-
A Survey on Deep Tabular Learning
Authors:
Shriyank Somvanshi,
Subasish Das,
Syed Aaqib Javed,
Gian Antariksa,
Ahmed Hossain
Abstract:
Tabular data, widely used in industries like healthcare, finance, and transportation, presents unique challenges for deep learning due to its heterogeneous nature and lack of spatial structure. This survey reviews the evolution of deep learning models for tabular data, from early fully connected networks (FCNs) to advanced architectures like TabNet, SAINT, TabTranSELU, and MambaNet. These models i…
▽ More
Tabular data, widely used in industries like healthcare, finance, and transportation, presents unique challenges for deep learning due to its heterogeneous nature and lack of spatial structure. This survey reviews the evolution of deep learning models for tabular data, from early fully connected networks (FCNs) to advanced architectures like TabNet, SAINT, TabTranSELU, and MambaNet. These models incorporate attention mechanisms, feature embeddings, and hybrid architectures to address tabular data complexities. TabNet uses sequential attention for instance-wise feature selection, improving interpretability, while SAINT combines self-attention and intersample attention to capture complex interactions across features and data points, both advancing scalability and reducing computational overhead. Hybrid architectures such as TabTransformer and FT-Transformer integrate attention mechanisms with multi-layer perceptrons (MLPs) to handle categorical and numerical data, with FT-Transformer adapting transformers for tabular datasets. Research continues to balance performance and efficiency for large datasets. Graph-based models like GNN4TDL and GANDALF combine neural networks with decision trees or graph structures, enhancing feature representation and mitigating overfitting in small datasets through advanced regularization techniques. Diffusion-based models like the Tabular Denoising Diffusion Probabilistic Model (TabDDPM) generate synthetic data to address data scarcity, improving model robustness. Similarly, models like TabPFN and Ptab leverage pre-trained language models, incorporating transfer learning and self-supervised techniques into tabular tasks. This survey highlights key advancements and outlines future research directions on scalability, generalization, and interpretability in diverse tabular data applications.
△ Less
Submitted 15 October, 2024;
originally announced October 2024.
-
Introducing the Large Medical Model: State of the art healthcare cost and risk prediction with transformers trained on patient event sequences
Authors:
Ricky Sahu,
Eric Marriott,
Ethan Siegel,
David Wagner,
Flore Uzan,
Troy Yang,
Asim Javed
Abstract:
With U.S. healthcare spending approaching $5T (NHE Fact Sheet 2024), and 25% of it estimated to be wasteful (Waste in the US the health care system: estimated costs and potential for savings, n.d.), the need to better predict risk and optimal patient care is evermore important. This paper introduces the Large Medical Model (LMM), a generative pre-trained transformer (GPT) designed to guide and pre…
▽ More
With U.S. healthcare spending approaching $5T (NHE Fact Sheet 2024), and 25% of it estimated to be wasteful (Waste in the US the health care system: estimated costs and potential for savings, n.d.), the need to better predict risk and optimal patient care is evermore important. This paper introduces the Large Medical Model (LMM), a generative pre-trained transformer (GPT) designed to guide and predict the broad facets of patient care and healthcare administration. The model is trained on medical event sequences from over 140M longitudinal patient claims records with a specialized vocabulary built from medical terminology systems and demonstrates a superior capability to forecast healthcare costs and identify potential risk factors. Through experimentation and validation, we showcase the LMM's proficiency in not only in cost and risk predictions, but also in discerning intricate patterns within complex medical conditions and an ability to identify novel relationships in patient care. The LMM is able to improve both cost prediction by 14.1% over the best commercial models and chronic conditions prediction by 1.9% over the best transformer models in research predicting a broad set of conditions. The LMM is a substantial advancement in healthcare analytics, offering the potential to significantly enhance risk assessment, cost management, and personalized medicine.
△ Less
Submitted 19 September, 2024;
originally announced September 2024.
-
A Robust Multi-Stage Intrusion Detection System for In-Vehicle Network Security using Hierarchical Federated Learning
Authors:
Muzun Althunayyan,
Amir Javed,
Omer Rana
Abstract:
As connected and autonomous vehicles proliferate, the Controller Area Network (CAN) bus has become the predominant communication standard for in-vehicle networks due to its speed and efficiency. However, the CAN bus lacks basic security measures such as authentication and encryption, making it highly vulnerable to cyberattacks. To ensure in-vehicle security, intrusion detection systems (IDSs) must…
▽ More
As connected and autonomous vehicles proliferate, the Controller Area Network (CAN) bus has become the predominant communication standard for in-vehicle networks due to its speed and efficiency. However, the CAN bus lacks basic security measures such as authentication and encryption, making it highly vulnerable to cyberattacks. To ensure in-vehicle security, intrusion detection systems (IDSs) must detect seen attacks and provide a robust defense against new, unseen attacks while remaining lightweight for practical deployment. Previous work has relied solely on the CAN ID feature or has used traditional machine learning (ML) approaches with manual feature extraction. These approaches overlook other exploitable features, making it challenging to adapt to new unseen attack variants and compromising security. This paper introduces a cutting-edge, novel, lightweight, in-vehicle, IDS-leveraging, deep learning (DL) algorithm to address these limitations. The proposed IDS employs a multi-stage approach: an artificial neural network (ANN) in the first stage to detect seen attacks, and a Long Short-Term Memory (LSTM) autoencoder in the second stage to detect new, unseen attacks. To understand and analyze diverse driving behaviors, update the model with the latest attack patterns, and preserve data privacy, we propose a theoretical framework to deploy our IDS in a hierarchical federated learning (H-FL) environment. Experimental results demonstrate that our IDS achieves an F1-score exceeding 0.99 for seen attacks and exceeding 0.95 for novel attacks, with a detection rate of 99.99%. Additionally, the false alarm rate (FAR) is exceptionally low at 0.016%, minimizing false alarms. Despite using DL algorithms known for their effectiveness in identifying sophisticated and zero-day attacks, the IDS remains lightweight, ensuring its feasibility for real-world deployment.
△ Less
Submitted 15 August, 2024;
originally announced August 2024.
-
Simplifying Integration of Custom Controllers in Exergames
Authors:
Hassan Ali Khan,
Muhammad Asbar Javed,
Amnah Khan
Abstract:
Despite of the established evidence in favor of exergames for physical rehabilitation their use is limited in Pakistan. In our user study with game developers (N=62), majority (67.7%) of the participants believed that exergames' popularity will increase if cheap alternatives of body tracking devices are available. Perhaps, custom controllers can be used as an affordable alternate input source in e…
▽ More
Despite of the established evidence in favor of exergames for physical rehabilitation their use is limited in Pakistan. In our user study with game developers (N=62), majority (67.7%) of the participants believed that exergames' popularity will increase if cheap alternatives of body tracking devices are available. Perhaps, custom controllers can be used as an affordable alternate input source in exergames but the lack of hardware programming knowledge and shortage of experience in the embedded programming attribute to the little involvement of game developers (11.3% of the participants) in the area of exergames. This paper presents a library for the integration of Arduino based (open-source and low-cost) tailored controllers to be used as input source in Unity3D (most preferred game development engine by 88.7% participants) based exergames. The interface to the library proposes a flexible and easy structure for programming and serve as a template application for a range of exergames.
△ Less
Submitted 8 July, 2024;
originally announced July 2024.
-
Photosynthetic energy transfer: missing in action (detected spectroscopy)?
Authors:
Ariba Javed,
Julian Lüttig,
Kateřina Charvátová,
Stephanie E. Sanders,
Rhiannon Willow,
Muyi Zhang,
Alastair T. Gardiner,
Pavel Malý,
Jennifer P. Ogilvie
Abstract:
In recent years, action-detected ultrafast spectroscopies have gained popularity. These approaches offer some advantages over their coherently-detected counterparts, enabling spatially-resolved and operando measurements with high sensitivity. However, there are also fundamental limitations connected to the different process of signal generation in action-detected experiments. Specifically, state m…
▽ More
In recent years, action-detected ultrafast spectroscopies have gained popularity. These approaches offer some advantages over their coherently-detected counterparts, enabling spatially-resolved and operando measurements with high sensitivity. However, there are also fundamental limitations connected to the different process of signal generation in action-detected experiments. Specifically, state mixing by nonlinear interactions during signal emission leads to a large static background which can obscure the excited-state dynamics. This could severely limit the applicability of action-detected spectroscopy to study energy transfer in larger systems. Here we perform fluorescence-detected two-dimensional electronic spectroscopy (F-2DES) of the light-harvesting II (LH2) complex from purple bacteria. We demonstrate that the B800-B850 energy transfer process in LH2 is barely discernable in F-2DES, representing a ~6.2% rise of the lower cross-peak intensity. This is in stark contrast to measurements using coherently-detected 2DES where the lower cross-peak reveals energy transfer with 100% contrast. We explain the weak presence of excited-state dynamics using a disordered excitonic model with realistic experimental conditions. We further derive a general formula for the presence of excited-state signals in multi-chromophoric aggregates, dependent on the aggregate geometry and size, and the interplay of excitonic coupling and disorder. We find that, dependent on the excitonic state structure, the excited state dynamics in F-2DES can be visible even in large aggregates. Our work shows that the signatures of energy transfer in F-2DES can be used to directly infer the excitonic structure in multichromophoric systems.
△ Less
Submitted 10 June, 2024;
originally announced June 2024.
