated against future incoming traffic volume profiles (high or low). Finally, a series of network optimization applications (rApps and xApps) have been developed. With their machine learning-based functionalities, they can improve certain key performance indicators such as throughput, delay, and energy efficiency. In this final stage, using an attention-based hierarchical reinforcement learning algorithm, these applications are optimally initiated to satisfy the intent of an operator. Our simulations show that the proposed method can achieve at least 12% increase in throughput, 17.1% increase in energy efficiency, and 26.5% decrease in network delay compared to the baseline algorithms.
△ Less
Submitted 10 June, 2024;
originally announced June 2024.
-
CredSec: A Blockchain-based Secure Credential Management System for University Adoption
Authors:
Md. Ahsan Habib,
Md. Mostafijur Rahman,
Nieb Hasan Neom
Abstract:
University education play a critical role in shaping intellectual and professional development of the individuals and contribute significantly to the advancement of knowledge and society. Generally, university authority has a direct control of students result making and stores the credential in their local dedicated server. So, there is chance to alter the credential and also have a very high poss…
▽ More
University education play a critical role in shaping intellectual and professional development of the individuals and contribute significantly to the advancement of knowledge and society. Generally, university authority has a direct control of students result making and stores the credential in their local dedicated server. So, there is chance to alter the credential and also have a very high possibility to encounter various threats and different security attacks. To resolve these, we propose a blockchain based secure credential management system (BCMS) for efficiently storing, managing and recovering credential without involving the university authority. The proposed BCMS incorporates a modified two factor encryption (m2FE) technique, a combination of RSA cryptosystem and a DNA encoding to ensure credential privacy and an enhanced authentication scheme for teachers and students. Besides, to reduce size of the cipher credential and its conversion time, we use character to integer (C2I) table instead of ASCII table. Finally, the experimental result and analysis of the BCMS illustrate the effectiveness over state of the art works.
△ Less
Submitted 3 June, 2024;
originally announced June 2024.
-
Spin-Valve-Like Magnetoresistance and Anomalous Hall Effect in Magnetic Weyl Metal Mn$_2$PdSn
Authors:
Arnab Bhattacharya,
Mohammad Rezwan Habib,
Afsar Ahmed,
Biswarup Satpati,
Samik DuttaGupta,
Indra Dasgupta,
Indranil Das
Abstract:
Realization of noncentrosymmetric magnetic Weyl metals is expected to exhibit anomalous transport properties stemming from the interplay of unusual bulk electronic topology and magnetism. Here, we present spin-valve-like magnetoresistance at room temperature in ferrimagneticWeyl metal Mn$_2$PdSn that crystallizes in the inverse Heusler structure. Anomalous magnetoresistance display dominant asymme…
▽ More
Realization of noncentrosymmetric magnetic Weyl metals is expected to exhibit anomalous transport properties stemming from the interplay of unusual bulk electronic topology and magnetism. Here, we present spin-valve-like magnetoresistance at room temperature in ferrimagneticWeyl metal Mn$_2$PdSn that crystallizes in the inverse Heusler structure. Anomalous magnetoresistance display dominant asymmetric component attributed to domain wall electron scattering, indicative of spin-valve-like behavior. Ab initio calculations confirm the topologically non-trivial nature of the band structure, with three pairs of Weyl nodes proximate to the Fermi level, providing deeper insights into the observed intrinsic Berry curvature mediated substantial anomalous Hall conductivity. Our results underscore the inverse Heusler compounds as promising platform to realize magnetic Weyl metals/semimetals and leverage emergent transport properties for electronic functionalities.
△ Less
Submitted 18 April, 2024;
originally announced April 2024.
-
Evolving Genetic Programming Tree Models for Predicting the Mechanical Properties of Green Fibers for Better Biocomposite Materials
Authors:
Faris M. AL-Oqla,
Hossam Faris,
Maria Habib,
Pedro A. Castillo-Valdivieso
Abstract:
Advanced modern technology and industrial sustainability theme have contributed implementing composite materials for various industrial applications. Green composites are among the desired alternatives for the green products. However, to properly control the performance of the green composites, predicting their constituents properties are of paramount importance. This work presents an innovative e…
▽ More
Advanced modern technology and industrial sustainability theme have contributed implementing composite materials for various industrial applications. Green composites are among the desired alternatives for the green products. However, to properly control the performance of the green composites, predicting their constituents properties are of paramount importance. This work presents an innovative evolving genetic programming tree models for predicting the mechanical properties of natural fibers based upon several inherent chemical and physical properties. Cellulose, hemicellulose, lignin and moisture contents as well as the Microfibrillar angle of various natural fibers were considered to establish the prediction models. A one-hold-out methodology was applied for training/testing phases. Robust models were developed to predict the tensile strength, Young's modulus, and the elongation at break properties of the natural fibers. It was revealed that Microfibrillar angle was dominant and capable of determining the ultimate tensile strength of the natural fibers by 44.7% comparable to other considered properties, while the impact of cellulose content in the model was only 35.6%. This in order would facilitate utilizing artificial intelligence in predicting the overall mechanical properties of natural fibers without experimental efforts and cost to enhance developing better green composite materials for various industrial applications.
△ Less
Submitted 20 February, 2024;
originally announced April 2024.
-
Antimagic Labeling of Graphs Using Prime Numbers
Authors:
Arafat Islam,
Md. Imtiaz Habib
Abstract:
Graph labeling is a technique that assigns unique labels or weights to the vertices or edges of a graph, often used to analyze and solve various graph-related problems. There are few methods with certain limitations conducted by researchers previously on this topic. This research paper focuses on antimagic labeling of different types of graphs and trees. It entails the assignment of distinct prime…
▽ More
Graph labeling is a technique that assigns unique labels or weights to the vertices or edges of a graph, often used to analyze and solve various graph-related problems. There are few methods with certain limitations conducted by researchers previously on this topic. This research paper focuses on antimagic labeling of different types of graphs and trees. It entails the assignment of distinct prime values to edges in a manner that ensures the cumulative sum of edge labels at each vertex remains unique. This research proposes a conjecture on antimagic labeling of any graphs and proves two theories. Firstly, we tried to give weights to the edges randomly, as some exceptions are faced in particular phases in this way, we followed a whole new way to mitigate this problem. This research paper demonstrates computational and mathematical verification to prove that antimagic labeling of any perfect binary tree and complete graph is possible.
△ Less
Submitted 16 March, 2024;
originally announced March 2024.
-
Transformer-Based Wireless Traffic Prediction and Network Optimization in O-RAN
Authors:
Md Arafat Habib,
Pedro Enrique Iturria-Rivera,
Yigit Ozcan,
Medhat Elsayed,
Majid Bavand,
Raimundus Gaigalas,
Melike Erol-Kantarci
Abstract:
This paper introduces an innovative method for predicting wireless network traffic in concise temporal intervals for Open Radio Access Networks (O-RAN) using a transformer architecture, which is the machine learning model behind generative AI tools. Depending on the anticipated traffic, the system either launches a reinforcement learning-based traffic steering xApp or a cell sleeping rApp to enhan…
▽ More
This paper introduces an innovative method for predicting wireless network traffic in concise temporal intervals for Open Radio Access Networks (O-RAN) using a transformer architecture, which is the machine learning model behind generative AI tools. Depending on the anticipated traffic, the system either launches a reinforcement learning-based traffic steering xApp or a cell sleeping rApp to enhance performance metrics like throughput or energy efficiency. Our simulation results demonstrate that the proposed traffic prediction-based network optimization mechanism matches the performance of standalone RAN applications (rApps/ xApps) that are always on during the whole simulation time while offering on-demand activation. This feature is particularly advantageous during instances of abrupt fluctuations in traffic volume. Rather than persistently operating specific applications irrespective of the actual incoming traffic conditions, the proposed prediction-based method increases the average energy efficiency by 39.7% compared to the "Always on Traffic Steering xApp" and achieves 10.1% increase in throughput compared to the "Always on Cell Sleeping rApp". The simulation has been conducted over 24 hours, emulating a whole day traffic pattern for a dense urban area.
△ Less
Submitted 16 March, 2024;
originally announced March 2024.
-
Analyzing the Dynamics of COVID-19 Lockdown Success: Insights from Regional Data and Public Health Measures
Authors:
Md. Motaleb Hossen Manik,
Md. Ahsan Habib,
Md. Zabirul Islam,
Tanim Ahmed,
Fabliha Haque
Abstract:
The COVID-19 pandemic caused by the coronavirus had a significant effect on social, economic, and health systems globally. The virus emerged in Wuhan, China, and spread worldwide resulting in severe disease, death, and social interference. Countries implemented lockdowns in various regions to limit the spread of the virus. Some of them were successful and some failed. Here, several factors played…
▽ More
The COVID-19 pandemic caused by the coronavirus had a significant effect on social, economic, and health systems globally. The virus emerged in Wuhan, China, and spread worldwide resulting in severe disease, death, and social interference. Countries implemented lockdowns in various regions to limit the spread of the virus. Some of them were successful and some failed. Here, several factors played a vital role in their success. But mostly these factors and their correlations remained unidentified. In this paper, we unlocked those factors that contributed to the success of lockdown during the COVID-19 pandemic and explored the correlations among them. Moreover, this paper proposes several strategies to control any pandemic situation in the future. Here, it explores the relationships among variables, such as population density, number of infected, death, recovered patients, and the success or failure of the lockdown in different regions of the world. The findings suggest a strong correlation among these factors and indicate that the spread of similar kinds of viruses can be reduced in the future by implementing several safety measures.