-
Utilizing and extending superconducting circuit toolbox to simulate analog quantum gravity
Authors:
M. A. Javed,
D. Kruti,
A. Kenawy,
T. Herrig,
C. Koliofoti,
O. Kashuba,
R. -P. Riwar
Abstract:
There has been considerable effort to simulate quantum gravity features in solid state systems, such as analog black holes or wormholes. However, superconducting circuits have so far received only limited attention in this regard. Moreover, for quantum superpositions of spacetime geometries - a highly contentious notion within the quantum gravity community itself - there currently exist no solid s…
▽ More
There has been considerable effort to simulate quantum gravity features in solid state systems, such as analog black holes or wormholes. However, superconducting circuits have so far received only limited attention in this regard. Moreover, for quantum superpositions of spacetime geometries - a highly contentious notion within the quantum gravity community itself - there currently exist no solid state blueprints. We here show how quantum circuit hardware can implement a variety of classical and quantum spacetime geometries on lattices, by both using established circuit elements and introducing new ones. We demonstrate the possibility of a metric sharply changing within a single lattice point, thus entering a regime where the spacetime curvature itself is trans-Planckian, and the Hawking temperature ill-defined. In fact, our approach suggests that stable, thermal event horizons are incompatible with strictly discrete lattice models. We thus propose to directly probe the evaporation of a wormhole by tracking the accumulation of charge and phase quantum fluctuations over short time scales, which are a robust signature even in the presence of a dissipative environment. Moreover, we present a loop-hole for the typical black/while hole ambiguity in lattice simulations: the existence of exceptional points in the dispersion relation allows for the creation of pure black (or white) hole horizons - at the expense of radically changing the interior wormhole dynamics. Finally, based on multistable Josephson junctions, we introduce the notion of quantum inductors: circuit elements that can be prepared in a superposition of different inductance values. Such inductors realise regions with a quantum superposition of analog spacetime. The entanglement of signals with the quantum spacetime can be probed by a type of delayed-choice experiment.
△ Less
Submitted 17 June, 2024; v1 submitted 3 June, 2024;
originally announced June 2024.
-
PLUTO: Pathology-Universal Transformer
Authors:
Dinkar Juyal,
Harshith Padigela,
Chintan Shah,
Daniel Shenker,
Natalia Harguindeguy,
Yi Liu,
Blake Martin,
Yibo Zhang,
Michael Nercessian,
Miles Markey,
Isaac Finberg,
Kelsey Luu,
Daniel Borders,
Syed Ashar Javed,
Emma Krause,
Raymond Biju,
Aashish Sood,
Allen Ma,
Jackson Nyman,
John Shamshoian,
Guillaume Chhor,
Darpan Sanghavi,
Marc Thibault,
Limin Yu,
Fedaa Najdawi
, et al. (8 additional authors not shown)
Abstract:
Pathology is the study of microscopic inspection of tissue, and a pathology diagnosis is often the medical gold standard to diagnose disease. Pathology images provide a unique challenge for computer-vision-based analysis: a single pathology Whole Slide Image (WSI) is gigapixel-sized and often contains hundreds of thousands to millions of objects of interest across multiple resolutions. In this wor…
▽ More
Pathology is the study of microscopic inspection of tissue, and a pathology diagnosis is often the medical gold standard to diagnose disease. Pathology images provide a unique challenge for computer-vision-based analysis: a single pathology Whole Slide Image (WSI) is gigapixel-sized and often contains hundreds of thousands to millions of objects of interest across multiple resolutions. In this work, we propose PathoLogy Universal TransfOrmer (PLUTO): a light-weight pathology FM that is pre-trained on a diverse dataset of 195 million image tiles collected from multiple sites and extracts meaningful representations across multiple WSI scales that enable a large variety of downstream pathology tasks. In particular, we design task-specific adaptation heads that utilize PLUTO's output embeddings for tasks which span pathology scales ranging from subcellular to slide-scale, including instance segmentation, tile classification, and slide-level prediction. We compare PLUTO's performance to other state-of-the-art methods on a diverse set of external and internal benchmarks covering multiple biologically relevant tasks, tissue types, resolutions, stains, and scanners. We find that PLUTO matches or outperforms existing task-specific baselines and pathology-specific foundation models, some of which use orders-of-magnitude larger datasets and model sizes when compared to PLUTO. Our findings present a path towards a universal embedding to power pathology image analysis, and motivate further exploration around pathology foundation models in terms of data diversity, architectural improvements, sample efficiency, and practical deployability in real-world applications.
△ Less
Submitted 13 May, 2024;
originally announced May 2024.
-
Imaging transformer for MRI denoising with the SNR unit training: enabling generalization across field-strengths, imaging contrasts, and anatomy
Authors:
Hui Xue,
Sarah Hooper,
Azaan Rehman,
Iain Pierce,
Thomas Treibel,
Rhodri Davies,
W Patricia Bandettini,
Rajiv Ramasawmy,
Ahsan Javed,
Zheren Zhu,
Yang Yang,
James Moon,
Adrienne Campbell,
Peter Kellman
Abstract:
The ability to recover MRI signal from noise is key to achieve fast acquisition, accurate quantification, and high image quality. Past work has shown convolutional neural networks can be used with abundant and paired low and high-SNR images for training. However, for applications where high-SNR data is difficult to produce at scale (e.g. with aggressive acceleration, high resolution, or low field…
▽ More
The ability to recover MRI signal from noise is key to achieve fast acquisition, accurate quantification, and high image quality. Past work has shown convolutional neural networks can be used with abundant and paired low and high-SNR images for training. However, for applications where high-SNR data is difficult to produce at scale (e.g. with aggressive acceleration, high resolution, or low field strength), training a new denoising network using a large quantity of high-SNR images can be infeasible.
In this study, we overcome this limitation by improving the generalization of denoising models, enabling application to many settings beyond what appears in the training data. Specifically, we a) develop a training scheme that uses complex MRIs reconstructed in the SNR units (i.e., the images have a fixed noise level, SNR unit training) and augments images with realistic noise based on coil g-factor, and b) develop a novel imaging transformer (imformer) to handle 2D, 2D+T, and 3D MRIs in one model architecture. Through empirical evaluation, we show this combination improves performance compared to CNN models and improves generalization, enabling a denoising model to be used across field-strengths, image contrasts, and anatomy.
△ Less
Submitted 2 April, 2024;
originally announced April 2024.
-
Modulational electrostatic wave-wave interactions in plasma fluids modeled by asymmetric coupled nonlinear Schrödinger (CNLS) equations
Authors:
N. Lazarides,
Giorgos P. Veldes,
Amaria Javed,
Ioannis Kourakis
Abstract:
The interaction between two co-propagating electrostatic wavepackets characterized by arbitrary carrier wavenumber is considered. A one-dimensional (1D) non-magnetized plasma model is adopted, consisting of a cold inertial ion fluid evolving against a thermalized (Maxwell-Boltzmann distributed) electron background. A multiple-scale perturbation method is employed to reduce the original model equat…
▽ More
The interaction between two co-propagating electrostatic wavepackets characterized by arbitrary carrier wavenumber is considered. A one-dimensional (1D) non-magnetized plasma model is adopted, consisting of a cold inertial ion fluid evolving against a thermalized (Maxwell-Boltzmann distributed) electron background. A multiple-scale perturbation method is employed to reduce the original model equations to a pair of coupled nonlinear Schrödinger (CNLS) equations governing the dynamics of the wavepacket amplitudes (envelopes). The CNLS equations are in general asymmetric for arbitrary carrier wabvenumbers. Similar CNLS systems have been derived in the past in various physical contexts, and were found to support soliton, breather, and rogue wave solutions, among others. A detailed stability analysis reveals that modulational instability (MI) is possible in a wide range of values in the parameter space. The instability window and the corresponding growth rate are determined, considering different case studies, and their dependence on the carrier and the perturbation wavenumber is investigated from first principles. Wave-wave coupling is shown to favor MI occurrence by extending its range of occurrence and by enhancing its growth rate. Our findings generalize previously known results usually associated with symmetric NLS equations in nonlinear optics, though taking into account the difference between the different envelope wavenumbers and thus group velocities.
△ Less
Submitted 25 March, 2024;
originally announced March 2024.
-
Direct Sensing of Remote Nuclei: Expanding the Reach of Cross-Effect Dynamic Nuclear Polarization
Authors:
Amaria Javed,
Asif Equbal
Abstract:
Dynamic Nuclear Polarization (DNP) has revolutionized the field of solid-state NMR spectroscopy by significantly enhancing the sensitivity of nuclear magnetic resonance experiments. Conventionally, cross effect DNP relies on biradicals to transfer polarization from coupled electron spins to nearby nuclear spins and subsequent relay to target nuclei via spin diffusion mechanism. However, the direct…
▽ More
Dynamic Nuclear Polarization (DNP) has revolutionized the field of solid-state NMR spectroscopy by significantly enhancing the sensitivity of nuclear magnetic resonance experiments. Conventionally, cross effect DNP relies on biradicals to transfer polarization from coupled electron spins to nearby nuclear spins and subsequent relay to target nuclei via spin diffusion mechanism. However, the direct transfer of polarization to distant nuclei remains a significant challenge, limiting its applicability in various contexts. In this work, we propose a novel biradical design concept that involves a very strong electron-electron coupling, with a magnitude of hundreds of MHz, which enables efficient direct polarization transfer from electron spins to nuclear spins over much longer distances, exceeding 2.0 nm. We discuss the potential of this tailored biradicals in scenarios where conventional spin diffusion mechanisms are inefficient or when direct nuclear spin sensing through electron spin interactions is desired. Our study presents a promising avenue for expanding the scope of cross effect DNP in solid-state NMR spectroscopy and opens new opportunities for investigating a wide range of biological and material systems. Our research also provides insight into the DNP buildup time of commercially available biradicals.
△ Less
Submitted 27 September, 2023;
originally announced September 2023.
-
Implementing Snort Intrusion Prevention System (IPS) for Network Forensic Analysis
Authors:
Kashif Ishaq,
Hafiz Ahsan Javed
Abstract:
The security trade confidentiality, integrity and availability are the main pillar of the information systems as every organization emphasize of the security. From last few decades, digital data is the main asset for every digital or non-digital organization. The proliferation of easily accessible attack software on the internet has lowered the barrier for individuals without hacking skills to eng…
▽ More
The security trade confidentiality, integrity and availability are the main pillar of the information systems as every organization emphasize of the security. From last few decades, digital data is the main asset for every digital or non-digital organization. The proliferation of easily accessible attack software on the internet has lowered the barrier for individuals without hacking skills to engage in malicious activities. An Industrial organization operates a server that (Confluence) serves as a learning platform for newly hired employees or Management training officers, thereby making it vulnerable to potential attacks using readily available internet-based software. To mitigate this risk, it is essential to implement a security system capable of detecting and preventing attacks, as well as conducting investigations. This research project aims to develop a comprehensive security system that can detect attack attempts, initiate preventive measures, and carry out investigations by analyzing attack logs. The study adopted a survey methodology and spanned a period of four months, from March 1, 2023, to June 31, 2023. The outcome of this research is a robust security system that effectively identifies attack attempts, blocks the attacker's IP address, and employs network forensic techniques for investigation purposes. The findings indicate that deploying Snort in IPS mode on PfSense enables the detection of attacks targeting e-learning servers, triggering automatic preventive measures such as IP address blocking. The alerts generated by Snort facilitate investigative actions through network forensics, allowing for accurate reporting on the detrimental effects of the attacks.
△ Less
Submitted 25 August, 2023;
originally announced August 2023.
-
LIPSFUS: A neuromorphic dataset for audio-visual sensory fusion of lip reading
Authors:
Antonio Rios-Navarro,
Enrique Piñero-Fuentes,
Salvador Canas-Moreno,
Aqib Javed,
Jin Harkin,
Alejandro Linares-Barranco
Abstract:
This paper presents a sensory fusion neuromorphic dataset collected with precise temporal synchronization using a set of Address-Event-Representation sensors and tools. The target application is the lip reading of several keywords for different machine learning applications, such as digits, robotic commands, and auxiliary rich phonetic short words. The dataset is enlarged with a spiking version of…
▽ More
This paper presents a sensory fusion neuromorphic dataset collected with precise temporal synchronization using a set of Address-Event-Representation sensors and tools. The target application is the lip reading of several keywords for different machine learning applications, such as digits, robotic commands, and auxiliary rich phonetic short words. The dataset is enlarged with a spiking version of an audio-visual lip reading dataset collected with frame-based cameras. LIPSFUS is publicly available and it has been validated with a deep learning architecture for audio and visual classification. It is intended for sensory fusion architectures based on both artificial and spiking neural network algorithms.
△ Less
Submitted 28 March, 2023;
originally announced April 2023.
-
SC-MIL: Supervised Contrastive Multiple Instance Learning for Imbalanced Classification in Pathology
Authors:
Dinkar Juyal,
Siddhant Shingi,
Syed Ashar Javed,
Harshith Padigela,
Chintan Shah,
Anand Sampat,
Archit Khosla,
John Abel,
Amaro Taylor-Weiner
Abstract:
Multiple Instance learning (MIL) models have been extensively used in pathology to predict biomarkers and risk-stratify patients from gigapixel-sized images. Machine learning problems in medical imaging often deal with rare diseases, making it important for these models to work in a label-imbalanced setting. In pathology images, there is another level of imbalance, where given a positively labeled…
▽ More
Multiple Instance learning (MIL) models have been extensively used in pathology to predict biomarkers and risk-stratify patients from gigapixel-sized images. Machine learning problems in medical imaging often deal with rare diseases, making it important for these models to work in a label-imbalanced setting. In pathology images, there is another level of imbalance, where given a positively labeled Whole Slide Image (WSI), only a fraction of pixels within it contribute to the positive label. This compounds the severity of imbalance and makes imbalanced classification in pathology challenging. Furthermore, these imbalances can occur in out-of-distribution (OOD) datasets when the models are deployed in the real-world. We leverage the idea that decoupling feature and classifier learning can lead to improved decision boundaries for label imbalanced datasets. To this end, we investigate the integration of supervised contrastive learning with multiple instance learning (SC-MIL). Specifically, we propose a joint-training MIL framework in the presence of label imbalance that progressively transitions from learning bag-level representations to optimal classifier learning. We perform experiments with different imbalance settings for two well-studied problems in cancer pathology: subtyping of non-small cell lung cancer and subtyping of renal cell carcinoma. SC-MIL provides large and consistent improvements over other techniques on both in-distribution (ID) and OOD held-out sets across multiple imbalanced settings.
△ Less
Submitted 9 September, 2023; v1 submitted 23 March, 2023;
originally announced March 2023.
-
Intelligent and Secure Radio Environments for 6G Vehicular Aided HetNets: Key Opportunities and Challenges
Authors:
Wali Ullah Khan,
Muhammad Awais Javed,
Sherali Zeadally,
Eva Lagunas,
Symeon Chatzinotas
Abstract:
Reconfigurable meta-surfaces are emerging as a novel and revolutionizing technology to enable intelligent wireless environments. Due to the low cost, improved efficiency, and passive nature of reflecting elements, it is becoming possible to program and control the wireless environment. Since wireless physical layer technologies can generally adapt to the wireless environment, their combination wit…
▽ More
Reconfigurable meta-surfaces are emerging as a novel and revolutionizing technology to enable intelligent wireless environments. Due to the low cost, improved efficiency, and passive nature of reflecting elements, it is becoming possible to program and control the wireless environment. Since wireless physical layer technologies can generally adapt to the wireless environment, their combination with reconfigurable surfaces and deep learning approaches can open new avenues for achieving secure 6G vehicular aided heterogeneous networks (HetNets). Motivated by these appealing advantages, this work provides an intelligent and secure radio environment (ISRE) paradigm for 6G vehicular aided HetNets. We present an overview of enabling technologies for ISRE-based 6G vehicular aided HetNets. We discuss features, design goals, and applications of such networks. Next, we outline new opportunities provided by ISRE-based 6G vehicular HetNets and we present a case study using the contextual bandit approach in terms of best IRS for secure communications. Finally, we discuss some future research opportunities.
△ Less
Submitted 5 October, 2022;
originally announced October 2022.
-
Cooperative Backscatter NOMA with Imperfect SIC: Towards Energy Efficient Sum Rate Maximization in Sustainable 6G Networks
Authors:
Manzoor Ahmed,
Zain Ali,
Wali Ullah Khan,
Omer Waqar,
Muhammad Asif,
Abd Ullah Khan,
Muhammad Awais Javed,
Fahd N. Al-Wesabi
Abstract:
The combination of backscatter communication with non-orthogonal multiple access (NOMA) has the potential to support low-powered massive connections in upcoming sixth-generation (6G) wireless networks. More specifically, backscatter communication can harvest and use the existing RF signals in the atmosphere for communication, while NOMA provides communication to multiple wireless devices over the…
▽ More
The combination of backscatter communication with non-orthogonal multiple access (NOMA) has the potential to support low-powered massive connections in upcoming sixth-generation (6G) wireless networks. More specifically, backscatter communication can harvest and use the existing RF signals in the atmosphere for communication, while NOMA provides communication to multiple wireless devices over the same frequency and time resources. This paper has proposed a new resource management framework for backscatter-aided cooperative NOMA communication in upcoming 6G networks. In particular, the proposed work has simultaneously optimized the base station's transmit power, relaying node, the reflection coefficient of the backscatter tag, and time allocation under imperfect successive interference cancellation to maximize the sum rate of the system. To obtain an efficient solution for the resource management framework, we have proposed a combination of the bisection method and dual theory, where the sub-gradient method is adopted to optimize the Lagrangian multipliers. Numerical results have shown that the proposed solution provides excellent performance. When the performance of the proposed technique is compared to a brute-forcing search technique that guarantees optimal solution however, is very time-consuming, it was seen that the gap in performance is actually 0\%. Hence, the proposed framework has provided performance equal to a cumbersome brute-force search technique while offering much less complexity. The works in the literature on cooperative NOMA considered equal time distribution for cooperation and direct communication. Our results showed that optimizing the time-division can increase the performance by more than 110\% for high transmission powers.
△ Less
Submitted 7 July, 2022;
originally announced July 2022.
-
Additive MIL: Intrinsically Interpretable Multiple Instance Learning for Pathology
Authors:
Syed Ashar Javed,
Dinkar Juyal,
Harshith Padigela,
Amaro Taylor-Weiner,
Limin Yu,
Aaditya Prakash
Abstract:
Multiple Instance Learning (MIL) has been widely applied in pathology towards solving critical problems such as automating cancer diagnosis and grading, predicting patient prognosis, and therapy response. Deploying these models in a clinical setting requires careful inspection of these black boxes during development and deployment to identify failures and maintain physician trust. In this work, we…
▽ More
Multiple Instance Learning (MIL) has been widely applied in pathology towards solving critical problems such as automating cancer diagnosis and grading, predicting patient prognosis, and therapy response. Deploying these models in a clinical setting requires careful inspection of these black boxes during development and deployment to identify failures and maintain physician trust. In this work, we propose a simple formulation of MIL models, which enables interpretability while maintaining similar predictive performance. Our Additive MIL models enable spatial credit assignment such that the contribution of each region in the image can be exactly computed and visualized. We show that our spatial credit assignment coincides with regions used by pathologists during diagnosis and improves upon classical attention heatmaps from attention MIL models. We show that any existing MIL model can be made additive with a simple change in function composition. We also show how these models can debug model failures, identify spurious features, and highlight class-wise regions of interest, enabling their use in high-stakes environments such as clinical decision-making.
△ Less
Submitted 16 October, 2022; v1 submitted 3 June, 2022;
originally announced June 2022.