△ Less
Submitted 24 February, 2024;
originally announced February 2024.
-
Explicit Good Codes Approaching Distance 1 in Ulam Metric
Authors:
Elazar Goldenberg,
Mursalin Habib,
Karthik C. S
Abstract:
The Ulam distance of two permutations on $[n]$ is $n$ minus the length of their longest common subsequence. In this paper, we show that for every $\varepsilon>0$, there exists some $α>0$, and an infinite set $Γ\subseteq \mathbb{N}$, such that for all $n\inΓ$, there is an explicit set $C_n$ of $(n!)^α$ many permutations on $[n]$, such that every pair of permutations in $C_n$ has pairwise Ulam dista…
▽ More
The Ulam distance of two permutations on $[n]$ is $n$ minus the length of their longest common subsequence. In this paper, we show that for every $\varepsilon>0$, there exists some $α>0$, and an infinite set $Γ\subseteq \mathbb{N}$, such that for all $n\inΓ$, there is an explicit set $C_n$ of $(n!)^α$ many permutations on $[n]$, such that every pair of permutations in $C_n$ has pairwise Ulam distance at least $(1-\varepsilon)\cdot n$. Moreover, we can compute the $i^{\text{th}}$ permutation in $C_n$ in poly$(n)$ time and can also decode in poly$(n)$ time, a permutation $π$ on $[n]$ to its closest permutation $π^*$ in $C_n$, if the Ulam distance of $π$ and $π^*$ is less than $ \frac{(1-\varepsilon)\cdot n}{4} $.
Previously, it was implicitly known by combining works of Goldreich and Wigderson [Israel Journal of Mathematics'23] and Farnoud, Skachek, and Milenkovic [IEEE Transactions on Information Theory'13] in a black-box manner, that it is possible to explicitly construct $(n!)^{Ω(1)}$ many permutations on $[n]$, such that every pair of them have pairwise Ulam distance at least $\frac{n}{6}\cdot (1-\varepsilon)$, for any $\varepsilon>0$, and the bound on the distance can be improved to $\frac{n}{4}\cdot (1-\varepsilon)$ if the construction of Goldreich and Wigderson is directly analyzed in the Ulam metric.
△ Less
Submitted 11 May, 2024; v1 submitted 30 January, 2024;
originally announced January 2024.
-
An Ultra-Sensitive Visible-IR Range Fiber Based Plasmonic Refractive Index Sensor
Authors:
Mohammad Al Mahfuz,
Sumaiya Afroj,
Md. Azad Hossain,
Md. Anwar Hossain,
Afiquer Rahman,
Md Selim Habib
Abstract:
Photonic crystal fiber (PCF)-based plasmonic sensors have gained considerable attention because of their highly sensitive performance and broad range of sensing regimes. In this work, a relatively simple ultra-sensitive PCF-based surface plasmon resonance (SPR) sensor has been proposed for detecting different analyte refractive indices (RIs) ranging from 1.33 to 1.43 over a wide range of wavelengt…
▽ More
Photonic crystal fiber (PCF)-based plasmonic sensors have gained considerable attention because of their highly sensitive performance and broad range of sensing regimes. In this work, a relatively simple ultra-sensitive PCF-based surface plasmon resonance (SPR) sensor has been proposed for detecting different analyte refractive indices (RIs) ranging from 1.33 to 1.43 over a wide range of wavelength spectrum spanning 0.55 $μ$m to 3.50 $μ$m. The comprehensive finite-element simulations indicate that it is possible to achieve remarkable sensing performances such as wavelength sensitivity (WS) and figure of merit (FOM) as high as 123,000 nm/RIU and 683 RIU$^{-1}$, respectively, and extremely low values of wavelength resolution (WR) of 8.13 x 10$^{-8}$ RIU. In addition, a novel artificial neural network (ANN) model is proposed to be integrated into the practical setup in order to accurately predict the RIs by carefully examining the simulation data. The mean square error (MSE) and accuracy ($R^2$) values for the ANN model are found about 0.0097 and 0.9987, respectively, indicating the high prediction capability of the proposed ANN model. Due to its exceptional sensitivity and precise detection capabilities, the proposed device has the potential to serve as a viable option for sensing analyte refractive index (RI). Additionally, the sensor could be utilized for identifying cancerous cells and detecting urinary tract infections in humans.
△ Less
Submitted 19 January, 2024;
originally announced January 2024.
-
Accurate Loss Prediction of Realistic Hollow-core Anti-resonant Fibers Using Machine Learning
Authors:
Yordanos Jewani,
Michael Petry,
Rei Sanchez-Arias,
Rodrigo Amezcua-Correa,
Md Selim Habib
Abstract:
Hollow-core anti-resonant fibers (HC-ARFs) have proven to be an indispensable platform for various emerging applications due to their unique and extraordinary optical properties. However, accurately estimating the propagation loss of nested HC-ARFs remains a challenging task due to their complex structure and the lack of precise analytical and theoretical models. To address this challenge, we prop…
▽ More
Hollow-core anti-resonant fibers (HC-ARFs) have proven to be an indispensable platform for various emerging applications due to their unique and extraordinary optical properties. However, accurately estimating the propagation loss of nested HC-ARFs remains a challenging task due to their complex structure and the lack of precise analytical and theoretical models. To address this challenge, we propose a supervised machine-learning framework that presents an effective solution to accurately predict the propagation loss of a 5-tube nested HC-ARF. Multiple supervised learning models, including random forest, logistic regression, quadratic discriminant analysis, tree-based methods, extreme gradient boosting, and K-nearest neighbors are implemented and compared using a simulated dataset. Among these methods, the random forest algorithm is identified as the most effective, delivering accurate predictions. Notably, this study considers the impact of random structural perturbations on fiber geometry, encompassing random variations in tube wall thicknesses and tube gap separations. In particular, these perturbations involve randomly varying outer and nested tube wall thicknesses, tube angle offsets, and randomly distributed non-circular, anisotropic shapes within the cladding structure. It is worth noting that these specific perturbations have not been previously investigated. Each tube exhibits its unique set of random values, leading to longer simulation times for combinations of these values compared to regular random variables in HC-ARFs with similar tube characteristics. The comprehensive consideration of these factors allows for precise predictions, significantly contributing to the advancement of HC-ARFs for many emerging applications.
△ Less
Submitted 12 January, 2024;
originally announced January 2024.
-
Novel End-to-End Production-Ready Machine Learning Flow for Nanolithography Modeling and Correction
Authors:
Mohamed S. E. Habib,
Hossam A. H. Fahmy,
Mohamed F. Abu-ElYazeed
Abstract:
Optical lithography is the main enabler to semiconductor manufacturing. It requires extensive processing to perform the Resolution Enhancement Techniques (RETs) required to transfer the design data to a working Integrated Circuits (ICs). The processing power and computational runtime for RETs tasks is ever increasing due to the continuous reduction of the feature size and the expansion of the chip…
▽ More
Optical lithography is the main enabler to semiconductor manufacturing. It requires extensive processing to perform the Resolution Enhancement Techniques (RETs) required to transfer the design data to a working Integrated Circuits (ICs). The processing power and computational runtime for RETs tasks is ever increasing due to the continuous reduction of the feature size and the expansion of the chip area. State-of-the-art research sought Machine Learning (ML) technologies to reduce runtime and computational power, however they are still not used in production yet. In this study, we analyze the reasons holding back ML computational lithography from being production ready and present a novel highly scalable end-to-end flow that enables production ready ML-RET correction.
△ Less
Submitted 4 January, 2024;
originally announced January 2024.
-
A technique to avoid Blockchain Denial of Service (BDoS) and Selfish Mining Attack
Authors:
Md. Ahsan Habib,
Md. Motaleb Hossen Manik
Abstract:
Blockchain denial of service (BDoS) and selfish mining are the two most crucial attacks on blockchain technology. A classical DoS attack targets the computer network to limit, restrict, or stop accessing the system of authorized users which is ineffective against renowned cryptocurrencies like Bitcoin, Ethereum, etc. Unlike the conventional DoS, the BDoS affects the system's mechanism design to ma…
▽ More
Blockchain denial of service (BDoS) and selfish mining are the two most crucial attacks on blockchain technology. A classical DoS attack targets the computer network to limit, restrict, or stop accessing the system of authorized users which is ineffective against renowned cryptocurrencies like Bitcoin, Ethereum, etc. Unlike the conventional DoS, the BDoS affects the system's mechanism design to manipulate the incentive structure to discourage honest miners to participate in the mining process. In contrast, in a selfish mining attack, the adversary miner keeps its discovered block private to fork the chain intentionally that aiming to increase the incentive of the adversary miner. This paper proposed a technique to successfully avoid BDoS and selfish mining attacks. The existing infrastructure of blockchain technology doesn't need to be changed a lot to incorporate the proposed solution.