-
Fractional Josephson effect versus fractional charge in superconducting-normal metal hybrid circuits
Authors:
Mohammad Atif Javed,
Jakob Schwibbert,
Roman-Pascal Riwar
Abstract:
Fractionally charged excitations play a central role in condensed matter physics, and can be probed in different ways. If transport occurs via dissipation-less supercurrents, they manifest as a fractional Josephson effect, whereas in dissipative transport they can be revealed by the transport statistics. However, in a regime where supercurrents and lossy currents coincide, a full understanding of…
▽ More
Fractionally charged excitations play a central role in condensed matter physics, and can be probed in different ways. If transport occurs via dissipation-less supercurrents, they manifest as a fractional Josephson effect, whereas in dissipative transport they can be revealed by the transport statistics. However, in a regime where supercurrents and lossy currents coincide, a full understanding of the relationship between these two transport phenomena is still missing. Moreover, especially for superconducting circuits, the question of how noninteger quasicharges can be reconciled with charge quantization is still not fully resolved, and plays an important role for the circuit dynamics. Here, we aim to unify the above concepts by studying the system-detector dynamics in terms of a Lindbladian capturing both coherent and dissipative transport. Charge quantization is here a conserved property of the detector basis of the Lindbladian, while charge fractionalization is a topological property of its complex-valued eigenspectrum. We show that already conventional superconductor-normal metal hybrid circuits exhibit a variety of topological phases, including an open quantum system version of a fractional Josephson effect. Surprisingly, quasiparticles, usually considered a detrimental side effect, are here a necessary ingredient to observe nontrivial transport behaviour.
△ Less
Submitted 25 May, 2022; v1 submitted 28 April, 2022;
originally announced April 2022.
-
Rethinking Machine Learning Model Evaluation in Pathology
Authors:
Syed Ashar Javed,
Dinkar Juyal,
Zahil Shanis,
Shreya Chakraborty,
Harsha Pokkalla,
Aaditya Prakash
Abstract:
Machine Learning has been applied to pathology images in research and clinical practice with promising outcomes. However, standard ML models often lack the rigorous evaluation required for clinical decisions. Machine learning techniques for natural images are ill-equipped to deal with pathology images that are significantly large and noisy, require expensive labeling, are hard to interpret, and ar…
▽ More
Machine Learning has been applied to pathology images in research and clinical practice with promising outcomes. However, standard ML models often lack the rigorous evaluation required for clinical decisions. Machine learning techniques for natural images are ill-equipped to deal with pathology images that are significantly large and noisy, require expensive labeling, are hard to interpret, and are susceptible to spurious correlations. We propose a set of practical guidelines for ML evaluation in pathology that address the above concerns. The paper includes measures for setting up the evaluation framework, effectively dealing with variability in labels, and a recommended suite of tests to address issues related to domain shift, robustness, and confounding variables. We hope that the proposed framework will bridge the gap between ML researchers and domain experts, leading to wider adoption of ML techniques in pathology and improving patient outcomes.
△ Less
Submitted 18 April, 2022; v1 submitted 11 April, 2022;
originally announced April 2022.
-
Opportunities for Physical Layer Security in UAV Communication Enhanced with Intelligent Reflective Surfaces
Authors:
Wali Ullah Khan,
Eva Lagunas,
Zain Ali,
Muhammad Awais Javed,
Manzoor Ahmed,
Symeon Chatzinotas,
Björn Ottersten,
Petar Popovski
Abstract:
Unmanned Aerial Vehicles (UAVs) are an important component of next-generation wireless networks that can assist in high data rate communications and provide enhanced coverage.Their high mobility and aerial nature offer deployment flexibility and low-cost infrastructure support to existing cellular networks and provide many applications that rely on mobile wireless communications. However, security…
▽ More
Unmanned Aerial Vehicles (UAVs) are an important component of next-generation wireless networks that can assist in high data rate communications and provide enhanced coverage.Their high mobility and aerial nature offer deployment flexibility and low-cost infrastructure support to existing cellular networks and provide many applications that rely on mobile wireless communications. However, security is a major challenge in UAV communications, and Physical Layer Security (PLS) is an important technique to improve the reliability and security of data shared with the assistance of UAVs. Recently, Intelligent Reflecting Surfaces (IRS) have emerged as a novel technology to extend and/or enhance wireless coverage by re-configuring the propagation environment of communications. This paper provides an overview of how IRS can improve the PLS of UAV networks. We discuss different use cases of PLS for IRS enhanced UAV communications and briefly review the recent advances in this area. Then based on the recent advances, we also present a case study that utilizes alternate optimization to maximize the secrecy capacity for IRS enhanced UAV scenario in the presence of multiple eavesdroppers. Finally, we highlight several open issues and research challenges to realize PLS in IRS enhanced UAV communications.
△ Less
Submitted 20 September, 2022; v1 submitted 31 March, 2022;
originally announced March 2022.
-
NOMA-enabled Backscatter Communications for Green Transportation in Automotive-Industry 5.0
Authors:
Wali Ullah Khan,
Asim Ihsan,
Tu N. Nguyen,
Zain Ali,
Muhammad Awais Javed
Abstract:
Automotive-Industry 5.0 will use emerging 6G communications to provide robust, computationally intelligent, and energy-efficient data sharing among various onboard sensors, vehicles, and other Intelligent Transportation System (ITS) entities. Non-Orthogonal Multiple Access (NOMA) and backscatter communications are two key techniques of 6G communications for enhanced spectrum and energy efficiency.…
▽ More
Automotive-Industry 5.0 will use emerging 6G communications to provide robust, computationally intelligent, and energy-efficient data sharing among various onboard sensors, vehicles, and other Intelligent Transportation System (ITS) entities. Non-Orthogonal Multiple Access (NOMA) and backscatter communications are two key techniques of 6G communications for enhanced spectrum and energy efficiency. In this paper, we provide an introduction to green transportation and also discuss the advantages of using backscatter communications and NOMA in Automotive Industry 5.0. We also briefly review the recent work in the area of NOMA empowered backscatter communications. We discuss different use cases of backscatter communications in NOMA-enabled 6G vehicular networks. We also propose a multi-cell optimization framework to maximize the energy efficiency of the backscatter-enabled NOMA vehicular network. In particular, we jointly optimize the transmit power of the roadside unit and the reflection coefficient of the backscatter device in each cell, where several practical constraints are also taken into account. The problem of energy efficiency is formulated as nonconvex which is hard to solve directly. Thus, first, we adopt the Dinkelbach method to transform the objective function into a subtractive one, then we decouple the problem into two subproblems. Second, we employ dual theory and KKT conditions to obtain efficient solutions. Finally, we highlight some open issues and future research opportunities related to NOMA-enabled backscatter communications in 6G vehicular networks.
△ Less
Submitted 9 March, 2022;
originally announced March 2022.
-
SOMTimeS: Self Organizing Maps for Time Series Clustering and its Application to Serious Illness Conversations
Authors:
Ali Javed,
Donna M. Rizzo,
Byung Suk Lee,
Robert Gramling
Abstract:
There is an increasing demand for scalable algorithms capable of clustering and analyzing large time series datasets. The Kohonen self-organizing map (SOM) is a type of unsupervised artificial neural network for visualizing and clustering complex data, reducing the dimensionality of data, and selecting influential features. Like all clustering methods, the SOM requires a measure of similarity betw…
▽ More
There is an increasing demand for scalable algorithms capable of clustering and analyzing large time series datasets. The Kohonen self-organizing map (SOM) is a type of unsupervised artificial neural network for visualizing and clustering complex data, reducing the dimensionality of data, and selecting influential features. Like all clustering methods, the SOM requires a measure of similarity between input data (in this work time series). Dynamic time warping (DTW) is one such measure, and a top performer given that it accommodates the distortions when aligning time series. Despite its use in clustering, DTW is limited in practice because it is quadratic in runtime complexity with the length of the time series data. To address this, we present a new DTW-based clustering method, called SOMTimeS (a Self-Organizing Map for TIME Series), that scales better and runs faster than other DTW-based clustering algorithms, and has similar performance accuracy. The computational performance of SOMTimeS stems from its ability to prune unnecessary DTW computations during the SOM's training phase. We also implemented a similar pruning strategy for K-means for comparison with one of the top performing clustering algorithms. We evaluated the pruning effectiveness, accuracy, execution time and scalability on 112 benchmark time series datasets from the University of California, Riverside classification archive. We showed that for similar accuracy, the speed-up achieved for SOMTimeS and K-means was 1.8x on average; however, rates varied between 1x and 18x depending on the dataset. SOMTimeS and K-means pruned 43% and 50% of the total DTW computations, respectively. We applied SOMtimeS to natural language conversation data collected as part of a large healthcare cohort study of patient-clinician serious illness conversations to demonstrate the algorithm's utility with complex, temporally sequenced phenomena.
△ Less
Submitted 25 August, 2021;
originally announced August 2021.
-
Families of Skyrmions in Two-Dimensional Spin-1/2 Systems
Authors:
Amaria Javed,
L. Al Sakkaf,
U. Al Khawaja
Abstract:
We find Skyrmion-like topological excitations for a two-dimensional spin-1/2 system. Expressing the spinor wavefunction in terms of a rotation operator maps the spin-1/2 system to a Manakov system. We employ both analytical and numerical methods to solve the resulting Manakov system. Using a generalized similarity transformation, we reduce the two-dimensional Manakov system to the integrable one-d…
▽ More
We find Skyrmion-like topological excitations for a two-dimensional spin-1/2 system. Expressing the spinor wavefunction in terms of a rotation operator maps the spin-1/2 system to a Manakov system. We employ both analytical and numerical methods to solve the resulting Manakov system. Using a generalized similarity transformation, we reduce the two-dimensional Manakov system to the integrable one-dimensional Manakov system. Solutions obtained in this manner diverge at the origin. We employ a power series method to obtain an infinite family of localized and nondiverging solutions characterized by a finite number of nodes. A numerical method is then used to obtain a family of localized oscillatory solutions with an infinite number of nodes corresponding to a skyrmion composed of concentric rings with intensities alternating between the two components of the spinor. We investigate the stability of the skyrmion solutions found here by calculating their energy functional in terms of their effective size. It turns out that indeed the skyrmion is most stable when the phase difference between the concentric rings is $π$, i.e., alternating between spin up and spin down. Our results are also applicable to doubly polarized optical pulses.
△ Less
Submitted 3 August, 2021;
originally announced August 2021.
-
Adding Binary Numbers with Discrete Solitons in Waveguide Arrays
Authors:
Alaa Shaheen,
Amaria Javed,
U. Al Khawaja
Abstract:
We present a design and protocol to add binary numbers using discrete solitons in waveguide arrays. We show that the nonlinear interaction between discrete solitons in waveguide arrays can be exploited to design half and full adders. By modulating the separation between waveguides and introducing control solitons, we achieve the performance of an XOR gate. We construct the half and full adders usi…
▽ More
We present a design and protocol to add binary numbers using discrete solitons in waveguide arrays. We show that the nonlinear interaction between discrete solitons in waveguide arrays can be exploited to design half and full adders. By modulating the separation between waveguides and introducing control solitons, we achieve the performance of an XOR gate. We construct the half and full adders using the XOR gate together with the previously-designed OR and AND gates. To facilitate the experimental realization, we calculate the profile of separations between the waveguides that will lead to the performance of the XOR gate.
△ Less
Submitted 3 August, 2021;
originally announced August 2021.
-
Amplifying Optical Signals with Discrete Solitons in Waveguide Arrays
Authors:
Amaria Javed,
Alaa Shaheen,
U. Al Khawaja
Abstract:
We present a design and protocol to achieve an essential feature of an optical transistor, namely the amplification of input signal with the use of discrete solitons in waveguide arrays. We consider the scattering of a discrete soliton by a reflectionless potential in the presence of a control soliton. We show that at the sharp transition region between full reflectance and full transmittance, the…
▽ More
We present a design and protocol to achieve an essential feature of an optical transistor, namely the amplification of input signal with the use of discrete solitons in waveguide arrays. We consider the scattering of a discrete soliton by a reflectionless potential in the presence of a control soliton. We show that at the sharp transition region between full reflectance and full transmittance, the intensity of the reflected or transmitted soliton is highly sensitive to the intensity of the control soliton. This suggests a setup of signal amplifier. For realistic purposes, we modulate the parameters of the reflectionless potential well to achieve a performance of amplifier with a controllable amplification. To facilitate the experimental realization, we calculate the amplification factor in terms of the parameters of the potential well and the input power of the control soliton. The suggested signal amplifier device will be an important component in the all-optical data processing.
△ Less
Submitted 3 August, 2021;
originally announced August 2021.
-
Unidirectional flow of composite bright-bright solitons through asymmetric double potential barriers and wells
Authors:
Amaria Javed,
T. Uthayakumar,
M. O. D. Alotaibi,
S. M. Al-Marzoug,
H. Bahlouli,
U. Al Khawaja
Abstract:
We investigate the dynamics of two component bright-bright (BB) solitons through reflectionless double barrier and double well potentials in the framework of a Manakov system governed by the coupled nonlinear Schrödinger equations. The objective is to achieve unidirectional flow and unidirectional segregation/splitting, which may be used in the design of optical data processing devices. We observe…
▽ More
We investigate the dynamics of two component bright-bright (BB) solitons through reflectionless double barrier and double well potentials in the framework of a Manakov system governed by the coupled nonlinear Schrödinger equations. The objective is to achieve unidirectional flow and unidirectional segregation/splitting, which may be used in the design of optical data processing devices. We observe how the propagation of composite BB soliton is affected by the presence of interaction coupling between the two components passing through the asymmetric potentials. We consider Gaussian and Rosen-Morse double potential barriers in order to achieve the unidirectional flow. Moreover, we observe a novel phenomenon which we name "\textit{Polarity Reversal}" in the unidirectional flow. In this situation, the polarity of the diode is reversed. To understand the physics underlying these phenomena, we perform a variational calculation where we also achieve unidirectional segregation/splitting using an asymmetric double square potential well. Our comparative study between analytical and numerical analysis lead to an excellent agreement between the two methods.
△ Less
Submitted 23 July, 2021;
originally announced July 2021.
-
Hierarchical Text Classification of Urdu News using Deep Neural Network
Authors:
Taimoor Ahmed Javed,
Waseem Shahzad,
Umair Arshad
Abstract:
Digital text is increasing day by day on the internet. It is very challenging to classify a large and heterogeneous collection of data, which require improved information processing methods to organize text. To classify large size of corpus, one common approach is to use hierarchical text classification, which aims to classify textual data in a hierarchical structure. Several approaches have been…
▽ More
Digital text is increasing day by day on the internet. It is very challenging to classify a large and heterogeneous collection of data, which require improved information processing methods to organize text. To classify large size of corpus, one common approach is to use hierarchical text classification, which aims to classify textual data in a hierarchical structure. Several approaches have been proposed to tackle classification of text but most of the research has been done on English language. This paper proposes a deep learning model for hierarchical text classification of news in Urdu language - consisting of 51,325 sentences from 8 online news websites belonging to the following genres: Sports; Technology; and Entertainment. The objectives of this paper are twofold: (1) to develop a large human-annotated dataset of news in Urdu language for hierarchical text classification; and (2) to classify Urdu news hierarchically using our proposed model based on LSTM mechanism named as Hierarchical Multi-layer LSTMs (HMLSTM). Our model consists of two modules: Text Representing Layer, for obtaining text representation in which we use Word2vec embedding to transform the words to vector and Urdu Hierarchical LSTM Layer (UHLSTML) an end-to-end fully connected deep LSTMs network to perform automatic feature learning, we train one LSTM layer for each level of the class hierarchy. We have performed extensive experiments on our self created dataset named as Urdu News Dataset for Hierarchical Text Classification (UNDHTC). The result shows that our proposed method is very effective for hierarchical text classification and it outperforms baseline methods significantly and also achieved good results as compare to deep neural model.
△ Less
Submitted 7 July, 2021;
originally announced July 2021.
-
Terrain Adaptive Gait Transitioning for a Quadruped Robot using Model Predictive Control
Authors:
Prathamesh Saraf,
Abhishek Sarkar,
Arshad Javed
Abstract:
Legged robots can traverse challenging terrain, use perception to plan their safe foothold positions, and navigate the environment. Such unique mobility capabilities make these platforms a perfect candidate for scenarios such as search and rescue, inspection, and exploration tasks. While traversing through such terrains, the robot's instability is a significant concern. Many times the robot needs…
▽ More
Legged robots can traverse challenging terrain, use perception to plan their safe foothold positions, and navigate the environment. Such unique mobility capabilities make these platforms a perfect candidate for scenarios such as search and rescue, inspection, and exploration tasks. While traversing through such terrains, the robot's instability is a significant concern. Many times the robot needs to switch gaits depending on its environment. Due to the complex dynamics of quadruped robots, classical PID control fails to provide high stability. Thus, there is a need for advanced control methods like the Model Predictive Control (MPC) which uses the system model and the nature of the terrain in order to predict the stable body pose of the robot. The controller also provides correction to any external disturbances that result in a change in the desired behavior of the robot. The MPC controller is designed in MATLAB, for full body torque control. The controller performance was verified on Boston Dynamics Spot in Webots simulator. The robot is able to provide correction for external perturbations up to 150 N and also resist falls till 80 cm.
△ Less
Submitted 6 July, 2021; v1 submitted 6 June, 2021;
originally announced June 2021.
-
Phase-Modulated Rapid-Scanning Fluorescence-Detected Two-Dimensional Electronic Spectroscopy
Authors:
Damianos Agathangelou,
Ariba Javed,
Francesco Sessa,
Xavier Solinas,
Manuel Joffre,
Jennifer P. Ogilvie
Abstract:
We present a rapid-scanning approach to fluorescence-detected two-dimensional electronic spectroscopy that combines acousto-optic phase-modulation with digital lock-in detection. The approach shifts the signal detection window to suppress 1/f laser noise and enables interferometric tracking of the time delays to allow for correction of spectral phase distortions and accurate phasing of the data. T…
▽ More
We present a rapid-scanning approach to fluorescence-detected two-dimensional electronic spectroscopy that combines acousto-optic phase-modulation with digital lock-in detection. The approach shifts the signal detection window to suppress 1/f laser noise and enables interferometric tracking of the time delays to allow for correction of spectral phase distortions and accurate phasing of the data. This use of digital lock-in detection enables acquisition of linear and nonlinear signals of interest in a single measurement. We demonstrate the method on a laser dye, measuring the linear fluorescence excitation spectrum, as well as rephasing, non-rephasing and absorptive fluorescence-detected two-dimensional electronic spectra.
△ Less
Submitted 27 May, 2021;
originally announced May 2021.
-
Deepfakes Generation and Detection: State-of-the-art, open challenges, countermeasures, and way forward
Authors:
Momina Masood,
Marriam Nawaz,
Khalid Mahmood Malik,
Ali Javed,
Aun Irtaza
Abstract:
Easy access to audio-visual content on social media, combined with the availability of modern tools such as Tensorflow or Keras, open-source trained models, and economical computing infrastructure, and the rapid evolution of deep-learning (DL) methods, especially Generative Adversarial Networks (GAN), have made it possible to generate deepfakes to disseminate disinformation, revenge porn, financia…
▽ More
Easy access to audio-visual content on social media, combined with the availability of modern tools such as Tensorflow or Keras, open-source trained models, and economical computing infrastructure, and the rapid evolution of deep-learning (DL) methods, especially Generative Adversarial Networks (GAN), have made it possible to generate deepfakes to disseminate disinformation, revenge porn, financial frauds, hoaxes, and to disrupt government functioning. The existing surveys have mainly focused on the detection of deepfake images and videos. This paper provides a comprehensive review and detailed analysis of existing tools and machine learning (ML) based approaches for deepfake generation and the methodologies used to detect such manipulations for both audio and visual deepfakes. For each category of deepfake, we discuss information related to manipulation approaches, current public datasets, and key standards for the performance evaluation of deepfake detection techniques along with their results. Additionally, we also discuss open challenges and enumerate future directions to guide future researchers on issues that need to be considered to improve the domains of both deepfake generation and detection. This work is expected to assist the readers in understanding the creation and detection mechanisms of deepfakes, along with their current limitations and future direction.