△ Less
Submitted 29 April, 2023;
originally announced October 2023.
-
LEI: Livestock Event Information Schema for Enabling Data Sharing
Authors:
Mahir Habib,
Muhammad Ashad Kabir,
Lihong Zheng,
Shawn McGrath
Abstract:
Data-driven advances have resulted in significant improvements in dairy production. However, the meat industry has lagged behind in adopting data-driven approaches, underscoring the crucial need for data standardisation to facilitate seamless data transmission to maximise productivity, save costs, and increase market access. To address this gap, we propose a novel data schema, Livestock Event Info…
▽ More
Data-driven advances have resulted in significant improvements in dairy production. However, the meat industry has lagged behind in adopting data-driven approaches, underscoring the crucial need for data standardisation to facilitate seamless data transmission to maximise productivity, save costs, and increase market access. To address this gap, we propose a novel data schema, Livestock Event Information (LEI) schema, designed to accurately and uniformly record livestock events. LEI complies with the International Committee for Animal Recording (ICAR) and Integrity System Company (ISC) schemas to deliver this data standardisation and enable data sharing between producers and consumers. To validate the superiority of LEI, we conducted a structural metrics analysis and a comprehensive case study. The analysis demonstrated that LEI outperforms the ICAR and ISC schemas in terms of design, while the case study confirmed its superior ability to capture livestock event information. Our findings lay the foundation for the implementation of the LEI schema, unlocking the potential for data-driven advances in livestock management. Moreover, LEI's versatility opens avenues for future expansion into other agricultural domains, encompassing poultry, fisheries, and crops. The adoption of LEI promises substantial benefits, including improved data accuracy, reduced costs, and increased productivity, heralding a new era of sustainability in the meat industry.
△ Less
Submitted 26 October, 2023;
originally announced October 2023.
-
LEI2JSON: Schema-based Validation and Conversion of Livestock Event Information
Authors:
Mahir Habib,
Muhammad Ashad Kabir,
Lihong Zheng
Abstract:
Livestock producers often need help in standardising (i.e., converting and validating) their livestock event data. This article introduces a novel solution, LEI2JSON (Livestock Event Information To JSON). The tool is an add-on for Google Sheets, adhering to the livestock event information (LEI) schema. The core objective of LEI2JSON is to provide livestock producers with an efficient mechanism to…
▽ More
Livestock producers often need help in standardising (i.e., converting and validating) their livestock event data. This article introduces a novel solution, LEI2JSON (Livestock Event Information To JSON). The tool is an add-on for Google Sheets, adhering to the livestock event information (LEI) schema. The core objective of LEI2JSON is to provide livestock producers with an efficient mechanism to standardise their data, leading to substantial savings in time and resources. This is achieved by building the spreadsheet template with the appropriate column headers, notes, and validation rules, converting the spreadsheet data into JSON format, and validating the output against the schema. LEI2JSON facilitates the seamless storage of livestock event information locally or on Google Drive in JSON. Additionally, we have conducted an extensive experimental evaluation to assess the effectiveness of the tool.
△ Less
Submitted 26 October, 2023;
originally announced October 2023.
-
An Exploration Into Web Session Security- A Systematic Literature Review
Authors:
Md. Imtiaz Habib,
Abdullah Al Maruf,
Md. Jobair Ahmed Nabil
Abstract:
The most common attacks against web sessions are reviewed in this paper, for example, some attacks against web browsers' honest users attempting to create session with trusted web browser application legally. We have assessed with four different ways to judge the viability of a certain solution by reviewing existing security solutions which prevent or halt the different attacks. Then we have point…
▽ More
The most common attacks against web sessions are reviewed in this paper, for example, some attacks against web browsers' honest users attempting to create session with trusted web browser application legally. We have assessed with four different ways to judge the viability of a certain solution by reviewing existing security solutions which prevent or halt the different attacks. Then we have pointed out some guidelines that have been taken into account by the designers of the proposals we reviewed. The guidelines we have identified will be helpful for the creative solutions proceeding web security in a more structured and holistic way.
△ Less
Submitted 14 October, 2023;
originally announced October 2023.
-
Fire Detection From Image and Video Using YOLOv5
Authors:
Arafat Islam,
Md. Imtiaz Habib
Abstract:
For the detection of fire-like targets in indoor, outdoor and forest fire images, as well as fire detection under different natural lights, an improved YOLOv5 fire detection deep learning algorithm is proposed. The YOLOv5 detection model expands the feature extraction network from three dimensions, which enhances feature propagation of fire small targets identification, improves network performanc…
▽ More
For the detection of fire-like targets in indoor, outdoor and forest fire images, as well as fire detection under different natural lights, an improved YOLOv5 fire detection deep learning algorithm is proposed. The YOLOv5 detection model expands the feature extraction network from three dimensions, which enhances feature propagation of fire small targets identification, improves network performance, and reduces model parameters. Furthermore, through the promotion of the feature pyramid, the top-performing prediction box is obtained. Fire-YOLOv5 attains excellent results compared to state-of-the-art object detection networks, notably in the detection of small targets of fire and smoke with mAP 90.5% and f1 score 88%. Overall, the Fire-YOLOv5 detection model can effectively deal with the inspection of small fire targets, as well as fire-like and smoke-like objects with F1 score 0.88. When the input image size is 416 x 416 resolution, the average detection time is 0.12 s per frame, which can provide real-time forest fire detection. Moreover, the algorithm proposed in this paper can also be applied to small target detection under other complicated situations. The proposed system shows an improved approach in all fire detection metrics such as precision, recall, and mean average precision.
△ Less
Submitted 10 October, 2023;
originally announced October 2023.
-
Intent-driven Intelligent Control and Orchestration in O-RAN Via Hierarchical Reinforcement Learning
Authors:
Md Arafat Habib,
Hao Zhou,
Pedro Enrique Iturria-Rivera,
Medhat Elsayed,
Majid Bavand,
Raimundas Gaigalas,
Yigit Ozcan,
Melike Erol-Kantarci
Abstract:
rApps and xApps need to be controlled and orchestrated well in the open radio access network (O-RAN) so that they can deliver a guaranteed network performance in a complex multi-vendor environment. This paper proposes a novel intent-driven intelligent control and orchestration scheme based on hierarchical reinforcement learning (HRL). The proposed scheme can orchestrate multiple rApps or xApps acc…
▽ More
rApps and xApps need to be controlled and orchestrated well in the open radio access network (O-RAN) so that they can deliver a guaranteed network performance in a complex multi-vendor environment. This paper proposes a novel intent-driven intelligent control and orchestration scheme based on hierarchical reinforcement learning (HRL). The proposed scheme can orchestrate multiple rApps or xApps according to the operator's intent of optimizing certain key performance indicators (KPIs), such as throughput, energy efficiency, and latency. Specifically, we propose a bi-level architecture with a meta-controller and a controller. The meta-controller provides the target performance in terms of KPIs, while the controller performs xApp orchestration at the lower level. Our simulation results show that the proposed HRL-based intent-driven xApp orchestration mechanism achieves 7.5% and 21.4% increase in average system throughput with respect to two baselines, i.e., a single xApp baseline and a non-machine learning-based algorithm, respectively. Similarly, 17.3% and 37.9% increase in energy efficiency are observed in comparison to the same baselines.
△ Less
Submitted 5 July, 2023;
originally announced July 2023.