△ Less
Submitted 22 November, 2021; v1 submitted 25 February, 2021;
originally announced March 2021.
-
Stable Matching for Selection of Intelligent Reflecting Surfaces in Multiuser MISO Systems
Authors:
Jawad Mirza,
Bakhtiar Ali,
Muhammad Awais Javed
Abstract:
In this letter, we present an intelligent reflecting surface (IRS) selection strategy for multiple IRSs aided multiuser multiple-input single-output (MISO) systems. In particular, we pose the IRS selection problem as a stable matching problem. A two stage user-IRS assignment algorithm is proposed, where the main objective is to carry out a stable user-IRS matching, such that the sum rate of the sy…
▽ More
In this letter, we present an intelligent reflecting surface (IRS) selection strategy for multiple IRSs aided multiuser multiple-input single-output (MISO) systems. In particular, we pose the IRS selection problem as a stable matching problem. A two stage user-IRS assignment algorithm is proposed, where the main objective is to carry out a stable user-IRS matching, such that the sum rate of the system is improved. The first stage of the proposed algorithm employs a well-known Gale Shapley matching designed for the stable marriage problem. However, due to interference in multiuser systems, the matching obtained after the first stage may not be stable. To overcome this issue, one-sided (i.e., only IRSs) blocking pairs (BPs) are identified in the second stage of the proposed algorithm, where the BP is a pair of IRSs which are better off after exchanging their partners. Thus, the second stage validates the stable matching in the proposed algorithm. Numerical results show that the proposed assignment achieves better sum rate performance compared to distance-based and random matching algorithms.
△ Less
Submitted 16 January, 2021;
originally announced January 2021.
-
Efficient Mining Cluster Selection for Blockchain-based Cellular V2X Communications
Authors:
Furqan Jameel,
Muhammad Awais Javed,
Sherali Zeadally,
Riku Jantti
Abstract:
Cellular vehicle-to-everything (V2X) communication is expected to herald the age of autonomous vehicles in the coming years. With the integration of blockchain in such networks, information of all granularity levels, from complete blocks to individual transactions, would be accessible to vehicles at any time. Specifically, the blockchain technology is expected to improve the security, immutability…
▽ More
Cellular vehicle-to-everything (V2X) communication is expected to herald the age of autonomous vehicles in the coming years. With the integration of blockchain in such networks, information of all granularity levels, from complete blocks to individual transactions, would be accessible to vehicles at any time. Specifically, the blockchain technology is expected to improve the security, immutability, and decentralization of cellular V2X communication through smart contract and distributed ledgers. Although blockchain-based cellular V2X networks hold promise, many challenges need to be addressed to enable the future interoperability and accessibility of such large-scale platforms. One such challenge is the offloading of mining tasks in cellular V2X networks. While transportation authorities may try to balance the network mining load, the vehicles may select the nearest mining clusters to offload a task. This may cause congestion and disproportionate use of vehicular network resources. To address this issue, we propose a game-theoretic approach for balancing the load at mining clusters while maintaining fairness among offloading vehicles. Keeping in mind the low-latency requirements of vehicles, we consider a finite channel blocklength transmission which is more practical compared to the use of infinite blocklength codes. The simulation results obtained with our proposed offloading framework show improved performance over the conventional nearest mining cluster selection technique.
△ Less
Submitted 29 June, 2020;
originally announced July 2020.
-
A Benchmark Study on Time Series Clustering
Authors:
Ali Javed,
Byung Suk Lee,
Dona M. Rizzo
Abstract:
This paper presents the first time series clustering benchmark utilizing all time series datasets currently available in the University of California Riverside (UCR) archive -- the state of the art repository of time series data. Specifically, the benchmark examines eight popular clustering methods representing three categories of clustering algorithms (partitional, hierarchical and density-based)…
▽ More
This paper presents the first time series clustering benchmark utilizing all time series datasets currently available in the University of California Riverside (UCR) archive -- the state of the art repository of time series data. Specifically, the benchmark examines eight popular clustering methods representing three categories of clustering algorithms (partitional, hierarchical and density-based) and three types of distance measures (Euclidean, dynamic time warping, and shape-based). We lay out six restrictions with special attention to making the benchmark as unbiased as possible. A phased evaluation approach was then designed for summarizing dataset-level assessment metrics and discussing the results. The benchmark study presented can be a useful reference for the research community on its own; and the dataset-level assessment metrics reported may be used for designing evaluation frameworks to answer different research questions.
△ Less
Submitted 26 April, 2020; v1 submitted 20 April, 2020;
originally announced April 2020.
-
CEFIoT: A Fault-Tolerant IoT Architecture for Edge and Cloud
Authors:
Asad Javed,
Keijo Heljanko,
Andrea Buda,
Kary Främling
Abstract:
Internet of Things (IoT), the emerging computing infrastructure that refers to the networked interconnection of physical objects, incorporates a plethora of digital systems that are being developed by means of a large number of applications. Many of these applications administer data collection on the edge and offer data storage and analytics capabilities in the cloud. This raises the following pr…
▽ More
Internet of Things (IoT), the emerging computing infrastructure that refers to the networked interconnection of physical objects, incorporates a plethora of digital systems that are being developed by means of a large number of applications. Many of these applications administer data collection on the edge and offer data storage and analytics capabilities in the cloud. This raises the following problems: (i) the processing stages in IoT applications need to have separate implementations for both the edge and the cloud, (ii) the placement of computation is inflexible with separate software stacks, as the optimal deployment decisions need to be made at runtime, and (iii) unified fault tolerance is essential in case of intermittent long-distance network connectivity problems, malicious harming of edge devices, or harsh environments. This paper proposes a novel fault-tolerant architecture CEFIoT for IoT applications by adopting state-of-the-art cloud technologies and deploying them also for edge computing. We solve the data fault tolerance issue by exploiting the Apache Kafka publish/subscribe platform as the unified high-performance data replication solution offering a common software stack for both the edge and the cloud. We also deploy Kubernetes for fault-tolerant management and the advanced functionality allowing on-the-fly automatic reconfiguration of the processing pipeline to handle both hardware and network connectivity based failures.
△ Less
Submitted 23 January, 2020;
originally announced January 2020.
-
Shared Autonomy in Web-based Human Robot Interaction
Authors:
Yug Ajmera,
Arshad Javed
Abstract:
In this paper, we aim to achieve a human-robot work balance by implementing shared autonomy through a web interface. Shared autonomy integrates user input with the autonomous capabilities of the robot and therefore increases the overall performance of the robot. Presenting only the relevant information to the user on the web page lowers the cognitive load of the operator. Through our web interface…
▽ More
In this paper, we aim to achieve a human-robot work balance by implementing shared autonomy through a web interface. Shared autonomy integrates user input with the autonomous capabilities of the robot and therefore increases the overall performance of the robot. Presenting only the relevant information to the user on the web page lowers the cognitive load of the operator. Through our web interface, we provide a mechanism for the operator to directly interact using the displayed information by applying a point-and-click paradigm. Further, we present our idea to employ a human-robot mutual adaptation in a shared autonomy setting through our web interface for effective team collaboration.
△ Less
Submitted 19 February, 2020; v1 submitted 21 December, 2019;
originally announced December 2019.
-
CineFilter: Unsupervised Filtering for Real Time Autonomous Camera Systems
Authors:
Sudheer Achary,
K L Bhanu Moorthy,
Syed Ashar Javed,
Nikita Shravan,
Vineet Gandhi,
Anoop Namboodiri
Abstract:
Autonomous camera systems are often subjected to an optimization/filtering operation to smoothen and stabilize the rough trajectory estimates. Most common filtering techniques do reduce the irregularities in data; however, they fail to mimic the behavior of a human cameraman. Global filtering methods modeling human camera operators have been successful; however, they are limited to offline setting…
▽ More
Autonomous camera systems are often subjected to an optimization/filtering operation to smoothen and stabilize the rough trajectory estimates. Most common filtering techniques do reduce the irregularities in data; however, they fail to mimic the behavior of a human cameraman. Global filtering methods modeling human camera operators have been successful; however, they are limited to offline settings. In this paper, we propose two online filtering methods called Cinefilters, which produce smooth camera trajectories that are motivated by cinematographic principles. The first filter (CineConvex) uses a sliding window-based convex optimization formulation, and the second (CineCNN) is a CNN based encoder-decoder model. We evaluate the proposed filters in two different settings, namely a basketball dataset and a stage performance dataset. Our models outperform previous methods and baselines on both quantitative and qualitative metrics. The CineConvex and CineCNN filters operate at about 250fps and 1000fps, respectively, with a minor latency (half a second), making them apt for a variety of real-time applications.
△ Less
Submitted 27 May, 2020; v1 submitted 11 December, 2019;
originally announced December 2019.