-
Fabrication and Characterization of Graphene-Barium Titanate-Graphene layered capacitors by spin coating at low processing temperatures
Authors:
M. S. Habib,
S. F. U. Farhad,
N. I. Tanvir,
M. S. Alam,
M. N. A. Bitu,
M. S. Islam,
S. Islam,
N. Khatun,
M. S Hossain
Abstract:
Barium titanate, BaTiO3 (BT), materials have been synthesized by two different routes: one ball-mill-derived (BMD) nanopowder and another precursor-derived (PCD) BT synthesis method were used separately to fabricate BT thin films on stainless steel (SS) and quartz substrates by spin coating. Then thin films from both synthesis routes were characterized by Ultraviolet-Visible-Near Infrared (UV-Vis-…
▽ More
Barium titanate, BaTiO3 (BT), materials have been synthesized by two different routes: one ball-mill-derived (BMD) nanopowder and another precursor-derived (PCD) BT synthesis method were used separately to fabricate BT thin films on stainless steel (SS) and quartz substrates by spin coating. Then thin films from both synthesis routes were characterized by Ultraviolet-Visible-Near Infrared (UV-Vis-NIR) Spectroscopy, Field-Emission Scanning Electron Microscopy (FE-SEM), X-ray Diffractometry (XRD), Raman Spectroscopy, and Four-point collinear probe; all carried out at room temperature. Our studies revealed that the PCD synthesis process did not produce the BT phase even under the 900^0C air-annealing condition. In contrast, a homogeneous BT thin film has been formed from the BMD-BT nanopowder. The optical band gap of BMD-BT thin films was found in the 3.10 - 3.28 eV range. Finally, a Graphene-Barium Titanate-Graphene (G-BT-G) structure was fabricated on a SS substrate by spin coating at processing temperatures below 100^0C and characterized by two different pieces of equipment: a Potentiostat/Galvanostat (PG-STAT) and a Precision Impedance Analyzer (PIA). The G-BT-G structure exhibited a capacitance of 8 nF and 7.15 nF, a highest dielectric constant of 800 and 790, and a low dielectric loss of 4.5 and 5, investigated by PG-STAT and PIA equipment, respectively.
△ Less
Submitted 17 June, 2023;
originally announced June 2023.
-
A Secure Land Record Management System using Blockchain Technology
Authors:
Md. Samir Shahariar,
Pranta Banik,
Md. Ahsan Habib
Abstract:
A land record (LR) contains very sensitive information related to land e.g. owner, buyer, etc. Currently, almost all over the world, the LR is maintained by different governmental offices and most of them maintain the LR with paper-based approach. Some of the works focus to digitalize the existing land record management system (LRMS) but with some security concerns. A blockchain-based LRMS can be…
▽ More
A land record (LR) contains very sensitive information related to land e.g. owner, buyer, etc. Currently, almost all over the world, the LR is maintained by different governmental offices and most of them maintain the LR with paper-based approach. Some of the works focus to digitalize the existing land record management system (LRMS) but with some security concerns. A blockchain-based LRMS can be effective enough to solve the existing issues. This paper proposes a blockchain-based LRMS that (i) digitalizes the existing paper-based system, (ii) ensures LR privacy using an asymmetric cryptosystem, (iii) preserves LR integrity, (iv) facilitates a platform for trading land through an advertising agency, and (v) accelerates the process of changing ownership that saves time significantly. Besides, this paper also proposes a new way of character to integer mapping named C2I table that reduces around 33% overhead of text to integer conversion compared to ASCII table. The experimental results, analyses, and comparisons indicate the effectiveness of the proposed LRMS over the state-of-the-art systems.
△ Less
Submitted 9 February, 2023;
originally announced April 2023.
-
A Secure Medical Record Sharing Scheme Based on Blockchain and Two-fold Encryption
Authors:
Md. Ahsan Habib,
Kazi Md. Rokibul Alam,
Yasuhiko Morimoto
Abstract:
Usually, a medical record (MR) contains the patients disease-oriented sensitive information. In addition, the MR needs to be shared among different bodies, e.g., diagnostic centres, hospitals, physicians, etc. Hence, retaining the privacy and integrity of MR is crucial. A blockchain based secure MR sharing system can manage these aspects properly. This paper proposes a blockchain based electronic…
▽ More
Usually, a medical record (MR) contains the patients disease-oriented sensitive information. In addition, the MR needs to be shared among different bodies, e.g., diagnostic centres, hospitals, physicians, etc. Hence, retaining the privacy and integrity of MR is crucial. A blockchain based secure MR sharing system can manage these aspects properly. This paper proposes a blockchain based electronic (e-) MR sharing scheme that (i) considers the medical image and the text as the input, (ii) enriches the data privacy through a two-fold encryption mechanism consisting of an asymmetric cryptosystem and the dynamic DNA encoding, (iii) assures data integrity by storing the encrypted e-MR in the distinct block designated for each user in the blockchain, and (iv) eventually, enables authorized entities to regain the e-MR through decryption. Preliminary evaluations, analyses, comparisons with state-of-the-art works, etc., imply the efficacy of the proposed scheme.
△ Less
Submitted 9 February, 2023;
originally announced April 2023.
-
Single-polarization Hybrid Hollow-core Anti-resonant Fiber Designs at 2 $μ$m
Authors:
Herschel Herring,
Md Selim Habib
Abstract:
In this letter, to the best of our knowledge, a new type of hollow-core anti-resonant fiber (HC-ARF) design using hybrid silica/chalcogenide cladding is presented for single-polarization, high-birefringence, and endlessly single-mode operation at 2 $μ$m wavelength. We show that the inclusion of a chalcogenide layer in the cladding allows strong suppression of $x$-polarization, while maintaining lo…
▽ More
In this letter, to the best of our knowledge, a new type of hollow-core anti-resonant fiber (HC-ARF) design using hybrid silica/chalcogenide cladding is presented for single-polarization, high-birefringence, and endlessly single-mode operation at 2 $μ$m wavelength. We show that the inclusion of a chalcogenide layer in the cladding allows strong suppression of $x$-polarization, while maintaining low propagation loss and single-mode propagation for $y$-polarization. The optimized HC-ARF design includes a combination of low propagation loss, high-birefringence, and polarization-extinction ratio (PER) or loss ratio of 0.02 dB/m, 1.2$\times$10$^{-4}$, >550 respectively, while the loss of the $x$-polarization is >20 dB/m. The proposed fiber may also be coiled to small bend radii while maintaining low bend-loss of $\approx$ 0.01--0.1 dB/m, and can potentially be used as polarization filter based on the different gap separations and bend conditions.
△ Less
Submitted 16 March, 2023;
originally announced March 2023.
-
Pattern detection in ordered graphs
Authors:
Guillaume Ducoffe,
Laurent Feuilloley,
Michel Habib,
François Pitois
Abstract:
A popular way to define or characterize graph classes is via forbidden subgraphs or forbidden minors. These characterizations play a key role in graph theory, but they rarely lead to efficient algorithms to recognize these classes. In contrast, many essential graph classes can be recognized efficiently thanks to characterizations of the following form: there must exist an ordering of the vertices…
▽ More
A popular way to define or characterize graph classes is via forbidden subgraphs or forbidden minors. These characterizations play a key role in graph theory, but they rarely lead to efficient algorithms to recognize these classes. In contrast, many essential graph classes can be recognized efficiently thanks to characterizations of the following form: there must exist an ordering of the vertices such that some ordered pattern does not appear, where a pattern is basically an ordered subgraph. These pattern characterizations have been studied for decades, but there have been recent efforts to better understand them systematically. In this paper, we focus on a simple problem at the core of this topic: given an ordered graph of size $n$, how fast can we detect whether a fixed pattern of size $k$ is present?
Following the literature on graph classes recognition, we first look for patterns that can be detected in linear time. We prove, among other results, that almost all patterns on three vertices (which capture many interesting classes, such as interval, chordal, split, bipartite, and comparability graphs) fall in this category. Then, in a finer-grained complexity perspective, we prove conditional lower bounds for this problem. In particular we show that for a large family of patterns on four vertices it is unlikely that subquadratic algorithm exist. Finally, we define a parameter for patterns, the merge-width, and prove that for patterns of merge-width $t$, one can solve the problem in $O(n^{ct})$ for some constant~$c$. As a corollary, we get that detecting outerplanar patterns and other classes of patterns can be done in time independent of the size of the pattern.
△ Less
Submitted 22 February, 2023;
originally announced February 2023.
-
Forbidden Patterns in Temporal Graphs Resulting from Encounters in a Corridor
Authors:
Mónika Csikós,
Michel Habib,
Minh-Hang Nguyen,
Mikaël Rabie,
Laurent Viennot
Abstract:
In this paper, we study temporal graphs arising from mobility models, where vertices correspond to agents moving in space and edges appear each time two agents meet. We propose a rather natural one-dimensional model.
If each pair of agents meets exactly once, we get a simple temporal clique where the edges are ordered according to meeting times. In order to characterize which temporal cliques ca…
▽ More
In this paper, we study temporal graphs arising from mobility models, where vertices correspond to agents moving in space and edges appear each time two agents meet. We propose a rather natural one-dimensional model.
If each pair of agents meets exactly once, we get a simple temporal clique where the edges are ordered according to meeting times. In order to characterize which temporal cliques can be obtained as such `mobility graphs', we introduce the notion of forbidden patterns in temporal graphs. Furthermore, using a classical result in combinatorics, we count the number of such mobility cliques for a given number of agents, and show that not every temporal clique resulting from the 1D model can be realized with agents moving with different constant speeds. For the analogous circular problem, where agents are moving along a circle, we provide a characterization via circular forbidden patterns.
Our characterization in terms of forbidden patterns can be extended to the case where each edge appears at most once. We also study the problem where pairs of agents are allowed to cross each other several times, using an approach from automata theory. We observe that in this case, there is no finite set of forbidden patterns that characterize such temporal graphs and nevertheless give a linear-time algorithm to recognize temporal graphs arising from this model.
△ Less
Submitted 19 September, 2024; v1 submitted 15 February, 2023;
originally announced February 2023.
-
Physarum Inspired Bicycle Lane Network Design in a Congested Mega City
Authors:
Md. Ahsan Habib,
M. A. H. Akhand
Abstract:
Mobility is a key factor in urban life and transport network plays a vital role in mobility. Worse transport network having less mobility is one of the key reasons to decline the living standard in any unplanned mega city. Transport mobility enhancement in an unplanned mega city is always challenging due to various constraints including complex design and high cost involvement. The aim of this the…
▽ More
Mobility is a key factor in urban life and transport network plays a vital role in mobility. Worse transport network having less mobility is one of the key reasons to decline the living standard in any unplanned mega city. Transport mobility enhancement in an unplanned mega city is always challenging due to various constraints including complex design and high cost involvement. The aim of this thesis is to enhance transport mobility in a megacity introducing a bicycle lane. To design the bicycle lane natural Physarum, brainless single celled multi-nucleated protist, is studied and modified for better optimization. Recently Physarum inspired techniques are drawn significant attention to the construction of effective networks. Exiting Physarum inspired models effectively and efficiently solves different problems including transport network design and modification and implication for bicycle lane is the unique contribution of this study. Central area of Dhaka, the capital city of Bangladesh, is considered to analyze and design the bicycle lane network bypassing primary roads.
△ Less
Submitted 29 January, 2023;
originally announced January 2023.
-
Hierarchical Reinforcement Learning Based Traffic Steering in Multi-RAT 5G Deployments
Authors:
Md Arafat Habib,
Hao Zhou,
Pedro Enrique Iturria-Rivera,
Medhat Elsayed,
Majid Bavand,
Raimundas Gaigalas,
Yigit Ozcan,
Melike Erol-Kantarci
Abstract:
In 5G non-standalone mode, an intelligent traffic steering mechanism can vastly aid in ensuring smooth user experience by selecting the best radio access technology (RAT) from a multi-RAT environment for a specific traffic flow. In this paper, we propose a novel load-aware traffic steering algorithm based on hierarchical reinforcement learning (HRL) while satisfying diverse QoS requirements of dif…
▽ More
In 5G non-standalone mode, an intelligent traffic steering mechanism can vastly aid in ensuring smooth user experience by selecting the best radio access technology (RAT) from a multi-RAT environment for a specific traffic flow. In this paper, we propose a novel load-aware traffic steering algorithm based on hierarchical reinforcement learning (HRL) while satisfying diverse QoS requirements of different traffic types. HRL can significantly increase system performance using a bi-level architecture having a meta-controller and a controller. In our proposed method, the meta-controller provides an appropriate threshold for load balancing, while the controller performs traffic admission to an appropriate RAT in the lower level. Simulation results show that HRL outperforms a Deep Q-Learning (DQN) and a threshold-based heuristic baseline with 8.49%, 12.52% higher average system throughput and 27.74%, 39.13% lower network delay, respectively.
△ Less
Submitted 18 January, 2023;
originally announced January 2023.
-
Traffic Steering for 5G Multi-RAT Deployments using Deep Reinforcement Learning
Authors:
Md Arafat Habib,
Hao Zhou,
Pedro Enrique Iturria Rivera,
Medhat Elsayed,
Majid Bavand,
Raimundas Gaigalas,
Steve Furr,
Melike Erol-Kantarci
Abstract:
In 5G non-standalone mode, traffic steering is a critical technique to take full advantage of 5G new radio while optimizing dual connectivity of 5G and LTE networks in multiple radio access technology (RAT). An intelligent traffic steering mechanism can play an important role to maintain seamless user experience by choosing appropriate RAT (5G or LTE) dynamically for a specific user traffic flow w…
▽ More
In 5G non-standalone mode, traffic steering is a critical technique to take full advantage of 5G new radio while optimizing dual connectivity of 5G and LTE networks in multiple radio access technology (RAT). An intelligent traffic steering mechanism can play an important role to maintain seamless user experience by choosing appropriate RAT (5G or LTE) dynamically for a specific user traffic flow with certain QoS requirements. In this paper, we propose a novel traffic steering mechanism based on Deep Q-learning that can automate traffic steering decisions in a dynamic environment having multiple RATs, and maintain diverse QoS requirements for different traffic classes. The proposed method is compared with two baseline algorithms: a heuristic-based algorithm and Q-learningbased traffic steering. Compared to the Q-learning and heuristic baselines, our results show that the proposed algorithm achieves better performance in terms of 6% and 10% higher average system throughput, and 23% and 33% lower network delay, respectively.
△ Less
Submitted 12 January, 2023;
originally announced January 2023.
-
Emotion Recognition from Microblog Managing Emoticon with Text and Classifying using 1D CNN
Authors:
Md. Ahsan Habib,
M. A. H. Akhand,
Md. Abdus Samad Kamal
Abstract:
Microblog, an online-based broadcast medium, is a widely used forum for people to share their thoughts and opinions. Recently, Emotion Recognition (ER) from microblogs is an inspiring research topic in diverse areas. In the machine learning domain, automatic emotion recognition from microblogs is a challenging task, especially, for better outcomes considering diverse content. Emoticon becomes very…
▽ More
Microblog, an online-based broadcast medium, is a widely used forum for people to share their thoughts and opinions. Recently, Emotion Recognition (ER) from microblogs is an inspiring research topic in diverse areas. In the machine learning domain, automatic emotion recognition from microblogs is a challenging task, especially, for better outcomes considering diverse content. Emoticon becomes very common in the text of microblogs as it reinforces the meaning of content. This study proposes an emotion recognition scheme considering both the texts and emoticons from microblog data. Emoticons are considered unique expressions of the users' emotions and can be changed by the proper emotional words. The succession of emoticons appearing in the microblog data is preserved and a 1D Convolutional Neural Network (CNN) is employed for emotion classification. The experimental result shows that the proposed emotion recognition scheme outperforms the other existing methods while tested on Twitter data.
△ Less
Submitted 7 January, 2023;
originally announced January 2023.
-
Unconventionally Fast Transport through Sliding Dynamics of Rodlike Particles in Macromolecular Networks
Authors:
Xuanyu Zhang,
Xiaobin Dai,
Md Ahsan Habib,
Ziyang Xu,
Lijuan Gao,
Wenlong Chen,
Wenjie Wei,
Zhongqiu Tang,
Xianyu Qi,
Xiangjun Gong,
Lingxiang Jiang,
Li-Tang Yan
Abstract:
Transport of rodlike particles in confinement environments of macromolecular networks plays crucial roles in many important biological processes and technological applications. The relevant understanding has been limited to thin rods with diameter much smaller than network mesh size, although the opposite case, of which the dynamical behaviors and underlying physical mechanisms remain unclear, is…
▽ More
Transport of rodlike particles in confinement environments of macromolecular networks plays crucial roles in many important biological processes and technological applications. The relevant understanding has been limited to thin rods with diameter much smaller than network mesh size, although the opposite case, of which the dynamical behaviors and underlying physical mechanisms remain unclear, is ubiquitous. Here, we solve this issue by combining experiments, simulations and theory. We find a nonmonotonic dependence of translational diffusion on rod length, characterized by length commensuration-governed unconventionally fast dynamics which is in striking contrast to the monotonic dependence for thin rods. Our results clarify that such a fast diffusion of thick rods with length of integral multiple of mesh size follows sliding dynamics and demonstrate it to be "anomalous yet Brownian". Moreover, good agreement between theoretical analysis and simulations corroborates that the sliding dynamics is an intermediate regime between hopping and Brownian dynamics, and provides a mechanistic interpretation based on the rod-length dependent entropic free energy barrier. The findings yield a principle, that is, length commensuration, for optimal design of rodlike particles with highly efficient transport in confined environments of macromolecular networks, and might enrich the physics of the diffusion dynamics in heterogeneous media.
△ Less
Submitted 19 November, 2023; v1 submitted 26 December, 2022;
originally announced December 2022.