-
Analysis of Hydrological and Suspended Sediment Events from Mad River Watershed using Multivariate Time Series Clustering
Authors:
Ali Javed,
Scott D. Hamshaw,
Donna M. Rizzo,
Byung Suk Lee
Abstract:
Hydrological storm events are a primary driver for transporting water quality constituents such as turbidity, suspended sediments and nutrients. Analyzing the concentration (C) of these water quality constituents in response to increased streamflow discharge (Q), particularly when monitored at high temporal resolution during a hydrological event, helps to characterize the dynamics and flux of such…
▽ More
Hydrological storm events are a primary driver for transporting water quality constituents such as turbidity, suspended sediments and nutrients. Analyzing the concentration (C) of these water quality constituents in response to increased streamflow discharge (Q), particularly when monitored at high temporal resolution during a hydrological event, helps to characterize the dynamics and flux of such constituents. A conventional approach to storm event analysis is to reduce the C-Q time series to two-dimensional (2-D) hysteresis loops and analyze these 2-D patterns. While effective and informative to some extent, this hysteresis loop approach has limitations because projecting the C-Q time series onto a 2-D plane obscures detail (e.g., temporal variation) associated with the C-Q relationships. In this paper, we address this issue using a multivariate time series clustering approach. Clustering is applied to sequences of river discharge and suspended sediment data (acquired through turbidity-based monitoring) from six watersheds located in the Lake Champlain Basin in the northeastern United States. While clusters of the hydrological storm events using the multivariate time series approach were found to be correlated to 2-D hysteresis loop classifications and watershed locations, the clusters differed from the 2-D hysteresis classifications. Additionally, using available meteorological data associated with storm events, we examine the characteristics of computational clusters of storm events in the study watersheds and identify the features driving the clustering approach.
△ Less
Submitted 20 March, 2020; v1 submitted 27 November, 2019;
originally announced November 2019.
-
Embodied Language Grounding with 3D Visual Feature Representations
Authors:
Mihir Prabhudesai,
Hsiao-Yu Fish Tung,
Syed Ashar Javed,
Maximilian Sieb,
Adam W. Harley,
Katerina Fragkiadaki
Abstract:
We propose associating language utterances to 3D visual abstractions of the scene they describe. The 3D visual abstractions are encoded as 3-dimensional visual feature maps. We infer these 3D visual scene feature maps from RGB images of the scene via view prediction: when the generated 3D scene feature map is neurally projected from a camera viewpoint, it should match the corresponding RGB image.…
▽ More
We propose associating language utterances to 3D visual abstractions of the scene they describe. The 3D visual abstractions are encoded as 3-dimensional visual feature maps. We infer these 3D visual scene feature maps from RGB images of the scene via view prediction: when the generated 3D scene feature map is neurally projected from a camera viewpoint, it should match the corresponding RGB image. We present generative models that condition on the dependency tree of an utterance and generate a corresponding visual 3D feature map as well as reason about its plausibility, and detector models that condition on both the dependency tree of an utterance and a related image and localize the object referents in the 3D feature map inferred from the image. Our model outperforms models of language and vision that associate language with 2D CNN activations or 2D images by a large margin in a variety of tasks, such as, classifying plausibility of utterances, detecting referential expressions, and supplying rewards for trajectory optimization of object placement policies from language instructions. We perform numerous ablations and show the improved performance of our detectors is due to its better generalization across camera viewpoints and lack of object interferences in the inferred 3D feature space, and the improved performance of our generators is due to their ability to spatially reason about objects and their configurations in 3D when mapping from language to scenes.
△ Less
Submitted 17 June, 2021; v1 submitted 2 October, 2019;
originally announced October 2019.
-
Interference mitigation techniques for a dense heterogeneous area network in machine-to-machine communications
Authors:
Dong Chen,
Jamil Khan,
Muhammad Awais Javed,
Jason Brown
Abstract:
With the advent of Machine-to-Machine (M2M) communications, various networking consumer industrial and autonomous systems exchange messages in the real world in order to achieve their objectives. Parts of these systems are comprised of short-range wireless networks in the form of clusters that collectively cover a large geographical area. In these clusters, the nodes that represent the cluster hea…
▽ More
With the advent of Machine-to-Machine (M2M) communications, various networking consumer industrial and autonomous systems exchange messages in the real world in order to achieve their objectives. Parts of these systems are comprised of short-range wireless networks in the form of clusters that collectively cover a large geographical area. In these clusters, the nodes that represent the cluster heads need to deal with two types of communications: one is within the cluster and the other is from the cluster to the sink node. As the number of clusters increases, it takes multiple hops for the cluster head to forward data to the sink node, thus resulting in a low packet delivery rate and throughput. To solve this problem, we propose a heterogeneous area network in which the cluster head is equipped with two types of radios: the IEEE 802.15.4 and IEEE 802.11 radios. The former is for the devices within the cluster to communicate, whereas the latter is for the cluster heads to communicate to the sink node. Although the IEEE 802.11 links increase the link capacity, the IEEE 802.11 radio and the IEEE 802.15.4 radio might share the 2.4 GHz unlicensed band, thus giving rise to the inter-network collisions or interference. To tackle this problem and to maintain decent Qualityof-Service (QoS) for the network, we subsequently present two interference mitigation techniques, in which a Blank Burst (BB) period is proposed so that the IEEE 802.15.4 radios can be suspended while the IEEE 802.11 radios are active. Simulation results show the proposed two methods can effectively mitigate the inter-network collisions and are superior to the existing technique, which uses an adaptive aggregation technique to mitigate the inter-network collisions.
△ Less
Submitted 4 September, 2019;
originally announced September 2019.
-
Voice Spoofing Detection Corpus for Single and Multi-order Audio Replays
Authors:
Roland Baumann,
Khalid Mahmood Malik,
Ali Javed,
Andersen Ball,
Brandon Kujawa,
Hafiz Malik
Abstract:
The evolution of modern voice controlled devices (VCDs) in recent years has revolutionized the Internet of Things, and resulted in increased realization of smart homes, personalization and home automation through voice commands. The introduction of VCDs in IoT is expected to give emergence of new subfield of IoT, called Multimedia of Thing (MoT). These VCDs can be exploited in IoT driven environme…
▽ More
The evolution of modern voice controlled devices (VCDs) in recent years has revolutionized the Internet of Things, and resulted in increased realization of smart homes, personalization and home automation through voice commands. The introduction of VCDs in IoT is expected to give emergence of new subfield of IoT, called Multimedia of Thing (MoT). These VCDs can be exploited in IoT driven environment to generate various spoofing attacks including the replays. Replay attacks are generated through replaying the recorded audio of legitimate human speaker with the intent of deceiving the VCDs having speaker verification system. The connectivity among the VCDs can easily be exploited in IoT driven environment to generate a chain of replay attacks (multi-order replay attacks). Existing spoofing detection datasets like ASVspoof and ReMASC contain only the first-order replay recordings against the bonafide audio samples. These datasets can not offer evaluation of the anti-spoofing algorithms capable of detecting the multi-order replay attacks. Additionally, these datasets do not capture the characteristics of microphone arrays, which is an important characteristic of modern VCDs. We need a diverse replay spoofing detection corpus that consists of multi-order replay recordings against the bonafide voice samples. This paper presents a novel voice spoofing detection corpus (VSDC) to evaluate the performance of multi-order replay anti-spoofing methods. The proposed VSDC consists of first and second-order-replay samples against the bonafide audio recordings. Additionally, the proposed VSDC can also be used to evaluate the performance of speaker verification systems as our corpus includes the audio samples of fifteen different speakers. To the best of our knowledge, this is the first publicly available replay spoofing detection corpus comprising of first-order and second-order-replay samples.
△ Less
Submitted 2 September, 2019;
originally announced September 2019.
-
Performance Analysis of Cooperative V2V and V2I Communications under Correlated Fading
Authors:
Furqan Jameel,
Muhammad Awais Javed,
Duy T. Ngo
Abstract:
Cooperative vehicular networks will play a vital role in the coming years to implement various intelligent transportation-related applications. Both vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications will be needed to reliably disseminate information in a vehicular network. In this regard, a roadside unit (RSU) equipped with multiple antennas can improve the network capaci…
▽ More
Cooperative vehicular networks will play a vital role in the coming years to implement various intelligent transportation-related applications. Both vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications will be needed to reliably disseminate information in a vehicular network. In this regard, a roadside unit (RSU) equipped with multiple antennas can improve the network capacity. While the traditional approaches assume antennas to experience independent fading, we consider a more practical uplink scenario where antennas at the RSU experience correlated fading. In particular, we evaluate the packet error probability for two renowned antenna correlation models, i.e., constant correlation (CC) and exponential correlation (EC). We also consider intermediate cooperative vehicles for reliable communication between the source vehicle and the RSU. Here, we derive closed-form expressions for packet error probability which help quantify the performance variations due to fading parameter, correlation coefficients and the number of intermediate helper vehicles. To evaluate the optimal transmit power in this network scenario, we formulate a Stackelberg game, wherein, the source vehicle is treated as a buyer and the helper vehicles are the sellers. The optimal solutions for the asking price and the transmit power are devised which maximize the utility functions of helper vehicles and the source vehicle, respectively. We verify our mathematical derivations by extensive simulations in MATLAB.
△ Less
Submitted 11 August, 2019;
originally announced August 2019.
-
Robust Autocalibrated Structured Low-Rank EPI Ghost Correction
Authors:
Rodrigo A. Lobos,
W. Scott Hoge,
Ahsan Javed,
Congyu Liao,
Kawin Setsompop,
Krishna S. Nayak,
Justin P. Haldar
Abstract:
Purpose: We propose and evaluate a new structured low-rank method for EPI ghost correction called Robust Autocalibrated LORAKS (RAC-LORAKS). The method can be used to suppress EPI ghosts arising from the differences between different readout gradient polarities and/or the differences between different shots. It does not require conventional EPI navigator signals, and is robust to imperfect autocal…
▽ More
Purpose: We propose and evaluate a new structured low-rank method for EPI ghost correction called Robust Autocalibrated LORAKS (RAC-LORAKS). The method can be used to suppress EPI ghosts arising from the differences between different readout gradient polarities and/or the differences between different shots. It does not require conventional EPI navigator signals, and is robust to imperfect autocalibration data.