-
Design and numerical investigation of cadmium telluride (CdTe) and iron silicide (FeSi2) based double absorber solar cells to enhance power conversion efficiency
Authors:
Md. Ferdous Rahman,
M. J. A. Habib,
Md. Hasan Ali,
M. H. K. Rubel,
M. Rounakul Islam,
Abu Bakar Md. Ismail,
M. Khalid Hossain
Abstract:
Inorganic CdTe and FeSi2-based solar cells have recently drawn a lot of attention because they offer superior thermal stability and good optoelectronic properties compared to conventional solar cells. In this work, a unique alternative technique is presented by using FeSi2 as a secondary absorber layer and In2S3 as the window layer for improving photovoltaic (PV) performance parameters. Simulating…
▽ More
Inorganic CdTe and FeSi2-based solar cells have recently drawn a lot of attention because they offer superior thermal stability and good optoelectronic properties compared to conventional solar cells. In this work, a unique alternative technique is presented by using FeSi2 as a secondary absorber layer and In2S3 as the window layer for improving photovoltaic (PV) performance parameters. Simulating on SCAPS-1D, the proposed double-absorber (Cu/FTO/In2S3/CdTe/FeSi2/Ni) structure is thoroughly examined and analyzed. The window layer thickness, absorber layer thickness, acceptor density (NA), donor density (ND), defect density (Nt), series resistance (RS), and shunt resistance (Rsh) were simulated in detail for optimization of the above configuration to improve PV performance. According to this study, 0.5 um is the optimized thickness for both the CdTe and FeSi2 absorber layers in order to maximize efficiency. Here, the value of the optimum window layer thickness is 50 nm. For using CdTe as a single absorber, the efficiency is achieved by 13.26%. But for using CdTe and FeSi2 as a dual absorber, the efficiency is enhanced and the obtaining value is 27.35%. The other parameters are also improved and the obtaining values for fill factor (FF) are 83.68%, open-circuit voltage (Voc) is 0.6566V, and short circuit current density (JSc) is 49.78 mA/cm2. Furthermore, the proposed model performs good at 300 K operating temperature. The addition of the FeSi2 layer to the cell structure has resulted in a significant quantum efficiency (QE) enhancement because of the rise in solar spectrum absorption at longer wavelengths. The findings of this work offer a promising approach for producing high-performance and reasonably priced CdTe-based solar cells.
△ Less
Submitted 6 November, 2022;
originally announced November 2022.
-
Dual-Band Metal-Insulator-Metasurface Absorber
Authors:
Ibrahim Issah,
Carlos Rodríguez Fernández,
Mohsin Habib,
Semyon Chervinskii,
Humeyra Caglayan
Abstract:
We explored a metal-insulator-metasurface structure exhibiting dual-band absorption in the visible and infrared regions with almost perfect absorbance. We demonstrated that the existence of the dual peak absorbance is due to the excitation of propagating surface plasmon and localized surface plasmon mode. We further utilized the excited degenerate propagating surface plasmon to enhance the fluores…
▽ More
We explored a metal-insulator-metasurface structure exhibiting dual-band absorption in the visible and infrared regions with almost perfect absorbance. We demonstrated that the existence of the dual peak absorbance is due to the excitation of propagating surface plasmon and localized surface plasmon mode. We further utilized the excited degenerate propagating surface plasmon to enhance the fluorescence emission of an emitter located on top of the metasurface. This was accomplished by engineering a metasurface that excites a degenerate mode with resonance absorption bands close to the emission wavelength of fluorescent material. This condition helps to increase the rate of excitation and emission of an emitter by generating additional electron configurations when coupled to such metal-insulator-metasurface structures. This approach offers relevant potential in radiative engineering techniques.
△ Less
Submitted 2 September, 2022;
originally announced September 2022.
-
Hot electron dynamics and relaxation in hyperbolic meta-antennas
Authors:
Rakesh Dhama,
Mohsin Habib,
Alireza R. Rashed,
Humeyra Caglayan
Abstract:
Conventional plasmonic nanoantennas enable scattering and absorption bands at the same wavelength region, making their utilization to full potential impossible for both features simultaneously. In this regard, hyperbolic meta-antennas (HMA) offer independent, tunable and separate scattering and absorption resonance bands at different spectral ranges. Here, we take advantage of these separated spec…
▽ More
Conventional plasmonic nanoantennas enable scattering and absorption bands at the same wavelength region, making their utilization to full potential impossible for both features simultaneously. In this regard, hyperbolic meta-antennas (HMA) offer independent, tunable and separate scattering and absorption resonance bands at different spectral ranges. Here, we take advantage of these separated spectral bands in HMA to enhance and modify the hot electron-based phenomena. On the one hand, we observed the photoexcited emission of particle plasmons by hot carriers; on the other, we utilized ultrafast transient absorption spectroscopy to characterize the dynamics of hot electrons. Compared to corresponding plasmonic nanodisk antennas (NDA), extended plasmon-modulated photoluminescence (PM-PL) spectrum in HMA is achieved, attributing to their particular scattering spectra. Furthermore, the absorption band at longer wavelengths in HMA enhances the excitation efficiency of plasmon-induced hot electrons (HEs) in the near-infrared region (NIR) with an extended lifetime. It broadens the utilization of the visible/NIR range that can not be observed in conventional NDAs. Our results further show that such meta-antennas can generate plasmon-induced hot carriers on demand and provide insight into the optimization and engineering of the hot-carrier-assisted photochemistry.
△ Less
Submitted 31 August, 2022;
originally announced August 2022.
-
A Machine Learning Approach for Driver Identification Based on CAN-BUS Sensor Data
Authors:
Md. Abbas Ali Khan,
Mphammad Hanif Ali,
AKM Fazlul Haque,
Md. Tarek Habib
Abstract:
Driver identification is a momentous field of modern decorated vehicles in the controller area network (CAN-BUS) perspective. Many conventional systems are used to identify the driver. One step ahead, most of the researchers use sensor data of CAN-BUS but there are some difficulties because of the variation of the protocol of different models of vehicle. Our aim is to identify the driver through s…
▽ More
Driver identification is a momentous field of modern decorated vehicles in the controller area network (CAN-BUS) perspective. Many conventional systems are used to identify the driver. One step ahead, most of the researchers use sensor data of CAN-BUS but there are some difficulties because of the variation of the protocol of different models of vehicle. Our aim is to identify the driver through supervised learning algorithms based on driving behavior analysis. To determine the driver, a driver verification technique is proposed that evaluate driving pattern using the measurement of CAN sensor data. In this paper on-board diagnostic (OBD-II) is used to capture the data from the CAN-BUS sensor and the sensors are listed under SAE J1979 statement. According to the service of OBD-II, drive identification is possible. However, we have gained two types of accuracy on a complete data set with 10 drivers and a partial data set with two drivers. The accuracy is good with less number of drivers compared to the higher number of drivers. We have achieved statistically significant results in terms of accuracy in contrast to the baseline algorithm
△ Less
Submitted 15 July, 2022;
originally announced July 2022.
-
Convolutional Neural Network Based Partial Face Detection
Authors:
Md. Towfiqul Islam,
Tanzim Ahmed,
A. B. M. Raihanur Rashid,
Taminul Islam,
Md. Sadekur Rahman,
Md. Tarek Habib
Abstract:
Due to the massive explanation of artificial intelligence, machine learning technology is being used in various areas of our day-to-day life. In the world, there are a lot of scenarios where a simple crime can be prevented before it may even happen or find the person responsible for it. A face is one distinctive feature that we have and can differentiate easily among many other species. But not ju…
▽ More
Due to the massive explanation of artificial intelligence, machine learning technology is being used in various areas of our day-to-day life. In the world, there are a lot of scenarios where a simple crime can be prevented before it may even happen or find the person responsible for it. A face is one distinctive feature that we have and can differentiate easily among many other species. But not just different species, it also plays a significant role in determining someone from the same species as us, humans. Regarding this critical feature, a single problem occurs most often nowadays. When the camera is pointed, it cannot detect a person's face, and it becomes a poor image. On the other hand, where there was a robbery and a security camera installed, the robber's identity is almost indistinguishable due to the low-quality camera. But just making an excellent algorithm to work and detecting a face reduces the cost of hardware, and it doesn't cost that much to focus on that area. Facial recognition, widget control, and such can be done by detecting the face correctly. This study aims to create and enhance a machine learning model that correctly recognizes faces. Total 627 Data have been collected from different Bangladeshi people's faces on four angels. In this work, CNN, Harr Cascade, Cascaded CNN, Deep CNN & MTCNN are these five machine learning approaches implemented to get the best accuracy of our dataset. After creating and running the model, Multi-Task Convolutional Neural Network (MTCNN) achieved 96.2% best model accuracy with training data rather than other machine learning models.
△ Less
Submitted 28 June, 2022;
originally announced June 2022.
-
Impact of Third Order Dispersion on Dissipative Soliton Resonance
Authors:
Lujun Hong,
Yazhou Wang,
Abubakar Isa Adamu,
Md. Selim Habib,
Mengqiang Cai,
Jie Xu,
Jianfeng Li,
Christos Markos
Abstract:
Dissipative soliton resonance (DSR) is a promising way for high-energy pulse generation typically having a symmetrical square pulse profile. While this method is well known, the impact of third order dispersion (TOD) on DSR is yet to be fully addressed in the literature. In this article, the impact of TOD on DSR is numerically investigated under the frame of the complex cubic-quintic Ginzburg-Land…
▽ More
Dissipative soliton resonance (DSR) is a promising way for high-energy pulse generation typically having a symmetrical square pulse profile. While this method is well known, the impact of third order dispersion (TOD) on DSR is yet to be fully addressed in the literature. In this article, the impact of TOD on DSR is numerically investigated under the frame of the complex cubic-quintic Ginzburg-Landau equation (CQGLE). Our numerical investigations indicate that DSR can stably exist under TOD with nearly the same pulse amplitude, but with a (significantly) different pulse duration. Depending on the value of chromatic dispersion, the pulse duration can be notably longer or shorter due to the presence of TOD. The TOD effect also alters the dependence of pulse duration on the nonlinear gain. Another impact of TOD on DSR is that the DSR exists with an asymmetric pulse profile, leading to steepening of one edge of the DSR pulse, while flattening of the other. Our results indicate that TOD has a critical role for realizing DSR in mode-locked lasers and it should be taken into consideration during design and development of DSR-based lasers.
△ Less
Submitted 7 June, 2022;
originally announced June 2022.
-
Random Design Variations of Hollow-core Anti-resonant Fibers: A Monte-Carlo Study
Authors:
Michael Petry,
Md. Selim Habib
Abstract:
Hollow-core anti-resonant fibers (HC-ARFs) have earned great attention in the fiber optics community due to their remarkable light-guiding properties and broad application spectrum. Particularly nested HC-ARFs have recently reached competitiveness to standard fibers and even outperform them in certain categories. Key to their success is a precisely fine-tuned geometry, which inherently leaves opti…
▽ More
Hollow-core anti-resonant fibers (HC-ARFs) have earned great attention in the fiber optics community due to their remarkable light-guiding properties and broad application spectrum. Particularly nested HC-ARFs have recently reached competitiveness to standard fibers and even outperform them in certain categories. Key to their success is a precisely fine-tuned geometry, which inherently leaves optical characteristics highly susceptible to minimal structural deviations. When fabricating fibers, these come into play and manifest themselves in various imperfections to the geometry, ultimately worsening the fiber performance. In this article, for the first time to the best of our knowledge, these imperfections have been statistically modeled and analyzed on their impact to the propagation loss in a Monte-Carlo fashioned simulation. We have considered randomly varying outer and nested tube wall thicknesses as well as random tube angle offsets. We found that the loss increase due to perturbed tube angles dominates that of varying tube thicknesses by approximately an order of magnitude for FM and two orders of magnitude for HOM propagation at a wavelength of 1.55 $μ$m. Moreover, the higher-order-mode-extinction-ratio (HOMER) is proportional to the intensity of structural variations, indicating an increase in the `single-modeness' of a fabricated fiber. Furthermore, a bend condition worsens the loss contribution of both effects applied jointly dramatically to a value of $+50\%$ at a bend radius of 4 cm compared to $+5\%$ for a straight fiber. We believe that our work helps to predict the performance of realistic HC-ARFs after fabrication.
△ Less
Submitted 10 February, 2022;
originally announced February 2022.
-
The Double Chooz antineutrino detectors
Authors:
Double Chooz Collaboration,
H. de Kerret,
Y. Abe,
C. Aberle,
T. Abrahão,
J. M. Ahijado,
T. Akiri,
J. M. Alarcón,
J. Alba,
H. Almazan,
J. C. dos Anjos,
S. Appel,
F. Ardellier,
I. Barabanov,
J. C. Barriere,
E. Baussan,
A. Baxter,
I. Bekman,
M. Bergevin,
A. Bernstein,
W. Bertoli,
T. J. C. Bezerra,
L. Bezrukov,
C. Blanco,
N. Bleurvacq
, et al. (226 additional authors not shown)
Abstract:
This article describes the setup and performance of the near and far detectors in the Double Chooz experiment. The electron antineutrinos of the Chooz nuclear power plant were measured in two identically designed detectors with different average baselines of about 400 m and 1050 m from the two reactor cores. Over many years of data taking the neutrino signals were extracted from interactions in th…
▽ More
This article describes the setup and performance of the near and far detectors in the Double Chooz experiment. The electron antineutrinos of the Chooz nuclear power plant were measured in two identically designed detectors with different average baselines of about 400 m and 1050 m from the two reactor cores. Over many years of data taking the neutrino signals were extracted from interactions in the detectors with the goal of measuring a fundamental parameter in the context of neutrino oscillation, the mixing angle θ13. The central part of the Double Chooz detectors was a main detector comprising four cylindrical volumes filled with organic liquids. From the inside towards the outside there were volumes containing gadolinium-loaded scintillator, gadolinium-free scintillator, a buffer oil and, optically separated, another liquid scintillator acting as veto system. Above this main detector an additional outer veto system using plastic scintillator strips was installed. The technologies developed in Double Chooz were inspiration for several other antineutrino detectors in the field. The detector design allowed implementation of efficient background rejection techniques including use of pulse shape information provided by the data acquisition system. The Double Chooz detectors featured remarkable stability, in particular for the detected photons, as well as high radiopurity of the detector components.
△ Less
Submitted 13 September, 2022; v1 submitted 31 January, 2022;
originally announced January 2022.
-
Classifying grounded intersection graphs via ordered forbidden patterns
Authors:
Laurent Feuilloley,
Michel Habib
Abstract:
It was noted already in the 90s that many classic graph classes, such as interval, chordal, and bipartite graphs, can be characterized by the existence of an ordering of the vertices avoiding some ordered subgraphs, called patterns. Very recently, all the classes corresponding to patterns on three vertices (including the ones mentioned above) have been listed, and proved to be efficiently recogniz…
▽ More
It was noted already in the 90s that many classic graph classes, such as interval, chordal, and bipartite graphs, can be characterized by the existence of an ordering of the vertices avoiding some ordered subgraphs, called patterns. Very recently, all the classes corresponding to patterns on three vertices (including the ones mentioned above) have been listed, and proved to be efficiently recognizable. In contrast, very little is known about patterns on four vertices.
One of the few graph classes characterized by a pattern on four vertices is the class of intersection graphs of rectangles that are said to be grounded on a line. This class appears naturally in the study of intersection graphs, and similar grounded classes have recently attracted a lot of attention.
This paper contains three parts. First, we make a survey of grounded intersection graph classes, summarizing all the known inclusions between these various classes. Second, we show that the correspondence between a pattern on four vertices and grounded rectangle graphs is not an isolated phenomenon. We establish several other pattern characterizations for geometric classes, and show that the hierarchy of grounded intersection graph classes is tightly interleaved with the classes defined patterns on four vertices. We claim that forbidden patterns are a useful tool to classify grounded intersection graphs. Finally, we give an overview of the complexity of the recognition of classes defined by forbidden patterns on four vertices and list several interesting open problems.
△ Less
Submitted 6 December, 2021; v1 submitted 1 December, 2021;
originally announced December 2021.
-
Counting and Verifying Abelian Border Arrays of Binary Words
Authors:
Mursalin Habib,
Md. Salman Shamil,
M. Sohel Rahman
Abstract:
In this note, we consider the problem of counting and verifying abelian border arrays of binary words. We show that the number of valid abelian border arrays of length \(n\) is \(2^{n-1}\). We also show that verifying whether a given array is the abelian border array of some binary word reduces to computing the abelian border array of a specific binary word. Thus, assuming the word-RAM model, we p…
▽ More
In this note, we consider the problem of counting and verifying abelian border arrays of binary words. We show that the number of valid abelian border arrays of length \(n\) is \(2^{n-1}\). We also show that verifying whether a given array is the abelian border array of some binary word reduces to computing the abelian border array of a specific binary word. Thus, assuming the word-RAM model, we present an \(O\left(\frac{n^2}{\log^2n}\right)\) time algorithm for the abelian border array verification problem.
△ Less
Submitted 30 October, 2021;
originally announced November 2021.
-
Subquadratic-time algorithm for the diameter and all eccentricities on median graphs
Authors:
Pierre Bergé,
Guillaume Ducoffe,
Michel Habib
Abstract:
On sparse graphs, Roditty and Williams [2013] proved that no $O(n^{2-\varepsilon})$-time algorithm achieves an approximation factor smaller than $\frac{3}{2}$ for the diameter problem unless SETH fails. In this article, we solve an open question formulated in the literature: can we use the structural properties of median graphs to break this global quadratic barrier?
We propose the first combina…
▽ More
On sparse graphs, Roditty and Williams [2013] proved that no $O(n^{2-\varepsilon})$-time algorithm achieves an approximation factor smaller than $\frac{3}{2}$ for the diameter problem unless SETH fails. In this article, we solve an open question formulated in the literature: can we use the structural properties of median graphs to break this global quadratic barrier?
We propose the first combinatiorial algorithm computing exactly all eccentricities of a median graph in truly subquadratic time. Median graphs constitute the family of graphs which is the most studied in metric graph theory because their structure represents many other discrete and geometric concepts, such as CAT(0) cube complexes. Our result generalizes a recent one, stating that there is a linear-time algorithm for all eccentricities in median graphs with bounded dimension $d$, i.e. the dimension of the largest induced hypercube. This prerequisite on $d$ is not necessarily anymore to determine all eccentricities in subquadratic time. The execution time of our algorithm is $O(n^{1.6408}\log^{O(1)} n)$.