Methods: Autocalibrated LORAKS is a previous structured low-rank method for EPI ghost correction that uses GRAPPA-type autocalibration data to enable high-quality ghost correction. This method works well when the autocalibration data is pristine, but performance degrades substantially when the autocalibration information is imperfect. RAC-LORAKS generalizes Autocalibrated LORAKS in two ways. First, it does not completely trust the information from autocalibration data, and instead considers the autocalibration and EPI data simultaneously when estimating low-rank matrix structure. And second, it uses complementary information from the autocalibration data to improve EPI reconstruction in a multi-contrast joint reconstruction framework. RAC-LORAKS is evaluated using simulations and in vivo data, including comparisons to state-of-the-art methods.
Results: RAC-LORAKS is demonstrated to have good ghost elimination performance compared to state-of-the-art methods in several complicated EPI acquisition scenarios (including gradient-echo brain imaging, diffusion-encoded brain imaging, and cardiac imaging).
Conclusion: RAC-LORAKS provides effective suppression of EPI ghosts and is robust to imperfect autocalibration data.
△ Less
Submitted 1 October, 2020; v1 submitted 30 July, 2019;
originally announced July 2019.
-
Scattering Mechanisms and Modeling for Terahertz Wireless Communications
Authors:
Shihao Ju,
Syed Hashim Ali Shah,
Muhammad Affan Javed,
Jun Li,
Girish Palteru,
Jyotish Robin,
Yunchou Xing,
Ojas Kanhere,
Theodore S. Rappaport
Abstract:
This paper provides an analysis of radio wave scattering for frequencies ranging from the microwave to the Terahertz band (e.g., 1 GHz - 1 THz), by studying the scattering power reradiated from various types of materials with different surface roughnesses. First, fundamentals of scattering and reflection are developed and explained for use in wireless mobile radio, and the effect of scattering on…
▽ More
This paper provides an analysis of radio wave scattering for frequencies ranging from the microwave to the Terahertz band (e.g., 1 GHz - 1 THz), by studying the scattering power reradiated from various types of materials with different surface roughnesses. First, fundamentals of scattering and reflection are developed and explained for use in wireless mobile radio, and the effect of scattering on the reflection coefficient for rough surfaces is investigated. Received power is derived using two popular scattering models - the directive scattering (DS) model and the radar cross section (RCS) model through simulations over a wide range of frequencies, materials, and orientations for the two models, and measurements confirm the accuracy of the DS model at 140 GHz. This paper shows that scattering can become a prominent propagation mechanism as frequencies extend to millimeter-wave (mmWave) and beyond, but at other times can be treated like simple reflection. Knowledge of scattering effects is critical for appropriate and realistic channel models, which further support the development of massive multiple input-multiple output (MIMO) techniques, localization, ray tracing tool design, and imaging for future 5G and 6G wireless systems.
△ Less
Submitted 8 March, 2019; v1 submitted 6 March, 2019;
originally announced March 2019.
-
MergeNet: A Deep Net Architecture for Small Obstacle Discovery
Authors:
Krishnam Gupta,
Syed Ashar Javed,
Vineet Gandhi,
K. Madhava Krishna
Abstract:
We present here, a novel network architecture called MergeNet for discovering small obstacles for on-road scenes in the context of autonomous driving. The basis of the architecture rests on the central consideration of training with less amount of data since the physical setup and the annotation process for small obstacles is hard to scale. For making effective use of the limited data, we propose…
▽ More
We present here, a novel network architecture called MergeNet for discovering small obstacles for on-road scenes in the context of autonomous driving. The basis of the architecture rests on the central consideration of training with less amount of data since the physical setup and the annotation process for small obstacles is hard to scale. For making effective use of the limited data, we propose a multi-stage training procedure involving weight-sharing, separate learning of low and high level features from the RGBD input and a refining stage which learns to fuse the obtained complementary features. The model is trained and evaluated on the Lost and Found dataset and is able to achieve state-of-art results with just 135 images in comparison to the 1000 images used by the previous benchmark. Additionally, we also compare our results with recent methods trained on 6000 images and show that our method achieves comparable performance with only 1000 training samples.
△ Less
Submitted 17 March, 2018;
originally announced March 2018.
-
Learning Unsupervised Visual Grounding Through Semantic Self-Supervision
Authors:
Syed Ashar Javed,
Shreyas Saxena,
Vineet Gandhi
Abstract:
Localizing natural language phrases in images is a challenging problem that requires joint understanding of both the textual and visual modalities. In the unsupervised setting, lack of supervisory signals exacerbate this difficulty. In this paper, we propose a novel framework for unsupervised visual grounding which uses concept learning as a proxy task to obtain self-supervision. The simple intuit…
▽ More
Localizing natural language phrases in images is a challenging problem that requires joint understanding of both the textual and visual modalities. In the unsupervised setting, lack of supervisory signals exacerbate this difficulty. In this paper, we propose a novel framework for unsupervised visual grounding which uses concept learning as a proxy task to obtain self-supervision. The simple intuition behind this idea is to encourage the model to localize to regions which can explain some semantic property in the data, in our case, the property being the presence of a concept in a set of images. We present thorough quantitative and qualitative experiments to demonstrate the efficacy of our approach and show a 5.6% improvement over the current state of the art on Visual Genome dataset, a 5.8% improvement on the ReferItGame dataset and comparable to state-of-art performance on the Flickr30k dataset.
△ Less
Submitted 16 November, 2018; v1 submitted 17 March, 2018;
originally announced March 2018.
-
Real Time Prediction of Drive by Download Attacks on Twitter
Authors:
Amir Javed,
Pete Burnap,
Omer Rana
Abstract:
The popularity of Twitter for information discovery, coupled with the automatic shortening of URLs to save space, given the 140 character limit, provides cyber criminals with an opportunity to obfuscate the URL of a malicious Web page within a tweet. Once the URL is obfuscated the cyber criminal can lure a user to click on it with enticing text and images before carrying out a cyber attack using a…
▽ More
The popularity of Twitter for information discovery, coupled with the automatic shortening of URLs to save space, given the 140 character limit, provides cyber criminals with an opportunity to obfuscate the URL of a malicious Web page within a tweet. Once the URL is obfuscated the cyber criminal can lure a user to click on it with enticing text and images before carrying out a cyber attack using a malicious Web server. This is known as a drive-by- download. In a drive-by-download a user's computer system is infected while interacting with the malicious endpoint, often without them being made aware, the attack has taken place. An attacker can gain control of the system by exploiting unpatched system vulnerabilities and this form of attack currently represents one of the most common methods employed. In this paper, we build a machine learning model using machine activity data and tweet meta data to move beyond post-execution classification of such URLs as malicious, to predict a URL will be malicious with 99.2% F-measure (using 10-fold cross validation) and 83.98% (using an unseen test set) at 1 second into the interaction with the URL. Thus providing a basis from which to kill the connection to the server before an attack has completed and proactively blocking and preventing an attack, rather than reacting and repairing at a later date.
△ Less
Submitted 19 August, 2017;
originally announced August 2017.
-
Object-Level Context Modeling For Scene Classification with Context-CNN
Authors:
Syed Ashar Javed,
Anil Kumar Nelakanti
Abstract:
Convolutional Neural Networks (CNNs) have been used extensively for computer vision tasks and produce rich feature representation for objects or parts of an image. But reasoning about scenes requires integration between the low-level feature representations and the high-level semantic information. We propose a deep network architecture which models the semantic context of scenes by capturing objec…
▽ More
Convolutional Neural Networks (CNNs) have been used extensively for computer vision tasks and produce rich feature representation for objects or parts of an image. But reasoning about scenes requires integration between the low-level feature representations and the high-level semantic information. We propose a deep network architecture which models the semantic context of scenes by capturing object-level information. We use Long Short Term Memory(LSTM) units in conjunction with object proposals to incorporate object-object relationship and object-scene relationship in an end-to-end trainable manner. We evaluate our model on the LSUN dataset and achieve results comparable to the state-of-art. We further show visualization of the learned features and analyze the model with experiments to verify our model's ability to model context.
△ Less
Submitted 2 June, 2017; v1 submitted 11 May, 2017;
originally announced May 2017.
-
Phen-Gen: combining phenotype and genotype to analyze rare disorders
Authors:
Asif Javed,
Saloni Agrawal,
Pauline C. Ng
Abstract:
We introduce Phen-Gen, a method which combines patient disease symptoms and sequencing data with prior domain knowledge to identify the causative gene(s) for rare disorders.
We introduce Phen-Gen, a method which combines patient disease symptoms and sequencing data with prior domain knowledge to identify the causative gene(s) for rare disorders.
△ Less
Submitted 27 February, 2015;
originally announced February 2015.
-
Teaching Parallel Programming Using Java
Authors:
Aamir Shafi,
Aleem Akhtar,
Ansar Javed,
Bryan Carpenter
Abstract:
This paper presents an overview of the "Applied Parallel Computing" course taught to final year Software Engineering undergraduate students in Spring 2014 at NUST, Pakistan. The main objective of the course was to introduce practical parallel programming tools and techniques for shared and distributed memory concurrent systems. A unique aspect of the course was that Java was used as the principle…
▽ More
This paper presents an overview of the "Applied Parallel Computing" course taught to final year Software Engineering undergraduate students in Spring 2014 at NUST, Pakistan. The main objective of the course was to introduce practical parallel programming tools and techniques for shared and distributed memory concurrent systems. A unique aspect of the course was that Java was used as the principle programming language. The course was divided into three sections. The first section covered parallel programming techniques for shared memory systems that include multicore and Symmetric Multi-Processor (SMP) systems. In this section, Java threads was taught as a viable programming API for such systems. The second section was dedicated to parallel programming tools meant for distributed memory systems including clusters and network of computers. We used MPJ Express-a Java MPI library-for conducting programming assignments and lab work for this section. The third and the final section covered advanced topics including the MapReduce programming model using Hadoop and the General Purpose Computing on Graphics Processing Units (GPGPU).
△ Less
Submitted 27 August, 2014;
originally announced October 2014.