We provide also some satellite outcomes related to this general result. In particular, restricted to simplex graphs, this algorithm enumerates all eccentricities with a quasilinear running time. Moreover, an algorithm is proposed to compute exactly all reach centralities in time $O(2^{3d}n\log^{O(1)}n)$.
△ Less
Submitted 23 January, 2023; v1 submitted 6 October, 2021;
originally announced October 2021.
-
High Conversion Efficiency in Multi-mode Gas-filled Hollow-core Fiber
Authors:
Md. Selim Habib,
Christos Markos,
Rodrigo Amezcua-Correa
Abstract:
In this letter, an energetic and highly efficient dispersive wave (DW) generation at 200 nm has been numerically demonstrated by selectively exciting LP$_{02}$-like mode in a 10 bar Ar-filled hollow-core anti-resonant fiber pumping in the anomalous dispersion regime at 1030 nm with pulses of 30 fs duration and 7 $μ$J energy. Our calculations indicate high conversion efficiency of $>$35\% (2.5 $μ$J…
▽ More
In this letter, an energetic and highly efficient dispersive wave (DW) generation at 200 nm has been numerically demonstrated by selectively exciting LP$_{02}$-like mode in a 10 bar Ar-filled hollow-core anti-resonant fiber pumping in the anomalous dispersion regime at 1030 nm with pulses of 30 fs duration and 7 $μ$J energy. Our calculations indicate high conversion efficiency of $>$35\% (2.5 $μ$J) after propagating 3.6 cm fiber length which is due to the strong shock effect and plasma induced blue-shifted soliton. It is observed that the efficiency of fundamental LP$_{01}$-mode is about 15\% which is much smaller than LP$_{02}$-like mode and also emitted at longer wavelength of 270 nm.
△ Less
Submitted 24 August, 2021;
originally announced August 2021.
-
Detecting Requirements Smells With Deep Learning: Experiences, Challenges and Future Work
Authors:
Mohammad Kasra Habib,
Stefan Wagner,
Daniel Graziotin
Abstract:
Requirements Engineering (RE) is the initial step towards building a software system. The success or failure of a software project is firmly tied to this phase, based on communication among stakeholders using natural language. The problem with natural language is that it can easily lead to different understandings if it is not expressed precisely by the stakeholders involved, which results in buil…
▽ More
Requirements Engineering (RE) is the initial step towards building a software system. The success or failure of a software project is firmly tied to this phase, based on communication among stakeholders using natural language. The problem with natural language is that it can easily lead to different understandings if it is not expressed precisely by the stakeholders involved, which results in building a product different from the expected one. Previous work proposed to enhance the quality of the software requirements detecting language errors based on ISO 29148 requirements language criteria. The existing solutions apply classical Natural Language Processing (NLP) to detect them. NLP has some limitations, such as domain dependability which results in poor generalization capability. Therefore, this work aims to improve the previous work by creating a manually labeled dataset and using ensemble learning, Deep Learning (DL), and techniques such as word embeddings and transfer learning to overcome the generalization problem that is tied with classical NLP and improve precision and recall metrics using a manually labeled dataset. The current findings show that the dataset is unbalanced and which class examples should be added more. It is tempting to train algorithms even if the dataset is not considerably representative. Whence, the results show that models are overfitting; in Machine Learning this issue is solved by adding more instances to the dataset, improving label quality, removing noise, and reducing the learning algorithms complexity, which is planned for this research.
△ Less
Submitted 6 August, 2021;
originally announced August 2021.
-
Rolled-up Epsilon-near-zero Waveguide reservoir for long-range qubit entanglement
Authors:
Ibrahim Issah,
Mohsin Habib,
Humeyra Caglayan
Abstract:
Preservation of the entangled state of a quantum system is relevant in quantum applications. However, the preservation of entangled states is constrained due to the energy dissipation of the quantum system arising from the environment. As a result, the design of the environment seen by quantum bits is relevant due to its relation to the final state of the quantum system. This work presents the con…
▽ More
Preservation of the entangled state of a quantum system is relevant in quantum applications. However, the preservation of entangled states is constrained due to the energy dissipation of the quantum system arising from the environment. As a result, the design of the environment seen by quantum bits is relevant due to its relation to the final state of the quantum system. This work presents the concurrence measure of entanglement between two qubits coupled to a rolled-up epsilon-near-zero (ENZ) waveguide reservoir consisting of an alternating layer of metal and dielectric. Our numerical calculations demonstrate that the proposed rolled-up ENZ waveguide reservoir can preserve the entanglement of two qubits at the cutoff wavelength of the reservoir via enhanced energy transfer. This proposed rolled-up ENZ waveguide can serve as a unique reservoir for various quantum technologies such as quantum communication, quantum information processing, and single-photon generation. As a proof of concept, we also demonstrate that this novel structure can be fabricated using cost-effective self-rolling techniques.
△ Less
Submitted 28 July, 2021;
originally announced July 2021.
-
Diameter, radius and all eccentricities in linear time for constant-dimension median graphs
Authors:
Pierre Bergé,
Michel Habib
Abstract:
Median graphs form the class of graphs which is the most studied in metric graph theory. Recently, Bénéteau et al. [2019] designed a linear-time algorithm computing both the $Θ$-classes and the median set of median graphs. A natural question emerges: is there a linear-time algorithm computing the diameter and the radius for median graphs?
We answer positively to this question for median graphs…
▽ More
Median graphs form the class of graphs which is the most studied in metric graph theory. Recently, Bénéteau et al. [2019] designed a linear-time algorithm computing both the $Θ$-classes and the median set of median graphs. A natural question emerges: is there a linear-time algorithm computing the diameter and the radius for median graphs?
We answer positively to this question for median graphs $G$ with constant dimension $d$, i.e. the dimension of the largest induced hypercube of $G$. We propose a combinatorial algorithm computing all eccentricities of median graphs with running time $O(2^{O(d\log d)}n)$. As a consequence, this provides us with a linear-time algorithm determining both the diameter and the radius of median graphs with $d = O(1)$, such as cube-free median graphs. As the hypercube of dimension 4 is not planar, it shows also that all eccentricities of planar median graphs can be computed in $O(n)$.
△ Less
Submitted 25 May, 2021;
originally announced May 2021.
-
Robust 3D U-Net Segmentation of Macular Holes
Authors:
Jonathan Frawley,
Chris G. Willcocks,
Maged Habib,
Caspar Geenen,
David H. Steel,
Boguslaw Obara
Abstract:
Macular holes are a common eye condition which result in visual impairment. We look at the application of deep convolutional neural networks to the problem of macular hole segmentation. We use the 3D U-Net architecture as a basis and experiment with a number of design variants. Manually annotating and measuring macular holes is time consuming and error prone. Previous automated approaches to macul…
▽ More
Macular holes are a common eye condition which result in visual impairment. We look at the application of deep convolutional neural networks to the problem of macular hole segmentation. We use the 3D U-Net architecture as a basis and experiment with a number of design variants. Manually annotating and measuring macular holes is time consuming and error prone. Previous automated approaches to macular hole segmentation take minutes to segment a single 3D scan. Our proposed model generates significantly more accurate segmentations in less than a second. We found that an approach of architectural simplification, by greatly simplifying the network capacity and depth, exceeds both expert performance and state-of-the-art models such as residual 3D U-Nets.
△ Less
Submitted 7 April, 2021; v1 submitted 1 March, 2021;
originally announced March 2021.
-
(α, β)-Modules in Graphs
Authors:
Michel Habib,
Lalla Mouatadid,
Eric Sopena,
Mengchuan Zou
Abstract:
Modular Decomposition focuses on repeatedly identifying a module M (a collection of vertices that shares exactly the same neighbourhood outside of M) and collapsing it into a single vertex. This notion of exactitude of neighbourhood is very strict, especially when dealing with real world graphs. We study new ways to relax this exactitude condition. However, generalizing modular decomposition is fa…
▽ More
Modular Decomposition focuses on repeatedly identifying a module M (a collection of vertices that shares exactly the same neighbourhood outside of M) and collapsing it into a single vertex. This notion of exactitude of neighbourhood is very strict, especially when dealing with real world graphs. We study new ways to relax this exactitude condition. However, generalizing modular decomposition is far from obvious. Most of the previous proposals lose algebraic properties of modules and thus most of the nice algorithmic consequences. We introduce the notion of an (α, β)-module, a relaxation that allows a bounded number of errors in each node and maintains some of the algebraic structure. It leads to a new combinatorial decomposition with interesting properties. Among the main results in this work, we show that minimal (α, β)-modules can be computed in polynomial time, and that every graph admits an (α,β)-modular decomposition tree, thus generalizing Gallai's Theorem (which corresponds to the case for α = β = 0). Unfortunately we give evidence that computing such a decomposition tree can be difficult.
△ Less
Submitted 21 January, 2021;
originally announced January 2021.